Skip to main content
icon

Cybersecurity

Secure Configuration

Secure Configuration is the proficiency in establishing and maintaining safety parameters on networked systems. It involves knowledge of cybersecurity principles, meticulous attention to detail and regular updates to counter emerging threats. Effectively executed, it shields critical operations from unauthorized access, ensuring operational continuity and data integrity.

Level 1: Emerging

At a foundational level you are able to follow clear instructions to set up basic security settings on systems and devices. You understand the importance of keeping software up to date and spotting simple misconfigurations. By doing this, you help reduce obvious risks and support the safety of your organization’s information.

Level 2: Proficient

At a developing level you are able to follow clear instructions to apply basic security settings on systems and devices. You recognize why secure configuration matters and seek guidance when adjusting standard settings or updating software. Your careful approach helps prevent simple threats and lays the groundwork for stronger cybersecurity in your team.

Level 3: Advanced

At a proficient level you are able to apply secure configuration practices to a range of systems and devices, following organizational standards and current cybersecurity guidelines. You can identify and correct common vulnerabilities independently, ensuring systems remain resilient against threats. Your actions help maintain secure operations and protect sensitive information from unauthorised access.

Vulnerability Management

Vulnerability Management is the process of identifying, assessing, and mitigating cybersecurity risks. capabilityed in utilising preventative tools, these individuals continuously monitor, evaluate and deploy protective strategies against potential threats. Their actions limit exposure, contribute to a robust cybersecurity framework and safeguard organizational infrastructures, thereby ensuring data integrity and reliability.

Level 1: Emerging

At a foundational level you are aware of common cybersecurity vulnerabilities and the importance of keeping systems up to date. You follow basic procedures to report suspected issues and assist with routine checks under guidance. Your actions help reduce risks and support the organization’s broader efforts to protect information and systems.

Level 2: Proficient

At a developing level you are able to identify common cybersecurity vulnerabilities using basic tools and follow established procedures to help manage them. You support more experienced colleagues by gathering information and reporting potential risks. Your actions help reduce simple security gaps and add to the organization’s overall cyber safety.

Level 3: Advanced

At a proficient level you are capabilityed at identifying and assessing cybersecurity vulnerabilities using established tools and processes. You routinely prioritize risks, recommend suitable responses, and oversee the implementation of solutions within your area. Your actions strengthen the organization’s defences and reduce the likelihood of incidents impacting critical systems or data.

Threat Intelligence Analysis

Threat Intelligence Analysis is essential knowledge in countering cyberattacks. It encompasses the ability to interpret and mitigate potential cyber threats by analyzing patterns and predictive data. Consequently, it safeguards data integrity and builds a resilient digital environment, improving overall cybersecurity.

Level 1: Emerging

At a foundational level you are able to recognize basic cyber threats and understand how they might impact your organization. You use established sources to stay aware of common risks and report unusual activity to the right teams. This means you help protect data and support a safer digital environment from the ground up.

Level 2: Proficient

At a developing level you are able to recognize basic threat patterns and gather simple intelligence from clear sources. You use guidance to help analyze data, beginning to spot potential cyber risks within your area of work. This helps your team respond more quickly to emerging threats and protect key information.

Level 3: Advanced

At a proficient level you are capabilityed at gathering and interpreting threat intelligence to spot emerging cyber risks. You can recognize patterns in incidents and use these insights to recommend practical defences for your organization. Your work helps safeguard systems and builds a more secure digital environment.

Security Risk Assessment

Security Risk Assessment is the systematic identification and evaluation of potential cybersecurity threats or vulnerabilities. It involves analyzing an organization's digital infrastructure and data handling practices, aiming to highlight potential areas where breaches could occur. Executing effective Security Risk Assessments contributes to robust cybersecurity strategies, minimizing potential damage from cyber-attacks, and ensuring data protection compliance.

Level 1: Emerging

At a foundational level you are able to recognize basic cybersecurity risks and understand why identifying these threats is important. You follow clear instructions to help gather information for security risk assessments. Your involvement helps your team spot obvious vulnerabilities, contributing to a safer digital environment for the organization.

Level 2: Proficient

At a developing level you are able to assist with identifying basic security risks and support more experienced staff during risk assessments. You follow established procedures and contribute to gathering and documenting relevant information. Your involvement helps your team build a more complete understanding of the organization’s cybersecurity threats.

Level 3: Advanced

At a proficient level you are able to independently conduct thorough security risk assessments across a range of digital systems and processes. You can identify and evaluate threats and vulnerabilities, clearly outlining the potential business impact. Your work directly strengthens your organization’s ability to prioritize risks and improve its overall cyber resilience.

