Security Specialist

Free Security Specialist Course (6Months)

Security Specialist:

Brief Job Role Description: Individuals at this job are responsible for the design of security processes, the detection of threats and incidents, and response and restoration management in case of security incidents to IoT solutions.

Personal Attributes: IoT – Security Specialists must work and collaborate with various stakeholders involved in the development of IoT solutions. They must be able to communicate and build relationships with others and also continuously develop their knowledge and analytical abilities.

Security Specialist
Security Specialist

Design processes to manage security threats and incidents across multiple
technology layers:

Access Management
To be competent, the user/individual on the job must be able to:
PC1. manage access to IoT assets and systems based on Identity Access and Management tools and frameworks
PC2. evalute criticality and security threat levels of IoT assets and systems while managing their access
Data Security
PC3. define security parameters for data stored in cloud platforms, open source or in-memory databases
PC4. maintain accurate daily records/logs of data security performance parameters using standard templates and tools
PC5. analyze data security performance metrics to highlight variances and issues for action by appropriate people
PC6. develop encryption standards and access controls for data stored in cloud platforms, open source or in-memory databases
PC7. explore threats and vulnerabilities to data entry, exit and perimeter security in data assets such as databases, data lakes data pipelines, or streaming analytics packets
PC8. develop security assessment related data analytics models (both supervised and unsupervised) in coordination with data scientists for pattern detection of unknown issues and real time prediction of known issues.
PC9. conduct penetration testing using automatic scanning technologies, “black box testing”, as well as manual tests that use human intelligence to guide the steps
Network and Hardware Security
PC10. protect the IoT network and IoT devices from unauthorized access or malicious intent
PC11. configure and troubleshoot security hardware switches, routers, firewalls, WLAN, and Virtual Private Networks
PC12. ensure sufficient security levels are in place from device manufacture, initial installation, remote control and device disposal
PC13. maintain and continuously update inventory of physical assets of the organization
Network Security Design
PC14. secure the perimeter of the IoT network
PC15. classify IoT components into segments based on their functions and sensitivity of data
PC16. employ network monitoring tools to defend network
PC17. design logs that gather data from as many sources as possible
PC18. ensure only authorized devices should be able to connect to the network
Security Architecture
PC19. ensure that solution architecture implements, operates and controls prescribed security processes
PC20. ensure that security policies and standards are followed at all times
PC21. ensure that solution architecture performs day-to-day security processes such as threat and vulnerability management
Cloud, Application and Platform Security
PC22. encrypt both data in transit and data at rest (information stored in the cloud)
PC23. verify the integrity of cloud platforms
PC24. verify the integrity of third party applications and software that communicate with cloud services
PC25. implement regular security patches across devices to strengthen resistance against attack
PC26. employ digital certificates for identification and authentication
Fallback Mechanisms
PC27. implement fallback mechanisms such as disaster recovery plans


Organizational
Context
The user/individual on the job needs to know and understand:
KA1. organizational policies, procedures and guidelines which relate to maintaining solution security
KA2. organizational policies and procedures for sharing data
KA3. organizational policies for documenting and implementing security procedures
KA4. who to involve while defining and executing security processes
KA5. the range of standard templates and tools available and how to use them
Technical
Knowledge
The user/individual on the job needs to know and understand:
KB1. fundamentals of security and the various levels that they need to cover: device, cloud, communications, applications, etc.
KB2. how to communicate security requirements and processes across all levels of the organization
KB3. how to create and update Intrusion Detection Systems (IDS)
KB4. how to create and update Security Information Event Management (SIEM) Tools
KB5. how to define processes for handling security across various solution layers
KB6. how to manage Malware Software
KB7. how to manage Intrusion Prevention Systems
KB8. how to install and firewalls and data encryption protocols
KB9. knowledge of both internal and external security regulations and standards
KB10. how to prepare and submit security assessment reports and who to share these with
KB11. how to keep up to date with changes, procedures and practices in your role
KB12. how to store and retrieve information
KB13. how to keep up to date with changes, procedures and practices in your role

