Knowledge of interpreted and compiled computer languages.
Core KSAT for the following Work Roles
Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Examines data from multiple disparate sources with the goal of providing new insight. Designs and implements custom algorithms, flow processes and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.
Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.