Network Analyst

Network Analyst Work Role ID: 443 (NIST: N/A) Workforce Element: Cyberspace Effects

The Network Analyst will understand network traffic signatures and discover anomalies through network traffic and packet capture (PCAP) analysis. The Network Analyst will identify, assess, and mitigate intrusions into networks that are vital to cyberspace operations security. Network Analysts also use GUI or command-line based tools and assist in developing network mapping and signatures. Network Analysts will develop advanced network detection rules and alerts, queries and dashboards to gain a holistic view of the network.


Items denoted by a * are CORE KSATs for every Work Role, while other CORE KSATs vary by Work Role.

Core KSATs

KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs

KSAT ID Description KSAT
4170

Ability to accurately document results

Ability
4171

Ability to analyze a finding of a compromise and develop a custom signature(s) and/or rule(s) to identify it throughout the network

Ability
4173

Ability to analyze Data at Rest and Data in Transit encryption methodologies and assess Data at Rest and Data in Transit polices

Ability
4175

Ability to analyze device/protocol discovery tool output

Ability
4177

Ability to analyze interior and exterior routing protocols (e.g. RIP, EIGRP, OSPF, IS-IS, etc…)

Ability
4178

Ability to analyze mitigations to recover from a full network compromise

Ability
4180

Ability to analyze network infrastructure to identify and recommend key terrain or critical infrastructure.

Ability
4181

Ability to analyze organizational policies and documentation for appropriate use and user privileges as they apply to networking devices.

Ability
4183

Ability to analyze potential adversarial attack vectors on a mission-critical system.

Ability
4193

Ability to assess Data in Transit encryption policies.

Ability
4201

Ability to characterize network traffic for trends and patterns.

Ability
4205

Ability to communicate with Sr Leaders of an Org. to ensure shared responsibility for supporting Org. mission/business functions using external providers of systems, services and apps receives visibility and is elevated to the appropriate decisionmaking authorities.

Ability
4208

Ability to compile access control lists and firewall configurations.

Ability
4212

Ability to Conduct flow data analysis

Ability
4214

Ability to conduct research on vulnerabilites found and correlate current versions to known vulnerable releases

Ability
4217

Ability to configure, forward and statistically analyze logs

Ability
4218

Ability to configure, place, and maintain a distributed sensor grid.

Ability
4220

Ability to construct accurate maps of the network devices

Ability
4221

Ability to construct log aggregation solutions and analysis platforms

Ability
4225

Ability to correlate indicators of compromise

Ability
4226

Ability to create baselines/PPS documents and to compare current state against documentation.

Ability
4230

Ability to create rules/alerts for traffic validation.

Ability
4231

Ability to define caching and analyze the information contained within

Ability
4233

Ability to detect mismatched port-application traffic

Ability
4235

Ability to develop a risk defense plan to put active measure in place in defense of a network

Ability
4237

Ability to develop dashboards to better visualize data

Ability
4241

Ability to dissect and analyze a packet header

Ability
4242

Ability to document findings of any anomalous connections

Ability
4250

Ability to evaluate common Tactics, Techniques and Procedures (TTP) used in malware and open-source and Intelligence Community (IC) resources available to identify emerging TTPs

Ability
4253

Ability to evaluate information (e.g. trust relationships and security policies) from a domain to identify vulnerabilities/misconfiguration

Ability
4254

Ability to evaluate mitigations to recover from a full-network compromise.

Ability
4255

Ability to evaluate network diagram

Ability
4256

Ability to evaluate rogue/unauthorized systems on a network

Ability
4259

Ability to evaluate systems resiliency in adverse conditions

Ability
4267

Ability to identify activity in log entries to correlate indicators of compromise.

Ability
4268

Ability to identify anomalous activity based off of known trends and patterns.

Ability
4270

Ability to identify C2 Beaconing in normal network traffic.

Ability
4272

Ability to identify complex root-cause analysis and recommend mitigations

Ability
4274

Ability to identify Data in Transit encryption methodologies.

Ability
4275

Ability to identify exfiltration of data in normal network traffic

Ability
4277

Ability to identify IPv6 and differentiate between Link Local, Multicast, Unicast, and Anycast.

Ability
4286

Ability to identify wireless encryption and differentiate between WEP, WPA (all versions) and WAPI

Ability
4290

Ability to implement network TAP configuration

Ability
4295

Ability to integrate information security requirements into the acquisition process, using applicable baseline security controls as one of the sources for security requirements, and ensuring a robust software quality control process.

Ability
4301

Ability to measure application whitelisting/blacklisting solutions.

Ability
4303

Ability to measure principle of vulnerability exploitation.

Ability
4304

Ability to measure the effectiveness of white/blacklisting solutions on network devices.

Ability
4307

Ability to monitor network data and perform triage on triggered events.

