You and best CISO, security're just one team year-end performance evaluation template

He went to the year-end summary of the time, as head of the security team, you are still the team the year-end performance appraisal worry about it?

A good year-end summary KPI is both a comb and evaluation team for the past year, but also set a new work for the coming year KPI foundation.

At this time, if there is a security team to include all the performance indicators of year-end summary template before, Do not you think more with less? There spectrum of the brain, hearts do not panic, summed up getting a divine intervention. Security team members can also be carried out from the reference template for their own work processes and skills leak filled, while understanding the other members of the division of labor, in order to more smooth communication and collaboration in the workplace.

Now, templates come!

An especially compiled from the number of network Cynet 360 "security team year-end performance evaluation template" and carried out a number of adaptations to adapt to the Chinese context.

The template unprecedented overview of all major security team KPI , thus saving the chief information officer ( the CIO ) and Chief Information Security Officer ( CISO ) from the beginning of time and effort to create such assessments.

Establishment of such a template is challenging, different scale security team organization and internal division of jobs varies greatly. In addition, the same name are not the same job in different companies define responsibilities. Difficult to reach, but to seize the core can solve most problems.

Two core competencies is providing security team

A ) ensure the deployment of adequate security products

B ) make full use of these products make safety prevention , detection and response capabilities maximize.

The template Based on the above two core competencies, the decomposition of the security team of 6 characters and responsibilities:

1 , a security analyst

Responsible for security incidents preliminary identification and classification in the front line, providing 24x7x365 around the clock support. This post follows standard operating procedures, the security operations center ( the SOC under the supervision of) managers, in collaboration with two security analysts to detect, identify, report security incidents.

1.jpg

Templates section Screenshot

2 , two security analysts

The key event responsible for the security analyst reported a technical response. This includes timely suppression, detection, repair, remedy, as well as the use of new technology acquired in the process of strengthening the defense response.

2.jpg

Templates section Screenshot

3 , three security analyst

By continuously monitoring the environment of vulnerability search may take advantage of vulnerabilities to threats proactively identify unknown threats. In addition, three security analyst also need to threat intelligence feedback IOC Threat track (*** index), and master the security situation in real-time environment through active *** testing.

3.jpg

Templates section Screenshot

4 , security operations manager

Responsible for monitoring, managing and responding to security incidents. Smooth security operations manager to ensure security event identification, assessment, quantification, reporting, communication, mitigation and monitoring process, the need to ensure that the work to follow the service level agreement ( SLA ), process control and process the principle of flexibility to achieve operational objectives.

4.jpg

Templates section Screenshot

5 , Security Architect

Responsible for the organization's IT network design, build, test and implement security systems to protect the security of business information and data. Security architects must complex IT has a deep understanding of the system, and the latest safety standards, systems and authentication protocols and best practices for security products.

5.jpg

Templates section Screenshot

6 , Safety Director

All security-related oversight functions within the organization, including compliance with the relevant frameworks, purchasing, deploying and maintaining security products and protection *** workflow. Security Officer to the Chief Information Officer ( the CIO ) report, as all network security within the Organization window-related information.

6.jpg

Templates section Screenshot

 

Compared to job responsibilities more suitable for benchmarking. For example, in some units, the same bear a security analyst and two personal security analyst duties, or take responsibility security architects and security operations manager by the same person. In some large organizations, security architect may be provided by several specialist team, is responsible for the endpoint, network and cloud security.

Division of roles ever-changing, but the original aim, these core capabilities are largely generic, CISO flexibility to cut, adjust as needed, the template of detailed features unique to its team structure to match.

If you have not formed a security team, then based on the idea of ​​construction, after all, an ideal method.

Click to download the "security team year-end performance evaluation template"


This compilation compiled by several security network. Grasp the network security situation all in stupid networked device search system

[Network] safety regulators a free trial →→ Click to apply

For more safety information, please visit:

No micro-channel public safety network number ; Sina microblogging @ stupid search


Guess you like

Origin blog.51cto.com/14643690/2458938