DIGITAL Profiles Skills Assessment

Please select the job role that you wish to assess.


  • Summary statement
    Proposes, plans and manages functional development of the Information System (IS) focusing upon the needs of users.

    Aligns the Information System to the business strategy within their area/domain. Ensures continuous enhancement whilst accounting for user requirements, service quality and budgetary constraints.

    Main task/s
    • Manage the information and communication technology development focused on user needs
    • Prepare for changes to the Information System influenced by technology updates or user needs
    • Formalise, consolidate and drive the development of the IS configuration
    • Evaluate the relevance of the Information Systems to users
    • Liaise between the user community and the IS infrastructure
    • Translate user requirements into functional specifications
  • Summary statement
    Develops and maintains Information Systems to generate value for the business and meet the organisation’s needs.

    Ensures the alignment of the Information Systems strategy with the business strategy. Provides leadership for the implementation and development of the organisations architecture and applications.

    Main task/s
    • Enable the company’s digital strategy
    • Define and implement ICT strategy and ICT governance
    • Ensure the reliability, confidentiality, security and integrity of Information Systems
    • Ensure the quality and management of ICT customer-supplier relationships in particular contracts
    • Define and ensure compliance with Service Level Agreements
    • Ensure that ICT change management processes are implemented
  • Summary statement
    Leads the process of applying data analytics. Delivers insights from data by optimising the analytics process and presenting visual data representations.

    Finds, manages and merges multiple data sources and ensures consistency of datasets. Identifies the mathematical models, selects and optimises the algorhythms to deliver business value through insights. Communicates patterns and recommends ways of applying data.

    Main task/s
    • Represent business challenges through mathematical models
    • Collect, understand, clean, analyse, integrate and investigate internal and external data to achieve the mission
    • Create and test hypothesis
    • Uncover data correlations/relationships in support of measurement and predication
    • Identify the right visualisation models depending on the business challenges and the data sets
    • Address data security through active preventative strategies
    • Select and optimise algorhythms using data science tools
    • Comply with ethical guidelines and legal requirements
  • Summary statement
    Manages operations, people and overall ICT resources.

    Implements and maintains a designated part of an ICT operation ensuring that activities are conducted in accordance with organisational rules, processes and standards. Plans changes and implements them in accordance with organisational strategy and budget. Risk manages and ensures the effectiveness of the ICT infrastructure.

    Main task/s
    • Coordinate and manage staff
    • Direct, organize, plan and monitor activities
    • Negotiate the objectives and resources
    • Manage the departmental budget
    • Establish and monitor management information
    • Analyse and propose solutions for continuous productivity improvement
    • Manage the implementation and monitoring of IS quality assurance and security
    • Communicate with internal business departments and project owners

Process Improvement

  • Summary statement
    Implements processes and tools to successfully deploy DevOps techniques across the entire solution development lifecycle.

    Applies a cross-functional, collaborative approach for the creation of customer-centric software solutions. Introduces automation throughout the software production system to deliver better software faster.

    Main task/s
    • Implement and manage continuous distribution methodologies
    • Design systems with high levels of availability and scalability
    • Manage testing across the release lifecycle
    • Facilitate cross functional collaboration and engagement
    • Design and manage process automation tools
    • Adopt an agile software development methodology
    • Manage continuous integration tool management
  • Summary statement
    Provides leadershipfor the implementation of the digital transformation strategy of the organisation.

    Drives cultural change and builds digital capability to deliver innovative business models and processes.

    Main task/s
    • Shape and deliver a digital strategy
    • Develop awareness and education to improve digital capability
    • Demonstrate the benefits of digital transformation implementation
    • Advise and support on a ‘digital by design’ approach
    • Lead cultural change required to facilitate digital strategy
    • Lead and mobilise key organisation influencers to implement digital transformation
  • Summary statement
    Represents the needs of the stakeholder community, the voice of the customer, to the agile team.

