Information Security: Difference between revisions

From Secure Group Wiki
Jump to navigation Jump to search
No edit summary
 
(9 intermediate revisions by the same user not shown)
Line 1: Line 1:
Our Information Security specialists are responsible for coordinating computing environments, deploying and documenting routines and projects controlling the service levels of operating systems, databases, and networks.
Secure Group is rapidly expanding. Our teams are in continuous motion, and we’re constantly welcoming new people to join our company. The Information Security team needs to keep up with this fast-changing environment and ensure that our company's data is protected by ensuring that all parties have the right access to work safely.


They provide technical support in the use of computer hardware and software and in supporting users by configuring and installing computing resources and systems controlling the security of the computing environment, which is our number one driver.
It's also under the responsibility of the Information Security team to manage the security of our network and servers, monitor activities, establish compliant procedures, and guarantee the protection of our datacenter.


It is under the responsibility of the Information Security specialists to work with the configuration and maintenance of the systems' environment, from performance monitoring and availability of the systems to the definition and monitoring of system infrastructure's suppliers and to make the configuration and maintenance of backups, performing the installations and configurations of the operating systems.
Advancing in this framework consists of being on the lookout for new threats and finding new ways of safeguarding our company through effective management of processes, methodologies, costs, and policies assuring Secure Group's ability to function and grow as an ethical, compliant, and transparent organization.


In order to progress in our development path and Level Up or Step Up, our Information Security specialists must:</br>
 
* Meet the criteria of the Level & Step Chart for the [[Individual_Contributors|Individual Contributors Path]]
= Progression=
* Score at least 4 in the [[KAI]] of their position in order to reach Level 3
In order to progress in our development path and Level Up or Step Up, our Information Security team must:
* Meet the criteria of the Level & Step Chart for the [[Performance#Individual_Contributors_Levels|Individual Contributors Path]]
* Meet the [[Information_Security#KAI_of_the_framework|KAI]] grade of the framework related to each level
* Demonstrate proficiency in [[Secure Group Knowledge]]
* Demonstrate proficiency in [[Secure Group Knowledge]]
</br>
</br>
Line 27: Line 29:
!4
!4
|-
|-
!Information Security Expert
!1
|4.160  
|4.160  
|4.310  
|4.310  
Line 33: Line 35:
|4.610  
|4.610  
|-
|-
!Information Security Engineer
!2
|5.160  
|5.160  
|5.310  
|5.310  
Line 39: Line 41:
|5.610  
|5.610  
|-
|-
!Sr. Information Security Engineer
!3
|6.160  
|6.160  
|6.310  
|6.310  
Line 45: Line 47:
|6.610  
|6.610  
|-
|-
!Sr. Information Security Engineer lvl IV
!4
|7.160  
|7.160  
|7.310  
|7.310  
Line 51: Line 53:
|7.610  
|7.610  
|-
|-
!Sr. Information Security Engineer lvl V
!5
|8.160  
|8.160  
|8.310  
|8.310  
Line 57: Line 59:
|8.610  
|8.610  
|-
|-
!Sr. Information Security Engineer lvl VI
!6
|9.160  
|9.160  
|9.310  
|9.310  
Line 67: Line 69:
</div>
</div>


= [[Knowledge_Management#Knowledge_Accountability_Index|KAI]] of the position =
= [[Knowledge_Management#Knowledge_Accountability_Index|KAI]] of the framework =
 
<!-- JOB FRAMEWORK -->
<div class="grid two-columns">
<div class="">
  <div class="box-header center">
== Extensive Knowledge ==
== Extensive Knowledge ==
   </div>
   </div>
   <div class="box-content framework">
   <div class="box-content framework">
     <div class="center">
     <div class="center">
{| class="wikitable" style="text-align:center; background-color:#DEEBFF; color:#222;"
{| class="wikitable" style="text-align:center; font-size:11px; font-family:Arial, Helvetica, sans-serif !important;; background-color:#DEEBFF; color:#222;"
|- style="font-weight:bold; background-color:#F4F5F7; color:#172B4D;"
|- style="font-weight:bold; vertical-align:middle; background-color:#EAECF0; color:#172B4D;"
! rowspan="2" | Type
! rowspan="2" | Type
! rowspan="2" | Knowledge Description
! rowspan="2" | Knowledge Description
! colspan="6" | Minimum Grade to acquire Level X
! colspan="6" | Minimum Grade to acquire Level X
|- style="font-weight:bold; background-color:#F4F5F7; color:#172B4D;"
|- style="font-weight:bold; vertical-align:middle; background-color:#F4F5F7; color:#172B4D;"
| Level 1
| Level 1
| Level 2
| Level 2
Line 90: Line 87:
| Level 6
| Level 6
|-
|-
| style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:left;" | Hardware
| style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Hardware
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Supermicro Supermicro Services]
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Supermicro Supermicro Servers]
| style="background-color:#E3FCEF;" | Practical application
| style="background-color:#E3FCEF;" | Practical application
| style="background-color:#E3FCEF;" | Practical application
| style="background-color:#E3FCEF;" | Practical application
Line 99: Line 96:
| Applied theory
| Applied theory
|-
|-
| style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:left;" | Network Devices
| style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Network Devices
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://mikrotik.com/software Microtik routerOS]
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://mikrotik.com/software Microtik routerOS]
| style="background-color:#E3FCEF;" | Practical application
| style="background-color:#E3FCEF;" | Practical application
Line 108: Line 105:
| Applied theory
| Applied theory
|-
|-
| rowspan="3" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:left;" | Protocols
| rowspan="3" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Protocols
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Border_Gateway_Protocol BGP]
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Border_Gateway_Protocol BGP]
| style="background-color:#E3FCEF;" | Practical application
| style="background-color:#E3FCEF;" | Practical application
Line 133: Line 130:
| Applied theory
| Applied theory
|-
|-
| style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:left;" | Frameworks
| style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Frameworks
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Scrum_(software_development) Scrum]
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Scrum_(software_development) Scrum]
| style="background-color:#FFFAE5;" | Limited experience
| style="background-color:#FFFAE5;" | Limited experience
Line 142: Line 139:
| Applied theory
| Applied theory
|-
|-
| rowspan="2" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:left;" | Programming languages
| rowspan="2" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Programming languages
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Bash_(Unix_shell) Bash Script]
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Bash_(Unix_shell) Bash Script]
| style="background-color:#E3FCEF;" | Practical application
| style="background-color:#E3FCEF;" | Practical application
Line 159: Line 156:
| Applied theory
| Applied theory
|-
|-
| rowspan="23" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:left;" | Software/Tools/Platforms - Configuration
| rowspan="23" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Software/Tools/Platforms - Configuration
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Bamboo_(software) Atlassian Bamboo]
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Bamboo_(software) Atlassian Bamboo]
| style="background-color:#FFFAE5;" | Limited experience
| style="background-color:#FFFAE5;" | Limited experience
Line 344: Line 341:
| Applied theory
| Applied theory
|-
|-
| rowspan="20" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:left;" | Software/Tools/Platforms - Server Administration
| rowspan="20" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Software/Tools/Platforms - Server Administration
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Bamboo_(software) Atlassian Bamboo]
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Bamboo_(software) Atlassian Bamboo]
| style="background-color:#FFFAE5;" | Limited experience
| style="background-color:#FFFAE5;" | Limited experience
Line 505: Line 502:
| Applied theory
| Applied theory
|-
|-
| style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:left;" | Languages (idioms)
| style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Languages (idioms)
| style="background-color:#FFF; color:#172B4D; text-align:left;" | Advanced Business English
| style="background-color:#FFF; color:#172B4D; text-align:left;" | Advanced Business English
| style="background-color:#FFFAE5;" | Limited experience
| style="background-color:#FFFAE5;" | Limited experience

