Occupational Summary
A Cyber security technician Level 3 apprenticeship trains an apprentice to provide first-line cyber security support across sectors that hold digital information. Apprentices monitor and detect potential security threats, apply procedures and controls to maintain confidentiality, integrity and availability, and escalate incidents as required. They support secure and uninterrupted business operations by implementing cyber security mechanisms such as patching software, installing updates, implementing access control, configuring firewalls, and operating SIEM and protection tools (anti‑virus, anti‑malware, anti‑spam). Working under supervision, frequently within a Security Operations Centre or Network Operations Centre, they operate as part of a team, engage with colleagues, managers, customers and suppliers, follow defined procedures and determine when to escalate complex issues.
The programme comprises 59 knowledge, skills and behaviours (KSBs), typically lasts 18 months and has a maximum funding band of £11,000. End-point assessment is conducted via professional discussion, portfolio of evidence, knowledge test and observation.
View official Skills England source text
This occupation is found in all sectors where information is held digitally and where that information is an asset that needs to be protected including but not limited to finance, retail, telecoms, health, media, manufacturing and local authorities. The broad purpose of the occupation is to provide first line cyber security support. This requires individuals to monitor and detect potential security threats and escalate as necessary and to support secure and uninterrupted business operations of an organisation through the implementation of cyber security mechanisms and the application of cyber security procedures and controls. To contribute to the delivery of a security culture across an organisation, understanding vulnerabilities and threats and supporting the development of an organisation's cyber security maturity. To apply procedures and controls to maintain security and control of an organisation, and process security requests ensuring confidentiality, integrity and availability of information stored digitally. In their daily work, an employee in this occupation interacts with a wide range of stakeholders including colleagues, managers, customers and internal and external suppliers. They would typically work as a member of a team; this may be office based or virtual. The employee will interact with, and influence colleagues and will have working level contact with customers, suppliers and partners in their capacity as an individual contributor. An employee in this occupation will be responsible for supporting a cyber security function (frequently a Security Operations Centre or Network Operations Centre) working under supervision. The employee will be conducting specific cyber security tasks to defined procedures and standards. Specific cyber security mechanisms and controls that an individual would be required to implement would include: patching software, installing software updates, implementing access control, configuring firewalls, security incident and event management tools (SIEM) tools and protection tools (Anti-virus, Anti-malware, Anti-spam). They will be responsible for their own activities with other resources made available to them as required. As directed, the employee will engage with specific cyber security events. The employee will be expected to work with internal and external stakeholders under general direction. They will use discretion in identifying and responding to complex issues and assignments and will usually receive specific instructions and will have work reviewed at frequent milestones. They will be expected to determine when issues should be escalated to a higher level.
What's in the Delivery Pack?
Every section is tailored specifically to the ST0865 standard, using official KSB data, the published assessment plan, and sector-specific context.
KSB Interpretations
Plain-English interpretation of every Knowledge, Skill and Behaviour
EPA Preparation
End-point assessment readiness, gateway checklist and method guidance
Delivery Risks
Occupation-specific risks, mitigations and early warning signs
Delivery Model Options
Model-selection guide comparing day release, block release and front-loaded approaches
On/Off-the-Job Mapping
Which KSBs are best taught by the provider vs developed in the workplace
Initial Assessment & RPL
Starting points, prior learning recognition and programme adaptation
English, Maths & Digital
Where functional skills embed naturally and standalone qualification guidance
Employer Engagement Guide
Employer commitments, progress reviews and workplace engagement guidance
Get the ST0865 Delivery Guide
Unlock all 8 AI-powered sections — KSB interpretations, EPA preparation, delivery risks, employer engagement, and more. Tailored to Cyber security technician.
From £14.99 · Instant PDF download · en-GB throughout
Qualifications & Recognition
Professional Recognition
English & Maths
English and maths qualifications must be completed in line with the apprenticeship funding rules .
Knowledge, Skills & Behaviours
Knowledge
30- K1: Principles of organisational information security governance and the components of an organisation's cyber security tech...
