Information Security: Difference between revisions
mNo edit summary |
No edit summary |
||
(12 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
Our | Secure Group is rapidly expanding. Our teams are in continuous motion, and we’re constantly welcoming new people to join our company. The Information Security team needs to keep up with this fast-changing environment and ensure that our company's data is protected by ensuring that all parties have the right access to work safely. | ||
It's also under the responsibility of the Information Security team to manage the security of our network and servers, monitor activities, establish compliant procedures, and guarantee the protection of our datacenter. | |||
Advancing in this framework consists of being on the lookout for new threats and finding new ways of safeguarding our company through effective management of processes, methodologies, costs, and policies assuring Secure Group's ability to function and grow as an ethical, compliant, and transparent organization. | |||
In order to progress in our development path and Level Up or Step Up, our Information Security | |||
* Meet the criteria of the Level & Step Chart for the [[ | = Progression= | ||
* | In order to progress in our development path and Level Up or Step Up, our Information Security team must: | ||
* Meet the criteria of the Level & Step Chart for the [[Performance#Individual_Contributors_Levels|Individual Contributors Path]] | |||
* Meet the [[Information_Security#KAI_of_the_framework|KAI]] grade of the framework related to each level | |||
* Demonstrate proficiency in [[Secure Group Knowledge]] | * Demonstrate proficiency in [[Secure Group Knowledge]] | ||
</br> | </br> | ||
Line 27: | Line 29: | ||
!4 | !4 | ||
|- | |- | ||
! | !1 | ||
| | |4.160 | ||
| | |4.310 | ||
| | |4.466 | ||
| | |4.610 | ||
|- | |- | ||
! | !2 | ||
| | |5.160 | ||
| | |5.310 | ||
| | |5.466 | ||
| | |5.610 | ||
|- | |- | ||
! | !3 | ||
| | |6.160 | ||
| | |6.310 | ||
| | |6.466 | ||
| | |6.610 | ||
|- | |- | ||
! | !4 | ||
| | |7.160 | ||
| | |7.310 | ||
| | |7.466 | ||
| | |7.610 | ||
|- | |- | ||
! | !5 | ||
| | |8.160 | ||
| | |8.310 | ||
| | |8.466 | ||
| | |8.610 | ||
|- | |- | ||
! | !6 | ||
| | |9.160 | ||
| | |9.310 | ||
| | |9.466 | ||
| | |9.610 | ||
|- | |- | ||
|} | |} | ||
</div> | </div> | ||
</div> | </div> | ||
= [[Knowledge_Management#Knowledge_Accountability_Index|KAI]] of the framework = | |||
== Extensive Knowledge == | == Extensive Knowledge == | ||
</div> | </div> | ||
<div class="box-content framework"> | <div class="box-content framework"> | ||
<div class="center"> | <div class="center"> | ||
{| class="wikitable" style="text-align:center; background-color:#DEEBFF; color:#222;" | {| class="wikitable" style="text-align:center; font-size:11px; font-family:Arial, Helvetica, sans-serif !important;; background-color:#DEEBFF; color:#222;" | ||
|- style="font-weight:bold; background-color:# | |- style="font-weight:bold; vertical-align:middle; background-color:#EAECF0; color:#172B4D;" | ||
! rowspan="2" | Type | ! rowspan="2" | Type | ||
! rowspan="2" | Knowledge Description | ! rowspan="2" | Knowledge Description | ||
! colspan="6" | Minimum Grade to acquire Level X | ! colspan="6" | Minimum Grade to acquire Level X | ||
|- style="font-weight:bold; background-color:#F4F5F7; color:#172B4D;" | |- style="font-weight:bold; vertical-align:middle; background-color:#F4F5F7; color:#172B4D;" | ||
| Level 1 | | Level 1 | ||
| Level 2 | | Level 2 | ||
Line 89: | Line 87: | ||
| Level 6 | | Level 6 | ||
|- | |- | ||
| | | style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Hardware | ||
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Supermicro Supermicro Servers] | |||
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Supermicro Supermicro | |||
| style="background-color:#E3FCEF;" | Practical application | | style="background-color:#E3FCEF;" | Practical application | ||
| style="background-color:#E3FCEF;" | Practical application | | style="background-color:#E3FCEF;" | Practical application | ||
Line 123: | Line 96: | ||
| Applied theory | | Applied theory | ||
|- | |- | ||
| style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align: | | style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Network Devices | ||
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://mikrotik.com/software Microtik routerOS] | | style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://mikrotik.com/software Microtik routerOS] | ||
| style="background-color:#E3FCEF;" | Practical application | | style="background-color:#E3FCEF;" | Practical application | ||
Line 132: | Line 105: | ||
| Applied theory | | Applied theory | ||
|- | |- | ||
| rowspan="3" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align: | | rowspan="3" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Protocols | ||
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Border_Gateway_Protocol BGP] | | style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Border_Gateway_Protocol BGP] | ||
| style="background-color:#E3FCEF;" | Practical application | | style="background-color:#E3FCEF;" | Practical application | ||
Line 157: | Line 130: | ||
| Applied theory | | Applied theory | ||
|- | |- | ||
| style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align: | | style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Frameworks | ||
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Scrum_(software_development) Scrum] | | style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Scrum_(software_development) Scrum] | ||
| style="background-color:#FFFAE5;" | Limited experience | | style="background-color:#FFFAE5;" | Limited experience | ||
Line 166: | Line 139: | ||
| Applied theory | | Applied theory | ||
|- | |- | ||
| rowspan="2" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align: | | rowspan="2" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Programming languages | ||
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Bash_(Unix_shell) Bash Script] | | style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Bash_(Unix_shell) Bash Script] | ||
| style="background-color:#E3FCEF;" | Practical application | | style="background-color:#E3FCEF;" | Practical application | ||
Line 183: | Line 156: | ||
| Applied theory | | Applied theory | ||
|- | |- | ||
| rowspan=" | | rowspan="23" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Software/Tools/Platforms - Configuration | ||
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Bamboo_(software) Atlassian Bamboo] | | style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Bamboo_(software) Atlassian Bamboo] | ||
| style="background-color:#FFFAE5;" | Limited experience | | style="background-color:#FFFAE5;" | Limited experience | ||
Line 308: | Line 281: | ||
| style="background-color:#E3FCEF;" | Practical application | | style="background-color:#E3FCEF;" | Practical application | ||
| Applied theory | | Applied theory | ||
| Applied theory | | Applied theory | ||
| Applied theory | | Applied theory | ||
Line 376: | Line 341: | ||
| Applied theory | | Applied theory | ||
|- | |- | ||
