Cyber Security Operations
Awareness

Recognises the need for information systems and services to be operated and monitored securely and can list some of the main policies and practices involved in achieving this
Explains the main principles of secure configuration of role specific security components and devices, including firewalls and protective monitoring tools (e.g. SIEM)
Working

Demonstrates experience applying the principles of secure configuration of role-specific security components and devices in a training or academic environment, for example through participation in syndicate exercises, undertaking practical exercises, and/or passing a test or examination
Supports the overall aims of a Cyber Security operations-related team, e.g. a monitoring team
Applies routine security procedures appropriate to the role, such as patching, managing access rights, malware, protection or vulnerability testing under direction/supervision
Develops and tests rules for detecting violations of security operating procedures under supervision
Practitioner

Develops security operating procedures for use across multiple information systems or maintains compliance with them
Applies routine security procedures appropriate to the role, such as patching, managing access rights, malware protection or vulnerability testing with autonomy
Develops and tests rules for detecting violations of security operating procedures with autonomy
Leads small teams managing Cyber Security operations within an organisation
Expert

Leads teams managing Cyber Security operations within an organisation
Identifies the need for, and implements, new security operating procedures and practices to meet changing requirements
Is a subject matter expert in developing and operationalising techniques for Cyber Security operations, e.g. detecting anomalous activity, automating orchestration and configuration of IT