Network Analyst

Network Analyst Work Role ID: 443 (NIST: N/A) Workforce Element: Cyberspace Effects

The Network Analyst will understand network traffic signatures and discover anomalies through network traffic and packet capture (PCAP) analysis. The Network Analyst will identify, assess, and mitigate intrusions into networks that are vital to cyberspace operations security. Network Analysts also use GUI or command-line based tools and assist in developing network mapping and signatures. Network Analysts will develop advanced network detection rules and alerts, queries and dashboards to gain a holistic view of the network.


Items denoted by a * are CORE KSATs for every Work Role, while other CORE KSATs vary by Work Role.

Core KSATs

KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs

KSAT ID Description KSAT
12

Knowledge of communication methods, principles, and concepts (e.g., crypto, dual hubs, time multiplexers) that support the network infrastructure.

Knowledge
15

Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.

Knowledge
19

Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities.

Knowledge
27A

Knowledge of cryptology.

Knowledge
29

Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.

Knowledge
38

Knowledge of organization’s enterprise information security architecture system.

Knowledge
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
49

Knowledge of host/network access control mechanisms (e.g., access control list).

Knowledge
53

Knowledge of the Security Assessment and Authorization process.

Knowledge
61

Knowledge of incident response and handling methodologies.

Knowledge
62

Knowledge of industry-standard and organizationally accepted analysis principles and methods.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
70A

Knowledge of cybersecurity methods, such as firewalls, demilitarized zones, and encryption.

Knowledge
70B

Skill in applying cybersecurity methods, such as firewalls, demilitarized zones, and encryption.

Skill
72

Knowledge of local area and wide area networking principles and concepts including bandwidth management.

Knowledge
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
82A

Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs.

Knowledge
87

Knowledge of network traffic analysis methods.

Knowledge
88

Knowledge of new and emerging information technology (IT) and cybersecurity technologies.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
96

Knowledge of performance tuning tools and techniques.

Knowledge
99A

Knowledge of principles and methods for integrating system components.

Knowledge
109

Knowledge of secure configuration management techniques.

Knowledge
110

Knowledge of key concepts in security management (e.g., Release Management, Patch Management).

Knowledge
110A

Knowledge of security management.

Knowledge
132

Knowledge of technology integration processes.

Knowledge
133

Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).

Knowledge
139

Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications.

Knowledge
143A

Knowledge of integrating the organization’s goals and objectives into the architecture.

Knowledge
145

Knowledge of the type and frequency of routine maintenance needed to keep equipment functioning properly.

Knowledge
148

Knowledge of Virtual Private Network (VPN) security.

Knowledge
150

Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities.

Knowledge
154

Skill in analyzing network traffic capacity and performance characteristics.

Skill
155

Skill in applying and incorporating information technologies into proposed solutions.

Skill
167A

Skill in conducting system/server planning, management, and maintenance.

Skill
171A

Skill in correcting physical and technical problems that impact system/server performance.

Skill
177A

Knowledge of countermeasure design for identified security risks.

Knowledge
177

Skill in designing countermeasures to identified security risks.

Skill
183A

Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Knowledge
191

Skill in developing and applying security system access controls.

Skill
193

Skill in developing, testing, and implementing network infrastructure contingency and recovery plans.

Skill
194

Skill in diagnosing connectivity problems.

Skill
197

Skill in discerning the protection needs (i.e., security controls) of information systems and networks.

Skill
198

Skill in establishing a routing schema.

Skill
202A

Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems.

Skill
206A

Skill in installing system and component upgrades.

Skill
207

Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches.

Skill
211A

Skill in monitoring and optimizing system/server performance.

Skill
231

Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol).

Skill
244

Ability to determine the validity of technology trend data.

Ability
270

Knowledge of common adversary tactics, techniques, and procedures in assigned area of responsibility (i.e., historical country-specific tactics, techniques, and procedures; emerging capabilities).

Knowledge
408

Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application.

Task
427

Develop content for cyber defense tools.

Task
461

Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces.

Task
472

Coordinate with enterprise-wide cyber defense staff to validate network alerts.

Task
718

Monitor network capacity and performance.

Task
765

Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.

Task
782

Plan and recommend modifications or adjustments based on exercise results or system environment.

