Got a cyber idea that you’d like to bring to life? Respond to one of our challenges

What do we mean by cyber?

Cyber security is a mindset. It’s about thinking differently. It’s about problem solving. It’s about keeping the lights on, keeping business flowing, and staying safe online.

What is Cyber Security?

Cyber security is ensuring the protection of systems, networks and programs for digital attacks.  Often referred to as ‘Cyberattacks’, they often attempt to cause system damage, reputational harm, interrupt normal business practice or to extract money from the target.

A career in Cyber security has huge scope and can specialise in one area, be more generalist or be very varied in day-to-day responsibilities.

To find out how your skills could suit a role in Cyber, use the Cyber Security Council Career mapping tool.

There are 16 specialisms in cyber security.

Job roles in cyber security can encompass more than one sector, or be specialist roles.

Cyber Security Generalist

A combination of multiple specialities into one Cyber role.

Cyber Security Management

Managing staff, resources and policies to ensure regulatory compliance and protect the business from harm in the event of a cyber-attack.

Digital Forensics

Investigate and reconstruct the events during or after a cyber-attack.

Incident Response

Preparing for cyber security incidents, handing and following up attacks when they happen.  Working to ensure minimum loss and disruption in the event of a breach.

Vulnerability Management

Working to understand the current threat landscape and ensure systems are configured correctly, managed, and protected.

Cyber Threat Intelligence

Maintaining awareness of the current and potential threats to systems, to maximise the businesses situational awareness.

Network Monitoring & Intrusion Detecting

Monitoring systems to detect an intrusion or unauthorized system activity by users or attackers.

Security Testing

Testing the network, system, or a product for vulnerabilities against a set of requirements, often referred to as penetration (pen) testing.

Secure Operations

Managing the organisations information systems operations in accordance with the Security Policies.

Data Protection & Privacy

Ensuring the protection, safe storage and management of any data held by the organisation, to fulfil legal and regulatory requirements.

Cryptography & Communications

Design, development and testing of a system or product to secure communications.  Can also include implementation and operation management of the system/product.

Identity and Access Management

Managing policies, protections, and controls to ensure no unauthorised access to the network, system, or any online organisational resources.

Secure System Development

The maintenance, updating and development of a system throughout its lifecycle in accordance with policies, regulations, or legal frameworks.

Secure System Architecture & Design

Designing IT systems from the ground up to be secure, functional, and compliant.

Cyber Security Audit & Assistance:

Verification of systems, adherence to policies and processes to ensure on-going compliance.

Cyber Security Governance

Management of Cyber Security risk assessment, adherence to procedure and policy and management of hazards.

The future of cyber starts with you...

Your Cyber Career Awaits

Explore how to develop your career using these resources...

Take the Next Step

If you want to take the next step, we offer affordable, bite-size training courses from introductions to cybersecurity through to deep-dive, hands-on upskilling in different technology areas.

Training and Skills

Sign up to our newsletter

Stay up-to-date on the latest cybersecurity trends and technologies by joining the Cyber Innovation Hub newsletter today.

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website: privacy policy We use Mailchimp as our marketing platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.