Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Core KSAT for the following Work Roles
Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009).
Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Responsible for the cybersecurity of a program, organization, system, or enclave.
Plans, implements, and operates network services/systems, to include hardware and virtual environments.
Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST 800-37).
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.
Conducts software and systems engineering and software systems research in order to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Executes software planning, requirements, risk management, design, development, architecture, modeling, estimation, configuration management, quality, security, and tests using software development methodologies, architectural structures, viewpoints, styles, design decisions, and frameworks across all lifecycle phases.
Installs, configures, troubleshoots, and maintains hardware, software, and administers system accounts.
Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.
Responsible for analysis and development of systems/software security through the product lifecycle to include integration, testing, operations and maintenance.