Cyber Security

Specialism

Core Skills

Create effective and secure software solutions using contemporary software development languages to deliver the full range of functional and non-functional requirements using relevant development methodologies

Undertake analysis and design to create artefacts, such as use cases to produce robust software designs

Produce high quality code with sound syntax in at least one language following best practices and standards

Perform code reviews, debugging and refactoring to improve code quality and efficiency

Test code to ensure that the functional and non-functional requirements have been met

Deliver software solutions using industry standard build processes, and tools for configuration management, version control and software build, release and deployment into enterprise environments

Core Skills

Plan, design, build and test a simple network to a requirement specification that includes hubs, switches, routers and wireless user devices, applying appropriate security products and processes

Determine the minimum network capacity of planned networks to meet network requirements

Analyse network performance and troubleshoot typical problems in networks

Identify the key characteristics of a new network service and develop estimates of the expected traffic intensity and traffic load that the network must support

Design, build, test, configure and optimise a distributed network (more than 1 sub- net), including switches, routers and firewalls to meet given requirements

Identify and evaluate network security risks and incorporate appropriate security products and processes into network designs to increase security, resilience and dependability

Core Skills

Perform technical process improvement tasks in a range of environments to solve business problems

Recommend options based upon risks, costs vs benefits, and impact on other business processes

Support training of end-users in preparation for system activation

Present optimised solutions to improve business process and workflows through improved technology

Participate in walk-throughs for IT, to identify and document key risks within a client’s organisation

Evaluate the success of a new system, process, initiative, etc

Core Skills

Import, cleanse, transform, and validate data with the purpose of understanding or making conclusions from the data for business decision making purposes

Present data visualisation using charts, graphs, tables, and more sophisticated visualisation tools

Perform routine statistical analyses and ad-hoc queries

Use a range of analytical techniques such as data mining, time series forecasting and modelling techniques to identify and predict trends and patterns in data

Report on conclusions gained from analysing data using a range of statistical software tools

Summarise and present results to a range of stakeholders making recommendations

Core Skills

Analyse and evaluate security threats and vulnerabilities to planned and installed information systems or services and identify how these can be mitigated against

Develop a security case against recognised security threats, and recommend mitigation, security controls and appropriate processes

Perform a business impact analysis in response to a security incident and follow a disaster recovery plan to meet elements of a given business continuity policy

Perform security risk assessments for a range of information systems and propose solutions

Define and justify a user access policy for an information system given knowledge of the system architecture, security requirements and threat/risk environment. This should be in terms of what they can do, resources they can access, and operations they are allowed to perform.

Conduct a range of cyber security audit activities to demonstrate security control effectiveness

Core Skills

Develop and apply modelling and analysis techniques to describe business problem scenarios and to help select solutions using a range of industry standard analysis techniques

Develop a clear, complete, unambiguous and testable requirements specification, including functional, non- functional, data, user interface and security requirements

Evaluate selected models against business objectives and system requirements

Elicit and prioritise business requirements for a digital technology system using ‘industry best practice’ methods

Model the ‘as is’ and future state for a business process using industry standard approaches and notation

Use ‘industry’ standard tools to facilitate the analysis, documentation and traceability of requirements

Course Details:

A Cyber Security Analyst is responsible for the implementation, maintenance and support of the security controls that protect an organisation’s systems and data assets from threats and hazards.

They ensure that security technologies and practices are operating in accordance with the organisation’s policies and standards to provide continued protection. They require a broad understanding of network infrastructure, software and data to identify where threat and hazard can occur. They are responsible for performing periodic vulnerability assessments to evaluate the organisation’s ongoing security posture and will provide visibility to management of the main risks and control status on an ongoing basis. They respond to security incidents and implement resolution activities across the organisation.

Enquire

Specialism Overview

Skills and Technical Knowledge
Required Understanding

Our Programme Specialisms

View All Specialisms

Need help getting started?

Get in contact with one of the team to find out more and discover how we are helping organisations across the UK become future-ready.

Contact Us

© 2023 The Development Manager Ltd. All rights reserved.

Terms & ConditionsPrivacy Policy

we went with; wizard pi