Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies.
Core KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
Responsible for the cybersecurity of a program, organization, system, or enclave.
Additional KSAT for the following Work Roles
No Work Roles with Additional KSAT 66