Level 4 -
Apply an understanding of cyber security to protect from attacks and unauthorised access.
Reference: OCC1021A
Status:
SOC 2020 sub unit groups:
QinetiQ CGI IASME Sky Siemens Dark Trace BT Fujitsu DCMS Cabinet Office JBC FoxRedRisk
This occupation is found in all sectors and organisations that employ technology, for example Digital, Telecoms, Technology, Business Services, Defence, Government, Finance, Health, Retail, Critical National Infrastructure, Transport, Automotive sectors; and in all types and sizes of organisation including large corporates, public sector bodies, academic institutions, charities, and small and medium enterprise (SME).
The broad purpose of the occupation is to apply an understanding of cyber security to protect organisations, systems, information, personal data and people from attacks and unauthorised access.
Fighting cyber security threats is a multi-billion-pound industry, and one that continues to grow as threats from the likes of malware, ransomware, phishing, DDoS attacks and hacking increase. Organisations both large and small are turning to cyber security professionals to help them keep their commercial and financial data, websites, infrastructure sites and their customers' details safe.
With almost all personal data now stored online, cyber security attacks have the potential to completely ruin businesses - not to mention people's lives - in the process. There are often
news stories about high-profile attacks, such as those on the NHS, Yahoo and LinkedIn, meaning that organisations are becoming increasingly concerned with any potential leaks that could occur. In fact, nearly half of all UK businesses experienced some form of attack in the last 12 months. As a cyber-security technologist, you will be part of the response to those attacks.
Cyber Security Technologists all require an understanding of security concepts and technology and how to mitigate risks arising from threats. The specific tasks undertaken vary depending on what needs to be achieved by the team at any particular time. Some tasks may be very technical, others may be more analytical, business or user focused. All roles in this occupation work to achieve required cyber security outcomes in a legal and regulatory context in all parts of the economy. They develop and apply practical knowledge of information security to deliver solutions that fulfil an organisations requirement.
The Cyber Security Technologist standard has three distinct options. At the end of the apprenticeship you will be competent in either:
1) The Cyber Security Engineer is the most technology focused role in the occupation and will typically design, build and test secure networks or security products or systems with a particular focus on the security aspects of the design.
Typical job titles include: Cyber Security Engineer, Cyber Security Consultant, Cyber Security Architect, Cyber Security Analyst, Cyber Security Specialist, IT Security Technician, Embedded Engineer.
2) The Cyber Risk Analyst Focuses on risk assessment, analysis and giving advice on risk mitigations. The roles may support formal security governance, regulatory & compliance (GRC).
Typical job titles include: Cyber Security Consultant, Cyber Security Analyst, Cyber Risk Analyst, Intelligence Researcher, Cyber Security Specialist, Information Security Analyst, Governance & Compliance Analyst, Information Security Assurance & Threat Analyst, Information Security Auditor.
3) The Cyber Defender & Responder is more operationally focused, configuring and operating secure systems to prevent security breaches or monitoring systems to detect and respond to security breaches.
Typical job titles include: Cyber Security Analyst, Cyber Security Operator, Forensics & Incident Response Analyst, Cyber Security Administrator, Information Security Officer, Secure Operations Centre (SOC) Analyst, Network Intrusion Analyst, Incident Response Centre (IRC) Analyst, Network Operations Centre (NOC) Security Analyst.
In their daily work, an employee in this occupation interacts with a broad range of people from their own organisation and externally including suppliers and customers, technical specialists, non-specialists, peers and senior representatives. The roles are typically office or computer room/lab based. Some employers will also have security clearance requirements, which may impose residency or nationality restrictions. An employee in this occupation will be responsible for their own work, work as part of a team including different levels of technical and non-technical skills, and may also be required to supervise work, budgets and other staff.
QinetiQ CGI IASME Sky Siemens Dark Trace BT Fujitsu DCMS Cabinet Office JBC FoxRedRisk
Identify cyber vulnerabilities in a system to ensure security is maintained.
Identify security threats and hazards to a system, service or processes to inform risk assessments and design of security features
Research and investigate attack techniques and recommend ways to defend against them
Support cyber security risk assessments, cyber security audits and cyber security incident management
Develop security designs with design justification to meet the defined cyber security parameters.
Configure, deploy and use computer, digital network and cyber security technology.
Develop program code or scripts for a computer or other digital technology for example an industrial control system
Write reports, give verbal reports and presentations in the context of the cyber security role
Manage cyber security operations processes in accordance with organisational policies and standards and business requirements.
Participate in cyber war gaming and simulations (technical & non-technical).for example to better understand cyber-attack and defence, rehearse responses, test and evaluate cyber security techniques
Keep up to date with industry trends and developments to enhance relevant skills and take responsibility for own professional development
Manage local response to non-major cyber security incidents
Monitor technology systems (for example computer networks and computer systems) in real time to detect cyber security incidents, breaches and intrusions
Integrate and correlate information from a variety of sources and form an informed judgement on whether an indicator constitutes a likely security incident, breach or intrusion.
Respond to a suspected security incident, breach or intrusion in accordance with organisation procedures any defined service level agreements or performance targets.
Prevent security breaches using a variety of tools techniques and processes.
This occupational progression map shows technical occupations that have transferable knowledge and skills.
In this map, the focused occupation is highlighted in yellow. The arrows indicate where transferable knowledge and skills exist between two occupations. This map shows some of the strongest progression links between the focused occupation and other occupations.
It is anticipated that individuals would be required to undertake further learning or training to progress to and from occupations. To find out more about an occupation featured in the progression map, including the learning options available, click the occupation.
Progression decisions have been reached by comparing the knowledge and skills statements between occupational standards, combined with individualised learner movement data.
Digital