Information Security: Difference between revisions

From Secure Group Wiki
Jump to navigation Jump to search
No edit summary
No edit summary
Line 1: Line 1:
Secure Group is rapidly expanding; our teams are in constant motion and we’re welcoming many new faces to join our ranks. The Information Security team needs to keep up with all of that, enabling that all parties have the right accesses to work safely while being constantly on the look for new threats and finding new ways of safeguarding the company.
Secure Group is rapidly expanding; our teams are in continuous motion and we’re constantly welcoming new people to join our company. The Information Security team needs to keep up with this fast-changing environment and ensure that our company's data is protected by ensuring that all parties have the right accesses to work safely.


As an Information Security specialist, you will be coordinating computing environments, deploying and documenting routines and projects controlling the service levels of operating systems, databases, and networks.
Our Information Security specialists are responsible for coordinating, monitoring, deploying, and documenting routines and projects to control the service levels of all operating systems, databases, and networks. They also provide technical support regarding hardware and software to users by configuring and installing resources and systems that ensure the security of the computing environment, which is our number one driver.
You will also provide technical support in the use of computer hardware and software and in supporting users by configuring and installing computing resources and systems controlling the security of the computing environment, which is our number one driver.


It is under the responsibility of the Information Security specialists to work with the configuration and maintenance of the systems' environment, from performance monitoring and availability of the systems to the definition and monitoring of system infrastructure's suppliers and to make the configuration and maintenance of backups, performing the installations and configurations of the operating systems.
Growing in this framework consists of being on the lookout for new threats and finding new ways of safeguarding our company.




 
= Progression=
= Progression =
In order to progress in our development path and Level Up or Step Up, our Information Security team must:
 
* Meet the criteria of the Level & Step Chart for the [[Performance#Individual_Contributors_Levels|Individual Contributors Path]]
In order to progress in our development path and Level Up or Step Up, our Information Security specialists must:</br>
* Meet the [[Information_Security#KAI_of_the_framework|KAI]] grade of the framework related to each level
* Meet the criteria of the Level & Step Chart for the [[Individual_Contributors|Individual Contributors Path]]
* Score at least 4 in the [[KAI]] of their position in order to reach Level 3
* Demonstrate proficiency in [[Secure Group Knowledge]]
* Demonstrate proficiency in [[Secure Group Knowledge]]
</br>
</br>
Line 32: Line 29:
!4
!4
|-
|-
!Information Security Expert
!1
|4.160  
|4.160  
|4.310  
|4.310  
Line 38: Line 35:
|4.610  
|4.610  
|-
|-
!Information Security Engineer
!2
|5.160  
|5.160  
|5.310  
|5.310  
Line 44: Line 41:
|5.610  
|5.610  
|-
|-
!Sr. Information Security Engineer
!3
|6.160  
|6.160  
|6.310  
|6.310  
Line 50: Line 47:
|6.610  
|6.610  
|-
|-
!Sr. Information Security Engineer lvl IV
!4
|7.160  
|7.160  
|7.310  
|7.310  
Line 56: Line 53:
|7.610  
|7.610  
|-
|-
!Sr. Information Security Engineer lvl V
!5
|8.160  
|8.160  
|8.310  
|8.310  
Line 62: Line 59:
|8.610  
|8.610  
|-
|-
!Sr. Information Security Engineer lvl VI
!6
|9.160  
|9.160  
|9.310  
|9.310  
Line 72: Line 69:
</div>
</div>


= [[Knowledge_Management#Knowledge_Accountability_Index|KAI]] of the position =
= [[Knowledge_Management#Knowledge_Accountability_Index|KAI]] of the framework =
 