Security Policy Compliance

Security Policy Compliance is the ability to adhere to and implement security protocols established by an organization. This capability requires understanding the scope of various cybersecurity policies, ensuring that all business operations align with set guidelines. It further impacts the organization's security posture by minimizing risk exposure and protecting sensitive data.

Level 1: Emerging

At a foundational level you are aware of your organization’s cybersecurity policies and follow them in your daily work. You recognize the importance of these rules for protecting sensitive information and reducing risks. By consistently applying basic security protocols, you help maintain a safer digital environment for everyone.

Level 2: Proficient

At a developing level you are beginning to follow the organization’s security policies in your daily work, asking questions where you are unsure. You can identify when your actions align or do not align with key security procedures. Your growing awareness helps reduce basic errors and supports safer practices across your team.

Level 3: Advanced

At a proficient level you are consistently applying organizational security policies to your daily work and ensuring your team adheres to these protocols. You understand the importance of following detailed procedures when handling sensitive data and responding to security incidents. Through your reliable compliance, you help reduce risks and strengthen the overall security of your organization.

Security Monitoring

Security Monitoring is a critical capability in Cybersecurity, built upon vigilance, knowledge, and prompt response. It involves the continuous observation and assessment of systems to detect, analyze and address potential threats. This capability is instrumental in protecting data integrity, thus safeguarding an organization's reputation and operations.

Level 1: Emerging

At a foundational level you are able to follow basic security monitoring procedures and report unusual activity or alerts to the appropriate team members. You understand the importance of vigilance and know how to use standard monitoring tools under supervision. Your actions help maintain day-to-day system safety and support a rapid response to potential cybersecurity threats.

Level 2: Proficient

At a developing level you are beginning to recognize common security events and follow established procedures to report them. You rely on guidance when monitoring systems and interpreting potential threats, but you are building confidence in using security tools. Your actions help ensure that early risks are noticed and escalated to protect organizational information.

Level 3: Advanced

At a proficient level you are able to independently monitor security systems, interpret alerts, and recognize unusual activity that could signal a threat. You confidently apply established procedures to investigate incidents and escalate them when needed. Your vigilance helps protect sensitive data and supports the organization’s ongoing security and reputation.

Security Logging and Reporting

Security Logging and Reporting is the systematic recording and analysis of cybersecurity events. It involves the proficient use of tools to collect, store, and interpret data relating to security incidents, thereby assessing potential threats. The effectiveness of this capability can strengthen an organization's security stance, and predict future breaches, aiding strategic decision-making.

Level 1: Emerging

At a foundational level you are able to recognize and follow basic procedures for recording security events using standard logging tools. You understand why accurate logging and simple reporting are important for detecting potential threats and supporting investigations. Your careful attention helps your team respond quickly to suspicious activity.

Level 2: Proficient

At a developing level you are able to use basic security logging tools to record and review cybersecurity events under guidance. You can recognize routine patterns in logs and raise concerns about unusual activity to senior team members. Your work helps to maintain foundational awareness of security incidents in the organization.

Level 3: Advanced

At a proficient level you are able to consistently collect, review and interpret security log data using established tools and methods to identify threats or unusual activity. You monitor and investigate security events, escalating issues where required, and support team reporting on findings. Your actions help strengthen the organization’s response to incidents and improve overall security awareness.

Security Incident Detection

Security Incident Detection is the ability to identify and discern potential cybersecurity threats and breaches. This capability necessitates an acute understanding of system vulnerabilities, robust analytic skills and a comprehensive knowledge of threat landscape. This subsequently aids in mitigating damage, preventing future breaches and fortifying security infrastructure.

Level 1: Emerging

At a foundational level you are able to recognize common signs of a cybersecurity incident, such as suspicious emails or unusual system activity. You know when and how to report concerns using your organization’s processes. Your vigilance helps the security team act quickly to minimize potential harm.

Level 2: Proficient

At a developing level you are beginning to recognize common signs of security incidents and know when to escalate concerns to more experienced team members. You follow established procedures to report and document suspicious activity, helping protect systems from basic threats. Your awareness supports your team’s efforts to maintain a secure environment.

Level 3: Advanced

At a proficient level you are able to reliably detect and assess security incidents, using your strong understanding of threats, vulnerabilities and typical attack behaviors. You routinely review alerts, analyze suspicious activity and escalate genuine risks for response. Your work reduces the impact of incidents and increases the organization’s readiness to prevent future breaches.

