Knowledge of interpreted and compiled computer languages.
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 904
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Plans, prepares, and performs testing, evaluation, verification, and validation of software to evaluate results against specifications, requirements, and operational need.
Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.