109
Knowledge
Knowledge of secure configuration management techniques.
Core KSAT for the following Work Roles
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.
Additional KSAT for the following Work Roles
A Host Analyst (HA) will have knowledge of various system configurations encountered. This work role also performs analysis using built-in tools and capabilities. A Host Analyst will have knowledge of system services and the security and configuration of them, as well as knowledge of file systems, permissions, and operation system configurations. The Host Analyst conducts analysis using built-in tools and capabilities.
The Network Analyst will understand network traffic signatures and discover anomalies through network traffic and packet capture (PCAP) analysis. The Network Analyst will identify, assess, and mitigate intrusions into networks that are vital to cyberspace operations security. Network Analysts also use GUI or command-line based tools and assist in developing network mapping and signatures. Network Analysts will develop advanced network detection rules and alerts, queries and dashboards to gain a holistic view of the network.
Executes software planning, requirements, risk management, design, development, architecture, modeling, estimation, configuration management, quality, security, and tests using software development methodologies, architectural structures, viewpoints, styles, design decisions, and frameworks across all lifecycle phases.
Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.