[cybersecurity roles] Innovation meets security: Design and Development (DD)


Cybersecurity starts with building secure systems from the ground up. At the heart of every secure organization, there is a team of innovative cybersecurity professionals who design and develop the tools and infrastructure that protect digital environments. This is the focus of the Design and Development (DD) role category, where technical expertise and creativity come together to create secure solutions.  

Following the guidance of the NIST Cybersecurity NICE framework, we identify and cultivate the skills needed to excel in designing and developing secure technologies. The Design and Development includes roles that are responsible for creating the frameworks, tools, and protocols that form the foundation of cybersecurity. From designing secure architectures to developing applications that withstand modern threats, these professionals are shaping the future of cyber defense. Explore the key responsibilities, critical skills, and impactful contributions of this vital category. 

What is Design and Development (DD) 

The Design and Development (DD) role in cybersecurity focuses on creating and implementing secure systems, tools, and applications that form the backbone of digital defense. These professionals are responsible for designing robust architectures, developing innovative security solutions, and ensuring that cybersecurity measures are integrated seamlessly into technology frameworks. 

These cybersecurity professionals play a crucial role in proactively addressing cybersecurity needs. By building secure technologies from the ground up, they help organizations minimize risks, protect critical data, and adapt to the ever-evolving threat landscape. Their work ensures that security is not just an add-on but a fundamental part of the digital infrastructure. 

These roles require a combination of technical expertise, problem-solving skills, and creativity, making them an essential pillar of any cybersecurity strategy. 

1. Cybersecurity Architecture: the master planners of secure systems  

Cybersecurity Architects are the master planners of secure systems, ensuring that security is built into every aspect of enterprise architecture. From designing frameworks to implementing robust solutions, they align security needs with business goals. Their work safeguards organizational missions and ensures that security is a core component, not an afterthought.  

Key Responsibilities 

  • Design secure architectures: develop and implement secure frameworks, systems, and networks that align with organizational goals and withstand evolving threats. 
  • Integrate security requirements: ensure security is embedded into all levels of enterprise architecture, including reference models, segment designs, and solution frameworks. 
  • Evaluate and optimize systems: continuously assess existing systems to identify vulnerabilities and recommend improvements for enhanced security and efficiency. 

Essential Knowledge

Cybersecurity Architects must possess a deep understanding of enterprise architecture, risk management, and compliance standards. They also need expertise in secure design principles, threat modeling, and the latest advancements in security technologies. 

2. Enterprise Architecture: the blueprint designers of organizational systems

Enterprise Architects are the blueprint designers of organizational systems, ensuring that technology and business strategies are seamlessly aligned. They focus on creating holistic frameworks that connect processes, systems, and technologies, enabling organizations to achieve their mission efficiently and securely. Their work lays the foundation for robust, scalable, and adaptable systems that support organizational growth and resilience. 

Key Responsibilities

  • Design enterprise frameworks: develop and implement comprehensive architectures that align IT systems with business goals and ensure seamless integration. 
  • Optimize system performance: continuously analyze and refine systems to enhance efficiency, scalability, and reliability. 
  • Ensure interoperability: create frameworks that enable seamless communication between different systems, applications, and processes across the organization. 
  • Manage technology portfolios: evaluate and recommend technology investments to support current and future organizational needs. 

Essential Knowledge

Enterprise Architects require a deep understanding of systems integration, IT infrastructure, and business processes. Their expertise includes enterprise modeling tools, risk management, and the ability to balance innovation with operational stability. 

3. Security Software Development: building applications with security at their core

Security Software Developers are the builders of resilient applications, ensuring that security is a fundamental part of the development process. From writing secure code to identifying and mitigating vulnerabilities, these professionals design software that protects organizations from potential cyber threats. Their work ensures that applications are not just functional but also robust against evolving risks. 

Key Responsibilities

  • Develop secure software: create applications with built-in security features to safeguard against vulnerabilities and cyber threats. 
  • Conduct code reviews: identify and fix security flaws through rigorous testing and evaluation of code. 
  • Integrate security tools: use automated tools and processes to detect vulnerabilities during the software development lifecycle. 

