88A
Knowledge
Knowledge of current and emerging cyber technologies.
Core KSAT for the following Work Roles
Develops cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and initiatives.
Additional KSAT for the following Work Roles
Responsible for device, equipment, and system-level cybersecurity configuration and day-to-day security operations of control systems, including security monitoring and maintenance along with stakeholder coordination to ensure the system and its interconnections are secure in support of mission operations.
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.
Develops and conducts training or education of personnel within cyber domain.
Provides legal advice and recommendations on relevant topics related to cyber law.
Develop cyberspace workforce plans, strategies and guidance to support cyberspace workforce manpower, personnel, training and education requirements and to address changes to cyberspace policy, doctrine, materiel, force structure, and education and training requirements.
Responsible for the cybersecurity of a program, organization, system, or enclave.
Work that involves directly managing information technology projects to provide a unique service or product.
Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST 800-37).
Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.