Task
802

Provide feedback on network requirements, including network architecture and infrastructure.

Task
818

Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to higher headquarters.

Task
823

Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.

Task
850

Store, retrieve, and manipulate data for analysis of system capabilities and requirements.

Task
880A

Work with stakeholders to resolve computer security incidents and vulnerability compliance.

Task
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
958

Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity.

Task
959

Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.

Task
971

Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements.

Task
978A

Knowledge of root cause analysis techniques.

Knowledge
986

Knowledge of organizational information technology (IT) user security policies (e.g., account creation, password rules, access control).

Knowledge
993A

Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization’s enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).

Ability
1020A

Skill in secure test plan design (e. g. unit, integration, system, acceptance).

Skill
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
1037A

Knowledge of information technology (IT) risk management policies, requirements, and procedures.

Knowledge
1037B

Knowledge of program protection planning to include information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements.

Knowledge
1038

Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability.

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
1073A

Skill in network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Skill
1074A

Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.

Knowledge
1091

Skill in one way hash functions (e.g., Secure Hash Algorithm [SHA], Message Digest Algorithm [MD5]).

Skill
1107

Identify and analyze anomalies in network traffic using metadata (e.g., CENTAUR).

Task
1109

Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools.

Task
1111

Identify applications and operating systems of a network device based on network traffic.

Task
1113

Identify network mapping and operating system (OS) fingerprinting activities.

Task
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
2062

Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the NE or enclave.

Task
2087

Collaborate with intelligence analysts/targeting organizations involved in related areas.

Task
2102

Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access.

Task
2119

Conduct network scouting and vulnerability analyses of systems within a network.

Task
2124

Conduct open source data collection via various online tools.

Task
2226

Detect exploits against targeted networks and hosts and react accordingly.

Task
2379B

Identify threats to Blue Force vulnerabilities.

Task
2429

Generate requests for information.

Task
2477

Identify potential points of strength and vulnerability within a network.

Task
2603

Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements.

Task
2611

Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan.

Task
3030

Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.

Ability
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3146

Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3201

Knowledge of all relevant reporting and dissemination procedures.

Knowledge
3206

Knowledge of current software and methodologies for active defense and system hardening.

Knowledge
3261

Knowledge of evasion strategies and techniques.

Knowledge
3277

Knowledge of general SCADA system components.

Knowledge
3346

Knowledge of Internet and routing protocols.

Knowledge
3349

Knowledge of intrusion sets.

Knowledge
3353

Knowledge of the Risk Management Framework Assessment Methodology.

Knowledge
3378

Knowledge of methods and techniques used to detect various exploitation activities.

Knowledge
3399

Knowledge of network administration.

Knowledge
3431

Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).

Knowledge
3454

Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, Panda, Kaspersky) and how differences affect exploitation/vulnerabilities.

Knowledge
3479

Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation.

Knowledge
3508

Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network).

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3695

Skill in auditing firewalls, perimeters, routers, and intrusion detection systems.

Skill
3740

Skill in determining installed patches on various operating systems and identifying patch signatures.

Skill
3779

Skill in extracting information from packet captures.

Skill
3801

Skill in identifying the devices that work at each level of protocol models.

Skill
3815

Skill in interpreting vulnerability scanner results to identify vulnerabilities.

Skill
3871

Skill in remote command line and Graphic User Interface (GUI) tool usage.

Skill
3910

Skill in using Boolean operators to construct simple and complex queries.

Skill
3931

Skill in using various open source data collection tools (online trade, DNS, mail, etc.).

Skill
3948

Skill in verifying the integrity of all files.

Skill
4170

Ability to accurately document results

Ability
4171

Ability to analyze a finding of a compromise and develop a custom signature(s) and/or rule(s) to identify it throughout the network

Ability
4173

Ability to analyze Data at Rest and Data in Transit encryption methodologies and assess Data at Rest and Data in Transit polices

Ability
4175

Ability to analyze device/protocol discovery tool output

Ability
4177

Ability to analyze interior and exterior routing protocols (e.g. RIP, EIGRP, OSPF, IS-IS, etc…)

Ability
4178

Ability to analyze mitigations to recover from a full network compromise

Ability
4180

Ability to analyze network infrastructure to identify and recommend key terrain or critical infrastructure.