Latest revision as of 12:04, 18 April 2022

Secure Group is rapidly expanding. Our teams are in continuous motion, and we’re constantly welcoming new people to join our company. The Information Security team needs to keep up with this fast-changing environment and ensure that our company's data is protected by ensuring that all parties have the right access to work safely.

It's also under the responsibility of the Information Security team to manage the security of our network and servers, monitor activities, establish compliant procedures, and guarantee the protection of our datacenter.

Advancing in this framework consists of being on the lookout for new threats and finding new ways of safeguarding our company through effective management of processes, methodologies, costs, and policies assuring Secure Group's ability to function and grow as an ethical, compliant, and transparent organization.


Progression

In order to progress in our development path and Level Up or Step Up, our Information Security team must:


Salary Grid

All mentioned salary ranges represent the monthly income in Bulgarian Lev after taxes and deductions.

Information Security Step
Level
Individual Contributor Path 1 2 3 4
1 4.160 4.310 4.466 4.610
2 5.160 5.310 5.466 5.610
3 6.160 6.310 6.466 6.610
4 7.160 7.310 7.466 7.610
5 8.160 8.310 8.466 8.610
6 9.160 9.310 9.466 9.610

KAI of the framework

Extensive Knowledge

Type Knowledge Description Minimum Grade to acquire Level X
Level 1 Level 2 Level 3 Level 4 Level 5 Level 6
Hardware Supermicro Servers Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Network Devices Microtik routerOS Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Protocols BGP Practical application Practical application Applied theory Applied theory Applied theory Applied theory
iSCSI Practical application Practical application Applied theory Applied theory Applied theory Applied theory
NFS Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Frameworks Scrum Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Programming languages Bash Script Practical application Practical application Applied theory Applied theory Applied theory Applied theory
SQL Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Software/Tools/Platforms - Configuration Atlassian Bamboo Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Atlassian Confluence Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Atlassian Jira Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
BlackBerry Enterprise Server Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Countly Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Digium Switchvox Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Docker Engine/Container Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Docker Harbor Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Gerrit Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Idaptive Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Lansweeper Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Microsoft Dynamics Navision Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Microsoft Windows Server Practical application Practical application Applied theory Applied theory Applied theory Applied theory
MS Exchange Practical application Practical application Applied theory Applied theory Applied theory Applied theory
MySQL Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Nextcloud Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Paessler PRTG Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Samsung Knox Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Snapt Load Balancer Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Sophos UTM Practical application Practical application Applied theory Applied theory Applied theory Applied theory
SpamTitan Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Veeam Backup Practical application Practical application Applied theory Applied theory Applied theory Applied theory
VMWare Vcenter Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Software/Tools/Platforms - Server Administration Atlassian Bamboo Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Atlassian Bitbucket Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Atlassian Confluence Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Atlassian Jira Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
BlackBerry Enterprise Server Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Countly Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Docker Engine/Container Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Docker Harbor Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Gerrit Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Lansweeper Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Microsoft Dynamics Navision Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Microsoft Windows Server Practical application Practical application Applied theory Applied theory Applied theory Applied theory
MS Exchange Practical application Practical application Applied theory Applied theory Applied theory Applied theory
MySQL Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Nexenta Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Paessler PRTG Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Samsung Knox Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Sophos UTM Practical application Practical application Applied theory Applied theory Applied theory Applied theory
VMWare Vcenter Practical application Practical application Applied theory Applied theory Applied theory Applied theory
XiboTV Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Languages (idioms) Advanced Business English Limited experience Limited experience Practical application Applied theory Applied theory Applied theory