| PROFESSIONAL PROFILES | ROLE AND SKILL |
Chief Information Security Officer (CISO)  | - ROLE CISO protect company and employee information from unauthorized access. They also define the information system security policy, manage the deployment of security across all information systems, and ensure information availability. - SKILLS 1. Must have technical expertise in technology. 2. Develop a strategic thinking pattern that aligns with business objectives. 3. Leadership attitudes. 4. Understand the legal framework of certain important laws and effectively communicate risks and strategies. 5. Develop an incident response protocol. 6. Understand and identify potential security threats, implementing solutions with minimal impact. 7. Maintain a security policy budget to ensure the organization's needs are met. |
Cyber Incident Responder  | - ROLE Cyber Incident Response Managers monitor and assess the cybersecurity status of systems, analyzing, evaluating, and mitigating the impact of cybersecurity incidents. They identify malicious actors and the root causes of cyber incidents. - SKILL 1. Knowledge of networking protocols, systems operator, and security tools such as SIEM and IDS/IPS. 2. Critical thinking and problem solving skills in a timely manner. 3. Communication skills for effective teamwork. 4. Ability to work under stress and handle multiple incidents. 5. Stay current and continue learning. |
Cyber Legal, Policy and Compliance Officer  | - ROLE Compliance and information security directors monitor regulatory compliance and oversee information security to ensure the security of all associated information technology. - SKILL 1. Understand the implications of changes to the legal framework on the organization's cybersecurity and data protection strategy and policies. 2. Follow and apply the practices of audit frameworks, standards, and methodologies. Work as part of a team, collaborating with colleagues. |
Cyber Threat Intelligence Specialist  | - ROLE Collect, process, and analyze data and information to produce actionable intelligence reports and disseminate them to target stakeholders. - SKILL: 1. Analytical thinking to dissect complex data, identify patterns, and reach crucial conclusions. 2. Knowledge of cybersecurity principles, familiarity with detection tools and networking protocols. 3. Communication skills, clear writing, presenting and dissecting complex information. 4. Collaborate closely with other professionals, share information, and coordinate responses to threats. |
Cybersecurity Architect  | - ROLE Software architects create the technical design and functional model of a software system, based on functional specifications. They plan and design security solutions from the ground up (infrastructure, systems, assets, software, hardware, and services) and cybersecurity controls. - SKILL 1. Basic knowledge of cybersecurity and legality is crucial. 2. Technical skills in threat modeling and cryptography are mandatory. 3. Knowledge of cloud and storage security, identity use, and access. |
Cybersecurity Auditor  | - ROLE A cybersecurity auditor is a professional responsible for assessing and ensuring the security of an organization's systems and digital infrastructure, identifying vulnerabilities and risks. - SKILL 1. Understand the implications of changes to the legal framework on the organization's cybersecurity and data protection strategy and policies. 2. Follow and apply the practices of audit frameworks, standards, and methodologies. Work as part of a team, collaborating with colleagues. Cybersecurity Educator |
Cybersecurity Educator  | - ROLE Cybersecurity educator instruct students who have earned a higher secondary education diploma in their own specialized field of study, which is predominantly academic in nature. - SKILL 1. Technical knowledge 2. Knowledge of potential cyber threats 3. Effective communication and the ability to express security concepts to diverse audiences 4. Legal knowledge to provide advice on cybersecurity risk reduction |
Cybersecurity Implementer  | - ROLE Develops cybersecurity solutions, ensuring not only that they are implemented securely, but also that they are properly integrated into the organization's infrastructure. These must also comply with the security requirements and specificities of each system. - SKILL 1. Coding knowledge 2. Fix vulnerabilities in systems 3. Ensure that solutions applied to cybersecurity problems are effective 4. Collaborate closely to integrate cybersecurity solutions within operational centers. |
Cybersecurity Researcher  | - ROLE Research engineers combine research skills and knowledge of engineering principles to assist in the development or design of new products and technologies. They also improve existing technical processes, machines, and systems, and create innovative new technologies. - SKILL 1. Technical knowledge of programming languages. 2. Analytical skills to analyze complex data and study future preventions. 3. Problem-solving skills. 4. Ability to communicate effectively. 5. Continue learning daily in the field of cybersecurity. |
Cybersecurity Risk Manager  | - ROLE Cybersecurity risk managers identify, analyze, evaluate, estimate, and mitigate risks related to the cybersecurity of ICT infrastructures, such as systems or services. They manage these aspects by planning, implementing, reporting, evaluating, communicating, and addressing risks. - SKILL 1. Technical knowledge of cybersecurity and skills to identify, analyze, and assess crises. 2. Ability to deduce the impacts that incidents will have on organizations. 3. Communication skills. 4. Leadership and team management skills in collaboration with the organizational department. 5. Legal knowledge and certifications. |
Digital Forensics Investigator  | - ROLE Digital forensics experts recover and analyze information from computers and other types of data storage devices. They forensically examine digital media that may have been hidden, encrypted, or damaged, with the goal of identifying, preserving, recovering, analyzing, and presenting facts and opinions about the digital information. - SKILL 1. Analytical knowledge. 2. Technical knowledge. 3. Knowledge of data structures and the ability to preserve them. 4. Expertise in tools such as the Forensic Toolkit (FTK). 5. Legal knowledge and understanding of the legal and civil worlds and how to present data in court, providing effective advice. |
Pentration Tester  | - ROLE Penetration tester perform security vulnerability assessments and penetration tests according to industry-accepted methods and protocols. They analyze systems for potential vulnerabilities that may result from system misconfiguration, hardware or software failures, or operational weaknesses. - SKILL 1. Effective communication is crucial for sharing incidents and vulnerabilities. 2. Knowledge of technical aspects of cybersecurity and systems is essential for effective penetration testing. 3. Critical thinking skills to think creatively and analyze complex situations. 4. Knowledge of network protocols, architecture, and security controls is vital for understanding the operation of these systems. 5. Familiarity with security standards, ethical thinking, and maintaining a high level of professionalism. 6. Effective communication and collaboration with team members and clients are essential for the success of the attack examination. |