Crosswalk between ESCO and ECSF

The ECSF and the ESCO classification and the share a common objective: analysing the labour market in terms of professional roles and required skills, albeit from different perspectives. ESCO aims to classify the entire EU labour market across various sectors, while the ECSF provides a focused analysis of role profiles specific to the cybersecurity sector.

During the update process leading to the release of ESCO version 1.2, ENISA collaborated closely with the ESCO team. Leveraging the ECSF, several enhancements were made to the ESCO classification to more accurately represent the occupations and skills required in cybersecurity.

As a result of this collaboration, ESCO v1.2 now features, 5 occupations that are directly aligned with five ECSF cybersecurity role profiles. Additionally, 7 ECSF profiles are associated with multiple ESCO occupations, linked by shared tasks, skills, and scopes, each with varying degrees of correspondence.

 The document titled "Crosswalk between ECSO and ESCF" details this collaboration and its outcomes.

Image
esco ecsf poster

The table below outlines the relationship between ESCO occupations (including their respective ESCO codes) and ESCF role profiles.

ESCO codeESCO Occupation v 1.2

ESCO Occupation

Description

RelationshipECSF role profileECSF summary statement
2529.1Chief ICT security officerChief ICT security officers protect company and employee information against unauthorized access. They also define the Information System security policy, manage security deployment across all Information Systems and ensure the provision of information availability.The ESCO occupation is an exact match with the ECSF role profileChief Information Security Officer (CISO)Manages an organisation’s cybersecurity strategy and its implementation to ensure that digital systems, services and assets are adequately secure and protected.
2529.7Cyber incident responderCyber incident responders monitor and assess cybersecurity state systems, analysing, evaluating, and mitigating the impact of cybersecurity incidents. Moreover, they identify malicious actors and cyber incident root causes. According to the organisation’s Incident Response Plan, they restore systems and process functionalities to an operational state, collecting evidence and documenting actions taken.The ESCO occupation is an exact match with the ECSF role profileCyber incident responderMonitor the organisation’s cybersecurity state, handle incidents during cyber-attacks and assure the continued operations of ICT systems.
1213.9Director of compliance and information securityDirectors of compliance and information security follow the regulatory compliance and oversee information security to ensure the security of all information technology associated.The ESCO occupation is more specific than the ECSF role profileCyber Legal, Policy & Compliance OfficerManages compliance with cybersecurity-related standards, legal and regulatory frameworks based on the organisation’s strategy and legal requirements.
2619.4Data protection officerData protection officers ensure that the processing of personal data in an organisation is compliant with data protection standards and with the obligations set out in the applicable legislation such as GDPR. They elaborate and implement the organisation policy related to data protection, are responsible for data protection impact assessments and handle complaints and requests from third parties and regulatory agencies.The ESCO occupation shares tasks with the ECSF role profileCyber Legal, Policy & Compliance OfficerManages compliance with cybersecurity-related standards, legal and regulatory frameworks based on the organisation’s strategy and legal requirements.
2422.8Intelligence officerIntelligence officers develop and execute plans to gather information and intelligence.The ESCO occupation is broader than the ECSF role profileCyber Threat Intelligence SpecialistCollect, process, analyse data and information to produce actionable intelligence reports and disseminate them to target stakeholders.
2511.14ICT system architectICT system architects design architecture, components, modules, interfaces, and data for a multi-component system to meet specified requirements.The ESCO occupation shares tasks with the ECSF role profileCybersecurity ArchitectPlans and designs security-by-design solutions (infrastructures, systems, assets, software, hardware and services) and cybersecurity controls.
2512.3software architectSoftware architects create the technical design and the functional model of a software system, based on functional specifications.The ESCO occupation shares tasks with the ECSF role profileCybersecurity ArchitectPlans and designs security-by-design solutions (infrastructures, systems, assets, software, hardware and services) and cybersecurity controls.
2512.6cloud architectCloud architects are responsible for converting the technical features of a project into the architecture to lead to the final product.The ESCO occupation shares tasks with the ECSF role profileCybersecurity ArchitectPlans and designs security-by-design solutions (infrastructures, systems, assets, software, hardware and services) and cybersecurity controls.
2523.2ICT network architectICT network architects design the topology and connectivity of ICT networks such as hardware, infrastructure, communication and hardware components.The ESCO occupation shares tasks with the ECSF role profileCybersecurity ArchitectPlans and designs security-by-design solutions (infrastructures, systems, assets, software, hardware and services) and cybersecurity controls.
