DevSecOps Specialist
Selects/Deploys/Maintains the set of Continuous Integration/Continuous Deployment (CI/CD) tools and processes used by the development team and/or maintains the deployed software product and ensures observability and security across the lifecycle.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
3C | Skill in recognizing vulnerabilities in information and/or data systems. |
Skill |
3B | Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks. |
Skill |
4 | Ability to identify systemic security issues based on the analysis of vulnerability and configuration data. |
Ability |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
34 | Knowledge of database systems. |
Knowledge |
58 | Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
130 | Knowledge of systems testing and evaluation methods. |
Knowledge |
130A | Knowledge of systems security testing and evaluation methods. |
Knowledge |
142A | Knowledge of the operations and processes for incident, problem, and event management. |
Knowledge |
144 | Knowledge of the systems engineering process. |
Knowledge |
190 | Skill in developing operations-based testing scenarios. |
Skill |
238A | Skill in writing code in a currently supported programming language (e.g., Java, C++). |
Skill |
412A | Analyze the results of software, hardware, or interoperability testing. |
Task |
420 | Apply security policies to meet security objectives of the system. |
Task |
421a | Apply security architecture principles to meet organization’s confidentiality, integrity, and availability requirements. |
Task |
452 | Conduct functional and connectivity testing to ensure continuing operability. |
Task |
559B | Analyze and report system security posture trends. |
Task |
568 | Employ secure configuration management processes. |
Task |
572 | Ensure application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment. |
Task |
576 | Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level. |
Task |
653B | Implement security measures to mitigate or remediate vulnerabilities and security deficiencies, and provide justification for acceptance of residual risk. |
Task |
661A | Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation. |
Task |
708A | Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance for the appropriate senior leader or authorized representative. |
Task |
726 | Oversee and make recommendations regarding configuration management. |
Task |
729A | Verify minimum security requirements are in place for all applications. |
Task |
754 | Perform cybersecurity testing of developed applications and/or systems. |
Task |
880A | Work with stakeholders to resolve computer security incidents and vulnerability compliance. |
Task |
1037A | Knowledge of information technology (IT) risk management policies, requirements, and procedures. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2054 | Assess the effectiveness of security controls. |
Task |
3030 | Ability to conduct vulnerability scans and recognize vulnerabilities in security systems. |
Ability |
3822 | Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results. |
Skill |
5940 | Work with designers and developers throughout the design, development and testing process. |
Task |
5939 | Choose and deploy the appropriate automated application security testing tools. |
Task |
5941 | Utilize tools and techniques like risk assessment, threat modeling, and cybersecurity to detect and analyze the threats. |
Task |
5942 | Work with Security Engineers to ensure that all security threats are dealt with during the development phase. |
Task |
5943 | Work with Automation tools are used to identify the vulnerabilities. |
Task |
5944 | Identify and implement tooling for controlling the steps in a continuous integration (CI) and continuous deployment (CD) pipeline. |
Task |
5945 | Develop and implement automatic test tools in a CI/CD pipeline, which could include Static Application Security Test (SAST) tools, Dynamic Application Security Test (DAST) tools, Unit Test tools, Static Code Analysis (SCA) tools, etc. |
Task |
5946 | Develop code within a CI/CD Pipeline. |
Task |
5947 | Select appropriate language and coding standards for software application for appropriate Continuous Integration/Continuous Deployment (CI/CD) framework. |
Task |
5948 | Apply testing activities, understands fault vs. failures, conduct basic test planning, develop test selection or adequacy criteria, crafts test documentation, ensures test coverages, and conducts automated testing. |
Task |
5950 | Develop and deploy software using continuous integration methods, processes, and tools, including test case writing against completion criteria (for each release, capability, micro-service, or component), build automation, and build processes. |
Task |
5953 | Provide DevSecOps guidance to leadership. |
Task |
5955 | Work closely with development teams to provide and support the environment needed to deliver an organization’s services. |
Task |
6090 | Ability to develop curriculum for use within a virtual environment. |
Ability |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7087 | Knowledge of programming languages. |
Knowledge |
7088 | Knowledge of continuous integration/continuous deployment (CI/CD) processes and pipeline tools. |
Knowledge |
7089 | Knowledge of portable, extensible, open source platform for managing containerized workloads and services. |
Knowledge |
7090 | Knowledge of cloud hosting providers. |
Knowledge |
7091 | Knowledge of threat modeling, risk assessment techniques, code reviews, current best practices and the latest cybersecurity threats. |
Knowledge |
7092 | Knowledge of how security impacts each development phase and the services. |
Knowledge |
7093 | Knowledge of a Continuous Integration/Continuous Deployment (CI/CD) environment and processes. |
Knowledge |
7094 | Knowledge of the steps for release to higher levels of integration testing, certification activities, and/or operations using testbeds, modeling and simulation to synchronize software releases with the development of an operations environment(s) to ensure compatibility. |
Knowledge |
7095 | Knowledge of every stage in the software project lifecycle, from initial design and build to rollout and maintenance. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
21 | Knowledge of computer algorithms. |
Knowledge |
25B | Knowledge of encryption algorithms. |
Knowledge |
27A | Knowledge of cryptology. |
Knowledge |
75B | Knowledge of statistics. |
Knowledge |
94 | Knowledge of parallel and distributed computing concepts. |
Knowledge |
220 | Skill in systems integration testing. |
Skill |
225A | Skill in the use of penetration testing tools and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems). |
Skill |
571 | Ensure all systems security operations and maintenance activities are properly documented and updated as necessary. |
Task |
717A | Assess and monitor cybersecurity related to system implementation and testing practices. |
Task |
765 | Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. |
Task |
795 | Properly document all systems security implementation, operations and maintenance activities and update as necessary. |
Task |
806A | Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities. |
Task |
809 | Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). |
Task |
876 | Verify and update security documentation reflecting the application/system security design features. |
Task |
938A | Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans. |
Task |
1040A | Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure. |
Knowledge |
1139A | Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption. |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
3642 | Knowledge of various types of computer architectures. |
Knowledge |
5050 | Assess all the configuration management (change configuration/release management) processes. |
Task |
5949 | Transition embedded and non-embedded software developed and sustained using traditional software methods into a DevSecOps environment. |
Task |
5951 | Select and implement telemetry within the CI/CD pipeline and Ops software to support metrics and problem discovery and resolution. |
Task |
5954 | Build test interfaces and perform complex integration. |
Task |
6240 | Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE). |
Knowledge |