52 NICE Cybersecurity Workforce Framework work roles: What you need to know

Introduction

In the US, Chinese restaurant menus usually have many combination plates available for lunch or dinner, each representing a particular grouping of ingredients in a specific ratio. These combinations can grow to huge numbers, sometimes into the hundreds at particularly busy restaurants. 

Having common reference points for these particular combinations, sometimes only with very small differences, can make massive dividends when trying to reduce the amount of time required to produce a product. It also makes sure that people potentially speaking different languages have a common point of reference. 

Being able to have a list of exactly what you’re looking for in these types of scenarios can make things far easier for whoever is doing the ordering, even if it does take some research as to what each number means. This principle can be applied to more than just food orders though, as in the case of the 52 work roles that are listed as part of the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. Like on our menu analogy, there are many different combinations to choose from, with each one dialed in to particular skill sets and having specific values — this allows for multiple departments to speak their own languages when it comes to who they are looking for.

One critical thing to remember about the NICE Framework is that it is a National Institute of Standards and Technology (NIST) Special Publication. What this means is that in addition to being a set of guidelines and recommendations for the industry as a whole, it may be a binding required set of rules that MUST be followed for some specific applications such as government work. You may need to do some additional research if this applies to your sector.

Breaking down the seven categories

(Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Kurt Ellzey. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/C0TIMZx5eSY/