Reading Skills
SA1. follow instructions, guidelines, procedures, rules and service level agreements
Listening and Speaking Skills
SA2. listen effectively and orally communicate information accurately
B. Professional Skills
The user/individual on the job needs to know and understand how to:
Decision Making
SA3. follow rule-based decision making processes
SA4. make decisions on suitable courses
Plan and Organize
SA5. plan and organize your own work to achieve targets and deadlines
Problem Solving
SA6. apply problem-solving approaches in different situations
Analytical Thinking
SA7. configure data and disemminate relevant information to others
Critical Thinking
SA8. apply balanced judgments to different situations
Attention to Detail
SA9. apply good attention to detail
SA10. check your work is complete and free from errors

Security Specialist

Detect occurences of security incidents to IoT solutions:

Review Past Incidents
To be competent, the user/individual on the job must be able to:
PC1. record, classify and prioritize information security incidents using standard templates and tools
PC2. access their organization’s knowledge base for information on previous information security incidents and how these were managed
Audit Operations
PC3. participate in audit reviews, as required
PC4. identify the requirements of audits and prepare for audits in advance
PC5. liaise with appropriate people to gather data/information required for audits
PC6. provide immediate support to auditors to carry out audit tasks
PC7. carry out required audit tasks using standard tools and following established procedures/guidelines/checklists
Security Analysis
PC8. evaluate the impact of potential anomalies
PC9. ensure anomalies and events are detected in a timely manner
PC10. perform regular maintenance of detection processes
PC11. ensure readiness of maintenance processes to reliable detect incidents
Continuous Monitoring and Threat Assessment
PC12. apply security controls to IoT solutions in line with data security policies, procedures and guidelines
PC13. perform security assessments of gateway / edge devices systems using automated security assessment tools
PC14. design and develop dashboards/KPIs for monitoring the incidents, the root cause and detection to resolution corrective actions using standard Commercial off-the-shelf based Investigation Management tool
PC15. search for critical security threats and vulnerabilities across all layers of the IoT solution
PC16. predict and extrapolate attack trends ahead of their occurrence
PC17. carry out backups of security devices and applications in line with security policies, procedures and guidelines, where required

Organizational
Context
The user/individual on the job needs to know and understand:
KA1. organizational policies, procedures and guidelines which relate to maintaining solution security
KA2. organizational policies and procedures for sharing data
KA3. organizational policies for documenting and implementing security procedures
KA4. who to involve while defining and executing security processes
KA5. the range of standard templates and tools available and how to use them
Technical
Knowledge
The user/individual on the job needs to know and understand:
KB1. fundamentals of security and the various levels that they need to cover: device, cloud, communications, applications, etc.
KB2. routine operational procedures and tasks required to co-ordinate and respond to information security incidents
KB3. how to identify and resolve security vulnerabilities and incidents
KB4. common security issues and incidents that may require action and who to report these to
KB5. how to identify and resolve vulnerabilities in systems
KB6. how to maintain records of monitoring activities
KB7. how to obtain and validate information related to security issues
KB8. how to prepare and submit security reports and who to share these with
KB9. how to query and write scripts
KB10. how to identify and refer anomalies in data
KB11. how to store and retrieve information
KB12. how to keep up to date with changes, procedures and practices in your role



Reading Skills
SA1. follow instructions, guidelines, procedures, rules and service level agreements
Listening and Speaking Skills
SA2. ask for clarification and advice from appropriate people
SA3. listen effectively and orally communicate information accurately
Professional Skills
The user/individual on the job needs to know and understand how to:
Decision Making
SA4. follow rule-based decision making processes
SA5. make decisions on suitable courses
Plan and Organize
SA6. plan and organize your own work to achieve targets and deadlines
Problem Solving
SA7. refer anomalies to the supervisor
SA8. seek clarification on problems from others
Analytical Thinking
SA9. analyze data and activities
SA10. pass on relevant information to others
Critical Thinking
SA11. apply balanced judgments to different situations
Attention to Detail
SA12. apply good attention to detail
SA13. check your work is complete and free from errors
Team Working
SA14. work independently and collaboratively

Security Specialist

Respond to detected security incidents and restore affected capabilities:

