Knowledge of an organization’s information classification program and procedures for information compromise.
Core KSAT for the following Work Roles
Manages the Communications Security (COMSEC) resources of an organization (CNSSI No. 4009).
Responsible for the cybersecurity of a program, organization, system, or enclave.
Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.
Provides technical support to customers who need assistance utilizing client level hardware and software in accordance with established or approved organizational process components. (i.e., Master Incident Management Plan, when applicable).
Additional KSAT for the following Work Roles
Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.
Develops and conducts training or education of personnel within cyber domain.
Administers databases and/or data management systems that allow for the storage, query, and utilization of data.
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Plans, implements, and operates network services/systems, to include hardware and virtual environments.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST 800-37).
Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.
Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.
Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.