The global skills and competency framework for the digital world

Security operations SCAD

(new)

Manages and administers security measures, leveraging tools and intelligence to protect assets, ensuring compliance and operational integrity.

SFIA 9 is in development

  • SFIA 9 beta due in early July 2024
  • SFIA 9 planned for publication October 2024

Moving to SFIA 9

There is an updated version of this skill for SFIA 9.

  • Identity and access management has been split from Security operations to become a skill on it's own.
  • Security operations has been edited with additional indicators and updated guidance notes (including cryptography)
  • SFIA 8 skill descriptions will remain available for you to use
  • Previous SFIA assessments may be impacted by this change

Disclaimer - prototypes/new skills may be substantially modified prior to launch or may never be released.

Guidance notes

(modified)

Activities may include, but are not limited to:

  • providing advice and guidance on the implementation and enforcement of security controls, including proactive cloud security measures
  • using security tools such as Security Information and Event Management (SIEM), Intrusion Detection/Prevention Systems (IDS/IPS), and firewalls, alongside the use of automation to streamline security operations. e.g. automatic patching, vulnerability scanning, and rapid response to common threats
  • acting on threat intelligence to proactively address potential security threats, and conducting routine vulnerability assessments monitoring and analysing relevant logs, alerts, and events, and responding to incidents submitted via tickets or phone
  • performing rapid analysis and remediation of security issues
  • ensuring compliance with relevant legislation, adherence to security policies, and maintaining standard security operating procedures
  • keeping accurate security records and documentation
  • implementing, managing, and monitoring cryptographic and certificate management activities to protect data, ensure compliance, and manage cryptographic keys securely
  • using advanced reporting techniques for comprehensive security oversight and informed decision-making.

Understanding the responsibility levels of this skill

Where lower levels are not defined...

  • Specific tasks and responsibilities are not defined because the skill requires a higher level of autonomy, influence, and complexity in decision-making than is typically expected at these levels. You can use the essence statements to understand the generic responsibilities associated with these levels.

Where higher levels are not defined...

  • Responsibilities and accountabilities are not defined because these higher levels involve strategic leadership and broader organisational influence that goes beyond the scope of this specific skill. See the essence statements.

Developing skills and demonstrating responsibilities related to this skill

The defined levels show the incremental progression in skills and reponsibilities.

Where lower levels are not defined...

You can develop your knowledge and support others who do have responsibility in this area by:

  • Learning key concepts and principles related to this skill and its impact on your role
  • Performing related skills (see the related SFIA skills)
  • Supporting others with tasks (generic examples are provided by the essence statements for each level)

Where higher levels are not defined...

  • You can progress by developing related skills which are better suited to higher levels of organisational leadership.

Levels

Defined at these levels: 1 2 3 4 5 6

Show/hide extra descriptions and levels.

Security operations: Level 1

Level 1 - Follow: Essence of the level: Performs routine tasks under close supervision, follows instructions, and requires guidance to complete their work. Learns and applies basic skills and knowledge.

(modified)

Performs simple security administration tasks.

Maintains relevant records and documentation, contributing to overall data integrity.

Security operations: Level 2

Level 2 - Assist: Essence of the level: Provides assistance to others, works under routine supervision, and uses their discretion to address routine problems. Actively learns through training and on-the-job experiences.

(modified)

Receives and responds to routine requests for security support. Maintains records and effectively communicates actions taken.

Assists in the investigation and resolution of issues relating to security systems using basic diagnostic tools and techniques.

Documents incident and event information and generates reports on exceptions and security events. Contributes to management reporting processes.

Security operations: Level 3

Level 3 - Apply: Essence of the level: Performs varied tasks, sometimes complex and non-routine, using standard methods and procedures. Works under general direction, exercises discretion, and manages own work within deadlines. Proactively enhances skills and impact in the workplace.

(modified)

Investigates minor security breaches using established procedures , incorporating analytical tools and techniques.

Performs non-standard operational security tasks adapting to evolving technologies and threat landscapes.

Addresses and resolves a variety of security events to ensure system integrity and operational continuity.

Security operations: Level 4

Level 4 - Enable: Essence of the level: Performs diverse complex activities, supports and supervises others, works autonomously under general direction, and contributes expertise to deliver team objectives.

(modified)

Maintains and optimises operational security processes. Checks that all requests for support are dealt with according to established protocols, including for cloud-based and automated systems.

Provides advice on implementing and managing physical, procedural and technical security encompassing both physical and digital assets.

Investigates security breaches in accordance with established procedures using advanced tools and techniques and recommends necessary corrective actions.

Enables effective implementation of recommended security measures and monitors their performance.

Security operations: Level 5

Level 5 - Ensure, advise: Essence of the level: Provides authoritative guidance in their field and works under broad direction. Accountable for achieving workgroup objectives and managing work from analysis to execution and evaluation.

(modified)

Oversees the adherence to and effectiveness of security operations procedures, including cloud security practices and automated threat responses.

Reviews actual or potential security breaches and vulnerabilities and ensures that they are promptly and thoroughly investigated. Recommends actions and appropriate control improvements.

Ensures the integrity and completeness of security records , ensuring timely support and adherence to established procedures.

Contributes to the creation and maintenance of security policies, standards and procedures integrating new compliance requirements and technology advances.

Security operations: Level 6

Level 6 - Initiate, influence: Essence of the level: Has significant organisational influence, makes high-level decisions, shapes policies, demonstrates leadership, fosters organizational collaboration, and accepts accountability in key areas.

(modified)

Develops comprehensive policies, standards, processes, guidelines for organisational security, including automated systems and cloud environments.

Ensures the ongoing relevance and effective implementation of security policies and standards, adapting to emerging technologies and threats.

Reviews and advises on security aspects of new business initiatives considering implications in the evolving digital landscape.

Leads strategic planning for security operations, integrating advanced threat intelligence and automation to enhance organisational resilience.

Level 7

Level 7 - Set strategy, inspire, mobilise: Essence of the level: Operates at the highest organisational level, determines overall organisational vision and strategy, and assumes accountability for overall success.