L4 Cybersecurity Technologist
Jump to: Job Roles, Pathways, Courses, Contact Us or Resources
Cyber Security Technologists all require an understanding of security concepts and technology and how to mitigate risks arising from threats. The specific tasks undertaken vary depending on what needs to be achieved by the team at any particular time. Some tasks may be very technical, others may be more analytical, business or user focused. All roles in this occupation work to achieve required cyber security outcomes in a legal and regulatory context in all parts of the economy. They develop and apply practical knowledge of information security to deliver solutions that fulfil an organisations requirement.
The Cyber Security Technologist standard has three distinct options. At the end of the apprenticeship you will be competent in either:
1) The Cyber Security Engineer is the most technology focused role in the occupation and will typically design, build and test secure networks or security products or systems with a particular focus on the security aspects of the design.
Typical job titles include: Cyber Security Engineer, Cyber Security Consultant, Cyber Security Architect, Cyber Security Analyst, Cyber Security Specialist, IT Security Technician, Embedded Engineer.
2) The Cyber Risk Analyst Focuses on risk assessment, analysis and giving advice on risk mitigations. The roles may support formal security governance, regulatory & compliance (GRC).
Typical job titles include: Cyber Security Consultant, Cyber Security Analyst, Cyber Risk Analyst, Intelligence Researcher, Cyber Security Specialist, Information Security Analyst, Governance & Compliance Analyst, Information Security Assurance & Threat Analyst, Information Security Auditor.
3) The Cyber Defender & Responder is more operationally focused, configuring and operating secure systems to prevent security breaches or monitoring systems to detect and respond to security breaches.
Cybersecurity Technologist Knowledge & Skills Taught:
As with all of our level 3 & 4 apprenticeships, you are not required to have any pre-requisite grades or skills. The purposes is to upskill the individual to the point of industry level competency within the given time period, whilst working within the field. Apprenticeships are a fusion of learning theory and applied experience, to produce applicable competency within a given field.
Discover vulnerabilities in a system by using a mix of research and practical exploration
Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. National Cyber Security Centre) Combine different sources to create an enriched view of cyber threats and hazards
Research and investigate common attack techniques and relate these to normal and observed digital system behaviour and recommend how to defend against them. Interpret and demonstrate use of external source of vulnerabilities (e.g. OWASP, intelligence sharing initiatives, open source)
Undertake security risk assessments for simple systems without direct supervision and propose basic remediation advice in the context of the employer.
Source and analyse security cases and describe what threats, vulnerability or risks are mitigated and identify any residual areas of concern.
Analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification
Identify and follow organisational policies and standards for information and cyber security and operate according to service level agreements or other defined performance targets.
Configure, deploy and use computer, digital network and cyber security technology.
Recommend improvements to the cyber security posture of an employer or customer based on research into future potential cyber threats and considering threat trends.
Design, build, test and troubleshoot a network incorporating more than one subnet with static and dynamic routes, to a given design requirement without supervision. Provide evidence that the system meets the design requirement.
Analyse security requirements given (functional and non-functional security requirements that may be presented in a security case) against other design requirements (e.g. usability, cost, size, weight, power, heat, supportability etc.) for a given system or product. Identify conflicting requirements and propose, with reasoning, resolution through appropriate trade-offs.
Design and build, systems in accordance with a security case within broad but generally well-defined parameters. This should include selection and configuration of typical security hardware and software components. Provide evidence that the system has properly implemented the security controls required by the security case
Write program code or scripts to meet a given design requirement in accordance with employers' coding standards
Design systems employing encryption to meet defined security objectives. Develop and implement a plan for managing the associated encryption keys for the given scenario or system.
Use tools, techniques and processes to actively prevent breaches to digital system security.
Conduct cyber-risk assessments against an externally (market) recognised cyber security standard using a recognised risk assessment methodology.
Identify cyber security threats relevant to a defined context
Develop information security policies or processes to address a set of identified risks, for example from security audit recommendations.