Ability
4181

Ability to analyze organizational policies and documentation for appropriate use and user privileges as they apply to networking devices.

Ability
4183

Ability to analyze potential adversarial attack vectors on a mission-critical system.

Ability
4193

Ability to assess Data in Transit encryption policies.

Ability
4201

Ability to characterize network traffic for trends and patterns.

Ability
4205

Ability to communicate with Sr Leaders of an Org. to ensure shared responsibility for supporting Org. mission/business functions using external providers of systems, services and apps receives visibility and is elevated to the appropriate decisionmaking authorities.

Ability
4208

Ability to compile access control lists and firewall configurations.

Ability
4212

Ability to Conduct flow data analysis

Ability
4214

Ability to conduct research on vulnerabilites found and correlate current versions to known vulnerable releases

Ability
4217

Ability to configure, forward and statistically analyze logs

Ability
4218

Ability to configure, place, and maintain a distributed sensor grid.

Ability
4220

Ability to construct accurate maps of the network devices

Ability
4221

Ability to construct log aggregation solutions and analysis platforms

Ability
4225

Ability to correlate indicators of compromise

Ability
4226

Ability to create baselines/PPS documents and to compare current state against documentation.

Ability
4230

Ability to create rules/alerts for traffic validation.

Ability
4231

Ability to define caching and analyze the information contained within

Ability
4233

Ability to detect mismatched port-application traffic

Ability
4235

Ability to develop a risk defense plan to put active measure in place in defense of a network

Ability
4237

Ability to develop dashboards to better visualize data

Ability
4241

Ability to dissect and analyze a packet header

Ability
4242

Ability to document findings of any anomalous connections

Ability
4250

Ability to evaluate common Tactics, Techniques and Procedures (TTP) used in malware and open-source and Intelligence Community (IC) resources available to identify emerging TTPs

Ability
4253

Ability to evaluate information (e.g. trust relationships and security policies) from a domain to identify vulnerabilities/misconfiguration

Ability
4254

Ability to evaluate mitigations to recover from a full-network compromise.

Ability
4255

Ability to evaluate network diagram

Ability
4256

Ability to evaluate rogue/unauthorized systems on a network

Ability
4259

Ability to evaluate systems resiliency in adverse conditions

Ability
4267

Ability to identify activity in log entries to correlate indicators of compromise.

Ability
4268

Ability to identify anomalous activity based off of known trends and patterns.

Ability
4270

Ability to identify C2 Beaconing in normal network traffic.

Ability
4272

Ability to identify complex root-cause analysis and recommend mitigations

Ability
4274

Ability to identify Data in Transit encryption methodologies.

Ability
4275

Ability to identify exfiltration of data in normal network traffic

Ability
4277

Ability to identify IPv6 and differentiate between Link Local, Multicast, Unicast, and Anycast.

Ability
4286

Ability to identify wireless encryption and differentiate between WEP, WPA (all versions) and WAPI

Ability
4290

Ability to implement network TAP configuration

Ability
4295

Ability to integrate information security requirements into the acquisition process, using applicable baseline security controls as one of the sources for security requirements, and ensuring a robust software quality control process.

Ability
4301

Ability to measure application whitelisting/blacklisting solutions.

Ability
4303

Ability to measure principle of vulnerability exploitation.

Ability
4304

Ability to measure the effectiveness of white/blacklisting solutions on network devices.

Ability
4307

Ability to monitor network data and perform triage on triggered events.

Ability
4310

Ability to operate the tools to enumerate a system.

Ability
4311

Ability to organize a list of mission infrastructure to identify which dependent systems are key terrain.

Ability
4314

Ability to organize Network System Architecture and the dependencies formed from relationships between systems.

Ability
4321

Ability to perform conversation calculations across Hexadecimal, Octal, Decimal, and binary.

Ability
4322

Ability to perform device discovery.

Ability
4348

Ability to research protocol utilization and determine anomalous use.

Ability
4357

Ability to test tools within sensor grid.

Ability
4364

Ability to use and integrate Security Information and Event Management (SIEM) capabilities in the analysis process.

Ability
4375

Ability to utilize Defense Information Systems Agency (DISA)/ Department of Defense (DoD) system configuration guidelines.

Ability
4392

Knowledge of anomaly-based detection and threat hunting.

