Core Cyber Specialisms

Identity & Access Management
The administration of policies, procedures and controls to guarantee that only authorised individuals can access information and technical resources
Digital Forensics
The process of determining and piecing together the sequence of events that lead to the current state of an IT system
Security System Architecture & Design
Functional design of an IT system to meet specific security requirements
Threat Intelligence
Maintaining an organisation's strategic awareness in relation to information insights that involve current and potential cyber threats


Cyber Governance & Risk Management
Evaluation, and management of risks associated with the cyber security policies
Incident Response
The process of preparing for, responding to, and addressing cyber security incidents to reduce an organisation's damage and prevent future occurrences
Vulnerability Management
The oversight of protected system configurations to ensure that vulnerabilities are identified and addressed effectively
Secure Operations
The administration of an organisation's information systems operations in alignment with the established Security Policy


Data Protection & Privacy
The management of data protection to ensure an organisation meets its contractual, legal and regulatory obligations
Secure System Development
The creation and continuous improvement of a system or product, adhering to agreed-upon security requirements and standards throughout its entire lifecycle
Security Testing
The evaluation of a network, system, product, or design to identify vulnerabilities or verify compliance with specified security requirements, often through penetration testing
Cyber Security Generalist
The execution of responsibilities from various cyber security specialisations within a single role


Network Monitoring & Intrusion
The surveillance of network and system activity to detect unauthorised user actions or potential intrusions by attackers
Security Management
The administration of cyber security resources, personnel and policies at an enterprise level, ensuring alignment with business goals and regulatory requirements
Cryptography & Communications Security
The design, development, testing, implementation and operation of a system or product to enable cryptographic secure communication
Cyber Audit & Assurance
The confirmation that systems and processes comply with specified security requirements and that mechanisms are in place to ensure ongoing compliance