Principles of networks: OSI and TCP/IP models, data, protocols and how they relate to each other; the main routing protocols; the main factors affecting network performance including typical failure modes in protocols and approaches to error control; virtual networking
The concepts, main functions and features of at least three Operating Systems (OS) and their security functions and associated security features.
Cyber security concepts and why cyber security matters to business and society; Security assurance concepts and how assurance may be achieved in practice including penetration testing and extrinsic assurance methods.
the main types of common attack techniques; also the role of human behaviour, including the significance of the 'insider threat'. Including: how attack techniques combine with motive and opportunity to become a threat. Techniques and strategies to defend against attack techniques and mitigate hazards
the significance of identified trends in cyber security threats and understand the value and risk of this analysis. How to deal with emerging attack techniques (including 'zero day'), hazards and vulnerabilities relevant to the digital systems and business environment.
lifecycle and service management practices to an established standard to a foundation level for example Information Technology Infrastructure Library (ITIL) foundation level.
cyber incident response processes, incident management processes and evidence collection/preservation requirements to support incident investigation
Understands the main features, applicability and how to apply the significant law, regulations and standards relevant specifically to cyber security. To include: laws, regulations & standards relating to personal data and privacy (e.g. Data Protection Act 2018 implementing General Data Protection Regulation); use of digital systems (e.g. Computer Misuse Act 1990 ); regulatory standards for cyber security, intelligence collection and law enforcement (e.g. Intelligence Services Act 1994, Regulation of Investigatory Powers Act 2000; standards for good practice in cyber security (e.g. ISO 27001, CyberEssentials, NIST) and any updates or additions
ethical principles and codes of good practice of at least one significant cyber security professional body and the ethical responsibilities of a cyber security professional.
how to analyse employer or customer requirements to derive security objectives and taking account of the threats and overall context develop a security case which sets out the proposed security measures in the context with reasoned justification
- Logical - Applies logical thinking, for example, uses clear and valid reasoning when making decisions related to undertaking the work instructions
- Analytical - working with data effectively to see patterns, trends and draw meaningful conclusions.
- Works independently and takes responsibility. For example works diligently regardless of how much they are being supervised, and stays motivated and committed when facing challenges
- Shows initiative, being resourceful when faced with a problem and taking responsibility for solving problems within their own remit
- Thorough & organised. For example uses their time effectively to complete work to schedule and takes responsibility for managing their own work load and time
- Works effectively with a wide range of people in different roles, internally and externally, with a regard to inclusion & diversity policy
- Communicates effectively in a wide variety of situations for example contributing effectively to meetings and presenting complex information to technical and non-technical audiences
- Maintains a productive, professional and secure working environment.
- Creative - taking a variety of perspectives, taking account of unpredictable adversary and threat behaviours and approaches, bring novel and unexpected solutions to address cyber security challenges
- Problem Solving - Identifies issues quickly, solves complex problems and applies appropriate solutions. Dedicated to finding the true root cause of any problem and find solutions that prevent recurrence.
- Cyber Operations Manager
- Security Architect
- Penetration Tester
- Security Analyst
- Risk Analyst
- Intelligence Researcher
- Security Sales Engineer
- Cyber Security Specialist
- Information Security Analyst
- Governance & Compliance Analyst
- Information Security Assurance & Threat Analyst
- Forensics & Incident Response Analyst
- Security Engineer
- Information Security Auditor
- Security Administrator
- Information Security Officer
These are the courses roadmaps. It is a portion of the work which will follow through the entirity of the apprenticeship course. With on the job experience, and off-the-job learning rounding out in the rest of the training.
All relevant courses within your selected pathway, for yourself or your employee, can be found below.
The GKA Way
Introduction to Programming
Legislation, Regulation & Ethics
BCS Certificate in Information Security Management Principles (Risk Analyst Only)
The EPA Way
Getting Started - Cybersecurity Technologist
Please complete below