Security Controls Implementation

Security Controls Implementation is the adept application of measures to protect information systems and data. This involves utilising advanced knowledge of security systems and procedures in a practical setting. Through implementing robust cybersecurity protocols, professionals aid in the reduction of risk, safeguarding vital systems, and defending against malicious cyber activities.

Level 1: Emerging

At a foundational level you are able to follow basic instructions to apply simple security controls, such as setting strong passwords and updating software on your devices. You recognize the importance of these actions in protecting information and systems. By reliably carrying out these tasks, you support your team’s overall cybersecurity efforts.

Level 2: Proficient

At a developing level you are able to apply basic security controls under guidance, following established procedures to help protect systems and data. You understand why these controls matter and can support their implementation within your area of work. Your contributions help your team maintain a safer computing environment and reduce common cyber risks.

Level 3: Advanced

At a proficient level you are able to independently select, configure, and apply a range of security controls to protect systems and data across your area of responsibility. You consider business needs and adapt established solutions to changing threats and environments. Your actions reduce vulnerabilities and help ensure the ongoing safety of critical information assets.

Security Awareness Training

Security Awareness Training is the process of educating employees about the potential risks and impacts associated with cyber incidents. This capability involves understanding and identifying cyber threats, knowing how to prevent them, and how to respond if they occur. The outcome is a safer workplace environment, better protected from cyber threats.

Level 1: Emerging

At a foundational level you are aware of common cyber threats, such as phishing and weak passwords, and understand the basic steps to protect sensitive information. You follow guidance on safe online practices and report anything suspicious to the appropriate contact. By doing this, you help reduce risk and contribute to a safer workplace.

Level 2: Proficient

At a developing level you are starting to recognize common cyber threats and understand basic security practices. You participate in security awareness training and follow standard procedures, asking for guidance when unsure. This helps you avoid simple mistakes and begin contributing to the organization’s safer digital environment.

Level 3: Advanced

At a proficient level you are able to recognize and respond to common cyber threats, such as phishing, social engineering, and suspicious links, without supervision. You understand the importance of ongoing security awareness and encourage safe practices among your team. This helps prevent incidents and builds a stronger culture of cybersecurity in your workplace.

Regulatory Compliance (Cyber)

Regulatory Compliance (Cyber) is adherence to legal, ethical, and professional standards set for cybersecurity practices. It calls for a deep understanding of cybersecurity laws and industry norms, and the ability to implement such knowledge to maintain secure systems. This capability shapes a safe digital environment, protecting organizational and client data from cyber threats while maintaining legal equilibrium.

Level 1: Emerging

At a foundational level you are aware of basic cybersecurity regulations and your organization’s key policies for handling data and digital systems. You follow established procedures to keep information secure and seek guidance if you are unsure about compliance requirements. Your attention to these basics helps the organization meet its legal obligations and build client trust.

Level 2: Proficient

At a developing level you are beginning to recognize key cybersecurity laws and standards relevant to your role, and you follow set compliance processes with guidance. You can identify when something does not meet regulatory requirements and seek help to address it. This helps your team maintain secure practices and avoid potential legal risks.

Level 3: Advanced

At a proficient level you are able to interpret and apply current cybersecurity laws and regulations to your daily work, ensuring systems and data remain compliant. You confidently manage compliance processes and resolve routine issues with minimal supervision. Your reliable actions help protect the organization from regulatory risks and foster trust with clients and partners.

Penetration Testing

Penetration Testing is a critical method of assessing the security of digital systems. This process involves simulating cyber-attacks to identify areas of weakness in the system, therefore preventing exploitation by malicious hackers. Proficiency in this area requires adept analytical skills, strong knowledge of network systems, and consistent attention to emerging cyber threats. This ability not only reinforces system security but also significantly mitigates the risk of severe data breaches.

Level 1: Emerging

At a foundational level you are familiar with the basic purpose of penetration testing and can recognize common types of system vulnerabilities. You understand why controlled testing is important for protecting information and can follow instructions to support more experienced team members. Your involvement helps strengthen the organization’s defences from the outset.

Level 2: Proficient

At a developing level you are able to assist in basic penetration testing activities under supervision, following established procedures to help identify common vulnerabilities. You contribute to documenting findings and support more experienced team members in the analysis of results. Your efforts help the cybersecurity team strengthen system defences and build your confidence for more advanced testing work.

Level 3: Advanced

At a proficient level you are able to independently plan and carry out penetration tests on a range of systems, accurately identifying and reporting security gaps. You use up-to-date techniques and tools to simulate real-world cyber threats, ensuring findings are practical and understandable. Your work directly helps prevent breaches and improves the organization’s overall security.