    Understands customer requirements and validates that the developed software solution meets requirements. Links business and Agile teams.

    Main task/s
    • Build, edit, and maintain the team backlog
    • Define, prioritise and validate software requirements through User Stories
    • Establish story acceptance criteria and accept stories in the baseline
    • Drive iteration goals and iteration content
    • Work across teams to define and implement improvement stories to enhance speed and quality
    • Participate in team demo and retrospective
  • Summary statement
    Leads and coaches an agile team.

    Creates a high performance self-managed dynamic team minimising impediments to development progress. Drives team by applying the agile process to achieve an optimesed work-flow through continuous improvement. Supports team goals and coordinates activities with other teams.

    Main task/s
    • Help team improve and take responsibilty for their actions to deploy agile values, principles and practices
    • Support Product Owner in the backlog management
    • Apply team-building techniques to improve performances
    • Promote continuous learning and professional development of team members
    • Ensure continuous improvement of software quality
    • Support team self-defined processes and rules
    • Facilitate regular team meetings, including daily stand-up, Iteration planning, team demo, and retrospective iteration


  • Summary statement
    Analyses the busines domain and optimises business performance through technology application.

    Analyses the information and the process needed to support business palns.Formulates functional and non-functional requirements of the business organisation and advises on the lifecycle of the information solutions. Evauates the impact in terms of change management.

    Main task/s
    • Contribute to the preparation of the organisation's business plan
    • Analyse business requirements and design related processes
    • Support Digital Transformation, identifying areas for improvement in business process
    • Provide possible ICT solutions compliant with the ICT Strategy
    • Develop business cases related to the proposed solutions
    • Analyse required information and documents
    • Develop plan for continuity of operations
  • Summary statement
    Ensures the implementation of the organisations data management policy. visual data representations.

    Ensures asset protection through the provision of clean, consistent, quality assured data. Maintains the integrity of data, stores and searches data and supports presentation of data analysis.
    Main task/s
    • Define, build and optimise data models
    • Proactively protect confidentiality and security of data
    • Ensure data lifecycle support
    • Curate and archive data
    • Advise on appropriate data analytic methodology
    • Ensure data quality and integrity
    • Maintain data quality and compliance to legal standards
  • Summary statement
    Designs and maintains the holistic architecture of business processes and information systems.

    Maintains a holistic perspective of the organisation strategy, processes, information, security and ICT assets. Links the mission, strategy and business processes to the IT strategy. Ensures project choices are integrated consistently, efficiently and in a sustainable manner according to the enterprise’s digital standards.

    Main task/s
    • Align digital and ICT strategies and planning with the organisation’s business goals
    • Anticipate future business needs and plan for how architecture will support/enable it
    • Streamline business processes, functions, procedures and workflows and apply a consistent implementation approach
    • Manage stakeholder engagement in the development of new processes and systems and verifies feasibility
    • Conduct post-implementation reviews to evaluate benefits accrued from new processes and systems
    • Build and maintain standards and enterprise architecture model and principles, for example process mapping
    • Evaluate the impact of changes within the ecosystem of the organisation (including political, technical, social, regulatory, legal) on the enterprise architecture
  • Summary statement
    Provides the translation of business requirements into end-to-end IT solutions.

    Proposes and designs solutions in line with technical architecture which fit business requirements and support change.

    Main task/s
    • Examine and interpret business requirements
    • Establish solution intent
    • Align solution with technical architecture
    • Identify potential technical design risks
    • Supervise the built in quality
    • Operate within the budgetary framework to validate the financial impact of design decisions
    • Identify opportunities for innovation
    • Plan technology roadmaps
  • Summary statement
    Analyses organisation requirements and specifies software and system requirements for new IT solutions.

    Ensures the technical design and contributes to the implementation of new and/or enhanced software provision. Provides solutions for the improvement of organisational efficiency and productivity.

