Infrastructure Competency

From Ian Loe Academy Wiki
Revision as of 01:07, 24 November 2022 by Ianloe (talk | contribs) (Created page with "== Background == === Competency Framework === As infrastructure technologies are evolving rapidly, we need to develop a competency framework to evaluate staffing and for pipeline development. This competency framework can be used to develop customised training programmes for individuals (or teams) and also for evaluation of skills for promotion considerations. === Principle Considerations === Key points when creating this framework * Enable focused development to bui...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Background

Competency Framework

As infrastructure technologies are evolving rapidly, we need to develop a competency framework to evaluate staffing and for pipeline development.

This competency framework can be used to develop customised training programmes for individuals (or teams) and also for evaluation of skills for promotion considerations.

Principle Considerations

Key points when creating this framework

  • Enable focused development to build deep capabilities
  • Relevant to business needs
  • Set skills expectations for job-grade

Competency Mapping

Role Categories

As the infrastructure domain is very wide and most organisations may not have specialist in every type of skills, the mapping will be categorised to 5 main types of roles:

  • Network Engineers
  • Cloud Specialist
  • Data Centers and Servers
  • Systems Administration
  • DevSecOps Specialist

Competency Areas

The skill areas for each competency can be viewed as such:

Network Cloud Computing Systems Administrators DevSecops
Incident Response Cyber Risk Assessment Strategy Development Adversary Simulation
Digital Forensics Cybersecurity Design Policies Development Social Engineering
Malware Analysis Cyber Programme Mgmt Audit & Compliance Penetration Testing
Cyber Threat Intelligence Cyber Tech Assessment Software Development
Cyber Threat Analysis
SOC Operations