Knowledge of relevant laws, legal authorities, restrictions, and regulations pertaining to cyber defense activities.
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 3461
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.