| rowspan=" | | rowspan="20" style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Software/Tools/Platforms - Server Administration | ||
| style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Bamboo_(software) Atlassian Bamboo] | | style="background-color:#FFF; color:#0052CC; text-align:left;" | [https://en.wikipedia.org/wiki/Bamboo_(software) Atlassian Bamboo] | ||
| style="background-color:#FFFAE5;" | Limited experience | | style="background-color:#FFFAE5;" | Limited experience | ||
Line 493: | Line 458: | ||
| style="background-color:#E3FCEF;" | Practical application | | style="background-color:#E3FCEF;" | Practical application | ||
| Applied theory | | Applied theory | ||
| Applied theory | | Applied theory | ||
| Applied theory | | Applied theory | ||
Line 545: | Line 502: | ||
| Applied theory | | Applied theory | ||
|- | |- | ||
| style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align:center;" | Languages (idioms) | |||
| style="font-weight:bold; background-color:#F4F5F7; color:#172B4D; text-align: | |||
| style="background-color:#FFF; color:#172B4D; text-align:left;" | Advanced Business English | | style="background-color:#FFF; color:#172B4D; text-align:left;" | Advanced Business English | ||
| style="background-color:#FFFAE5;" | Limited experience | | style="background-color:#FFFAE5;" | Limited experience |
Latest revision as of 12:04, 18 April 2022
Secure Group is rapidly expanding. Our teams are in continuous motion, and we’re constantly welcoming new people to join our company. The Information Security team needs to keep up with this fast-changing environment and ensure that our company's data is protected by ensuring that all parties have the right access to work safely.
It's also under the responsibility of the Information Security team to manage the security of our network and servers, monitor activities, establish compliant procedures, and guarantee the protection of our datacenter.
Advancing in this framework consists of being on the lookout for new threats and finding new ways of safeguarding our company through effective management of processes, methodologies, costs, and policies assuring Secure Group's ability to function and grow as an ethical, compliant, and transparent organization.
Progression
In order to progress in our development path and Level Up or Step Up, our Information Security team must:
- Meet the criteria of the Level & Step Chart for the Individual Contributors Path
- Meet the KAI grade of the framework related to each level
- Demonstrate proficiency in Secure Group Knowledge
Salary Grid
All mentioned salary ranges represent the monthly income in Bulgarian Lev after taxes and deductions.
Information Security | Step | ||||
---|---|---|---|---|---|
Level | |||||
Individual Contributor Path | 1 | 2 | 3 | 4 | |
1 | 4.160 | 4.310 | 4.466 | 4.610 | |
2 | 5.160 | 5.310 | 5.466 | 5.610 | |
3 | 6.160 | 6.310 | 6.466 | 6.610 | |
4 | 7.160 | 7.310 | 7.466 | 7.610 | |
5 | 8.160 | 8.310 | 8.466 | 8.610 | |
6 | 9.160 | 9.310 | 9.466 | 9.610 |
KAI of the framework
Extensive Knowledge
Type | Knowledge Description | Minimum Grade to acquire Level X | |||||
---|---|---|---|---|---|---|---|
Level 1 | Level 2 | Level 3 | Level 4 | Level 5 | Level 6 | ||
Hardware | Supermicro Servers | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory |
Network Devices | Microtik routerOS | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory |
Protocols | BGP | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory |
iSCSI | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
NFS | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Frameworks | Scrum | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory |
Programming languages | Bash Script | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory |
SQL | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
Software/Tools/Platforms - Configuration | Atlassian Bamboo | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory |
Atlassian Confluence | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Atlassian Jira | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
BlackBerry Enterprise Server | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
Countly | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Digium Switchvox | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
Docker Engine/Container | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Docker Harbor | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Gerrit | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Idaptive | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
Lansweeper | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Microsoft Dynamics Navision | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Microsoft Windows Server | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
MS Exchange | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
MySQL | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
Nextcloud | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
Paessler PRTG | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Samsung Knox | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Snapt Load Balancer | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
Sophos UTM | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
SpamTitan | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
Veeam Backup | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
VMWare Vcenter | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
Software/Tools/Platforms - Server Administration | Atlassian Bamboo | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory |
Atlassian Bitbucket | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Atlassian Confluence | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Atlassian Jira | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
BlackBerry Enterprise Server | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
Countly | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Docker Engine/Container | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Docker Harbor | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Gerrit | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Lansweeper | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Microsoft Dynamics Navision | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Microsoft Windows Server | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
MS Exchange | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
MySQL | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
Nexenta | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
Paessler PRTG | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Samsung Knox | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Sophos UTM | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
VMWare Vcenter | Practical application | Practical application | Applied theory | Applied theory | Applied theory | Applied theory | |
XiboTV | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory | |
Languages (idioms) | Advanced Business English | Limited experience | Limited experience | Practical application | Applied theory | Applied theory | Applied theory |