286
Knowledge
Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip).
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 286 |
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Cyberspace Operators use a wide range of software applications for network navigation, tactical forensic analysis, surveillance and reconnaissance, and executing on-net operations in support of offensive cyberspace operations when directed.