Ability to determine the best cloud deployment model for the appropriate operating environment.
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 6919
Additional KSAT for the following Work Roles
Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.
Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.
Develops and conducts training or education of personnel within cyber domain.
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Manages a portfolio of IT capabilities that align with the overall needs of mission and business enterprise priorities.
Conducts evaluations of an IT program or its individual components, to determine compliance with published standards.
Plans, implements, and operates network services/systems, to include hardware and virtual environments.
Conducts software and systems engineering and software systems research in order to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Executes software planning, requirements, risk management, design, development, architecture, modeling, estimation, configuration management, quality, security, and tests using software development methodologies, architectural structures, viewpoints, styles, design decisions, and frameworks across all lifecycle phases.
Installs, configures, troubleshoots, and maintains hardware, software, and administers system accounts.