Network Security

Design, implement, monitor, and continuously improve secure networks by controlling access, segmenting traffic, detecting threats, and ensuring availability and integrity of network services.

Proficiency Level

Level 1 (Follow)

  • Follow network security rules (VPN use, secure Wi-Fi, approved devices) and reports suspicious network behaviour (slowdowns, unusual pop-ups, unknown SSIDs).
  • Apply basic safe practices: does not bypass security controls, uses strong authentication, and protects credentials.
  • Understand the purpose of common controls (firewalls, antivirus, MFA, encryption) and complies with required procedures.

Level 2 (Assist)

  • Perform routine network security tasks under guidance (access provisioning, rule change requests, inventory updates, log checks).
  • Assist with vulnerability remediation (patch coordination, removing unused ports/services, enforcing secure configurations).
  • Support incident handling steps (identify affected endpoints/segments, isolate devices, collect basic information for escalation).

Level 3 (Apply)

  • Implement and maintains core network security controls (firewall rules, ACLs, VPN, IDS/IPS, secure DNS) with proper documentation and approval.
  • Monitor network events/logs, investigates anomalies, and tunes controls to reduce false positives while maintaining protection.
  • Apply segmentation and least privilege principles (VLANs, micro-segmentation, NAC) to protect critical systems and data flows.

Level 4 (Ensure)

  • Design secure network architecture and standards (segmentation strategy, zero trust principles, secure remote access, cloud network security).
  • Lead major changes and security improvements (migration, firewall/IPS refresh, NAC rollout), ensuring risk assessment and minimal downtime.
  • Coordinate response to network-based attacks (DDoS, lateral movement, ransomware spread), aligning IT Ops, Security, vendors, and management.

Level 5 (Strategise)

  • Set enterprise network security roadmap and governance (policies, control framework, KPIs, audits) aligned to business risk appetite.
  • Anticipate evolving threats and drives continuous improvement using threat intelligence, attack simulations, and security maturity assessments.
  • Establish resilient network security operating model (SOC integration, monitoring strategy, vendor management, standardised playbooks, capability building).