    Main task/s
    • Analyse existing systems and business models
    • Recommend resolutions and improvements
    • Provide integrated solutions
    • Provide consolidate findings on components or processes
    • Author technical performance requirements
    • Ensure security by design
    • Maps and documents interfaces between legacy and new systems
  • Summary statement
    Plans, designs and integrates ICT system components including hardware, software and services.

    Designs, integrates and implements complex technical ICT solutions ensuring procedures and models for development are current and comply with common standards. Monitors new technology developments and applies if appropriate. Provides technological design leadership.

    Main task/s
    • Specify and implement the architecture of complex ICT solutions
    • Lead development and integration of components
    • Lead and/ or conduct system integration
    • Ensure incorporation of security by design
    • Analyse technical and business requirements
    • Develop and maintain a comprehensive record of usability requirements


  • Summary statement
    Designs and/ or codes components to meet solution specifications.

    Ensures building and implementing of ICT applications. Contributes to lowlevel design. Writes code to ensure optimum efficiency and functionality and user experience.
    Main task/s
    • Develop engineer and integrate components
    • Follow user experience guidelines
    • Aware of and address known security vulnerabilities, applying security by design
    • Shape documentation
    • Provide advanced, component technical support
    • Resolve issues prior to and following testing
  • Summary statement
    Integrates digital technology components for internal and external communication purposes.

    Designs and codes social media applications and websites. Makes recommendations on Application Programming Interface (API) and supports efficiency through appropriate content management systems.

    Main task/s
    • Carry out user experience design methods and translate into application requirements
    • Design web and multimedia applications content in line with user and customer needs
    • Test and resolve any technical, usability and accessibility issues
    • Ensure compliance with privacy, legal requirements and accessibility standards
    • Provide guidance on search engine optimisation (SEO)
  • Summary statement
    Designs and performs testing plans.

    Ensures delivered or existing products, applications or services comply with technical and user needs and specifications. For existing systems, applications, innovations and changes; diagnoses failure of products or services to meet specification.

    Main task/s
    • Select and develop integration testing techniques to ensure the system meets requirements.
    • Design and customize integration tests, identify open issues.
    • Organise test plans and procedures for white and black box testing at unit, module, system and integration levels.
    • Establish procedures for result analysis and reporting.
    • Design and implement defect tracking and correction procedures
    • Write test program to assess software quality
    • Develop tools to increase test effectiveness

Service & Operation

  • Summary statement
    Designs, implements or monitors and maintains data sets, structured (databases) and unstructured (big data).

    Administer and monitor data management systems and ensures design, consistency, quality and security.

    Main task/s
    • Apply standards methods and tools for measuring and reporting on wide set of relevant performance indicators (response time, availability, safety, integrity)
    • Produce data set procedures and instructions for other analysts or administrators
    • Monitor and maintain data management systems
    • Ensure the integrity and security of existing data management systems
    • Identify, investigate and correct problems or incidents related to data management systems
    • Provide training, support, advice and guidance on data set issues to other information system practitioners
  • Summary statement
    Ensures the alignment of the network, including telecommunication and/or computer infrastructure to meet the organisation’s communication needs.

    Manages and operates a networked information system, solving problems and faults to ensure defined service levels. Monitors and improves network performances and security.

    Main task/s
    • Ensure communication performance, recovery, and security needs meet agreed service agreement standards
    • Contribute to define network design policies, philosophies and criteria
    • Investigate, diagnose and solve network problems
    • Use network management system tools to determine network load and model performance statistics
    • Maintain awareness of relevant legislation affecting network security
    • Configure network to protect against security threats
    • Monitor network to identify and address traffic bottle necks
  • Summary statement
    Senior focal point for client sales and customer satisfaction.

    Builds business relationships with clients to facilitate the sale of hardware, software, telecommunications or ICT services. Identifies opportunities and manages sourcing and delivery of products to customers. Has responsibility for achieving sales targets and maintaining profitability.

