CYBER SECURITY TECHNOLOGIST - LEVEL 4

CYBER SECURITY TECHNOLOGIST LEVEL 4

Whether focusing on the technical or risk analysis side, all people in this occupation work to achieve the required security outcomes in a legal and regulatory context in all parts of the economy. They develop and apply practical knowledge of information security to deliver solutions that fulfil an organisation's requirements.  Learners will choose one specialism route: Technical or Risk Analysis.

OCCUPATIONAL PROFILE

A Cyber Security Technologist's primary role is to apply an understanding of cyber threats, hazards, risks, controls, measures, and mitigations to protect organisations systems and people.

Those focused on the technical side work on security design & architecture, security testing, investigations & response.

Those focussed on the risk analysis side focus on operations, risk, governance & compliance.

Typical Job Roles

Cyber Operations Manager, Security Architect, Penetration Tester, Security Analyst, Risk Analyst, Intelligence Researcher, Security Sales Engineer, Cyber Security Specialist, Information Security Analyst, Governance & Compliance Analyst, Information Security Assurance & Threat Analyst, Forensics & Incident Response Analyst, Security Engineer, Information Security Auditor, Security Administrator, Information Security Officer.

ENTRY REQUIREMENTS

Individual employers will set the selection criteria, but this might include GCSEs, A levels, a level 2 apprenticeship or other relevant qualifications, relevant experience and/or an aptitude test with a focus on functional maths.

COURSE OVERVIEW AND LEARNING

All apprentices will learn the technical competencies and technical knowledge and an understanding of threats, hazards, risks and intelligence through research and practical exploration to discover vulnerabilities and cyber security concepts applied to ICT infrastructure and the Relevant laws and ethics. In addition to Module 1, Cyber Security Introduction module leaners will then choose

Option 1 (Technologist): in addition to the core

■ Knowledge Module 2: Network and Digital Communications Theory Knowledge Module 3: Security Case Development and Design Good Practice Knowledge Module 4: Security Technology Building Blocks

■ Knowledge Module 5: Employment of Cryptography

OR

Option 2 (Risk Analyst): in addition to the core

■ Knowledge Module 6: Risk Assessment

■ Knowledge Module 7: Governance, Organisation, Law, Regulation & Standards

END-POINT ASSESSMENT

■ Summative portfolio

■ Synoptic project

■ Employer reference

■ Interview

Professional Recognition

This apprenticeship is recognised for entry to both IISP and BCS Associate Membership and entry onto the Register of IT Technicians confirming SFIA level 3 professional competence. Those completing the apprenticeship are eligible to apply for registration.

EMPLOYERS INVOLVED IN CREATING THE TRAILBLAZER STANDARD

Quintiq, Airbus, BT, CGI, Cisco, Crest, Falanx, Fujitsu, IBM, Royal Signals, IRM

FEES: Fully Funded for 16-18 yrs Employer contribution 5% 19+

DURATION: 24 Months