29

29 (NIST ID: K0021)

Knowledge

Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.

Items denoted by a * are CORE KSATs for every Work Role, while other CORE KSATs vary by Work Role.


Core KSAT for the following Work Roles

Database Administrator (Core) ID: 421 (NIST ID: OM-DA-001) Workforce Element: IT (Cyberspace)

Administers databases and/or data management systems that allow for the storage, query, and utilization of data.

Information Systems Security Manager (Core) ID: 722 (NIST ID: OV-MG-001) Workforce Element: Cybersecurity

Responsible for the cybersecurity of a program, organization, system, or enclave.

Additional KSAT for the following Work Roles

Cyber Defense Forensics Analyst (Additional) ID: 212 (NIST ID: IN-FO-002) Workforce Element: Cybersecurity

Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.

Cyber Defense Incident Responder (Additional) ID: 531 (NIST ID: PR-IR-001) Workforce Element: Cybersecurity

Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.

Cyber Defense Infrastructure Support Specialist (Additional) ID: 521 (NIST ID: PR-INF-001) Workforce Element: Cybersecurity

Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.

Forensics Analyst (Additional) ID: 211 (NIST ID: IN-FO-001) Workforce Element: Cyberspace Enablers / Legal/Law Enforcement

Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.

Vulnerability Assessment Analyst (Additional) ID: 541 (NIST ID: PR-VA-001) Workforce Element: Cybersecurity

Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.