Network Analyst
The Network Analyst will understand network traffic signatures and discover anomalies through network traffic and packet capture (PCAP) analysis. The Network Analyst will identify, assess, and mitigate intrusions into networks that are vital to cyberspace operations security. Network Analysts also use GUI or command-line based tools and assist in developing network mapping and signatures. Network Analysts will develop advanced network detection rules and alerts, queries and dashboards to gain a holistic view of the network.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
4170 | Ability to accurately document results |
Ability |
4171 | Ability to analyze a finding of a compromise and develop a custom signature(s) and/or rule(s) to identify it throughout the network |
Ability |
4173 | Ability to analyze Data at Rest and Data in Transit encryption methodologies and assess Data at Rest and Data in Transit polices |
Ability |
4175 | Ability to analyze device/protocol discovery tool output |
Ability |
4177 | Ability to analyze interior and exterior routing protocols (e.g. RIP, EIGRP, OSPF, IS-IS, etc…) |
Ability |
4178 | Ability to analyze mitigations to recover from a full network compromise |
Ability |
4180 | Ability to analyze network infrastructure to identify and recommend key terrain or critical infrastructure. |
Ability |
4181 | Ability to analyze organizational policies and documentation for appropriate use and user privileges as they apply to networking devices. |
Ability |
4183 | Ability to analyze potential adversarial attack vectors on a mission-critical system. |
Ability |
4193 | Ability to assess Data in Transit encryption policies. |
Ability |
4201 | Ability to characterize network traffic for trends and patterns. |
Ability |
4205 | Ability to communicate with Sr Leaders of an Org. to ensure shared responsibility for supporting Org. mission/business functions using external providers of systems, services and apps receives visibility and is elevated to the appropriate decisionmaking authorities. |
Ability |
4208 | Ability to compile access control lists and firewall configurations. |
Ability |
4212 | Ability to Conduct flow data analysis |
Ability |
4214 | Ability to conduct research on vulnerabilites found and correlate current versions to known vulnerable releases |
Ability |
4217 | Ability to configure, forward and statistically analyze logs |
Ability |
4218 | Ability to configure, place, and maintain a distributed sensor grid. |
Ability |
4220 | Ability to construct accurate maps of the network devices |
Ability |
4221 | Ability to construct log aggregation solutions and analysis platforms |
Ability |
4225 | Ability to correlate indicators of compromise |
Ability |
4226 | Ability to create baselines/PPS documents and to compare current state against documentation. |
Ability |
4230 | Ability to create rules/alerts for traffic validation. |
Ability |
4231 | Ability to define caching and analyze the information contained within |
Ability |
4233 | Ability to detect mismatched port-application traffic |
Ability |
4235 | Ability to develop a risk defense plan to put active measure in place in defense of a network |
Ability |
4237 | Ability to develop dashboards to better visualize data |
Ability |
4241 | Ability to dissect and analyze a packet header |
Ability |
4242 | Ability to document findings of any anomalous connections |
Ability |
4250 | Ability to evaluate common Tactics, Techniques and Procedures (TTP) used in malware and open-source and Intelligence Community (IC) resources available to identify emerging TTPs |
Ability |
4253 | Ability to evaluate information (e.g. trust relationships and security policies) from a domain to identify vulnerabilities/misconfiguration |
Ability |
4254 | Ability to evaluate mitigations to recover from a full-network compromise. |
Ability |
4255 | Ability to evaluate network diagram |
Ability |
4256 | Ability to evaluate rogue/unauthorized systems on a network |
Ability |
4259 | Ability to evaluate systems resiliency in adverse conditions |
Ability |
4267 | Ability to identify activity in log entries to correlate indicators of compromise. |
Ability |
4268 | Ability to identify anomalous activity based off of known trends and patterns. |
Ability |
4270 | Ability to identify C2 Beaconing in normal network traffic. |
Ability |
4272 | Ability to identify complex root-cause analysis and recommend mitigations |
Ability |
4274 | Ability to identify Data in Transit encryption methodologies. |
Ability |
4275 | Ability to identify exfiltration of data in normal network traffic |
Ability |
4277 | Ability to identify IPv6 and differentiate between Link Local, Multicast, Unicast, and Anycast. |
Ability |
4286 | Ability to identify wireless encryption and differentiate between WEP, WPA (all versions) and WAPI |
Ability |
4290 | Ability to implement network TAP configuration |
Ability |
4295 | Ability to integrate information security requirements into the acquisition process, using applicable baseline security controls as one of the sources for security requirements, and ensuring a robust software quality control process. |
Ability |
4301 | Ability to measure application whitelisting/blacklisting solutions. |
Ability |
4303 | Ability to measure principle of vulnerability exploitation. |
Ability |
4304 | Ability to measure the effectiveness of white/blacklisting solutions on network devices. |
Ability |
4307 | Ability to monitor network data and perform triage on triggered events. |
Ability |
