Three more market qualifications have been included in the IQS. The Ministry of Digitization has included three qualifications related to cybersecurity.
Cyber security management - specialist
The holder of the qualification "Cyber security management - specialist" has knowledge in the area of information security and cyber security. Is familiar with national and EU formal and legal regulations in the area of cyber security. Has knowledge of team operation in the areas of risk management and cyber security incidents. Is also knowledgeable in environmental, technical, and human activity related security, as well as computer forensics.
Cyber security management - expert
The holder of the qualification "Cyber security management - expert" has knowledge in the area of information security and cyber security. Is familiar with national and EU formal and legal regulations in the area of cyber security. Is competent to independently perform tasks in the area of ICT infrastructure security. Understands the working of cryptographic algorithms and the principles of managing access control to information resources. Has expertise in the areas of network security, operating systems, databases, cloud solutions and software. Is familiar with security testing issues. Has knowledge in the areas of: environmental, technical and human activity related security, IT service management, security incident management including operational principles of CERT/CSiRT. Has expertise in computer forensics.
Cyber security management - manager
The holder of the qualification "Cyber security management - manager" has knowledge in the area of information security and cyber security. Is familiar with national and EU formal and legal regulations in the area of cyber security. Is knowledgeable in developing the organization's cyber security strategy, implementing IT security measures, plans and procedures, managing risk, business continuity, cyber security incidents and security auditing. Is knowledgeable in the operation of computer security incident response teams. Has knowledge in the area of ICT infrastructure security. Has a background in computer forensics applications.