The consortium is working with industry and the broader community to co-design, validate, and evolve a rigorous model for cyber capability, recognition, and professionalisation.
The approach is collaborative, evidence-based, and designed to scale responsibly.
Defines cyber occupations for larger organisations and flexible, multi‑hat roles for generalists in smaller businesses. It uses cyber domains to group related functions and a work‑type layer to organise competencies into meaningful clusters.
Used by employers to structure teams and positions, while practitioners use it to understand career options and mobility with a common language.
Defines the skills, knowledge, and behaviours required for each occupation and role, grounded in real threat and risk environments. It ensures competence is validated consistently rather than inferred from credentials alone.
Used by employers to assess capability and plan development, while practitioners use it to benchmark their skills and identify growth areas.
Defines how practitioners, training providers, and organisations are recognised and accredited, embedding ethics, quality assurance, and accountability. It builds trust by ensuring consistent standards across the profession.
Used by employers as a quality baseline for talent, practitioners use it to demonstrate trusted, portable credentials, and educators use it as a reference framework for curriculum design.
Provides clear, inclusive entry and progression routes into cyber, recognising formal education, vocational training, self‑taught skills, and prior experience. It ensures learning aligns with competencies and supports a diverse, job‑ready workforce.
Used by employers to guide development planning, practitioners use it to navigate entry pathways, career transitions, and ongoing development.
This plan ensures the scheme can grow nationally as an accepted and trusted asset that is self sustaining and evolves with technology, threats, and workforce needs. It provides the governance and rollout structure needed for long‑term impact.
Employers use it to plan adoption and integration as well as supporting the continued co-design and maintenance of the solution to remain relevant. Practitioners have confidence CyberPath remains relevant throughout their careers.