79
Knowledge
Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).
Core KSAT for the following Work Roles
Responsible for device, equipment, and system-level cybersecurity configuration and day-to-day security operations of control systems, including security monitoring and maintenance along with stakeholder coordination to ensure the system and its interconnections are secure in support of mission operations.
Holds responsibility for developing, promoting, and overseeing implementation of data as an asset and the establishment and enforcement of data-related strategies, policies, standards, processes, and governance.
Administers databases and/or data management systems that allow for the storage, query, and utilization of data.
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Responsible for analysis and development of systems/software security through the product lifecycle to include integration, testing, operations and maintenance.
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Designs a system’s data models, data flow, interfaces, and infrastructure to meet the information requirements of a business or mission.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Installs, configures, troubleshoots, and maintains hardware, software, and administers system accounts.
Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.
Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.