    Main task/s
    • Maintain overall customer satisfaction with products and/or services
    • Identify opportunities to propose new products or services
    • Provide the primary contact point for client executive management
    • Deliver value added presentations related to products and services to customer executive management
    • Lead negotiations to establish profitable contracts with client(s)
    • Maintain and enhance business relationships
  • Summary statement
    Administers ICT System components to meet service requirements.

    Installs software, configures and upgrades ICT systems. Administers day-today operations to satisfy continuity of service, recovery, security and performance needs.

    Main task/s
    • Investigate, diagnose and solve system related problems
    • Install and upgrades software
    • Test upgrades
    • Schedule installation work, to minimize disruption
    • Diagnose and solve hardware or software problems
    • Comply with organisation procedures to ensure integrity and security of the system
  • Summary statement
    Maintains and repairs hardware, software and service applications.

    Effectively maintains customer hardware/software. Responsible for delivering timely and effective repairs to ensure optimal system performance and superior customer satisfaction.

    Main task/s
    • Identify software and hardware problems and repair
    • Perform regular maintenance on hardware and software components
    • Install cables and configures hardware and software
    • Document system addresses and configurations
    • Run diagnostic programs or use test equipment to locate source of problems
    • Communicate effectively with end users and customer management
    • Maintain security and functionality through application of program temporary fixes


  • Summary statement
    Senior focal point for client sales and customer satisfaction.

    Builds business relationships with clients to facilitate the sale of hardware, software, telecommunications or ICT services. Identifies opportunities and manages sourcing and delivery of products to customers. Has responsibility for achieving sales targets and maintaining profitability.

    Main task/s
    • Maintain overall customer satisfaction with products and/or services
    • Identify opportunities to propose new products or services
    • Provide the primary contact point for client executive management
    • Deliver value added presentations related to products and services to customer executive management
    • Lead negotiations to establish profitable contracts with client(s)
    • Maintain and enhance business relationships
  • Summary statement
    Supports understanding of how digital technologies add value to a business.

    Maintains a technology watch to inform stakeholders of existing and emerging technologies and their potential to add business value. Supports the identification of needs and solutions for achieving business and IS strategic goals.

    Main task/s
    • Provide advice on how to optimize the use of existing tools and systems
    • Raise awareness of information technology innovations and potential value to a business
    • Make recommendations for the development and implementation of a business project or technological solution
    • Participate in scoping the business case for potential projects
    • Participate in the assessment and choice of digital solutions
    • Assess risks of change to business continuity and for information security
  • Summary statement
    Educates and trains Professionals to reach optimal digital competence to support business performance.

    Provide the knowledge and skills required to ensure that people are able to effectively perform tasks in the workplace.

    Main task/s
    • Conduct training needs analyses
    • Design programs to meet needs
    • Produce and/or update existing training materials (content and method)
    • Adapt third party training material to support individual competence development in line with organisational needs
    • Deliver effective training in classroom, on-line or informally
    • Monitor, evaluate and report effectiveness of training
    • Evaluate and report student performance
    • Encourages continuous professional development
  • Summary statement
    Ensures the implementation of the organisation’s information security policy by the secure and appropriate use of ICT resources.

    Defines, proposes and implements necessary information security techniques and practices in compliance with information security standards and procedures. Contributes to security practices, awareness and compliance by providing advice, support, information and training.
    Main task/s
    • Evaluate information security risks, threats and consequences and take appropriate action
    • Provide information security training and education
    • Provide technical validation of security tools, implement, configure and manage appropriate tools
    • Contribute to the definition of and actively promote information security standards and procedures throughout the IT and IT user communities
    • Identify and remediate security vulnerabilities
    • Monitor security developments to ensure the continued efficiency and effectiveness of information security processes and controls
    • Proactively evaluate new threats and counter potential information security incidents
    • Implements security techniques on all or part of an application, process, network or system within area of responsibility


  • Summary statement
    Leads and manages the organisation information security policy.

    Defines the information security strategy and manages implementation across the organisation. Embeds proactive information security protection by assessing, informing, alerting and educating the entire organisation.

