Skip to main content
  • About the Council
    • Vision and Mission
    • What we do
    • Meet the Team
    • Board of Trustees
    • Our Working Groups
    • Impact Report 2023-24
    • Work for the Council
  • Standards and Registration
    • About Professional Standards
    • Standard for Professional Competence and Commitment
    • Chartered
    • Principal
    • Practitioner
    • Associate
    • Benefits of Professional Registration
    • The Registration Process
    • Specialism Roadmap
    • Become Professionally Registered
    • Professional Register
    • Continuing Professional Development (CPD)
    • FAQs
  • Careers and Learning
    • Why work in cyber security?
    • Getting Started
    • Cyber Access Hub
    • Cyber Access Network
    • How do I get into cyber? FAQs
    • Entry Routes - Training
    • Entry Routes - Qualifications
    • Cyber Careers Framework
    • Career Mapping Quiz
    • Certification Framework Tool
    • Developing your career
    • Managing cyber talent
    • Glossary of cyber terms
    • Outreach and Diversity
    • Role Models
  • Ethics
    • Ethical Declaration
    • Ethical Principles for individuals
    • Ethics scenarios
  • Events
  • Corporate Membership
    • Member directory
    • Member Login
  • Get Involved
    • News
    • Events
    • Blogs
    • Thought Leadership
    • On Demand Webinars
    • Volunteering
  • Contact
    • Newsletter Signup
Search
MENU
  • Home
  • About the Council
  • Standards and Registration
  • Careers and Learning
  • Ethics
  • Events
  • Corporate Membership
  • Get Involved
  • Contact
  • About the Council
  • Vision and Mission
  • What we do
  • Meet the Team
  • Board of Trustees
  • Our Working Groups
  • Impact Report 2023-24
  • Work for the Council
  • Standards and Registration
  • About Professional Standards
  • Standard for Professional Competence and Commitment
  • Chartered
  • Principal
  • Practitioner
  • Associate
  • Benefits of Professional Registration
  • The Registration Process
  • Specialism Roadmap
  • Become Professionally Registered
  • Professional Register
  • Continuing Professional Development (CPD)
  • FAQs
  • Careers and Learning
  • Why work in cyber security?
  • Getting Started
  • Cyber Access Hub
  • Cyber Access Network
  • How do I get into cyber? FAQs
  • Entry Routes - Training
  • Entry Routes - Qualifications
  • Cyber Careers Framework
  • Career Mapping Quiz
  • Certification Framework Tool
  • Developing your career
  • Managing cyber talent
  • Glossary of cyber terms
  • Outreach and Diversity
  • Role Models
  • Ethics
  • Ethical Declaration
  • Ethical Principles for individuals
  • Ethics scenarios
  • Corporate Membership
  • Member directory
  • Member Login
  • Get Involved
  • News
  • Events
  • Blogs
  • Thought Leadership
  • On Demand Webinars
  • Volunteering
  • Contact
  • Newsletter Signup
What are you looking for?
Close
UK Cybersecurity council Logo

Cyber Career Framework

Cyber security career pathways
Routes into and through the profession

This section provides details about the 15 specialisms in cyber security, and suggests pathways through and between them. It's a flexible definition that individual practitioners - current or future - can use to plan out a possible career; it's not a standard to be followed rigidly. Bear in mind that a job may include parts, or the whole, of one or more of the specialisms. 

Details include an introduction to each specialism, information on the typical responsibilities and tasks, the skills and knowledge required, and information on useful prior experience for those hoping to enter the specialism from outside cyber security. Information also includes a list of common job titles and average salary ranges. 

Cyber Career Framework: pathways for the 15 specialisms in cyber security.

Pick a specialism to find out more.

Digital Forensics

Digital Forensics

The process of identifying and reconstructing the relevant sequence of events that have led to the currently observable state of a target IT system.

Learn more

Related Specialisms:

  • Digital Forensics
  • Cyber Threat Intelligence
  • Incident Response
  • Network Monitoring & Intrusion Detection
  • Vulnerability Management

Cyber Threat Intelligence

Cyber Threat Intelligence

Cyber Threat Intelligence is the assessment, validation and reporting of information on current and potential cyber threats to maintain an organisation’s situational awareness.

Learn more

Related Specialisms:

  • Digital Forensics
  • Cyber Threat Intelligence
  • Incident Response
  • Vulnerability Management
  • Network Monitoring & Intrusion Detection

Cyber Security Management

Cyber Security Management

The management of cyber security resources, staff and policies at an enterprise level in line with business objectives and regulatory requirements.

