Work Based Experience: A Cybersecurity Engineer Placement Report

Verified

Added on  2025/04/11

|39
|5167
|457
AI Summary
Desklib provides past papers and solved assignments for students. This report details a cybersecurity work placement.
Document Page
WORK BASED EXPERIENCE
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Introduction:..................................................................................................................................4
LO1 Be able to negotiate industry experience............................................................................5
1.1 research and evaluate the suitable organizations that could provide industry
experience...................................................................................................................................5
1.2 negotiate with work and academic supervisors a proposal for the work experience
6
1.3 recognize the business constraints on the work experience offered...........................9
LO2 Understand the specific requirements of the placement.................................................10
2.1 agree and prioritize the tasks and responsibilities involved in the work experience. .10
2.2 produce a plan for the work experience..........................................................................12
2.3 analyze the benefits of the proposed activities to the business and the learner...........17
LO3- Be able to undertake work experience as identified............................................................19
3.1 fulfill specified requirements of placement conforming to all related codes of practice....19
3.2 produce systematic records of work undertaken.................................................................20
3.3 revise the initial plan as required.........................................................................................26
Table 12: Initial Plan.................................................................................................................26
3.4 make suggestions for improvement and review these with the appropriate supervisor......27
LO4 Be able to monitor and evaluate own performance and learning..........................................28
4.1 monitor progress against the original proposal...................................................................28
4.2 evaluate the quality of own performance............................................................................31
4.3 analyze the learning which has taken place during the work experience using suitable
reflections..................................................................................................................................33
4.4 make recommendations on how the experience could have been enhanced.......................34
Conclusion-....................................................................................................................................35
References-....................................................................................................................................36
Document Page
List of tables:
Table 1: evaluation of the suitable organization..............................................................................4
Table 2: Reviews of the company...................................................................................................5
Table 3: Proposal for security engineer...........................................................................................5
Table 4: Proposal for software designer..........................................................................................6
Table 5: Business Constraints.........................................................................................................8
Table 6: Prioritisation of responsibilities......................................................................................10
Table 7: work experience plan......................................................................................................12
Table 8: Benefits of the proposed activity.....................................................................................16
Table 9: Rules of the company......................................................................................................18
Table 10: work experience plan....................................................................................................19
Table 11: Activity plan..................................................................................................................23
Table 12: Initial Plan.....................................................................................................................25
Table 13: improvement review......................................................................................................26
Table 14: monitoring the work......................................................................................................28
Table 15: Evaluating the performance..........................................................................................31
Table 16: company criteria............................................................................................................35
Document Page
Introduction:
Work-based experience is a way to support the development of personal & professional skills of
the student. This helps to develop enterprise skills that are required in a real working
