Host Analyst

Host Analyst Work Role ID: 463 (NIST: N/A) Workforce Element: Cyberspace Effects

A Host Analyst (HA) will have knowledge of various system configurations encountered. This work role also performs analysis using built-in tools and capabilities. A Host Analyst will have knowledge of system services and the security and configuration of them, as well as knowledge of file systems, permissions, and operation system configurations. The Host Analyst conducts analysis using built-in tools and capabilities.


Items denoted by a * are CORE KSATs for every Work Role, while other CORE KSATs vary by Work Role.

Core KSATs

KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs

KSAT ID Description KSAT
15

Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.

Knowledge
27A

Knowledge of cryptology.

Knowledge
34

Knowledge of database systems.

Knowledge
43A

Knowledge of embedded systems.

Knowledge
46

Knowledge of fault tolerance.

Knowledge
49

Knowledge of host/network access control mechanisms (e.g., access control list).

Knowledge
51

Knowledge of how system components are installed, integrated, and optimized.

Knowledge
52

Knowledge of human-computer interaction principles.

Knowledge
53

Knowledge of the Security Assessment and Authorization process.

Knowledge
61

Knowledge of incident response and handling methodologies.

Knowledge
62

Knowledge of industry-standard and organizationally accepted analysis principles and methods.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
65A

Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).

Knowledge
66

Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies.

Knowledge
68A

Ability to build architectures and frameworks.

Ability
69

Knowledge of Risk Management Framework (RMF) requirements.

Knowledge
70A

Knowledge of cybersecurity methods, such as firewalls, demilitarized zones, and encryption.

Knowledge
78

Knowledge of microprocessors.

Knowledge
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
82A

Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs.

Knowledge
88

Knowledge of new and emerging information technology (IT) and cybersecurity technologies.

Knowledge
90

Knowledge of operating systems.

Knowledge
92B

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol (TCP), Internet Protocol (IP), Open System Interconnection Model (OSI)).

Knowledge
95A

Knowledge of penetration testing principles, tools, and techniques.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
109

Knowledge of secure configuration management techniques.

Knowledge
109A

Knowledge of configuration management techniques.

Knowledge
110

Knowledge of key concepts in security management (e.g., Release Management, Patch Management).

Knowledge
110A

Knowledge of security management.

Knowledge
111

Knowledge of security system design tools, methods, and techniques.

Knowledge
117

Knowledge of software design tools, methods, and techniques.

Knowledge
124

Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools.

Knowledge
130

Knowledge of systems testing and evaluation methods.

Knowledge
139

Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications.

Knowledge
141A

Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures.

Knowledge
143A

Knowledge of integrating the organization’s goals and objectives into the architecture.

Knowledge
148

Knowledge of Virtual Private Network (VPN) security.

Knowledge
150

Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities.

Knowledge
155

Skill in applying and incorporating information technologies into proposed solutions.

Skill
156

Skill in applying confidentiality, integrity, and availability principles.

Skill
183A

Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Knowledge
202A

Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems.

Skill
205

Skill in implementing, maintaining, and improving established network security practices.

Skill
233

Skill in using protocol analyzers.

Skill
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
270

Knowledge of common adversary tactics, techniques, and procedures in assigned area of responsibility (i.e., historical country-specific tactics, techniques, and procedures; emerging capabilities).

Knowledge
350

Skill in analyzing memory dumps to extract information.

Skill
868

Extract data using data carving techniques (e.g., Forensic Tool Kit [FTK], Foremost).

Task
880A

Work with stakeholders to resolve computer security incidents and vulnerability compliance.

Task
892

Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, anti-virus software, anti-spyware).

Skill
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
915

Knowledge of front-end collection systems, including traffic collection, filtering, and selection.

Knowledge
958

Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity.

Task
959

Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.

Task
972A

Determine and document software patches or the extent of releases that would leave software vulnerable.

Task
973A

Skill in using code analysis tools.

Skill
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
1037B

Knowledge of program protection planning to include information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements.

Knowledge
1038

Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability.

Knowledge
1072A

Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Ability
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
1110

Isolate and remove malware.

Task
1111

Identify applications and operating systems of a network device based on network traffic.

Task
1113

Identify network mapping and operating system (OS) fingerprinting activities.

Task
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
2062

Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the NE or enclave.

Task
2063

Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.

