Source Level: IC2 Developing This role is Grade 6
I work with stakeholders, peers and my manager to deliver robust risk analyses, designs, or solutions to security problems identified by me or my team.
Scope Area of ownership and level of autonomy / ambiguity |
Collaborative Reach Organizational reach and extent of influence |
Competencies Competencies developed to deliver results |
---|---|---|
|
|
|
🌟 Results
Responsibility | Key Behaviors |
---|---|
Results |
|
Ownership |
|
Decision Making |
|
↔️ Direction
Responsibility | Key behaviors |
---|---|
Agility |
|
Innovation |
|
🌱 Talent
Responsibility | Key Behaviors |
---|---|
Personal growth |
|
Hiring |
|
Talent Development |
|
🌈 Values
Responsibility | Key Behaviors |
---|---|
Collaboration |
|
Diversity & Inclusion |
|
Transparency |
|
🛠️ Craft
I am an synchronous and asynchronous contributor. I create and execute security controls, defenses, and countermeasures to detect and mitigate internal and/or external attacks, seeking guidance from my team and lead. My solutions help mitigate attempts to infiltrate company systems (e.g., services, products, components, email, data, commerce, among others) to protect sensitive data and trust. I help mitigate attacks that could potentially compromise large systems, company trust, or sensitive data. I deliver consistently high-quality work.
Responsibility | Key Behaviors |
---|---|
Security Execution |
|
Technology Fluency |
|
Threat Fluency |
|