
Secure Operations
Secure Operations is the management of an organisation’s information systems operations in accordance with an agreed security policy.
What will applicants need to demonstrate?
Competence relevant to the professional level applied for. This is technical work, so there needs to be a good to subject matter expertise and understanding of server-level software such as operating systems, system processes and directories. If systems are running in the cloud, there will be a good to subject matter expertise and understanding of the cloud platforms in use.
Appropriate knowledge and expertise in the management and maintenance of end point devices, local and remote hardware as well as managing interaction with third party suppliers as appropriate. Professionals in Secure Operations have experience and expertise in how to monitor technical infrastructure and applications, their maintenance, upgrades, and repairs. The primary responsibility is to keep the services operation reliably and securely, by understanding the relationship between systems and their roles within an organisation. Â
Secure Operations supports incident response by closing access to some parts of the system or network, to ensure that any failure in controls is addressed.Â
Responsibilities include:Â
- Managing identification, authentication and authorisation controls, including directories
- Monitoring system performance, including security incident metrics
- Ensuring that system processes, such as backups, are effective and in compliance with agreed protocols
- Managing discrete development and test environments
- Managing the transition to operation of new components and systems to minimise the risk to the security of other systems and current services
- Ensuring that updates (patches) to externally supplied software and hardware are applied quickly but safely
- Supporting users in viewing and processing data according to agreed access controls
- Managing the recovery of services after a security incident has been resolved.
Our guidance notes below will help you decide whether Secure Operations is the correct specialism for you. Please ensure you read the UK Cyber Security Council’s Standard for Professional Competence and Commitment for detailed information on competency requirements. Our application form also includes contextualised notes to ensure you complete it correctly.
Want to learn more about the Council’s role in professional registration? Please click here to be taken to The Council’s website.