Essential Knowledge

Security Software Developers must be proficient in secure coding practices, threat modeling, and vulnerability management. They also need expertise in programming languages, development frameworks, and security standards to build applications that meet both functional and protective requirements. 

4. Secure Systems Development: engineering resilient digital environments

Secure Systems Developers are responsible for designing and building systems that prioritize security at every layer. Their role involves integrating secure practices throughout the system development lifecycle, ensuring that the systems are resilient to cyber threats while maintaining efficiency and performance. By combining technical expertise with a proactive approach, they create robust environments that support organizational goals securely. 

Key Responsibilities 

  • Design and build secure systems: develop systems with integrated security measures to protect against vulnerabilities and potential cyberattacks. 
  • Integrate security into development lifecycles: ensure security is embedded throughout the planning, development, and deployment stages. 
  • Conduct security assessments: regularly analyze systems to identify and mitigate risks while maintaining performance and functionality. 

Essential Knowledge 

Secure Systems Developers require in-depth knowledge of system architecture, secure coding practices, and risk assessment techniques. Familiarity with frameworks, such as DevSecOps, compliance standards, and security testing tools, is essential to ensure systems are both innovative and secure in a dynamic threat landscape. 

5. Software Security Assessment: evaluating and fortifying applications

Software Security Assessors play a critical role in ensuring applications are robust and resilient against cyber threats. By evaluating software for vulnerabilities, assessing compliance with security standards, and recommending fixes, they act as the gatekeepers of secure development. Their work ensures that every application is thoroughly tested and ready to withstand evolving threats. 

Key Responsibilities 

  • Identify vulnerabilities: conduct comprehensive security assessments to detect weaknesses in applications and systems. 
  • Perform penetration testing: simulate real-world attacks to evaluate the resilience of software under potential threat scenarios. 
  • Ensure compliance: verify that software meets security standards and regulatory requirements, such as OWASP and ISO 27001. 

Essential Knowledge 

Software Security Assessors need a solid understanding of application development processes, common vulnerabilities (e.g., OWASP Top 10), and testing methodologies. Expertise in security assessment tools, compliance standards, and risk management enables them to effectively evaluate and enhance the security of software systems. 

6. Systems Testing and Evaluation: ensuring system integrity and security

Systems Testing and Evaluation professionals are critical in verifying that systems meet security and performance requirements. They rigorously test systems to identify vulnerabilities, ensure compliance with standards, and validate their ability to operate under various conditions. Their work guarantees that every system is secure, reliable, and ready for deployment. 

Key Responsibilities 

  • Conduct system testing: perform functional, performance, and security tests to assess system behavior under real-world conditions. 
  • Identify and mitigate risks: detect vulnerabilities and recommend strategies to strengthen system resilience. 
  • Ensure standards compliance: validate systems against industry regulations and security standards, ensuring readiness for operational environments. 
  • Simulate attack scenarios: test systems through penetration testing and stress testing to uncover hidden weaknesses. 

Essential Knowledge 

Systems Testing and Evaluation professionals must have a strong grasp of testing methodologies, security frameworks, and system performance metrics. Familiarity with testing tools, compliance standards, and risk assessment techniques is essential to ensure systems meet both functional and security requirements. 

Why Design and Development matters  

It lays the foundation for secure and resilient systems. By integrating security into the design phase, these professionals ensure that vulnerabilities are addressed proactively rather than reactively, saving organizations time, money, and potential reputational damage. 

How the Swiss Cyber Institute supports DD professionals 

The Security Skills Assessment, rooted in the NICE framework, is designed to support individuals and organizations identify skill gaps and create personalized development plans. The Design and Development (DD) category empowers professionals to make a lasting impact by designing secure systems, integrating security into development processes, and staying ahead of emerging threats. By mastering the responsibilities and knowledge areas outlined above, you can become a key driver in building resilient and innovative cybersecurity solutions. 

Ready to take the next step? Explore our Security Skills Assessment and discover how you can lead with confidence in the ever-changing world of cybersecurity. 

In the next part of this series, you will deep dive into the “Investigation (IN)” role. Look forward to it! 

Subscribe for updates