    Main task/s
    • Define the information security strategy and standards
    • Contribute to the development of the organisation’s security policy
    • Manages security audits
    • Evaluate risks, threats and consequences
    • Establish and manage prevention, detection, correction and remediation plans
    • Inform and raise awareness among general management and across all IT users and professionals
    • Conduct information security operations
  • Summary statement
    Manages projects to achieve optimal performance and results.

    Defines, implements and manages projects from conception to final delivery. Responsible for achieving optimal results, conforming to standards for quality, safety and sustainability and complying with defined scope, performance, costs, and schedule. Deploys agile practices where applicable.

    Main task/s
    • Organize, coordinate and lead the project team
    • Maintain stakeholder engagement and communication
    • Supervise project progress
    • Coordinate, record and ensure quality compliance
    • Circulate and distribute information from the project owner
    • Ensure the project helps to support the organisation’s wider goals
    • Comply with budgets and delivery times
    • Update the project according to changing circumstances
  • Summary statement
    Ensures that processes and organisations implementing Information Systems comply to quality policies.

    Establishes and operates an ICT quality approach aligned with the organisation’s culture. Commits the organisation to the achievement of quality goals and an encourages an environment of continuous improvement.

    Main task/s
    • Establish and deploy the ICT quality policy
    • Organise and provide quality training
    • Provide ICT managers with quality performance indicators
    • Perform quality audits
    • Organise customer satisfaction surveys
    • Assist project team members to build and perform project quality plans
  • Summary statement
    Plans, implements and manages solution provision.

    Manages the provision of Service Level Agreements (SLAs), Operation Level Agreements (OLAs) and Key Perfomance Indicators (KPIs). Provides people management of staff monitoring, reporting and fulfilling service activities. Takes migration action in case of non-fulfillment of agreements.

    Main task/s
    • Define service requirements
    • Negotiate SLA/OLA
    • Manage solution operation
    • Provide service delivery
    • Maintain and contribute to the creation of department budget
    • Manage staff development


  • Summary statement
    Manages an organisation’s cybersecurity strategy and its implementation to ensure that digital systems, services and assets are adequately secure and protected.

    Defines, maintains and communicates the cybersecurity vision, strategy, policies and procedures. Manages the implementation of the cybersecurity policy across the organisation. Assures information exchange with external authorities and professional bodies.

    Main task/s
    • Define, implement, communicate and maintain cybersecurity goals, requirements, strategies, policies, aligned with the business strategy to support the organisational objectives
    • Prepare and present cybersecurity vision, strategies and policies for approval by the senior management of the organisation and ensure their execution
    • Supervise the application and improvement of the Information Security Management System (ISMS)
    • Educate senior management about cybersecurity risks, threats and their impact to the organisation
    • Ensure the senior management approves the cybersecurity risks of the organisation
    • Develop cybersecurity plans
    • Develop relationships with cybersecurity-related authorities and communities
    • Report cybersecurity incidents, risks, findings to the senior management
    • Monitor advancement in cybersecurity
    • Secure resources to implement the cybersecurity strategy
    • Negotiate the cybersecurity budget with the senior management
    • Ensure the organisation’s resiliency to cyber incidents
    • Manage continuous capacity building within the organisation
    • Review, plan and allocate appropriate cybersecurity resources
  • Summary statement
    Monitor the organisation’s cybersecurity state, handle incidents during cyber-attacks and assure the continued operations of ICT systems.

    Monitors and assesses systems’ cybersecurity state. Analyses, evaluates and mitigates the impact of cybersecurity incidents. Identifies cyber incidents root causes and malicious actors. According to the organisation’s Incident Response Plan, restores systems’ and processes’ functionalities to an operational state, collecting evidences and documenting actions taken.

