The Israeli regulation for Cyber Security Professionals by the INCB
The American (NICE) recommandation for Cyber Security Professionals
The Cyber Security Practitioner is responsible for implementing the organization’s cyber protection, and has the specific perspective of the following aspects:
A practitioner may hold International Certification such as CompTIA Security+, or (ISC)2 SSCP.
A person with an academic background, wide-ranging and profound theoretical knowledge, who is in charge of:
The Security Architect may hold International Certification such as CompTIA Security+, or (ISC)2 CISSP.
This is in recognition of understanding of the activities, needs and corporate objectives.
A person with an academic background, who is in charge of:
The Security Methodology Professional must have a comprehensive understanding of the business needs and restraints.
The Security Methodology professional may hold International Certification such as CompTIA Security+, (ISC)2 CISSP or ISACA CISM.
The issue of Cyber Defense Officer or Chief Information Security Officer was examined and announced as a role and not as a profession. Probably, the CISO role will be recognized as a combination of two roles: Cyber Security Technology Professional and Cyber Security Methodology Professional, in addition to other requirements.
The Security Methodology Professional must have a comprehensive understanding of the business needs and restraints. The CISO holds a high level insight of the entire Cyber Security array.
The CISO may hold International Certification such as (ISC)2 CISSP or ISACA CISM.
An Expert with wide and up dated knowledge as well as practical abilities in vulnerabilities detection and penetration testing in cyber systems.
A pentester may hold International Certification such as EC-Council CEH.
An Expert with wide knowledge and abilities to investigate events (forensics).
The forensics expert may hold International Certification such as (ISC)2 CCFP.
The Information Security Auditor performs detailed information technology assessments and internal audit reviews to assess the effectiveness of security controls. This employee also acts as an advisor to information security compliance management regarding the impact of changes to information technology on the internal security controls of the business. This position is responsible for performing audits and internal testing of controls around annual FISMA assessments and ISO 27001 audits, PII audits, SOX-ITGC audits, and other areas as needed.
Among his roles: Establish an enterprise information security auditing separate from annual assessments to include auditing existing computing systems, IT processes, and other areas as required. Use appropriate methods to monitor internal compliance with PII, records management and other policies as assigned.
He also plans, execute and report information technology, privacy, and operational reviews to identify business, privacy, security, compliance, information technology and regulatory risks.