Knowledge
4394

Knowledge of attack principles, tools, and techniques.

Knowledge
4396

Knowledge of basic cloud-based technologies and concepts.

Knowledge
4398

Knowledge of basic Cyber Threat Emulation concepts.

Knowledge
4399

Knowledge of basic Embedded Systems concepts.

Knowledge
4427

Knowledge of cybersecurity and cybersecurity-enabled software products.

Knowledge
4440

Knowledge of DOD Component-level cybersecurity architecture.

Knowledge
4442

Knowledge of encryption algorithms and their implementation.

Knowledge
4450

Knowledge of Friendly Network Forces (FNF) reporting procedures (i.e. deconfliction) to include external organization interaction.

Knowledge
4455

Knowledge of hardware components and architecture including functions and limitations.

Knowledge
4456

Knowledge of hashing algorithms.

Knowledge
4457

Knowledge of Hexadecimal, Octal, Decimal, and binary

Knowledge
4467

Knowledge of HTML source code and the intelligence that can be derived from it.

Knowledge
4472

Knowledge of IPv6

Knowledge
4499

Knowledge of Network OSs.

Knowledge
4531

Knowledge of security implications of device and software configurations.

Knowledge
4539

Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model).

Knowledge
4547

Knowledge of TCP flags

Knowledge
4557

Knowledge of the differences between distance vector and link-state routing protocols

Knowledge
4558

Knowledge of the different DNS resource records

Knowledge
4583

Knowledge of the U.S. Security System authorities, responsibilities, and contributions to the cyberspace operations mission.

Knowledge
4591

Knowledge of User Agent Strings and the intelligence that can be derived from them

Knowledge
4603

Skill in analyzing PCAP data

Skill
4614

Skill in conducting system planning, management, and maintenance.

Skill
4623

Skill in discerning the protection requirements (i.e. security controls) of IS and networks.

Skill
4636

Skill in implementing encryption algorithms.

Skill
4637

Skill in intrusion detection methodologies and techniques for detecting host and network-based intrusions for utilizing intrusion detection systems and signature development.

Skill
4642

Skill in network operating system administration.

Skill
4650

Skill in providing an understanding of the adversary through the identification and link analysis of physical, functional, or behavioral relationships within an operational environment.

Skill
4661

Skill in regular expressions

Skill
4671

Skill in understanding cybersecurity architecture, its implementation, and its expected behaviors and how changes in conditions affect outcomes.

Skill
4672

Skill in using Berkeley Packet filters.

Skill
4675

Skill in using network mapping tools to analyze identify and enumerate a network.

Skill
4680

Skill in utilizing a network traffic packet analyzer in order to detect anomalies in protocol utilization.

Skill
6030

Ability to apply an organization’s goals and objectives to develop and maintain architecture.

Ability
6150

Ability to optimize systems to meet enterprise performance requirements.

Ability
6330

Knowledge of multi-level/security cross domain solutions.

Knowledge
6590

Skill in interfacing with customers.

Skill
8000

Adhere to DCO policies and procedures reflecting applicable laws, policies, procedures, and regulations (such as United States Code Titles 10 and 50).

Task
8019

Assess exploited systems’ potential to provide additional access, target development information, intelligence and/or covert infrastructure.

Task
8061

Determine and document software patches or the extent of releases that would harden vulnerable software.

Task
8062

Determine location of tool(s) deployment and utilize them once deployed (e.g., monitor agent, sensor).

Task
8066

Develop and review cyberspace operations TTPs for integration into strategic, operational and tactical levels of planning.

Task
8099

Evaluate security architecture and its design against cyberspace threats as identified in operational and acquisition documents.

Task
8136

Manage threat or target analysis of DCO information and production of threat information for networks and enclave environments.

Task
8161

Provide and maintain documentation for TTPs as inputs to training programs.

Task
8171

Provide input to the analysis, design, development or acquisition of capabilities used for meeting mission objectives.

Task
8179

Read, write, and interpret simple scripts to collect remote data and automation tasks.

Task
8180

Read, write, and interpret simple scripts to parse large data files.

Task
8182

Recommend Patch network vulnerabilities to ensure information is safeguarded against outside parties via Risk Mitigation Plans.

Task