    Main task/s
    • Contribute to the development, maintenance and assessment of the Incident Response Plan
    • Develop, implement and assess procedures related to incident handling
    • Identify, analyse, mitigate and communicate cybersecurity incidents
    • Assess and manage technical vulnerabilities
    • Measure cybersecurity incidents detection and response effectiveness
    • Evaluate the resilience of the cybersecurity controls and mitigation actions taken after a cybersecurity or data breach incident
    • Adopt and develop incident handling testing techniques
    • Establish procedures for incident results analysis and incident handling reporting
    • Document incident results analysis and incident handling actions
    • Cooperate with Secure Operation Centres (SOCs) and Computer Security Incident Response Teams (CSIRTs)
    • Cooperate with key personnel for reporting of security incidents according to applicable legal framework
  • Summary statement
    Manages compliance with cybersecurity-related standards, legal and regulatory frameworks based on the organisation’s strategy and legal requirements.

    Oversees and assures compliance with cybersecurity- and data-related legal, regulatory frameworks and policies in line with the organisation’s strategy and legal requirements. Contributes to the organisation’s data protection related actions. Provides legal advice in the development of the organisation’s cybersecurity governance processes and recommended remediation strategies/solutions to ensure compliance.

    Main task/s
    • Ensure compliance with and provide legal advice and guidance on data privacy and data protection standards, laws and regulations
    • Identify and document compliance gaps
    • Conduct privacy impact assessments and develop, maintain, communicate and train upon the privacy policies, procedures
    • Enforce and advocate organisation’s data privacy and protection program
    • Ensure that data owners, holders, controllers, processors, subjects, internal or external partners and entities are informed about their data protection rights, obligations and responsibilities
    • Act as a key contact point to handle queries and complaints regarding data processing
    • Assist in designing, implementing, auditing and compliance testing activities in order to ensure cybersecurity and privacy compliance
    • Monitor audits and data protection related training activities
    • Cooperate and share information with authorities and professional groups
    • Contribute to the development of the organisation’s cybersecurity strategy, policy and procedures
    • Develop and propose staff awareness training to achieve compliance and foster a culture of data protection within the organization
    • Manage legal aspects of information security responsibilities and third-party relations
  • Summary statement
    Collect, process, analyse data and information to produce actionable intelligence reports and disseminate them to target stakeholders.

    Manages cyber threat intelligence life cycle including cyber threat information collection, analysis and production of actionable intelligence and dissemination to security stakeholders and the CTI community, at a tactical, operational and strategic level. Identifies and monitors the Tactics, Techniques and Procedures (TTPs) used by cyber threat actors and their trends, track threat actors’ activities and observe how non-cyber events can influence cyber-related actions.

    Main task/s
    • Develop, implement and manage the organisation's cyber threat intelligence strategy
    • Develop plans and procedures to manage threat intelligence
    • Translate business requirements into Intelligence Requirements
    • Implement threat intelligence collection, analysis and production of actionable intelligence and dissemination to security stakeholders
    • Identify and assess cyber threat actors targeting the organisation
    • Produce actionable reports based on threat intelligence data
    • Elaborate and advise on mitigation plans at the tactical, operational and strategic level
    • Coordinate with stakeholders to share and consume intelligence on relevant cyber threats
    • Leverage intelligence data to support and assist with threat modelling, recommendations for Risk Mitigation and cyber threat hunting
    • Articulate and communicate intelligence openly and publicly at all levels
    • Convey the proper security severity by explaining the risk exposure and its consequences to non-technical stakeholders
  • Summary statement
    Plans and designs security-by-design solutions (infrastructures, systems, assets, software, hardware and services) and cybersecurity controls.

    Designs solutions based on security-by-design and privacy-by-design principles. Creates and continuously improves architectural models and develops appropriate architectural documentation and specifications. Coordinate secure development, integration and maintenance of cybersecurity components in line with standards and other related requirements.

