141A

141A (NIST ID: K0291)

Knowledge

Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures.

Items denoted by a * are CORE KSATs for every Work Role, while other CORE KSATs vary by Work Role.


Core KSAT for the following Work Roles

Enterprise Architect (Core) ID: 651 (NIST ID: SP-ARC-001) Workforce Element: IT (Cyberspace)

Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.

Software/Cloud Architect (Core) ID: 628 (NIST ID: N/A) Workforce Element: Software Engineering

Manages and identifies program high-level technical specifications, which may include application design, cloud computing strategy and adoption, and integration of software applications into a functioning system to meet requirements.

Additional KSAT for the following Work Roles

Host Analyst (Additional) ID: 463 (NIST ID: N/A) Workforce Element: Cyberspace Effects

A Host Analyst (HA) will have knowledge of various system configurations encountered. This work role also performs analysis using built-in tools and capabilities. A Host Analyst will have knowledge of system services and the security and configuration of them, as well as knowledge of file systems, permissions, and operation system configurations. The Host Analyst conducts analysis using built-in tools and capabilities.

Network Technician (Additional) ID: 442 (NIST ID: N/A) Workforce Element: Cyberspace Effects

The Network Technician provides enterprise and tactical infrastructure knowledge, experience, and integration to the Cyber Protection Team (CPT). The Network Technician supports CPT elements by understanding of network technologies, defining mission scope, and identifying terrain.

Security Architect (Additional) ID: 652 (NIST ID: SP-ARC-002) Workforce Element: Cybersecurity

Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.