6918
Ability
Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 6918 |
Additional KSAT for the following Work Roles
Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.
Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Responsible for the cybersecurity of a program, organization, system, or enclave.
Manages a portfolio of IT capabilities that align with the overall needs of mission and business enterprise priorities.
Conducts evaluations of an IT program or its individual components, to determine compliance with published standards.
Plans, implements, and operates network services/systems, to include hardware and virtual environments.
Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance needs of privacy and security executives and their teams.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Executes software planning, requirements, risk management, design, development, architecture, modeling, estimation, configuration management, quality, security, and tests using software development methodologies, architectural structures, viewpoints, styles, design decisions, and frameworks across all lifecycle phases.
Installs, configures, troubleshoots, and maintains hardware, software, and administers system accounts.
Responsible for analysis and development of systems/software security through the product lifecycle to include integration, testing, operations and maintenance.
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.