    Main task/s
    • Design and propose a secure architecture to implement the organisation’s strategy
    • Develop organisation’s cybersecurity architecture to address security and privacy requirements
    • Produce architectural documentation and specifications
    • Present high-level security architecture design to stakeholders
    • Establish a secure environment during the development lifecycle of systems, services and products
    • Coordinate the development, integration and maintenance of cybersecurity components ensuring the cybersecurity specifications
    • Analyse and evaluate the cybersecurity of the organisation’s architecture
    • Assure the security of the solution architectures through security reviews and certification
    • Collaborate with other teams and colleagues
    • Evaluate the impact of cybersecurity solutions on the design and performance of the organisation’s architecture
    • Adapt the organisation’s architecture to emerging threats
    • Assess the implemented architecture to maintain an appropriate level of security
  • Summary statement
    Perform cybersecurity audits on the organisation’s ecosystem. Ensuring compliance with statutory, regulatory, policy information, security requirements, industry standards and best practices.

    Conducts independent reviews to assess the effectiveness of processes and controls and the overall compliance with the organisation's legal and regulatory frameworks policies. Evaluates, tests and verifies cybersecurity-related products (systems, hardware, software and services), functions and policies ensuring, compliance with guidelines, standards and regulations.

    Main task/s
    • Develop the organisation's auditing policy, procedures, standards and guidelines
    • Establish the methodologies and practices used for systems auditing
    • Establish the target environment and manage auditing activities
    • Define audit scope, objectives and criteria to audit against
    • Develop an audit plan describing the frameworks, standards, methodology, procedures and auditing tests
    • Review target of evaluation, security objectives and requirements based on the risk profile
    • Audit compliance with cybersecurity-related applicable laws and regulations
    • Audit conformity with cybersecurity-related applicable standards
    • Execute the audit plan and collect evidence and measurements
    • Maintain and protect the integrity of audit records
    • Develop and communicate conformity assessment, assurance, audit, certification and maintenance reports
    • Monitor risk remediation activities
  • Summary statement
    Improves cybersecurity knowledge, skills and competencies of humans.

    Designs, develops and conducts awareness, training and educational programmes in cybersecurity and data protection-related topics. Uses appropriate teaching and training methods, techniques and instruments to communicate and enhance the cybersecurity culture, capabilities, knowledge and skills of human resources. Promotes the importance of cybersecurity and consolidates it into the organisation.

    Main task/s
    • Develop, update and deliver cybersecurity and data protection curricula and educational material for training and awareness based on content, method, tools, trainees need
    • Organise, design and deliver cybersecurity and data protection awareness-raising activities, seminars, courses, practical training
    • Monitor, evaluate and report training effectiveness
    • Evaluate and report trainee’s performance
    • Finding new approaches for education, training and awareness-raising
    • Design, develop and deliver cybersecurity simulations, virtual labs or cyber range environments
    • Provide guidance on cybersecurity certification programs for individuals
    • Continuously maintain and enhance expertise; encourage and empower continuous enhancement of cybersecurity capacities and capabilities building
  • Summary statement
    Develop, deploy and operate cybersecurity solutions (systems, assets, software, controls and services) on infrastructures and products.

    Provides cybersecurity-related technical development, integration, testing, implementation, operation, maintenance, monitoring and support of cybersecurity solutions. Ensures adherence to specifications and conformance requirements, assures sound performance and resolves technical issues required in the organisation’s cybersecurity-related solutions (systems, assets, software, controls and services), infrastructures and products.

    Main task/s
    • Develop, implement, maintain, upgrade, test cybersecurity products
    • Provide cybersecurity-related support to users and customers
    • Integrate cybersecurity solutions and ensure their sound operation
    • Securely configure systems, services and products
    • Maintain and upgrade the security of systems, services and products
    • Implement cybersecurity procedures and controls
    • Monitor and assure the performance of the implemented cybersecurity controls
    • Document and report on the security of systems, services and products
    • Work close with the IT/OT personnel on cybersecurity-related actions
    • Implement, apply and manage patches to products to address technical vulnerabilities
  • Summary statement
    Research the cybersecurity domain and incorporate results in cybersecurity solutions.