Response Planning
To be competent, the individual working on the job must be able to:
PC1. plan timely response to detected security incidents
PC2. execute post-incident processes and procedures in line with security policies, procedures and guidelines
PC3. automate responses to detected security threats and incidents
PC4. assign information security incidents promptly to appropriate people for investigation/action
PC5. track progress of investigations into information security incidents and escalate to appropriate people where progress does not comply with standards or service level agreements (SLAs)
Communications
PC6. liaise with stakeholders to gather, validate and provide information related to information security incidents, where required
PC7. report to law enforcement agencies, if required
Preliminary Report
PC8. prepare accurate preliminary reports on information security incidents using standard templates and tools
PC9. submit preliminary reports promptly to appropriate people for action
Restoration and Recovery
PC10. neutralize the effects of the security incident or mitigate it
PC11. prevent further expansion of the security incident
PC12. ensure timely restoration of IoT assets and systems affected by security incident
PC13. incorporate lessons learned to prevent future security incidents
PC14. update the organization’s knowledge base promptly and accurately with information security incidents and how they were managed
Organizational
Context
The individual on the job needs to have knowledge of:
KA1. organizational policies, procedures and guidelines which relate to maintaining solution security
KA2. organizational policies and procedures for sharing data
KA3. organizational policies for documenting and implementing security procedures
KA4. who to involve while defining and executing security processes
KA5. the range of standard templates and tools available and how to use them
Technical
Knowledge
The individual on the job needs to know and understand:
KB1. fundamentals of security and the various levels that they need to cover: device, cloud, communications, applications, etc.
KB2. routine operational procedures and tasks required to co-ordinate and respond to information security incidents
KB3. different stages of incident management and your role in relation to these, including: identify; contain; cleanse; recover; close
KB4. how to restore and recover systems after a security incident
KB5. common security issues and incidents that may require action and who to report these to
KB6. how to obtain and validate information related to security issues
KB7. how to prepare and submit security reports and who to share these with
KB8. how to query and write scripts
KB9. how to identify and refer anomalies in data
KB10. how to store and retrieve information
KB11. how to keep up to date with changes, procedures and practices in your role

Reading Skills
SA1. follow instructions, guidelines, procedures, rules and service level agreements
Listening and Speaking Skills
SA2. ask for clarification and advice from appropriate people
SA3. listen effectively and orally communicate information accurately
B. Professional Skills
The user/individual on the job needs to know and understand how to:
Decision Making
SA4. follow rule-based decision making processes
SA5. make decisions on suitable courses
Plan and Organize
SA6. plan and organize your own work to achieve targets and deadlines
Problem Solving
SA7. refer anomalies to the supervisor
SA8. seek clarification on problems from others
Analytical Thinking
SA9. analyze data and activities
SA10. pass on relevant information to others
Critical Thinking
SA11. apply balanced judgments to different situations
Attention to Detail
SA12. apply good attention to detail
SA13. check your work is complete and free from errors
Team Working
SA14. work independently and collaboratively

Security Specialist

Create technical documents and manuals:

Planning
To be competent, the individual working on the job must be able to:
PC1. identify the purpose and the scope of the activity for which technical documentation is to be produced
PC2. obtain information for the technical document from relevant sources and stakeholders
Drafting
PC3. draft technical document ensuring that content is concise, complete and easy to consume
PC4. review technical document content with relevant stakeholders and document owners
PC5. ensure that technical document is formatted and designed as per specifications
Publishing
PC6. transfer technical document to relevant stakeholders for sign-off and publishing
PC7. continuously review and update technical document

Organizational
Context
The individual on the job needs to have knowledge of:
KA1. organizational policies, procedures and guidelines which relate to drafting and publishing technical documentation
KA2. organizational policies and procedures for sharing data

KA3. the range of standard templates and tools available and how to use them
Technical
Knowledge
The individual on the job needs to know and understand:
KB1. knowledge of the solution for which documentation is to be created
KB2. kow to create clear and concise content
KB3. how to format and align document

Writing Skills
SA1. complete accurate well written work with attention to detail
Reading Skills
SA2. follow instructions, guidelines, procedures, rules and service level agreements
Listening and Speaking Skills
SA3. ask for clarification and advice from appropriate people
SA4. listen effectively and orally communicate information accurately
Professional Skills
The user/individual on the job needs to know and understand how to:
Decision Making
SA5. follow rule-based decision making processes
Plan and Organize
SA6. plan and organize your own work to achieve targets and deadlines
Problem Solving
SA7. refer anomalies to the supervisor
SA8. apply problem-solving approaches in different situations
Analytical Thinking
SA9. pass on relevant information to others
Critical Thinking
SA10. apply balanced judgments to different situations
Attention to Detail
SA11. apply good attention to detail
SA12. check your work is complete and free from errors

