Network Security Management

Planning, implementing, monitoring, and managing security measures specifically designed to protect computer networks and data transmitted across them.

Proficiency Level

Level 1 (Follow)

  • Follows basic network security procedures relevant to their role (e.g., reporting suspicious network activity, adhering to VPN usage policies).
  • Recognizes common network-based threats (e.g., phishing links in emails) based on security awareness training.
  • Uses network resources in compliance with acceptable use policies.

Level 2 (Assist)

  • Assists security analysts in monitoring network security alerts generated by tools like firewalls, Intrusion Detection Systems (IDS), or SIEM platforms.
  • Helps implement predefined security configurations or rule changes on network security devices under close supervision.
  • Performs routine security checks, such as verifying firewall rule sets against documentation.

Level 3 (Apply)

  • Implements, configures, and manages standard network security tools like firewalls, VPN gateways, and basic IDS/IPS.
  • Responds to common network security incidents (e.g., malware detection, unauthorized access attempts) according to established procedures.
  • Applies network security policies and standards during network device configuration and troubleshooting.

Level 4 (Ensure)

  • Designs and implements robust network security solutions and architectures (e.g., network segmentation, secure remote access, DDoS mitigation).
  • Manages and tunes network security monitoring and prevention systems to ensure effectiveness against current threats.
  • Leads the response process for significant network security incidents.
  • Conducts network vulnerability assessments and penetration testing coordination.

Level 5 (Strategise)

  • Develops and oversees the organisation's comprehensive network security strategy, architecture, policies, and standards.
  • Leads network security risk management efforts, aligning security controls with business risk appetite.
  • Integrates network security seamlessly with the overall cybersecurity strategy, data protection, and compliance requirements.