IT Security Competence Purpose This document is used as a competence declaration to get a picture of the person’s background, knowledge and experience in the fields of IT security evaluation IT security in general Other relevant areas It is to be used by those who are aiming to have an active role in the Scheme, e.g. evaluators, certifiers, external experts, sub-contractors, etc. It will establish the base for further interviews with the applicants. Feel free to add rows to the form tables as necessary. Relevant information not provided for in the forms may be written in. 024 IT Security Competence - Form 11.0 Please send the form to: FMV/CSEC SE-115 88 Stockholm SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME IT Security Competence General Information Role applied for Evaluator Technical expert during evaluation Other (please specify)____________________ Applicant Name E-Mail Mobile Phone Company/Organisation Telephone Education Examination Institute Dates Institute Dates Education Examination Education Certificates, etc. Certificate Institute Dates Certificate Institute Dates Certificate Institute Dates Employment history Date Company Title/Task Date Company Title/Task Date Company 024 IT Security Competence - Form 11.0 Title/Task Date Company Title/Task SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME IT Security Competence 024 IT Security Competence - Form 11.0 Main Areas of Competence SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME IT Security Competence IT Security Competence Explanation to the form tables below: Duration: The time in weeks, months or years spent in the area. The listed application areas are examples, other relevant areas may be added as needed. Application areas: Area Cryptography/cryptology PKI Smart Cards Operating systems Description, examples Cryptographical protocols, key management, algorithms Electronic signatures, certificates, applications Internal design, Writing applications, CA operation User experience, administrating skills, kernel and sub-system development Protocols, routers, firewalls, IDS Protocols, equipment Protocols, equipment Network Telecom Wireless Competence areas: Area Theoretical System design Description, examples Security principles, formal models, algorithms High level design, abstract modelling, object orientation, structured approach Low level design, coding techniques, programming languages, platforms Methodology, equipment, functional testing, penetration test Installation, hard- and software Planning, writing policies Threats-vulnerabilities-security measures CC/CEM, ITSEC/ITSEM, other Implementation Test and verification Operation and maintenance Management of IT-systems Security analysis Evaluation Cryptography/Cryptology Theoretical System design Implementation Test & Ver Oper. & Maint. IT-Syst Mgm Security analysis Evaluation Other Duration Project Description Project Description 024 IT Security Competence - Form 11.0 Project Description SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME IT Security Competence PKI Theoretical System design Implementation Test & Ver Oper. & Maint. IT-Syst Mgm Security analysis Evaluation Other System design Implementation Test & Ver Oper. & Maint. IT-Syst Mgm Security analysis Evaluation Other Implementation Test & Ver Oper. & Maint. IT-Syst Mgm Security analysis Evaluation Other Duration Project Description Project Description Project Description Smart Cards Theoretical Duration Project Description Project Description Project Description Operating Systems Theoretical System design Duration Project Description Project Description 024 IT Security Competence - Form 11.0 Project Description SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME IT Security Competence Network Theoretical System design Implementation Test & Ver Oper. & Maint. IT-Syst Mgm Security analysis Evaluation Other System design Implementation Test & Ver Oper. & Maint. IT-Syst Mgm Security analysis Evaluation Other System design Implementation Test & Ver Oper. & Maint. IT-Syst Mgm Security analysis Evaluation Other Duration Project Description Project Description Project Description Telecom Theoretical Duration Project Description Project Description Project Description Wireless Theoretical Duration Project Description Project Description 024 IT Security Competence - Form 11.0 Project Description SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME IT Security Competence Other (specify) Theoretical System design Implementation Test & Ver Oper. & Maint. IT-Syst Mgm Security analysis Evaluation Other Duration Project Description Project Description Project Description IT Security Evaluation Experience Target of Evaluation Method Sponsor/Developer Dates Description of Work Target of Evaluation Method Sponsor/Developer Dates Description of Work Target of Evaluation Method Sponsor/Developer Dates 024 IT Security Competence - Form 11.0 Description of Work SWEDISH COMMON CRITERIA EVALUATION AND CERTIFICATION SCHEME