Knowledge of policy-based and risk adaptive access controls.
Core KSAT for the following Work Roles
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Examines data from multiple disparate sources with the goal of providing new insight. Designs and implements custom algorithms, flow processes and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
Administers databases and/or data management systems that allow for the storage, query, and utilization of data.
Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.