Skip to main Content

L3 Cybersecurity Technician

Jump to: Job Roles, Pathways, Courses, Contact Us or Resources

Role Profile

This occupation is found in all sectors where information is held digitally and where that information is an asset that needs to be protected including but not limited to finance, retail, telecoms, health, media, manufacturing and local authorities.

The broad purpose of the occupation is to provide first line cyber security support. This requires individuals to monitor and detect potential security threats and escalate as necessary and to support secure and uninterrupted business operations of an organisation through the implementation of cyber security mechanisms and the application of cyber security procedures and controls. To contribute to the delivery of a security culture across an organisation, understanding vulnerabilities and threats and supporting the development of an organisation's cyber security maturity. To apply procedures and controls to maintain security and control of an organisation, and process security requests ensuring confidentiality, integrity and availability of information stored digitally.

Typical Job Roles

  •    Cyber Security Administrator
  •    Access Control Administrator
  •    Incident Response Technician
  •    Junior Security Operations Centre (SOC) Analyst
  •    Junior Information Security Analyst
  •    Junior Threat and Risk Analyst
  •    Junior Penetration Tester
  •    Junior Security Analyst

Apprenticeship Pathways:

These are the courses roadmaps. It is a portion of the work which will follow through the entirity of the apprenticeship course. With on the job experience, and off-the-job learning rounding out in the rest of the training.

Cybersecurity Technician Apprenticeship Pathway

Cybersecurity Technician Courses:

All relevant courses within your selected pathway, for yourself or your employee, can be found below.

Polaris Launch

Introduction to Cybersecurity

CompTIA A+

Cybersecurity Foundations

The GKA Way



ITIL4 Foundation

Risk Assessment and Methodologies

IT Governance, Legislation and Regulation


Technical Competencies

Getting Started - Cybersecurity Technician

Please complete below


Please enter a first name

Please enter a last name

Please enter a valid email address

Please enter a valid phone number

There has been a technical issue with the submission of your form. Please try and reload the browser and try again. If the problem persists please contact the site administrator


Cookie Control toggle icon