3
Skill
Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
Core KSAT for the following Work Roles
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
Additional KSAT for the following Work Roles
Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST 800-37).
Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.