environment. Practical activities can be helpful to improve the learning experience.
This assignment aims to understand the necessary requirements for the placement and develop
skills to monitor the performance by own. It includes research about the suitable organization to
gain experience of industry and a plan to describe the experience of work.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
LO1 Be able to negotiate industry experience
1.1 research and evaluate the suitable organizations that could provide industry
experience
Table 1: evaluation of a suitable organization
Criteria Deloitte Cisco TEKsystems UBS Pizza Hut
restaurants
Travel London,
UK
London, UK London, UK London, UK Lowestoft, UK
Salary £85000 per
annum
£33T-65K per
annum
£67000 per
annum
£42.6T-82.9K
per year
£9000 a year
Flexible Yes NO Yes Yes Yes
Type of
job
FS digital
architect,
manager
software
engineer
Cyber
engineer
Program test
lead
Guest server
Technica
l skills
expected
Knowledge
of JAVA,
Go, Rust,
DevOps,
Docker,
Terraform,
ANsible,
ERM
platforms,
micro-
services,
software
lifecycle
etc.
Fundamentals
of computer
science,
programming
language,
scripting
language,
troubleshootin
g skills
Information
security,
security
experience,
infrastructure,
Networking,
LINUX,
windows etc.
Testing,
knowledge of
various skills
related to
project
NO technical
skill is
required
Soft
skills
expected
Good time
managemen
t
Good
problem-
solving
skills
Problem-
solving skills,
communicatio
n skills,
presentation
skills
Presentation
skills,
communicatio
n skills, time
management
Presentation
skills,
problem-
solving skills,
communication
, and
behavioral
skills.
Communicatio
n skills,
behavioral
skills,
management
skills
Benefits Sick pay,
work from
home,
flexible
hours of
work,
health
insurance
etc.
A chance to
work with an
MNC and
learn things
related to
software and
development,
day off for
birthdays,
emergency
Explore the
field of
security along
with
networking
concepts in a
flexible
environment,
bike to work,
employee
Improve
problem-
solving skills
and give
exposure to the
industry.
Improve
communicatio
n and
behavioral
skills
Document Page
time off,
holiday
package.
discount, car
allowance,
family
medical leave,
health
insurance.
The following reviews of the companies are based on the glass door reviews.
Table 2: Reviews of the company
Company Rating Reason
Deloitte 3.8 Sick pay, work from home,
flexibility, good working
environment
Cisco 4.0 Rewards, service quality,
management is good, holiday
package, emergency time off.
Tek systems 3.9 Insurance, health, wellness, childcare
voucher, helpful staff, growth is
higher
UBS UK 3.6 Emergency child backup care,
balanced life, learning environment
Pizza hut restaurants 2.7 Flexible environment, supportive
colleagues.
(Glassdoor.co.in, 2019).
1.2 negotiate with work and academic supervisors a proposal for the work
experience
Proposal for Cyber engineer:
Table 3: Proposal for a security engineer
Name Tek systems
Job Title Cyber engineer
Duties Coordinate with a team of IT, give
documentation, reports, allocation of
training materials, perform vulnerability
assessment and penetration testing,
providing solutions to secure them
Soft skills Presentation skills, communication skills,
time management
Technical skills Information security, security experience,
infrastructure, Networking, LINUX,
windows etc.
A brief introduction to your self Having knowledge of Linux, windows, and
networking. Also, have knowledge about
networking field. Developed a project in
Document Page
Security management system.
Reason for the work experience Interested in the cyber security field, want to
learn more about ethical hacking and
information systems. Previous training
experience was in the security field.
Future plan Become an ethical hacker
Supervisors: roles and responsibilities of
academic and industrial mentors
A mentor is responsible to guide throughout
the training provide the necessary resources
to complete the training.
Proposal for a Software engineer:
Table 4: Proposal for the software designer
Name Cisco
Job Title Software engineer
Duties Develop software, applications, design
databases, Development of OS, Testing,
quality check, Security etc.
Soft skills Problem solving skills, communication
skills, presentation skills
Technical skills Fundamentals of computer science,
programming language, scripting language,
troubleshooting skills
A brief introduction to your self Possess Knowledge of various
programming languages, testing skills,
developed software for the library
management system.
Reason for the work experience This will help to develop an understanding
of designing and developing software, solve
problems, debugging of software etc.
Future plan Develop a next-generation software which
includes innovations like cloud computing.
Supervisors: roles and responsibilities of
academic and industrial mentors
A mentor is responsible to guide throughout
the training provide the necessary resources
to complete the training.
Selection of proposal:
From the two above proposals, the selected proposal is for Tek systems for cyber engineer post.
As it providing a vast area to improve the knowledge. It will help to improve skills like Linux,
networking, ethical hacking, cyber security, coding, testing and so on. along with this is also
providing benefits to the employees such as flexible environment, bike to work, employee
discount, car allowance, family medical leave, health insurance.
