| Job Domain | Job Role | Responsibility |
|---|---|---|
| SOC | SOC Analyst – L1 | Monitor alerts and dashboards |
| SOC | SOC Analyst – L2 | Investigate incidents and analyze logs |
| SOC | SOC Analyst – L3 | Advanced threat handling and escalation |
| SOC | Incident Responder | Contain, eradicate, recover from attacks |
| SOC | Threat Hunter | Proactively hunt hidden threats |
| SOC | SOC Manager | Manage team, processes, and reporting |
| Job Domain | Job Role | Responsibility |
|---|---|---|
| Ethical Hacking | Penetration Tester | Simulate attacks to find vulnerabilities |
| Ethical Hacking | Web App Security Tester | Test websites and APIs |
| Ethical Hacking | Red Team Specialist | Conduct full attack simulations |
| Ethical Hacking | Bug Bounty Hunter | Find and responsibly report bugs |
| Job Domain | Job Role | Responsibility |
|---|---|---|
| Blue Team | Security Analyst | Monitor and defend systems |
| Blue Team | Detection Engineer | Create detection and alert rules |
| Blue Team | Security Engineer | Build and maintain security infrastructure |
| Job Domain | Job Role | Responsibility |
|---|---|---|
| Vulnerability Management | Vulnerability Analyst | Scan, assess, and report weaknesses |
| Risk & Compliance | GRC Analyst | Policies, risk management, compliance |
| Audit | Security Auditor | Conduct security audits and reviews |
| Job Domain | Job Role | Responsibility |
|---|---|---|
| Forensics | Digital Forensic Analyst | Collect and analyze digital evidence |
| Forensics | Malware Analyst | Analyze malicious software |
| Forensics | Incident Investigator | Root-cause analysis of attacks |
| Job Domain | Job Role | Responsibility |
|---|---|---|
| Architecture | Security Architect | Design secure systems and networks |
| Leadership | Security Manager | Manage security programs and teams |
| Leadership | CISO | Overall cyber security strategy |