Task
2119

Conduct network scouting and vulnerability analyses of systems within a network.

Task
2205

Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers).

Task
2226

Detect exploits against targeted networks and hosts and react accordingly.

Task
2232

Determine course of action for addressing changes to objectives, guidance, and operational environment.

Task
2353

Edit or execute simple scripts (e.g., PERL, VBS) on Windows and UNIX systems.

Task
2379B

Identify threats to Blue Force vulnerabilities.

Task
2429

Generate requests for information.

Task
2603

Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements.

Task
2611

Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan.

Task
3002

Ability to focus research efforts to meet the customer’s decision-making needs.

Ability
3063

Ability to monitor system operations and react to events in response to triggers and/or observation of trends or unusual activity.

Ability
3130

Knowledge of auditing and logging procedures (including server-based logging).

Knowledge
3140

Knowledge of basic programming concepts (e.g., levels, structures, compiled vs. interpreted languages).

Knowledge
3141

Knowledge of basic software applications (e.g., data storage and backup, database applications) and their vulnerabilities.

Knowledge
3153

Knowledge of circuit analysis.

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3201

Knowledge of all relevant reporting and dissemination procedures.

Knowledge
3206

Knowledge of current software and methodologies for active defense and system hardening.

Knowledge
3222

Knowledge of data backup and restoration concepts.

Knowledge
3253

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Knowledge
3261

Knowledge of evasion strategies and techniques.

Knowledge
3270

Knowledge of forensic implications of operating system structure and operations.

Knowledge
3317

Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP.

Knowledge
3348

Knowledge of intrusion detection systems and signature development.

Knowledge
3353

Knowledge of the Risk Management Framework Assessment Methodology.

Knowledge
3378

Knowledge of methods and techniques used to detect various exploitation activities.

Knowledge
3431

Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).

Knowledge
3454

Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, Panda, Kaspersky) and how differences affect exploitation/vulnerabilities.

Knowledge
3459

Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization.

Knowledge
3479

Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation.

Knowledge
3480

Knowledge of security implications of software configurations.

Knowledge
3508

Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network).

Knowledge
3513

Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems.

Knowledge
3539

Knowledge of telecommunications fundamentals.

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3637

Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).

Knowledge
3642

Knowledge of various types of computer architectures.

Knowledge
3740

Skill in determining installed patches on various operating systems and identifying patch signatures.

Skill
3777

Skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools.

Skill
3801

Skill in identifying the devices that work at each level of protocol models.

Skill
3815

Skill in interpreting vulnerability scanner results to identify vulnerabilities.

Skill
3859

Skill in reading, interpreting, writing, modifying, and executing simple scripts (e.g., PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data).

Skill
3859A

Ability to read, interpret, write, modify, and execute simple scripts (e.g. PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data).

Ability
3871

Skill in remote command line and Graphic User Interface (GUI) tool usage.

Skill
3948

Skill in verifying the integrity of all files.

Skill
4095

Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML).

Knowledge
4171

Ability to analyze a finding of a compromise and develop a custom signature(s) and/or rule(s) to identify it throughout the network

Ability
4172

Ability to analyze adversarial avenues of approach on a mission-critical system

Ability
4174

Ability to analyze Data at Rest and Data in Transit encryption methodologies and assess Data at Rest and Data in Transit policies in support of identifying outliers to delineate possible avenues of approach.

Ability
4176

Ability to analyze how the tools operate to enumerate the system

Ability
4179

Ability to analyze multiple memory captures, determine anomalous behavior and developed a detailed report that includes timeline of compromise

Ability
4182

Ability to analyze organizational policies and documentation for appropriate use and user privileges to determine current user access rights policies

Ability
4184

Ability to analyze potentially malicious processes, libraries and modules on a system

Ability
4185

Ability to analyze process lists within Windows, Unix, or Linux operating systems

Ability
4186

Ability to analyze software installed and in use on a system, and on a host machine and compare it to the authorized software list provided by the network owner

Ability
4187

Ability to analyze tools/hardware used to extract/analyze/capture memory and disk images

Ability
4188

Ability to analyze user-mode/kernel mode rootkits and how they function and differ

Ability
4189

Ability to analyze vulnerabilities and misconfiguration without Information Assurance artifacts.

