90
Knowledge
Knowledge of operating systems.
Core KSAT for the following Work Roles
Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
Examines data from multiple disparate sources with the goal of providing new insight. Designs and implements custom algorithms, flow processes and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
Administers databases and/or data management systems that allow for the storage, query, and utilization of data.
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.
Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.
Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.