Business Continuity (Cyber)

Business Continuity (Cyber) is the ability to maintain essential functions during, and following, a cyber threat. It covers the knowledge needed to create, implement, and manage cyber resilience strategies. This capability ensures organizational resistance to cyber threats and effective recovery post-incident.

Level 1: Emerging

At a foundational level you are aware of basic business continuity principles in the context of cyber threats. You recognize the importance of following established procedures during a cyber incident and understand your role in supporting organizational resilience. Your actions help ensure essential services continue with minimal disruption.

Level 2: Proficient

At a developing level you are able to support basic business continuity activities in response to cyber threats. You help follow established plans, report incidents, and assist with simple recovery steps so essential services can continue. Your work helps ensure others can carry out their roles during and after minor cyber incidents.

Level 3: Advanced

At a proficient level you are able to develop and maintain practical business continuity plans focused on cyber threats. You can lead the response to a cyber incident, coordinate recovery efforts, and ensure essential services are restored quickly. Your actions help the organization minimize disruption and build lasting cyber resilience.

Network Security Management

Network Security Management is the aptitude to maintain, update and monitor security hardware and software to counter potential cybersecurity threats. Involving the development and execution of security protocols and policies, it's essential in safeguarding organizational assets. This capability positively impacts by enhancing a business's resilience against cyber attacks, safeguarding integral data and systems.

Level 1: Emerging

At a foundational level you are able to follow basic network security procedures set by your organization, such as using approved passwords and correctly handling equipment. You recognize common cyber risks and know when to report anything unusual. Your actions help your team keep systems and data safer from basic threats.

Level 2: Proficient

At a developing level you are able to support basic network security tasks, such as helping to apply standard updates and following set protocols. You work with guidance to monitor security tools and report issues or suspicious activity to more experienced colleagues. Your actions contribute to maintaining secure networks and reducing risks to the organization’s data and systems.

Level 3: Advanced

At a proficient level you are able to independently manage and update network security systems, following established protocols and addressing common threats as they arise. You apply policies effectively, monitor key security tools, and ensure their continued reliability. Your work strengthens your organization’s ability to prevent disruptions and protect critical data from cyber attacks.

Malware Analysis

Malware Analysis is the practice of dissecting and examining malicious software to understand its purpose, functionality, and impact. This involves rigorous knowledge of technology platforms, programming, and operating systems. Proficiency in this capability enables the pro-active detection of security threats, prevention of potential breaches and the design and implementation of effective defense strategies, ensuring organizational cyber resilience.

Level 1: Emerging

At a foundational level you are aware of what malware is and understand its basic forms and how it impacts systems and data. You can recognize simple signs of malware infection and follow set procedures to report or escalate suspected incidents. Your actions support early detection and help protect the organization from basic cyber threats.

Level 2: Proficient

At a developing level you are able to recognize common types of malware and use basic tools to examine suspicious files safely. You follow established procedures to support investigations and document your findings clearly. You contribute to the early detection of threats and help your team strengthen the organization’s cyber defences.

Level 3: Advanced

At a proficient level you are able to independently analyze and interpret malware, identifying how it operates and the risks it poses to your organization’s systems. You confidently apply established tools and techniques to uncover threats and support incident response. Your work helps prevent security breaches and strengthens the organization’s overall cyber resilience.

Incident Response Coordination

Incident Response Coordination is the capability to manage and construct a swift, effective response to cybersecurity breaches or threats. This involves recognizing potential incidents, determining their impact and coordinating a multidisciplinary response. This capability requires a high level of organizational know-how, strong technical understanding and superb communicative skills.

Level 1: Emerging

At a foundational level you are able to recognize and report basic signs of a potential cybersecurity incident, following predefined procedures. You understand your role in alerting the right people and providing accurate information. Your quick actions help ensure incidents are escalated early, reducing potential harm to the organization.

Level 2: Proficient

At a developing level you are starting to recognize signs of potential cybersecurity incidents and know when to alert more experienced colleagues. You follow established procedures to support basic response tasks and learn from hands-on involvement. Your actions help ensure incidents are logged and communicated promptly, supporting the overall team response.

Level 3: Advanced

At a proficient level you are able to recognize and assess cybersecurity incidents quickly and coordinate effective responses involving relevant teams. You understand the steps needed to contain and resolve threats, clearly communicating roles and actions. Your coordination helps minimize disruption and keeps the organization informed throughout the response process.