<!-- JOB FRAMEWORK -->
<div class="grid two-columns">
<div class="">
  <div class="box-header center">
== Extensive Knowledge ==
== Extensive Knowledge ==
   </div>
   </div>
   <div class="box-content framework">
   <div class="box-content framework">
     <div class="center">
     <div class="center">
{| class="wikitable" style="text-align:center; background-color:#DEEBFF; color:#222;"
{| class="wikitable" style="text-align:center; font-size:13px; font-family:Arial, Helvetica, sans-serif !important;; background-color:#DEEBFF; color:#222;"
|- style="font-weight:bold; background-color:#F4F5F7; color:#172B4D;"
|- style="font-weight:bold; vertical-align:middle; background-color:#EAECF0; color:#172B4D;"
! rowspan="2" | Type
! rowspan="2" | Type
! rowspan="2" | Knowledge Description
! rowspan="2" | Knowledge Description
! colspan="6" | Minimum Grade to acquire Level X
! colspan="6" | Minimum Grade to acquire Level X
|- style="font-weight:bold; background-color:#F4F5F7; color:#172B4D;"
|- style="font-weight:bold; vertical-align:middle; background-color:#F4F5F7; color:#172B4D;"
| Level 1
| Level 1
| Level 2
| Level 2

Revision as of 14:33, 15 June 2021

Secure Group is rapidly expanding; our teams are in continuous motion and we’re constantly welcoming new people to join our company. The Information Security team needs to keep up with this fast-changing environment and ensure that our company's data is protected by ensuring that all parties have the right accesses to work safely.

Our Information Security specialists are responsible for coordinating, monitoring, deploying, and documenting routines and projects to control the service levels of all operating systems, databases, and networks. They also provide technical support regarding hardware and software to users by configuring and installing resources and systems that ensure the security of the computing environment, which is our number one driver.

Growing in this framework consists of being on the lookout for new threats and finding new ways of safeguarding our company.


Progression

In order to progress in our development path and Level Up or Step Up, our Information Security team must:


Salary Grid

All mentioned salary ranges represent the monthly income in Bulgarian Lev after taxes and deductions.

Information Security Step
Level
Individual Contributor Path 1 2 3 4
1 4.160 4.310 4.466 4.610
2 5.160 5.310 5.466 5.610
3 6.160 6.310 6.466 6.610
4 7.160 7.310 7.466 7.610
5 8.160 8.310 8.466 8.610
6 9.160 9.310 9.466 9.610

KAI of the framework

Extensive Knowledge

Type Knowledge Description Minimum Grade to acquire Level X
Level 1 Level 2 Level 3 Level 4 Level 5 Level 6
Hardware Supermicro Servers Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Network Devices Microtik routerOS Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Protocols BGP Practical application Practical application Applied theory Applied theory Applied theory Applied theory
iSCSI Practical application Practical application Applied theory Applied theory Applied theory Applied theory
NFS Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Frameworks Scrum Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Programming languages Bash Script Practical application Practical application Applied theory Applied theory Applied theory Applied theory
SQL Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Software/Tools/Platforms - Configuration Atlassian Bamboo Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Atlassian Confluence Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Atlassian Jira Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
BlackBerry Enterprise Server Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Countly Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Digium Switchvox Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Docker Engine/Container Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Docker Harbor Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Gerrit Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Idaptive Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Lansweeper Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Microsoft Dynamics Navision Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Microsoft Windows Server Practical application Practical application Applied theory Applied theory Applied theory Applied theory
MS Exchange Practical application Practical application Applied theory Applied theory Applied theory Applied theory
MySQL Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Nextcloud Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Paessler PRTG Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Samsung Knox Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Snapt Load Balancer Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Sophos UTM Practical application Practical application Applied theory Applied theory Applied theory Applied theory
SpamTitan Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Veeam Backup Practical application Practical application Applied theory Applied theory Applied theory Applied theory
VMWare Vcenter Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Software/Tools/Platforms - Server Administration Atlassian Bamboo Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Atlassian Bitbucket Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Atlassian Confluence Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Atlassian Jira Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
BlackBerry Enterprise Server Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Countly Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Docker Engine/Container Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Docker Harbor Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Gerrit Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Lansweeper Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Microsoft Dynamics Navision Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Microsoft Windows Server Practical application Practical application Applied theory Applied theory Applied theory Applied theory
MS Exchange Practical application Practical application Applied theory Applied theory Applied theory Applied theory
MySQL Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Nexenta Practical application Practical application Applied theory Applied theory Applied theory Applied theory
Paessler PRTG Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Samsung Knox Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Sophos UTM Practical application Practical application Applied theory Applied theory Applied theory Applied theory
VMWare Vcenter Practical application Practical application Applied theory Applied theory Applied theory Applied theory
XiboTV Limited experience Limited experience Practical application Applied theory Applied theory Applied theory
Languages (idioms) Advanced Business English Limited experience Limited experience Practical application Applied theory Applied theory Applied theory