Learn more

Related Specialisms:

  • Cyber Security Management
  • Cyber Security Governance & Risk Management
  • Cyber Security Audit & Assurance
  • Secure Operations

Incident Response

Incident Response

The preparation for, handling of and following up of cyber security incidents, to minimise the damage to an organisation and prevent recurrence.

Learn more

Related Specialisms:

  • Digital Forensics
  • Cyber Threat Intelligence
  • Cyber Security Management
  • Network Monitoring & Intrusion Detection
  • Vulnerability Management

Network Monitoring & Intrusion Detection

Network Monitoring & Intrusion Detection

The monitoring of network and system activity to identify unauthorised actions by users or potential intrusion by an attacker.

Learn more

Related Specialisms:

  • Digital Forensics
  • Cyber Threat Intelligence
  • Incident Response
  • Network Monitoring & Intrusion Detection
  • Vulnerability Management

Vulnerability Management

Vulnerability Management

The management of the configuration of protected systems to ensure that any vulnerabilities are understood and managed.

Learn more

Related Specialisms:

  • Cyber Threat Intelligence
  • Digital Forensics
  • Incident Response
  • Vulnerability Management
  • Network Monitoring & Intrusion Detection

Security Testing

Security Testing

The testing of a network, system, product or design, against the specified security requirements and/or for vulnerabilities (penetration testing).

Learn more

Related Specialisms:

  • Secure System Architecture & Design
  • Secure System Development

Cryptography & Communications Security

Cryptography & Communications Security

The designing, development, testing, implementation and operation of a system or product to provide cryptographic and/or secure communications.

Learn more

Related Specialisms:

  • Data Protection & Privacy
  • Identity & Access Management
  • Secure Operations
  • Cryptography & Communications Security

Secure Operations

Secure Operations

The management of an organisation’s information systems operations in accordance with the agreed Security Policy.

Learn more

Related Specialisms:

  • Secure Operations
  • Identity & Access Management
  • Data Protection & Privacy
  • Cryptography & Communications Security

Identity & Access Management

Identity & Access Management

The management of policies, procedures and controls to ensure that only authorised individuals access information or computer-controlled resources.

Learn more

Related Specialisms:

  • Secure Operations
  • Identity & Access Management
  • Data Protection & Privacy
  • Cryptography & Communications Security

Secure System Architecture & Design

Secure System Architecture & Design

The designing of an IT system to meet its security requirements, balancing this with its functional requirements.

Learn more

Related Specialisms:

  • Secure System Development
  • Secure System Architecture & Design
  • Security Testing

Cyber Security Audit & Assurance

Cyber Security Audit & Assurance

The verification that systems and processes meet the specified security requirements and that processes to verify on-going compliance are in place.

Learn more

Related Specialisms:

  • Cyber Security Management
  • Cyber Security Governance & Risk Management
  • Cyber Security Audit & Assurance

Data Protection & Privacy

Data Protection & Privacy

The management of the protection of data, enabling an organisation to meet its contractual, legal and regulatory requirements.

Learn more

Related Specialisms:

  • Secure Operations
  • Cryptography & Communications Security
  • Identity & Access Management
  • Data Protection & Privacy

Secure System Development

Secure System Development

The development and updating of a system or product, in conformance with agreed security requirements and standards, throughout its lifecycle.

Learn more

Related Specialisms:

  • Secure System Development
  • Secure System Architecture & Design
  • Security Testing

Cyber Security Governance & Risk Management

Cyber Security Governance & Risk Management

The monitoring of compliance with agreed cyber security policies and the assessment and management of relevant risks.

Learn more

Related Specialisms:

  • Cyber Security Management
  • Cyber Security Audit & Assurance
  • Cyber Security Governance & Risk Management

Cyber Career Framework: pathways for the 15 specialisms in cyber security.

Pick a specialism to find out more.

  • Home
  • About the Council
  • Thought Leadership
  • News
  • Events
  • Contact
  • Work for the Council
  • Membership
  • Member Login
  • Glossary
  • Acceptable Use Policy
  • Accessibility
  • Privacy Policy
  • Cookie Policy
  • Complaints Handling Policy
  • Outreach and Diversity Policy
  • Terms and Conditions

Subscribe to our Newsletter

Our e-newsletter keeps you up to date with the activities of and content from the UK Cyber Security Council.

Learn more

© 2025 UK Cyber Security Council | Registered charity no. 1195030