Security operations SCAD
Delivering management, technical and administrative services to implement security controls and security management strategies.
Updates for SFIA 9
- There is an updated version of this skill for SFIA 9.
- Theme(s) influencing the updates for this skill: Support for cyber security working practices (both specialised and general), Include cryptography, Making SFIA easier to consume (enhance readability/guidance/descriptions), Making SFIA easier to consume (updates to skill name/skill description).
- Skill split into two skills: Security operations and Identity and access management
- Content and/or readability changes have been made to levels 1, 2, 3, 4, 5, and 6.
- You can move to SFIA 9 when you are ready - SFIA 8 skill descriptions will still be available to use.
- Previous SFIA assessments or skills mapping may be impacted by this change. e.g. for Identity and access management
Guidance notes
Activities may include — but are not limited to:
- providing advice and guidance on the implementation of security controls
- defining and reviewing access rights and privileges
- authorising and monitoring of access to IT facilities or infrastructure
- investigating unauthorised access
- routine vulnerability assessments
- monitoring violations of security policies
- ensuring compliance with relevant legislation
- monitoring and analysing relevant logs, alerts and events
- responding to incidents submitted via tickets or phone
- implementing standard security operating procedures
- maintaining security records and documentation
- administering cryptographic and certificate management activities.
Understanding the responsibility levels of this skill
Where lower levels are not defined...
- Specific tasks and responsibilities are not defined because the skill requires a higher level of autonomy, influence, and complexity in decision-making than is typically expected at these levels. You can use the essence statements to understand the generic responsibilities associated with these levels.
Where higher levels are not defined...
- Responsibilities and accountabilities are not defined because these higher levels involve strategic leadership and broader organisational influence that goes beyond the scope of this specific skill. See the essence statements.
Developing skills and demonstrating responsibilities related to this skill
The defined levels show the incremental progression in skills and responsibilities.
Where lower levels are not defined...
You can develop your knowledge and support others who do have responsibility in this area by:
- Learning key concepts and principles related to this skill and its impact on your role
- Performing related skills (see the related SFIA skills)
- Supporting others who are performing higher level tasks and activities
Where higher levels are not defined...
- You can progress by developing related skills which are better suited to higher levels of organisational leadership.
Click to learn why SFIA skills are not defined at all 7 levels.
Show/hide extra descriptions and levels.
Security operations: Level 1
Performs simple security administration tasks. Maintains relevant records and documentation.
Security operations: Level 2
Receives and responds to routine requests for security support. Maintains records and advises relevant persons of actions taken.
Assists in the investigation and resolution of issues relating to access controls and security systems.
Documents incident and event information and produces incident, exception, and management reports.
Security operations: Level 3
Investigates minor security breaches in accordance with established procedures.
Assists users in defining their access rights and privileges. Performs non-standard operational security tasks.
Resolves security events and operational security issues.
Security operations: Level 4
Maintains operational security processes and checks that all requests for support are dealt with according to agreed procedures.
Provides advice on defining access rights and the application and operation of elementary physical, procedural and technical security controls.
Investigates security breaches in accordance with established procedures and recommends required actions. Provides support and checks that corrective actions are implemented.
Security operations: Level 5
Monitors the application and compliance of security operations procedures.
Reviews actual or potential security breaches and vulnerabilities and ensures that they are promptly and thoroughly investigated. Recommends actions and appropriate control improvements.
Ensures that security records are accurate and complete and that requests for support are dealt with according to agreed procedures.
Contributes to the creation and maintenance of policy, standards, procedures and documentation for security.
Security operations: Level 6
Develops policies, standards, processes, guidelines for ensuring the physical and electronic security of automated systems.
Ensures that the policy and standards for security operations are fit for purpose, current and are correctly implemented.
Reviews new business proposals and provides specialist advice on security issues and implications.