3030
Ability
Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 3030 |
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.