CYBER SECURITY TECHNICIAN - LEVEL 3

CYBER SECURITY TECHNICIAN LEVEL 3

This occupation is found in all sectors where information is held digitally and where that information is an asset that needs to be protected including but not limited to finance, retail, telecoms, health, media, manufacturing and local authorities.

OCCUPATIONAL PROFILE

The broad purpose of the occupation is to provide first-line cyber security support and requires individuals to monitor and detect potential security threats and escalate as necessary and support secure and uninterrupted business operations of an organisation through cyber security mechanisms and the application of procedures and controls.

An employee in this occupation will support a cyber security function (frequently a Security Operations Centre or Network Operations Centre) working under supervision. They will conduct specific cyber security tasks to defined procedures and standards. They apply specific cyber security mechanisms and controls such as patching software, installing software updates, implementing access control, configuring firewalls, security incident and event management tools (SIEM) and protection tools (Anti-virus, Anti-malware, Anti-spam). 

TYPICAL JOB ROLES

Access control administrator Cyber Security administrator, Incident response technician, Junior information security analyst, Junior penetration tester, Junior security analyst, Junior security operations centre (soc) analyst, Junior threat and risk analyst

ENTRY REQUIREMENTS

Apprentices without level 2 English and maths will need to achieve this level prior to taking the End-Point Assessment. For those with an education, health and care plan or a legacy statement, the apprenticeship's English and maths minimum requirement is Entry Level 3

COURSE OVERVIEW AND LEARNING

The course is delivered at the learner's place of business and tailored to the employer's business.

The course covers modules not limited to installing and maintaining technical security controls, identifying, reporting and escalating information security incidents, administering cryptographic and certificate management, risk assessments, backup, and recovery processes.

Learners will acquire technical knowledge and understanding of the principles of organisational information security governance and the components of an organisation's cyber security technical infrastructure including hardware, operating systems, networks, software and cloud. They will understand cyber security policies and standards based on an Information Security Management System (ISMS) and how to apply the procedures and controls to maintain security within an organisation.

END-POINT ASSESSMENT

■ Summative portfolio of work

■ Scenario Demonstrations with

■ Questioning

■ Professional Discussion

PROFESSIONAL RECOGNITION

This standard aligns with the following professional recognition:

■ BCS - The Chartered Institute for IT for Associate BCS membership (AMBCS) and Professional

■ Registration for IT Technicians (RITTech) for

■ Chartered Institute for Information Security for / Accredited Affiliate

EMPLOYERS INVOLVED IN CREATING THE TRAILBLAZER STANDARD:

IBM, Qufaro, Cap Gemini, Fujitsu, Sandettie, Dimension Data, CyberCrowd, Forgerock, CompTIA, ABFoods Issured, Deloitte, Local Government Association, Global Knowledge

FEES: Fully Funded for 16-18 yrs Employer contribution 5% 19+

DURATION: 18 MONTHS