Security operations (re-named) SCAD

(new)

Delivering management, technical and administrative services to implement security controls and security management strategies.

Guidance notes

(new)

Activities may include - but are not limited to...

  • providing advice and guidance on implementation of security controls
  • defining and reviewing access rights and privileges
  • authorising and monitoring of access to IT facilities or infrastructure
  • investigating unauthorised access
  • routine vulnerability assessments
  • monitoring violations of security policies
  • ensuring compliance with relevant legislation
  • monitoring and analysing relevant logs, alerts and events
  • responding to incidents submitted via tickets or phone
  • implementing standard security operating procedures
  • maintaining security records and documentation
  • administering cryptographic and certificate management activities

Security operations (re-named): Level 6

(modified)

Develops policies, standards, processes, guidelines for ensuring the physical and electronic security of automated systems.

Ensures that the policy and standards for security operations are fit for purpose, current and are correctly implemented.

Reviews new business proposals and provides specialist advice on security issues and implications.

Security operations (re-named): Level 5

(modified)

Monitors the application and compliance of security operations procedures.

Reviews actual or potential security breaches and vulnerabilities and ensures they are promptly and thoroughly investigated. Recommends actions and appropriate control improvements.

Ensures that security records are accurate and complete and that requests for support are dealt with according to agreed procedures.

Contributes to the creation and maintenance of policy, standards, procedures and documentation for security.

Security operations (re-named): Level 4

(modified)

Maintains operational security processes and checks that all requests for support are dealt with according to agreed procedures.

Provides advice on defining access rights and the application and operation of elementary physical, procedural and technical security controls.

Investigates security breaches in accordance with established procedures and recommends required actions. Provides support and monitors to ensure these are implemented.

Security operations (re-named): Level 3

(modified)

Investigates minor security breaches in accordance with established procedures.

Assists users in defining their access rights and privileges. Performs non-standard operational security tasks.

Resolves security events and operational security issues. Applies and maintains specific security controls as required by organisational policy and local risk assessments.

Security operations (re-named): Level 2

(modified)

Receives and responds to routine requests for security support. Maintains records and advises relevant persons of actions taken.

Installs and maintains technical security controls in accordance with relevant procedures and standards.

Assists in the investigation and resolution of issues relating to access controls and security systems.

Documents incident and event information and produces incident, exception, and management reports.

Security operations (re-named): Level 1

(unchanged)

Performs simple security administration tasks. Maintains relevant records and documentation.