150

150 (NIST ID: K0106)

Knowledge

Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities.

Items denoted by a * are CORE KSATs for every Work Role, while other CORE KSATs vary by Work Role.


Core KSAT for the following Work Roles

Cyber Defense Analyst (Core) ID: 511 (NIST ID: PR-DA-001) Workforce Element: Cybersecurity

Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.

Cyber Defense Incident Responder (Core) ID: 531 (NIST ID: PR-IR-001) Workforce Element: Cybersecurity

Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.

Cyber Defense Infrastructure Support Specialist (Core) ID: 521 (NIST ID: PR-INF-001) Workforce Element: Cybersecurity

Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.

Executive Cyber Leader (Core) ID: 901 (NIST ID: OV-EX-001) Workforce Element: Cyberspace Enablers / Leadership

Executes decision-making authorities and establishes vision and direction for an organization’s cyber and cyber-related policies, resources, and/or operations, while maintaining responsibility for risk-related decisions affecting mission success.

Information Systems Security Manager (Core) ID: 722 (NIST ID: OV-MG-001) Workforce Element: Cybersecurity

Responsible for the cybersecurity of a program, organization, system, or enclave.

Vulnerability Assessment Analyst (Core) ID: 541 (NIST ID: PR-VA-001) Workforce Element: Cybersecurity

Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.

Additional KSAT for the following Work Roles

Host Analyst (Additional) ID: 463 (NIST ID: N/A) Workforce Element: Cyberspace Effects

A Host Analyst (HA) will have knowledge of various system configurations encountered. This work role also performs analysis using built-in tools and capabilities. A Host Analyst will have knowledge of system services and the security and configuration of them, as well as knowledge of file systems, permissions, and operation system configurations. The Host Analyst conducts analysis using built-in tools and capabilities.

Network Analyst (Additional) ID: 443 (NIST ID: N/A) Workforce Element: Cyberspace Effects

The Network Analyst will understand network traffic signatures and discover anomalies through network traffic and packet capture (PCAP) analysis. The Network Analyst will identify, assess, and mitigate intrusions into networks that are vital to cyberspace operations security. Network Analysts also use GUI or command-line based tools and assist in developing network mapping and signatures. Network Analysts will develop advanced network detection rules and alerts, queries and dashboards to gain a holistic view of the network.