Ability
4195

Ability to build a baseline of configuration/state for host machines

Ability
4197

Ability to capture a memory image from a host workstation

Ability
4198

Ability to capture forensically sound memory and disk images with regard to timeline analysis

Ability
4206

Ability to compare active user accounts on a network to appropriate Standard Operating Procedure (SOP), gather active user accounts on a network and compare to authorized user list

Ability
4207

Ability to compare current state against baselines

Ability
4209

Ability to compile group policies and access control lists from mission partner networks.

Ability
4210

Ability to compile host-based firewall configurations and host intrusion prevention system through group policy modifications from mission partner networks.

Ability
4211

Ability to conduct disk forensics on multiple images

Ability
4216

Ability to configure log aggregation

Ability
4217

Ability to configure, forward and statistically analyze logs

Ability
4225

Ability to correlate indicators of compromise

Ability
4232

Ability to de-obfuscate (e.g. command line execution, string substitution, clandestine side channel, Base64).

Ability
4234

Ability to develop a risk defense plan (e.g. behavioral development, etc.) and put active measures in place in defense of a network, endpoint, and/or host.

Ability
4237

Ability to develop dashboards to better visualize data

Ability
4238

Ability to develop host-based IDS/IPS signatures and settings

Ability
4239

Ability to develop the reporting and recording of discovered potentially malicious processes, libraries, and modules on a compromised system

Ability
4245

Ability to enumerate domain security groups.

Ability
4246

Ability to enumerate knowledge management applications (e.g. SharePoint) and their service accounts/security groups.

Ability
4247

Ability to enumerate network shares and identify ACLs/security permissions and analyze for vulnerabilities/misconfigurations (e.g. SMB, NFS, ISCSI).

Ability
4250

Ability to evaluate common Tactics, Techniques and Procedures (TTP) used in malware and open-source and Intelligence Community (IC) resources available to identify emerging TTPs

Ability
4251

Ability to evaluate compliance with Security Technical Implementation Guides (STIGs) on host machines by utilizing a compliance scanner in support of identifying outliers in order to delineate possible avenues of approach

Ability
4252

Ability to evaluate if patches are up to date for all hosts, determine current process for updating patches and determine current patch level for all hosts on a network according to NIST Special Publications 800-40 in support of identifying outliers in order to delineate possible avenues of approach.

Ability
4256

Ability to evaluate rogue/unauthorized systems on a network

Ability
4257

Ability to evaluate security posture shortcomings in group policy

Ability
4258

Ability to evaluate steps taken after host-based IDS/IPS alerts, verify the finding and ensure its volatility

Ability
4259

Ability to evaluate systems resiliency in adverse conditions

Ability
4262

Ability to export/enumerate information (e.g., users, groups) from a Domain Controller.

Ability
4266

Ability to identify activity context in log entries to correlate indicators of compromise.

Ability
4269

Ability to identify anomalous network traffic on a host machine.

Ability
4273

Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.

Ability
4281

Ability to identify new indicators of compromise through anomalous behavior in log entries.

Ability
4283

Ability to identify security posture shortcomings

Ability
4284

Ability to identify tools and techniques available for analyzing binary applications and interpreted scripts.

Ability
4287

Ability to identify/select the most appropriate tools and solutions for the specific environment (e.g. disk/memory forensics/capture, host enumeration, application whitelisting, log aggregation and analysis, HIPS/HIDS solutions, etc.).

Ability
4288

Ability to implement and configure host-based firewalls and host intrusion prevention systems

Ability
4289

Ability to implement Data at Rest and Data in Transit encryption methodologies, Assess Data at Rest and Data in Transit polices.

Ability
4302

Ability to measure known vulnerabilities against known vectors of approach.

Ability
4306

Ability to monitor Active Directory (AD) for creation of unauthorized/potentially malicious accounts.

Ability
4309

Ability to operate specified tools to enumerate a system.

Ability
4312

Ability to organize Active Directories (AD) hierarchy structure.

Ability
4313

Ability to organize logging and auditing procedures including server-based logging.

Ability
4315

Ability to organize order of the volatility when capturing artifacts.

Ability
4318

Ability to perform and analyze situational awareness commands within Windows, Unix, and Linux operating systems (e.g. system info, net stat, ipconfig, task list, ls, ifconfig, etc…)

Ability
4319

Ability to perform and analyze vulnerability scans on host machines in support of identifying outliers in order to delineate possible avenues of approach.