Ability
4310

Ability to operate the tools to enumerate a system.

Ability
4311

Ability to organize a list of mission infrastructure to identify which dependent systems are key terrain.

Ability
4314

Ability to organize Network System Architecture and the dependencies formed from relationships between systems.

Ability
4321

Ability to perform conversation calculations across Hexadecimal, Octal, Decimal, and binary.

Ability
4322

Ability to perform device discovery.

Ability
4348

Ability to research protocol utilization and determine anomalous use.

Ability
4357

Ability to test tools within sensor grid.

Ability
4364

Ability to use and integrate Security Information and Event Management (SIEM) capabilities in the analysis process.

Ability
4375

Ability to utilize Defense Information Systems Agency (DISA)/ Department of Defense (DoD) system configuration guidelines.

Ability
4392

Knowledge of anomaly-based detection and threat hunting.

Knowledge
4394

Knowledge of attack principles, tools, and techniques.

Knowledge
4396

Knowledge of basic cloud-based technologies and concepts.

Knowledge
4398

Knowledge of basic Cyber Threat Emulation concepts.

Knowledge
4399

Knowledge of basic Embedded Systems concepts.

Knowledge
4427

Knowledge of cybersecurity and cybersecurity-enabled software products.

Knowledge
4440

Knowledge of DOD Component-level cybersecurity architecture.

Knowledge
4442

Knowledge of encryption algorithms and their implementation.

Knowledge
4450

Knowledge of Friendly Network Forces (FNF) reporting procedures (i.e. deconfliction) to include external organization interaction.

Knowledge
4455

Knowledge of hardware components and architecture including functions and limitations.

Knowledge
4456

Knowledge of hashing algorithms.

Knowledge
4457

Knowledge of Hexadecimal, Octal, Decimal, and binary

Knowledge
4467

Knowledge of HTML source code and the intelligence that can be derived from it.

Knowledge
4472

Knowledge of IPv6

Knowledge
4499

Knowledge of Network OSs.

Knowledge
4531

Knowledge of security implications of device and software configurations.

Knowledge
4539

Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model).

Knowledge
4547

Knowledge of TCP flags

Knowledge
4557

Knowledge of the differences between distance vector and link-state routing protocols

Knowledge
4558

Knowledge of the different DNS resource records

Knowledge
4583

Knowledge of the U.S. Security System authorities, responsibilities, and contributions to the cyberspace operations mission.

Knowledge
4591

Knowledge of User Agent Strings and the intelligence that can be derived from them

Knowledge
4603

Skill in analyzing PCAP data

Skill
4614

Skill in conducting system planning, management, and maintenance.

Skill
4623

Skill in discerning the protection requirements (i.e. security controls) of IS and networks.

Skill
4636

Skill in implementing encryption algorithms.

Skill
4637

Skill in intrusion detection methodologies and techniques for detecting host and network-based intrusions for utilizing intrusion detection systems and signature development.

Skill
4642

Skill in network operating system administration.

Skill
4650

Skill in providing an understanding of the adversary through the identification and link analysis of physical, functional, or behavioral relationships within an operational environment.

Skill
4661

Skill in regular expressions

Skill
4671

Skill in understanding cybersecurity architecture, its implementation, and its expected behaviors and how changes in conditions affect outcomes.

Skill
4672

Skill in using Berkeley Packet filters.

Skill
4675

Skill in using network mapping tools to analyze identify and enumerate a network.

Skill
4680

Skill in utilizing a network traffic packet analyzer in order to detect anomalies in protocol utilization.

Skill
8000

Adhere to DCO policies and procedures reflecting applicable laws, policies, procedures, and regulations (such as United States Code Titles 10 and 50).

Task
8019

Assess exploited systems’ potential to provide additional access, target development information, intelligence and/or covert infrastructure.

Task
8061

Determine and document software patches or the extent of releases that would harden vulnerable software.

Task
8062

Determine location of tool(s) deployment and utilize them once deployed (e.g., monitor agent, sensor).

Task
8066

Develop and review cyberspace operations TTPs for integration into strategic, operational and tactical levels of planning.

Task
8099

Evaluate security architecture and its design against cyberspace threats as identified in operational and acquisition documents.

Task
8136

Manage threat or target analysis of DCO information and production of threat information for networks and enclave environments.

Task
8161

Provide and maintain documentation for TTPs as inputs to training programs.

Task
8171

Provide input to the analysis, design, development or acquisition of capabilities used for meeting mission objectives.

Task
8179

Read, write, and interpret simple scripts to collect remote data and automation tasks.

Task
8180

Read, write, and interpret simple scripts to parse large data files.

Task
8182

Recommend Patch network vulnerabilities to ensure information is safeguarded against outside parties via Risk Mitigation Plans.

Task