Final agreed proposal:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
The final proposal plan should be like this that it can showcase all the skills included soft skills
and technical skills. And convince the company person to hire the candidate. The proposal
should meet the required skills for the job role.
Document Page
Date: aa/bb/cc
College name:
Industry name: Computer and IT
Organization name: Tek systems
Specification of Job: Cyber engineer
Dear Mr. XYZ,
I am responding to the advertisement on indeed.com for the post of Cyber engineer in Tek
systems. As a CCNA and CEH certifier, I have comprehensive knowledge of networking,
troubleshooting, cyber security, security tools, knowledge of hardware and software.
In my previous training experience, I was required to perform penetration testing and
vulnerability on various websites and resolve issues as soon as possible. I am comfortable for
working long hours in this file as it is my interest area. I am also punctual and able to manage
the task within the time limit. The company requires a cyber engineer to Coordinate with a team
of IT, give documentation, reports, allocation of training materials, perform vulnerability
assessment and penetration testing, providing solutions to secure them.
My effective and innovative approach and knowledge in the security and networking field to be
a network security engineer makes me a suitable candidate for the organization. I am eagerly
waiting for the response from you to discuss more the skills for the job.
Thank you,
Sincerely yours,
Name:
Phone number:
Email Id:
Signature:
(LiveCareer, 2019).
Document Page
1.3 recognize the business constraints on the work experience offered
Table 5: Business Constraints
Business constraints Explanations (Citations and
reference required)
Management constraints
need to be fully trained Training is required as it gives
a brief idea about the work
and the working environment.
It can become a constraint if a
good trainer or proper
resources are not available for
training.
Online videos, webinars,
and blogs can be helpful to
understand the task and
work. This also removes
the limit to always be
present at the time of
training.
adherence to quality systems If quality systems are not
available, then it affects the
performance and also needs
more time than required.
Installation of quality
systems.
health and safety
considerations
The improper working
environment can affect the
health and compromise with
the safety of the workers
To remove this proper
safety measures should be
taken, health insurance
should be provided to the
employees
workload, If the workload is high than
the capacity, then it can affect
the quality of work.
To remove this constraint,
divide the task into small
chunks then solve them. It
will reduce the time
required to solve the
problem.
limited staffing A limited number of staff can
also be a constraint. As if
enough workforce is not
available then it will increase
the workload and ultimately
compromise the quality of
work.
Hire more skilled people or
train the staff to do
multitasking.
cost of resources If the required resources are
costly then it may be not
available for work
Use alternative options that
can provide almost the
same results.
(Bizfluent.com, 2019).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
LO2 Understand the specific requirements of the placement
2.1 agree and prioritize the tasks and responsibilities involved in the work
experience
Job title: Cybersecurity engineer
Responsibilities and duties of the job:
1. Coordinate with a team of IT
2. Give documentation, reports
3. Perform vulnerability assessment and penetration testing
4. Providing solutions to secure the system
5. Analyze networks of computer systems
6. Protection of networks
7. Identification of unauthorized access
8. Create new ways to resolve security issues
9. Making recommendations to improve security and reduce threats.
10. Identification of security environments
To prioritize task and responsibilities, MoSCoW approach is used it refers to:
M- Must have (Most important task)
S- Should have (Important but not much necessary)
C- Could have (Desirable but not that necessary)
W- Won’t have (Won’t need this time)
Document Page
Table 6: Prioritisation of responsibilities.
Task
number
TASK Must
have
Shoul
d have
Could
have
Would Reasons for
rationalization of the
order of the tasks.
1 Coordinate with
a team of IT

3 Perform
vulnerability
assessment and
penetration
testing
Vulnerability assessment
and penetration testing is
required to analyze the
level of security of the
system and identification
of loopholes
5 Analysis of
computer
systems

7 Identification of
unauthorized
access
It is required to analyze
the unwanted activities
and unauthorized access
in the system
10 Identification of
security
environment

8 Create new ways
to resolve
security issues
Involvement of new ways
is required to improve the
security of the system.
4 Providing
solutions

6 Protection of
network
Providing solution will be
helpful when it is
implemented, so
protection is necessary
rather than only giving
solutions.
9 Making
recommendations

2 Give
documentation
and reports
Report and documentation
will be created in the last
to create a reference for
the future.
Listed duties have been agreed by me to undertake as a part of experience work to meet the
necessity of the module of Work Base Experience.
chevron_up_icon
1 out of 39
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]