top of page

CISSE UK InSight 
Search Counts "S"

Cyber, Technology and Operations Search Terms (CyTO)

CyTO search terms are identified through extensive analysis of job adverts relating to cyber roles, where the term "cyber" is considered to be the realm of online technologies (i.e. cyber space). Therefore, examples of search terms will include the domains of cyber security, operations, coding, networking, automation, cloud computing, project management and much more. 

Search Count Results

# | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | | S T | U | V | W | X | YZ 

SailPoint
"SailPoint can help you solve your most complex IAM challenges"

Saltstack
"SaltStack or Salt is software to automate the management and configuration of any infrastructure or application at scale."
Source: https://www.opensourceforu.com/2021/12/all-you-need-to-know-about-saltstack/

SAMM
"The Software Assurance Maturity Model (SAMM) is an open framework to help organizations formulate and implement a strategy for software security that is tailored to the specific risks facing the organization." 

SAST
"SAST is a vulnerability scanning technique that focuses on source code, bytecode, or assembly code." 

SCALA
"The Scala Programming Language Scala combines object-oriented and functional programming in one concise, high-level language."

SCRUM
"Scrum is a lightweight framework that helps people, teams and organizations generate value through adaptive solutions for complex problems." 

SIEM
"Security information and event management (SIEM) is a set of tools and services that combine security events management (SEM) and security information management (SIM) capabilities to enable analysts to review log and event data, understand and prepare for threats, and retrieve and report on log data." 

SMTP
"The Simple Mail Transfer Protocol is an internet standard communication protocol for electronic mail transmission." 

SNMP
"Simple Network Management Protocol is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behaviour." 

SonarCube
"SonarQube fits with your existing tools and pro-actively raises a hand when the quality or security of your codebase is at risk." 

Spinnaker
"Spinnaker is an open-source, multi-cloud continuous delivery platform that combines a powerful and flexible pipeline management system with integrations to the major cloud providers." 

Splunk
“Splunk is a "data platform that helps turn data into action for Observability, IT, Security and more. The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative." 

SQL
"SQL is a standard language for storing, manipulating and retrieving data in databases." 

SSH
"SSH is a software package that enables secure system administration and file transfers over insecure networks. It is used in nearly every data center and in every large enterprise." 

Syslog
"The syslog protocol has been in use for decades as a way to transport messages from network devices to a logging server, typically known as a syslog server. Due to its longevity and popularity, the syslog protocol has support on most major operating systems, including macOS, Linux, and Unix." 

bottom of page