Team Working
SA13. work effectively in a team environment
SA14. contribute to the quality of team working

Develop your knowledge, skills and competence:

Develop knowledge
To be competent, the individual working on the job must be able to:
PC1. obtain advice and guidance from appropriate people to develop your knowledge, skills and competence
PC2. identify accurately the knowledge and skills you need for your job role
PC3. identify accurately your current level of knowledge, skills and competence and any learning and development needs
PC4. agree with appropriate people a plan of learning and development activities to address your learning needs
PC5. undertake learning and development activities in line with your plan
Apply knowledge
PC6. apply your new knowledge and skills in the workplace, under supervision
PC7. obtain feedback from appropriate people on your knowledge and skills and how effectively you apply them
PC8. Review your knowledge, skills and competence regularly and take appropriate action

Organizational Context
The individual on the job needs to have knowledge of:
KA1. your organization’s procedures and guidelines for developing your knowledge, skills and competence and your role and responsibilities in relation to this
KA2. the importance of developing your knowledge, skills and competence to you and your organization
KA3. different methods used by your organization to review skills and knowledge including:  training need analysis  skills need analysis  performance appraisals
KA4. how to review your knowledge and skills against your job role using different methods and analysis
KA5. different types of learning and development activities available for your job role and how to access these
KA6. how to produce a plan to address your learning and development needs, who to agree it with and the importance of undertaking the planned activities
KA7. different types of support available to help you plan and undertake learning and development activities and how to access these
KA8. why it is important to maintain records of your learning and development
KA9. methods of obtaining and accepting feedback from appropriate people on your knowledge skills and competence
KA10. how to use feedback to develop in your job role
Technical
Knowledge
The individual on the job needs to know and understand:
KB1. the knowledge and skills required in your job role
KB2. your current learning and development needs in relation to your job role
KB3. different types of learning styles and methods including those that help you learn best
KB4. the importance of taking responsibility for your own learning and development
KB5. to the importance of learning and practicing new concepts, theory and how to apply these in the work environment or on samples.
KB6. how to explore sample problems and apply solutions
KB7. how to use information technology effectively to input and/or extract data accurately
KB8. how to agree objectives and work requirements
KB9. how to keep up to date with changes, procedures and practices in your role



Writing Skills
SA1. complete accurate well written work with attention to detail
Reading Skills
SA2. follow instructions, guidelines, procedures, rules and service level agreements
Listening and Speaking Skills
SA3. ask for clarification and advice from line managers
Decision Making
SA4. make decisions on suitable courses
Plan and Organize
SA5. plan and organize your own work to achieve targets and deadlines
Customer Centricity
SA6. check that your own and/or your peers’ work meets customer requirements
Problem Solving
SA7. refer anomalies to the line manager
Analytical Thinking
SA8. analyze data and activities
Critical Thinking
SA9. apply balanced judgments to different situations
Attention to Detail
SA10. check your work is complete and free from errors
SA11. get your work checked by others
Team Working
SA12. work effectively in a team environment

Guidelines for Assessment

  1. Criteria for assessment for each Qualification Pack will be created by the Sector Skill Council. Each Performance Criteria (PC) will be assigned marks proportional to its importance in NOS. SSC will also lay down proportion of marks for Theory and Skills Practical for each PC.
  2. The assessment for the theory part will be based on knowledge bank of questions created by the SSC.
  3. Assessment will be conducted for all compulsory NOS, and where applicable, on the selected elective/option NOS/set of NOS.
  4. Individual assessment agencies will create unique question papers for theory part for each candidate at each examination/training center (as per assessment criteria below).
  5. Individual assessment agencies will create unique evaluations for skill practical for every student at each examination/training center based on this criterion.
  6. To pass a QP, a trainee should score an average of 70% across generic NOS’ and a minimum of 70% for each technical NOS
  7. In case of unsuccessful completion, the trainee may seek reassessment on the Qualification Pack.