Network Security Management
Planning, implementing, monitoring, and managing security measures specifically designed to protect computer networks and data transmitted across them.
Proficiency Level
Level 1 (Follow)
- Follows basic network security procedures relevant to their role (e.g., reporting suspicious network activity, adhering to VPN usage policies).
- Recognizes common network-based threats (e.g., phishing links in emails) based on security awareness training.
- Uses network resources in compliance with acceptable use policies.
Level 2 (Assist)
- Assists security analysts in monitoring network security alerts generated by tools like firewalls, Intrusion Detection Systems (IDS), or SIEM platforms.
- Helps implement predefined security configurations or rule changes on network security devices under close supervision.
- Performs routine security checks, such as verifying firewall rule sets against documentation.
Level 3 (Apply)
- Implements, configures, and manages standard network security tools like firewalls, VPN gateways, and basic IDS/IPS.
- Responds to common network security incidents (e.g., malware detection, unauthorized access attempts) according to established procedures.
- Applies network security policies and standards during network device configuration and troubleshooting.
Level 4 (Ensure)
- Designs and implements robust network security solutions and architectures (e.g., network segmentation, secure remote access, DDoS mitigation).
- Manages and tunes network security monitoring and prevention systems to ensure effectiveness against current threats.
- Leads the response process for significant network security incidents.
- Conducts network vulnerability assessments and penetration testing coordination.
Level 5 (Strategise)
- Develops and oversees the organisation's comprehensive network security strategy, architecture, policies, and standards.
- Leads network security risk management efforts, aligning security controls with business risk appetite.
- Integrates network security seamlessly with the overall cybersecurity strategy, data protection, and compliance requirements.