Welcome Login

Workstream 3: Council Formation and Operations

Workstream Purpose 

Workstream 3. is fundamentally concerned with the development of the proposed council into a legal entity complete with a scope of technical focus, a sustainable financial operating model, a governance structure that is fit for purpose and plans for transition to full council following end of project. 

This role is not remunerated but the post-holder is able to claim reasonable out-of-pocket expenses. No specified location – commitments can be carried out remotely with expectation of travel to occasional meetings face to face – anticipated to be London but other locations in the UK also possible.


  • Definition of the Scope of the Council, taking account of the CyBOK's scope and both information and industrial cyber security - to be agreed by the Authority
  • Agreement on structure and governance of Cyber Security Council with a range of options having been considered and evaluated – will required review and sign-off by the Authority.
  • A business plan for the long-term financial sustainability for the Council developed and reviewed by the Authority to ensure that all models are valid from a government perspective
  • The rules, procedures and controls for the internal operations of the Council - agreed by Supplier organisations and reviewed and signed off by the Authority
  • Accountability arrangement for the Council, and the metrics and processes for monitoring and reporting on its performance – to be reviewed by the Authority and will require Authority sign off
  • Use cases for testing all assumptions about the operations of the Council developed - to be reviewed by the Authority and will require Authority sign off
  • Legal establishment of Council through submission of documents to Companies House and start of Council operations
  • Plan for transition to Council, including review of progress and readiness to employ staff - to be reviewed and signed off by both the Authority and the Supplier members.
  • Fair and open competition process of appointment of staff to public positions - to be reviewed and signed off by the Authority
  • Legal entity status of Cyber Security Council established and implemented. 


Person Specification 

Essential Criteria:

  • Strong technical understanding of the fundamentals of Cyber Security.
  • Leading experts from institutions/ organisations with strong track record in cyber security as evidenced by reputation and past achievements.
  • Representing “high-growth” companies or application areas.
  • Experience of developing, managing, engaging with not-for-profit organisations and an understanding of their structural and governance make-up.


Desirable Criteria:

  • A passion for making the UK the leading country for cyber security professionalism.
  • A desire to help strengthen the secure digital economy and society in the UK.
  • Experienced across a range of industries/ applications.

This description is intended as a general guide to the scope of the position. 

Roles are to be applied for by organisations with a suitably experienced and senior representative individual identified. 

If you are interested to support the UK CSC Formation Project and feel you have experience in a number of these areas (even if it’s not quite all of them) please send a ‘Letter of Application’ signed by C (or Director) Level for consideration to csc@theiet.org

Please note: There is no template for the letter of application. It should outline credentials and experience in relation to the person specification and the deliverables/ the role summary.  A C/Director Level signature is a helpful indication of organisation's willingness to support the individual's participation in the project.

Equality, Diversity & Inclusion is an important part of any project and it enables us to understand everyone's individual experience and perspective; we kindly request that applicants complete and return our ‘Equality and Diversity Monitoring’ form along with their letter of application.

We look forward to hearing from you soon.

The information provided on this form/email will be processed by the IET, as part of the Cyber Security Skills Alliance, for purposes which support and further the Alliances aims and ideals for the development of cyber skills within the engineering community including the UK Cyber Security Council Formation Project.