Create effective and secure software solutions using contemporary software development languages to deliver the full range of functional and non-functional requirements using relevant development methodologies
Undertake analysis and design to create artefacts, such as use cases to produce robust software designs
Produce high quality code with sound syntax in at least one language following best practices and standards
Perform code reviews, debugging and refactoring to improve code quality and efficiency
Test code to ensure that the functional and non-functional requirements have been met
Deliver software solutions using industry standard build processes, and tools for configuration management, version control and software build, release and deployment into enterprise environments
Plan, design, build and test a simple network to a requirement specification that includes hubs, switches, routers and wireless user devices, applying appropriate security products and processes
Determine the minimum network capacity of planned networks to meet network requirements
Analyse network performance and troubleshoot typical problems in networks
Identify the key characteristics of a new network service and develop estimates of the expected traffic intensity and traffic load that the network must support
Design, build, test, configure and optimise a distributed network (more than 1 sub- net), including switches, routers and firewalls to meet given requirements
Identify and evaluate network security risks and incorporate appropriate security products and processes into network designs to increase security, resilience and dependability
Perform technical process improvement tasks in a range of environments to solve business problems
Recommend options based upon risks, costs vs benefits, and impact on other business processes
Support training of end-users in preparation for system activation
Present optimised solutions to improve business process and workflows through improved technology
Participate in walk-throughs for IT, to identify and document key risks within a client’s organisation
Evaluate the success of a new system, process, initiative, etc
Import, cleanse, transform, and validate data with the purpose of understanding or making conclusions from the data for business decision making purposes
Present data visualisation using charts, graphs, tables, and more sophisticated visualisation tools
Perform routine statistical analyses and ad-hoc queries
Use a range of analytical techniques such as data mining, time series forecasting and modelling techniques to identify and predict trends and patterns in data
Report on conclusions gained from analysing data using a range of statistical software tools
Summarise and present results to a range of stakeholders making recommendations
Analyse and evaluate security threats and vulnerabilities to planned and installed information systems or services and identify how these can be mitigated against
Develop a security case against recognised security threats, and recommend mitigation, security controls and appropriate processes
Perform a business impact analysis in response to a security incident and follow a disaster recovery plan to meet elements of a given business continuity policy
Perform security risk assessments for a range of information systems and propose solutions
Define and justify a user access policy for an information system given knowledge of the system architecture, security requirements and threat/risk environment. This should be in terms of what they can do, resources they can access, and operations they are allowed to perform.
Conduct a range of cyber security audit activities to demonstrate security control effectiveness
Develop and apply modelling and analysis techniques to describe business problem scenarios and to help select solutions using a range of industry standard analysis techniques
Develop a clear, complete, unambiguous and testable requirements specification, including functional, non- functional, data, user interface and security requirements
Evaluate selected models against business objectives and system requirements
Elicit and prioritise business requirements for a digital technology system using ‘industry best practice’ methods
Model the ‘as is’ and future state for a business process using industry standard approaches and notation
Use ‘industry’ standard tools to facilitate the analysis, documentation and traceability of requirements
A Cyber Security Analyst is responsible for the implementation, maintenance and support of the security controls that protect an organisation’s systems and data assets from threats and hazards.
They ensure that security technologies and practices are operating in accordance with the organisation’s policies and standards to provide continued protection. They require a broad understanding of network infrastructure, software and data to identify where threat and hazard can occur. They are responsible for performing periodic vulnerability assessments to evaluate the organisation’s ongoing security posture and will provide visibility to management of the main risks and control status on an ongoing basis. They respond to security incidents and implement resolution activities across the organisation.
A cyber security analyst is responsible for the implementation, maintenance and support of the security controls that protect an organisation’s systems and data assets from threats and hazards. They ensure that security technologies and practices are operating in accordance with the organisation’s policies and standards to provide continued protection. They require a broad understanding of network infrastructure, software and data to identify where threat and hazard can occur. They are responsible for performing periodic vulnerability assessments to evaluate the organisation’s ongoing security posture and will provide visibility to management of the main risks and control status on an ongoing basis. They respond to security incidents and implement resolution activities across the organisation.
Skills
Be able to:
Technical Knowledge
Knows and understands:
we went with; wizard pi