25
Knowledge
Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]).
Core KSAT for the following Work Roles
Manages the Communications Security (COMSEC) resources of an organization (CNSSI No. 4009).
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Responsible for analysis and development of systems/software security through the product lifecycle to include integration, testing, operations and maintenance.
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
Responsible for the cybersecurity of a program, organization, system, or enclave.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.