4310 | Ability to operate the tools to enumerate a system. |
Ability |
4311 | Ability to organize a list of mission infrastructure to identify which dependent systems are key terrain. |
Ability |
4314 | Ability to organize Network System Architecture and the dependencies formed from relationships between systems. |
Ability |
4321 | Ability to perform conversation calculations across Hexadecimal, Octal, Decimal, and binary. |
Ability |
4322 | Ability to perform device discovery. |
Ability |
4348 | Ability to research protocol utilization and determine anomalous use. |
Ability |
4357 | Ability to test tools within sensor grid. |
Ability |
4364 | Ability to use and integrate Security Information and Event Management (SIEM) capabilities in the analysis process. |
Ability |
4375 | Ability to utilize Defense Information Systems Agency (DISA)/ Department of Defense (DoD) system configuration guidelines. |
Ability |
4392 | Knowledge of anomaly-based detection and threat hunting. |
Knowledge |
4394 | Knowledge of attack principles, tools, and techniques. |
Knowledge |
4396 | Knowledge of basic cloud-based technologies and concepts. |
Knowledge |
4398 | Knowledge of basic Cyber Threat Emulation concepts. |
Knowledge |
4399 | Knowledge of basic Embedded Systems concepts. |
Knowledge |
4427 | Knowledge of cybersecurity and cybersecurity-enabled software products. |
Knowledge |
4440 | Knowledge of DOD Component-level cybersecurity architecture. |
Knowledge |
4442 | Knowledge of encryption algorithms and their implementation. |
Knowledge |
4450 | Knowledge of Friendly Network Forces (FNF) reporting procedures (i.e. deconfliction) to include external organization interaction. |
Knowledge |
4455 | Knowledge of hardware components and architecture including functions and limitations. |
Knowledge |
4456 | Knowledge of hashing algorithms. |
Knowledge |
4457 | Knowledge of Hexadecimal, Octal, Decimal, and binary |
Knowledge |
4467 | Knowledge of HTML source code and the intelligence that can be derived from it. |
Knowledge |
4472 | Knowledge of IPv6 |
Knowledge |
4499 | Knowledge of Network OSs. |
Knowledge |
4531 | Knowledge of security implications of device and software configurations. |
Knowledge |
4539 | Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model). |
Knowledge |
4547 | Knowledge of TCP flags |
Knowledge |
4557 | Knowledge of the differences between distance vector and link-state routing protocols |
Knowledge |
4558 | Knowledge of the different DNS resource records |
Knowledge |
4583 | Knowledge of the U.S. Security System authorities, responsibilities, and contributions to the cyberspace operations mission. |
Knowledge |
4591 | Knowledge of User Agent Strings and the intelligence that can be derived from them |
Knowledge |
4603 | Skill in analyzing PCAP data |
Skill |
4614 | Skill in conducting system planning, management, and maintenance. |
Skill |
4623 | Skill in discerning the protection requirements (i.e. security controls) of IS and networks. |
Skill |
4636 | Skill in implementing encryption algorithms. |
Skill |
4637 | Skill in intrusion detection methodologies and techniques for detecting host and network-based intrusions for utilizing intrusion detection systems and signature development. |
Skill |
4642 | Skill in network operating system administration. |
Skill |
4650 | Skill in providing an understanding of the adversary through the identification and link analysis of physical, functional, or behavioral relationships within an operational environment. |
Skill |
4661 | Skill in regular expressions |
Skill |
4671 | Skill in understanding cybersecurity architecture, its implementation, and its expected behaviors and how changes in conditions affect outcomes. |
Skill |
4672 | Skill in using Berkeley Packet filters. |
Skill |
4675 | Skill in using network mapping tools to analyze identify and enumerate a network. |
Skill |
4680 | Skill in utilizing a network traffic packet analyzer in order to detect anomalies in protocol utilization. |
Skill |
8000 | Adhere to DCO policies and procedures reflecting applicable laws, policies, procedures, and regulations (such as United States Code Titles 10 and 50). |
Task |
8019 | Assess exploited systems’ potential to provide additional access, target development information, intelligence and/or covert infrastructure. |
Task |
8061 | Determine and document software patches or the extent of releases that would harden vulnerable software. |
Task |
8062 | Determine location of tool(s) deployment and utilize them once deployed (e.g., monitor agent, sensor). |
Task |
8066 | Develop and review cyberspace operations TTPs for integration into strategic, operational and tactical levels of planning. |
Task |
8099 | Evaluate security architecture and its design against cyberspace threats as identified in operational and acquisition documents. |
Task |
8136 | Manage threat or target analysis of DCO information and production of threat information for networks and enclave environments. |
Task |
8161 | Provide and maintain documentation for TTPs as inputs to training programs. |
Task |
8171 | Provide input to the analysis, design, development or acquisition of capabilities used for meeting mission objectives. |
Task |
8179 | Read, write, and interpret simple scripts to collect remote data and automation tasks. |
Task |
8180 | Read, write, and interpret simple scripts to parse large data files. |
Task |
8182 | Recommend Patch network vulnerabilities to ensure information is safeguarded against outside parties via Risk Mitigation Plans. |
Task |