Ability
4320

Ability to perform complex root-cause analysis and recommend mitigations to determine root cause of an intrusion.

Ability
4323

Ability to perform dynamic analysis.

Ability
4326

Ability to perform static analysis.

Ability
4331

Ability to prioritize how Operating System (OS) and application patches are distributed in different systems.

Ability
4332

Ability to prioritize Operating Systems (OS) default processes, library, and modules based on boot order, dependencies, or key operations.

Ability
4337

Ability to provide host analysis for Risk Mitigation Plan (RMP) to improve customer security overall posture.

Ability
4339

Ability to provide mitigations to recover from a full network compromise.

Ability
4351

Ability to select the best tools to enumerate a given set of host machines in order to validate whether they match known baselines.

Ability
4363

Ability to use and integrate a Security Information and Event Management (SIEM) platform.

Ability
4371

Ability to use host volatile data to compare active processes, libraries and modules against databases of known good/bad.

Ability
4375

Ability to utilize Defense Information Systems Agency (DISA)/ Department of Defense (DoD) system configuration guidelines.

Ability
4390

Knowledge of active directory federated services.

Knowledge
4413

Knowledge of common information network malware (e.g., viruses, trojans, etc.) and vectors of attack (e.g., ports, attachments, etc.).

Knowledge
4415

Knowledge of common obfuscation techniques (e.g. command line execution, string substitution, clandestine side channel, Base64).

Knowledge
4416

Knowledge of common persistence locations within Windows, Unix, or Linux operating systems.

Knowledge
4427

Knowledge of cybersecurity and cybersecurity-enabled software products.

Knowledge
4429

Knowledge of cybersecurity controls and design principles and methods (e.g., firewalls, DMZ, and encryption).

Knowledge
4430

Knowledge of cybersecurity Risk Management Framework (RMF) process.

Knowledge
4434

Knowledge of DCO capabilities, including open-source tools, and their capabilities.

Knowledge
4435

Knowledge of Defense-In-Depth principles.

Knowledge
4438

Knowledge of different types of log subscriptions (e.g. push vs pull, MS Windows event forwarding, winlogbeat, syslog).

Knowledge
4443

Knowledge of evasion strategies and TTPs (e.g., noise, stealth, situational awareness, bandwidth throttling).

Knowledge
4445

Knowledge of existing cybersecurity principles, policies, and procedures

Knowledge
4452

Knowledge of full-spectrum of cyberspace operations in an intelligence-driven DCO environment.

Knowledge
4501

Knowledge of non-Active Directory domains (e.g. IDM, LDAP).

Knowledge
4522

Knowledge of public key infrastructure (PKI) libraries, certificate authorities, certificate management, and encryption functionalities.

Knowledge
4537

Knowledge of stream providers (e.g. KAFKA).

Knowledge
4539

Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model).

Knowledge
4583

Knowledge of the U.S. Security System authorities, responsibilities, and contributions to the cyberspace operations mission.

Knowledge
4585

Knowledge of the Windows registry hive keys and the information contained within each one.

Knowledge
4589

Knowledge of typical system processes within Windows, Unix, or Linux operating systems

Knowledge
4595

Knowledge of web applications and their common attack vectors.

Knowledge
4599

Skill in analyzing endpoint collection data.

Skill
4655

Skill in providing support to intelligence analysts to understand the operational environment and how it ties to intelligence reporting.

Skill
4660

Skill in refining research (e.g., vulnerabilities, TTPs) to assist intelligence analysts’ preparation of products.

Skill
4665

Skill in run level configurations in a Linux or UNIX environment

Skill
4679

Skill in using various online tools for open-source research (e.g., online trade, DNS, mail, etc.).

Skill
6240

Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE).

Knowledge
6330

Knowledge of multi-level/security cross domain solutions.

Knowledge
6820

Knowledge of network architecture concepts including topology, protocols, and components.

Knowledge
8036

Conduct open source research via various online tools.

Task
8041

Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces.

Task
8111

Identify potential points of strength and vulnerability among segments of a network map.

Task
8115

Identify tools/hardware used to extract/analyze/capture memory and disk images.

Task
8151

Perform security reviews and identify gaps in security architecture that can be used in the development of a security risk management plan.

Task
8161

Provide and maintain documentation for TTPs as inputs to training programs.

Task
8212

Validate intrusion detection system (IDS) alerts.

Task