- K2: Cyber security policies and standards based on an Information Security Management System (ISMS)
- K3: Types of physical, procedural and technical controls
- K4: Awareness of how current legislation relates to or impacts upon the occupation including Data Protection Act, Regulation...
- K5: Cyber security awareness and components of an effective security culture, different organisational structures and cultur...
- + 25 more items
Skills
22- S1: Follow information security procedures
- S2: Maintain information security controls
- S3: Develop information security training and awareness resources
- S4: Monitor the effectiveness of information security training and awareness
- S5: Handle and assess the validity of security requests from a range of internal and external stakeholders
- + 17 more items
Behaviours
7- B1: Manage own time to meet deadlines and manage stakeholder expectations
- B2: Work independently and take responsibility for own actions within the occupation
- B3: Use own initiative
- B4: A structured approach to the prioritisation of tasks
- B5: Treat colleagues and external stakeholders fairly and with respect without bias or discrimination
- + 2 more items
Duties (18)
Apply procedures and controls to maintain security and control of an organisation.
Contribute to the production and development of security culture across an organisation including assisting with the promotion of cyber security awareness programmes, monitoring the effectiveness of cyber security awareness programmes, promoting an effective cyber security culture
Process cyber security helpdesk requests ensuring confidentiality, integrity and availability of digital information, meeting relevant legal and regulatory requirements for example access control requests.
Conduct the installation and maintenance of technical security controls in accordance with relevant procedures and standards.
Monitor, identify, report and escalate information security incidents and events in accordance with relevant procedures and standards.
Administer cryptographic and certificate management activities in accordance with relevant procedures and standards.
Conduct regular review of access rights to digital information assets in accordance with relevant procedures and standards.
Maintain an asset register of controlled environments in accordance with relevant policies, procedures and standards.
Assist with backup and recovery processes in accordance with relevant policies, procedures and standards.
Contribute to documenting the scope and evaluating the results of vulnerability assessments in accordance with management requirements.
Contribute to risk assessments and escalate where appropriate in accordance with relevant procedures and standards.
Contribute to routine threat intelligence gathering tasks.
Document incident and event information and incident, exception and management reports in accordance with relevant policies, procedures and standards.
Contribute towards the production and review of cyber security policies, procedures, standards and guidelines drawing on their experience of applying policies for example - acceptable use, incident management, patching, anti-virus, bring your own device (BYOD), access control, social media, password, data handling and data classification, information technology asset disposal
Monitor cyber security compliance and provide relevant data to auditors if required by the auditor.
Collaborate with people both internally and externally to support secure and uninterrupted business operations of an organisation.
Practice continuous self-learning to keep up to date with industry trends and developments to enhance relevant skills and take responsibility for own professional development.
Monitor and detect potential security threats and escalate in accordance with relevant procedures and standards.
End-Point Assessment
Assessment Plan
Type: PDF
Version & Source
- Version
- 1.1
- Occupational standard and end-point assessment plan revised
- Last changed
- 28 Sept 2025
- Earliest start
- 28 Sept 2025
- Approved for delivery
- 13 May 2020
- EQA Provider
- Ofqual
- Sector Subject Area
- 6.1 Digital technology (practitioners)
- Trailblazer
- TB0532
- Last checked
- 11 Mar 2026
Frequently Asked Questions
What knowledge, skills and behaviours are in the ST0865 standard?▼
The Cyber security technician apprenticeship has 30 knowledge items, 22 skills, and 7 behaviours that apprentices must demonstrate.
How long is the Cyber security technician apprenticeship?▼
The typical duration is 18 months, with a maximum funding band of £11,000.
What does a delivery guide for ST0865 include?▼
The KSB Planner delivery guide includes plain-English KSB interpretations, EPA preparation guidance, delivery risk analysis, on/off-the-job mapping, employer engagement strategies, and more — all tailored to ST0865.
Data sourced from Skills England. KSB Planner delivery guides are an interpretation and planning aid based on official published source material — not an official regulator-issued document.