Identity and Access Management

Identity and Access Management is the safeguarding practice in cybersecurity ensuring that the right individuals get access to the right resources, at the right times and for the right reasons. Effective controls include password protection, access rights verification and limiting system privileges. Mastery of this capability reduces unauthorised access, enhancing system security and integrity.

Level 1: Emerging

At a foundational level you are aware of the importance of protecting logins and following your organization’s access guidelines. You use strong passwords, report any suspicious activity, and only access information needed for your role. By doing this, you help prevent unauthorised access and support your organization’s overall security.

Level 2: Proficient

At a developing level you are starting to apply basic identity and access management principles in your daily work, such as following guidelines for strong passwords and carefully handling login details. You understand why access controls matter and you check before sharing system access with others. By doing this, you help reduce risks of unauthorised access in your team.

Level 3: Advanced

At a proficient level you are able to manage user identities and access rights across multiple systems, following established cybersecurity protocols. You assess and adjust permissions to ensure only authorized users can access sensitive information. Your actions help prevent security breaches and maintain the trustworthiness of organizational data.

Endpoint Protection Management

Endpoint Protection Management is the capabilityful administration of systems designed to secure network endpoints. This includes knowledge of intrusion detection, malware protection, and data leak prevention techniques. It's paramount for protecting an organization's digital operations by preventing, detecting and responding to cyber threats on endpoint devices.

Level 1: Emerging

At a foundational level you are aware of the basic principles of securing endpoint devices, such as recognizing common threats like malware and understanding the purpose of antivirus and security updates. You follow security policies and report suspicious activity as required. By doing so, you help maintain a safer environment for digital work in your organization.

Level 2: Proficient

At a developing level you are able to follow established processes to support endpoint protection, such as using approved tools to identify threats and applying basic remediation steps. You recognize common cybersecurity risks affecting endpoints and know when to seek guidance for complex issues. Your actions help maintain the organization’s digital safety and reduce risk.

Level 3: Advanced

At a proficient level you are able to independently manage and maintain endpoint protection across a range of systems, applying best practices to detect and respond to threats. You reliably configure and monitor tools for malware protection, intrusion detection, and data loss prevention. Your skills help prevent security incidents and ensure your organization’s endpoints stay secure.

Data Loss Prevention

Data Loss Prevention is a cybersecurity capability focused on safeguarding sensitive data from outside threats and internal vulnerabilities. It entails the provision of robust security measures, regular network monitoring and the establishment of effective protocols to prevent data leakage. This capability is crucial in maintaining data integrity, protecting user privacy and ensuring organizational compliance with data protection regulations.

Level 1: Emerging

At a foundational level you are aware of the importance of protecting sensitive data and follow basic procedures to help prevent data leaks. You understand your responsibility to handle information securely and know when to seek guidance if you notice suspicious activity. Your actions support a safe and compliant work environment.

Level 2: Proficient

At a developing level you are able to follow set procedures to identify and report potential data loss incidents. You apply basic data loss prevention tools under guidance, and contribute to maintaining security by handling sensitive information with care. Your actions support the wider cybersecurity team in protecting organizational data and reducing the risk of breaches.

Level 3: Advanced

At a proficient level you are able to implement and manage data loss prevention tools and processes to reliably protect sensitive data within your organization. You proactively monitor for risks, follow set protocols, and quickly address incidents to minimize impact. Your actions help ensure compliance and maintain trust in your organization’s information security.

Cloud Security Management

Cloud Security Management is the proficiency in safeguarding data, applications, and infrastructures involved in cloud computing. This encompasses understanding the unique risks and threats imposed by cloud environments, implementing preventive, mitigative and corrective controls. Mastery of this capability aids in protecting privacy, maintaining data integrity, and achieving compliance, significantly reducing the risk of cyber incidents.

Level 1: Emerging

At a foundational level you are aware of the basic concepts and risks of cloud security and understand why protecting information in the cloud is important. You can follow standard security procedures when working with cloud platforms and ask for help when needed. Your careful actions help prevent simple security incidents in cloud environments.

Level 2: Proficient

At a developing level you are beginning to recognize common cloud security risks and apply basic safeguards under guidance. You follow established policies to help protect data and systems in cloud environments. Your actions support the team in reducing vulnerabilities and improving compliance, though you still rely on colleagues for more complex security challenges.

Level 3: Advanced

At a proficient level you are able to assess cloud security risks and apply standard security controls across cloud platforms. You proactively monitor for threats, respond to incidents, and ensure data protection aligns with compliance requirements. Your work keeps sensitive information safer and helps your organization maintain trust and meet legal obligations.

Capabilities