29
Knowledge
Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.
Core KSAT for the following Work Roles
Administers databases and/or data management systems that allow for the storage, query, and utilization of data.
Responsible for the cybersecurity of a program, organization, system, or enclave.
Additional KSAT for the following Work Roles
Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.
Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.