Undertake a security risk assessment for a simple IT system to identify, analyse and evaluate security threats and hazards to planned and installed information systems or services (e.g. Cloud services) and provide recommendations.
apply organisational theory, change management, marketing, strategic practice, human resource management and IT service management to technology solutions development.
follow a systematic methodology for initiating, planning, executing, controlling, and closing technology solutions projects using industry standard processes, methods, techniques and tools to execute and manage projects.
plan, design and manage computer networks with an overall focus on the services and capabilities that network infrastructure solutions enable in an organisational context. Identifies network security risks and their resolution.
conduct and present effective research using engaging, well-structured approaches
K6 K17 K18 S7 S10 B1 B2 B3 B6
Duty 11
design, build and test high-quality software solutions.
K3 K4 K6 K7 K10 K12 S2 S4 S5 S9 B1 B2 B3 B4 B6
Duty 12
apply engineering principles to all stages of the software development process, from requirements, analysis and design, development and data requirements
K4 K8 K14 K15 K16 K19 K20 B5 B7 B8
Duty 13
Apply skills and knowledge of systems development, cyber security, data, AI and infrastructure in the creation of digital solutions.
Analyse ethical and legal implications of digital and technology solutions and make recommendations as a result of this analysis. For example, with regard to artificial intelligence or the use of personal data.
Mentor others in the development and implementation of digital and technical solutions.
K2 K3 K4 K5 K10 K11 K12 B4 B5 B6 B7 B8
Software Engineering Professional
Duty 16
Duty 17
Accountable for the undertaking and completion of the analysis of software engineering business issues for either the entire requirement or subset thereof dependent on complexity and/or scope size. K21 K22 K23 K28 S16 S23
Implement the software solution, or part thereof, dependent on complexity, scope size and technology (including bespoke code, implementation of COTS package, or tailoring of package, or combinations of these) into the environment required (including systems test, user test environment, or live environment as appropriate).K21 K22 K23 K24 K28 S19 S20
Duty 18
Duty 19
Creation of an over-arching software solution design suitable to resolving the business issues for either the entire requirement or subset thereof dependent on complexity and/or scope size.K24 K26 K27 K28 S17 S18 S19
Build the software solution, or part thereof, dependent on complexity, scope size, and technology (including bespoke code, implementation of COTS (Commercial-off-the-shelf) package, or tailoring of package, or combinations of these).K21 K22 K23 K24 K25 K26 K27 K28 S18 S19 S20 S21
Duty 20
Duty 21
Supervise the work of more junior team members undertaking work in the software solution life-cycle K21 K28 S16 S17 S22
Test that the software solution, or part thereof, dependent on complexity, scope size and technology (including bespoke code, implementation of COTS package, or tailoring of package, or combinations of these) meets the business needs identifying any remedial actions required K25 K26 K28 S16 S18 S21 S22 S23
Duty 22
Duty 23
Work closely with all key stakeholders to ensure the software solution or part thereof, dependent on complexity and scope size, is understood and correctly used. K21 K28 S17 S22
Ongoing support of the software solution or part thereof, dependent on complexity and technology (including bespoke code, implementation of COTS package, or tailoring of package or combinations of these).K21 K28 S22 S23
Cyber Security Professional
Duty 41
Duty 42
Analyse and evaluate security threats to technology solutions and implement technical and process solutions to mitigate these threats.K45 K46 K47 K49 K51 S40 S41 S43 S46
Perform security risk assessments within wider IT development teams, ensuring cyber security is embedded within the deliverables of the team.K46 K47 S41
Duty 43
Duty 44
Lead a range of cyber security audit activities to demonstrate security control effectiveness.K47 K48 K50 S42 S46
Apply advanced problem solving techniques to address cyber security issues.K45 K48 K49 K50 K52 S40 S44 S46 S47
Duty 45
Duty 46
Plan and perform a business impact analysis in response to a security incident and implement a recovery plan.K49 K51 K52 S40 S43 S44
Demonstrate effective management of cyber security processes and systems within the defined Service Level Agreements (SLAs). K46 K48 K49 K50 K51 K52 S43 S45 S46 S47
Network Engineering Professional
Duty 52
Duty 53
Analyse a network system and make recommendations to optimise performance and efficiencies of network systems.SK62 K64 K66 S56 S59 S60
Design operational networks and apply appropriate security products and processes in line with organisational requirements.K61 K63 K64 K66 K67 S56 S62
Duty 54
Duty 55
Plan system upgrades to a network or hardware or software or operating systems.K61 K63 K64 K65 K66 K67 K68 S57 S58 S59 S60 S61 S62 S63
Produce relevant network information or documentation to meet user needs.K64 K66 S57 S58 S61 S62 S63
Duty 56
Duty 57
Maintain accurate logical records in line with organisational policy and when carrying out network tasks and identify when network updates are required. S56 S57 S58 S59 S61 S63
Interpret requirements and technical specifications in relation to network systems. K61 K63 K64 K66 K67 K68 S57 S60 S61 S62
Duty 58
Duty 59
Escalate network security or resilience risk as appropriate, providing solution/s to identified risk area. K61 K64 K65 K66 S58 S59 S60 S61 S63
Problem solve to address technical performance issues in network systems. K61 K64 K65 K66 S59 S60 S61 S62 S63