Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 1125
Additional KSAT for the following Work Roles
Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.
Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.
Develops and conducts training or education of personnel within cyber domain.
Develops cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and initiatives.
Executes decision-making authorities and establishes vision and direction for an organization’s cyber and cyber-related policies, resources, and/or operations, while maintaining responsibility for risk-related decisions affecting mission success.
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Manages a portfolio of IT capabilities that align with the overall needs of mission and business enterprise priorities.
Conducts evaluations of an IT program or its individual components, to determine compliance with published standards.
Work that involves directly managing information technology projects to provide a unique service or product.
Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance needs of privacy and security executives and their teams.
Manages the development of products including the resource management, product strategy (physical or digital), functional requirements, and releases. Coordinate work done by functions (like software engineers, data scientists, and product designers).
Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components.
Leads, coordinates, communicates, integrates and is accountable for the overall success of the program, ensuring alignment with critical agency priorities.
Conducts software and systems engineering and software systems research in order to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Manages and identifies program high-level technical specifications, which may include application design, cloud computing strategy and adoption, and integration of software applications into a functioning system to meet requirements.