602
Task
Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 602 |
Additional KSAT for the following Work Roles
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Executes software planning, requirements, risk management, design, development, architecture, modeling, estimation, configuration management, quality, security, and tests using software development methodologies, architectural structures, viewpoints, styles, design decisions, and frameworks across all lifecycle phases.
Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.
Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.
Responsible for analysis and development of systems/software security through the product lifecycle to include integration, testing, operations and maintenance.