2511.18IT auditorIT auditors perform audits of information systems, platforms, and operating procedures in accordance with established corporate standards for efficiency, accuracy and security. They evaluate ICT infrastructure in terms of risk to the organisation and establish controls to mitigate loss. They determine and recommend improvements in the current risk management controls and in the implementation of system changes or upgrades.The ESCO occupation is broader than the ECSF role profileCybersecurity AuditorPerform cybersecurity audits on the organisation’s ecosystem. Ensuring compliance with statutory, regulatory, policy information, security requirements, industry standards and best practices.
2519.2ICT auditor managerICT auditor managers monitor ICT auditors responsible for auditing information systems, platforms, and operating procedures in accordance with established corporate standards for efficiency, accuracy and security. They evaluate ICT infrastructure in terms of risk to the organisation and establish controls to mitigate loss. They determine and recommend improvements in the current risk management controls and in the implementation of system changes or upgradesThe ESCO occupation is broader than the ECSF role profileCybersecurity AuditorPerform cybersecurity audits on the organisation’s ecosystem. Ensuring compliance with statutory, regulatory, policy information, security requirements, industry standards and best practices.
2310.1Higher education lecturerHigher education lecturers instruct students who have obtained an upper secondary education diploma in their own specialised field of study, which is predominantly academic in nature.The ESCO occupation is broader than the ECSF role profileCybersecurity EducatorImproves cybersecurity knowledge, skills and competencies of humans.
2356Information technology trainerInformation technology trainers develop, schedule and conduct training programmes and courses for computer and other information technology users outside the mainstream primary, secondary and higher education systemsThe ESCO occupation is broader than the ECSF role profileCybersecurity EducatorImproves cybersecurity knowledge, skills and competencies of humans.
2529.3Embedded system security engineerEmbedded systems security engineers advise and implement solutions to control access to data and programs in embedded and connected systems. They help ensuring the safe operation of products with embedded systems and connected devices by being responsible for the protection and security of the related systems and design, plan and execute security measures accordingly. Embedded systems security engineers help to keep attackers at bay by implementing safeguards that prevent intrusions and breaches.The ESCO occupation shares tasks with the ECSF role profileCybersecurity ImplementerDevelop, deploy and operate cybersecurity solutions (systems, assets, software, controls and services) on infrastructures and products.
2529.6ICT security administratorICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption.The ESCO occupation shares tasks with the ECSF role profileCybersecurity ImplementerDevelop, deploy and operate cybersecurity solutions (systems, assets, software, controls and services) on infrastructures and products.
3512.3ICT security technicianICT security technicians propose and implement necessary security updates and measures whenever is required.The ESCO occupation shares tasks with the ECSF role profileCybersecurity ImplementerDevelop, deploy and operate cybersecurity solutions (systems, assets, software, controls and services) on infrastructures and products.
2149.2.8Research engineerResearch engineers combine research skills and knowledge of engineering principles to assist in the development or design of new products and technology. They also improve existing technical processes, machines and systems and create new, innovative technologies. The duties of research engineers depend on the branch of engineering and the industry in which they work. Research engineers generally work in an office or laboratory, analysing processes and conducting experiments.The ESCO occupation is broader than the ECSF role profileCybersecurity ResearcherResearch the cybersecurity domain and incorporate results in cybersecurity solutions.
2529.8cybersecurity risk managerCybersecurity risk managers identify, analyse, assess, estimate and mitigate cybersecurity-related risks of ICT infrastructures such as systems or services. They manage these aspects by planning risk analysis, applying, reporting, assessing, communicating, and treating them. They establish a risk management strategy for the organisation and ensure that risks remain at an acceptable level for the organisation by selecting mitigation actions and controls.The ESCO occupation is an exact match with the ECSF role profileCybersecurity Risk ManagerManage the organisation's cybersecurity-related risks aligned to the organisation’s strategy. Develop, maintain and communicate the risk management processes and reports.
2529.2Digital forensic expertDigital forensics experts retrieve and analyse information from computers and other types of data storage devices. They examine digital media that may have been hidden, encrypted or damaged, in a forensic manner with the aim to identify, preserve, recover, analyse and present facts and opinions about the digital information.The ESCO occupation is an exact match with the ECSF role profileDigital Forensics InvestigatorEnsure the cybercriminal investigation reveals all digital evidence to prove the malicious activity.
2529.4Ethical hackerEthical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vulnerabilities that may result from improper system configuration, hardware or software flaws, or operational weaknesses.The ESCO occupation is an exact match with the ECSF role profilePenetration TesterAssess the effectiveness of security controls, reveal and utilise cybersecurity vulnerabilities, assessing their criticality if exploited by threat actors.