Knowledge of Personally Identifiable Information (PII) data security standards.
Core KSAT for the following Work Roles
Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009).
Responsible for the cybersecurity of a program, organization, system, or enclave.
Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Responsible for analysis and development of systems/software security through the product lifecycle to include integration, testing, operations and maintenance.
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Analyzes and interprets data from multiple disparate sources and builds visualizations and dashboards to report insights.
Designs a system’s data models, data flow, interfaces, and infrastructure to meet the information requirements of a business or mission.
Builds, manages, and operationalizes data pipelines.
Uncovers and explains actionable insights from data by combining scientific method, math and statistics, specialized programming, advanced analytics, AI, and storytelling.
Develops and maintains plans, policies, and processes for data management, data governance, security, quality, accessibility, use, and disposal.
Administers databases and/or data management systems that allow for the storage, query, and utilization of data.
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Plans, implements, and operates network services/systems, to include hardware and virtual environments.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST 800-37).
Executes software planning, requirements, risk management, design, development, architecture, modeling, estimation, configuration management, quality, security, and tests using software development methodologies, architectural structures, viewpoints, styles, design decisions, and frameworks across all lifecycle phases.
Installs, configures, troubleshoots, and maintains hardware, software, and administers system accounts.
Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.
Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.
Provides technical support to customers who need assistance utilizing client level hardware and software in accordance with established or approved organizational process components. (i.e., Master Incident Management Plan, when applicable).