    Conducts fundamental/basic and applied research and facilitates innovation in the cybersecurity domain through cooperation with other stakeholders. Analyses trends and scientific findings in cybersecurity.

    Main task/s
    • Analyse and assess cybersecurity technologies, solutions, developments and processes
    • Conduct research, innovation and development work in cybersecurity-related topics
    • Manifest and generate research and innovation ideas
    • Advance the current state-of-the-art in cybersecurity-related topics
    • Assist in the development of innovative cybersecurity-related solutions
    • Conduct experiments and develop a proof of concept, pilots and prototypes for cybersecurity solutions
    • Select and apply frameworks, methods, standards, tools and protocols including a building and testing a proof of concept to support projects
    • Contributes towards cutting-edge cybersecurity business ideas, services and solutions
    • Assist in cybersecurity-related capacity building including awareness, theoretical training, practical training, testing, mentoring, supervising and sharing
    • Identify cross-sectoral cybersecurity achievements and apply them in a different context or propose innovative approaches and solutions
    • Lead or participate in the innovation processes and projects including project management and budgeting
    • Publish and present scientific works and research and development results
  • Summary statement
    Security Architects design, review, test and assure the technical environment, solution designs and solution implementations in accordance with current and emerging security best practice. They contribute to the technical architecture and security policies and practices.

    Security Architects design, review, test and assure the technical environment, solution designs and solution implementations in accordance with current and emerging security best practice. They contribute to the technical architecture and security policies and practices.

    Main task/s
    • Interprets relevant security policies and threat/risk profiles into secure architectural solutions that mitigate the risks and conform to legislation and relate to business needs.
    • Applies common architectural frameworks (e.g. TOGAF, SABSA).
    • Presents security architecture solutions as a view within broader IT architectures.
    • Maintains awareness of the security advantages and vulnerabilities of common products and technologies. Designs robust and fault-tolerant security mechanisms and components appropriate to the perceived risks.
    • Develops and implements appropriate methodologies, templates, patterns and frameworks.
  • Summary statement
    Ensure the cybercriminal investigation reveals all digital evidence to prove the malicious activity.

    Connects artefacts to natural persons, captures, recovers, identifies and preserves data, including manifestations, inputs, outputs and processes of digital systems under investigation. Provides analysis, reconstruction and interpretation of the digital evidence based on a qualitative opinion. Presents an unbiased qualitative view without interpreting the resultant findings.

    Main task/s
    • Develop digital forensics investigation policy, plans and procedures
    • Identify, recover, extract, document and analyse digital evidence
    • Preserve and protect digital evidence and make it available to authorised stakeholders
    • Inspect environments for evidence of unauthorised and unlawful actions
    • Systematically and deterministic document, report and present digital forensic analysis findings and results
    • Select and customise forensics testing, analysing and reporting techniques
  • Summary statement
    Assess the effectiveness of security controls, reveals and utilise cybersecurity vulnerabilities, assessing their criticality if exploited by threat actors.

    Plans, designs, implements and executes penetration testing activities and attack scenarios to evaluate the effectiveness of deployed or planned security measures. Identifies vulnerabilities or failures on technical and organisational controls that affect the confidentiality, integrity and availability of ICT products (e.g. systems, hardware, software and services).

    Main task/s
    • Identify, analyse and assess technical and organisational cybersecurity vulnerabilities
    • Identify attack vectors, uncover and demonstrate exploitation of technical cybersecurity vulnerabilities
    • Test systems and operations compliance with regulatory standards
    • Select and develop appropriate penetration testing techniques
    • Organise test plans and procedures for penetration testing
    • Establish procedures for penetration testing result analysis and reporting
    • Document and report penetration testing results to stakeholders
    • Deploy penetration testing tools and test programs

Based on © 8 Framework

Based on Framework

Video Tutorial

Please publish modules in offcanvas position.