Network Technician
The Network Technician provides enterprise and tactical infrastructure knowledge, experience, and integration to the Cyber Protection Team (CPT). The Network Technician supports CPT elements by understanding of network technologies, defining mission scope, and identifying terrain.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
12 | Knowledge of communication methods, principles, and concepts (e.g., crypto, dual hubs, time multiplexers) that support the network infrastructure. |
Knowledge |
15 | Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware. |
Knowledge |
41A | Ability to operate the organization’s LAN/WAN pathways. |
Ability |
51 | Knowledge of how system components are installed, integrated, and optimized. |
Knowledge |
68A | Ability to build architectures and frameworks. |
Ability |
70 | Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
Knowledge |
72 | Knowledge of local area and wide area networking principles and concepts including bandwidth management. |
Knowledge |
76 | Knowledge of measures or indicators of system performance and availability. |
Knowledge |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
90 | Knowledge of operating systems. |
Knowledge |
96 | Knowledge of performance tuning tools and techniques. |
Knowledge |
106 | Knowledge of remote access technology concepts. |
Knowledge |
112A | Knowledge of systems engineering theories, concepts, and methods. |
Knowledge |
113 | Knowledge of server and client operating systems. |
Knowledge |
114A | Knowledge of system/server diagnostic tools and fault identification techniques. |
Knowledge |
127 | Knowledge of systems administration concepts. |
Knowledge |
141 | Knowledge of the enterprise information technology (IT) architecture. |
Knowledge |
141A | Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures. |
Knowledge |
145 | Knowledge of the type and frequency of routine maintenance needed to keep equipment functioning properly. |
Knowledge |
148 | Knowledge of Virtual Private Network (VPN) security. |
Knowledge |
154 | Skill in analyzing network traffic capacity and performance characteristics. |
Skill |
167A | Skill in conducting system/server planning, management, and maintenance. |
Skill |
170 | Skill in configuring and optimizing software. |
Skill |
171A | Skill in correcting physical and technical problems that impact system/server performance. |
Skill |
180 | Skill in designing the integration of hardware and software solutions. |
Skill |
183 | Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
Skill |
191 | Skill in developing and applying security system access controls. |
Skill |
193 | Skill in developing, testing, and implementing network infrastructure contingency and recovery plans. |
Skill |
194 | Skill in diagnosing connectivity problems. |
Skill |
195A | Skill in troubleshooting failed system components (i.e., servers) |
Skill |
202A | Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems. |
Skill |
206A | Skill in installing system and component upgrades. |
Skill |
207 | Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches. |
Skill |
209 | Skill in maintaining directory services. |
Skill |
211A | Skill in monitoring and optimizing system/server performance. |
Skill |
212A | Knowledge of network mapping and recreating network topologies. |
Knowledge |
216A | Skill in recovering failed systems/servers. |
Skill |
219A | Skill in operating system administration. |
Skill |
231 | Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol). |
Skill |
278 | Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN). |
Knowledge |
287 | Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). |
Knowledge |
342A | Knowledge of operating system command line/prompt. |
Knowledge |
344 | Knowledge of virtualization technologies and virtual machine development and maintenance. |
Knowledge |
433 | Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. |
Task |
434A | Check system hardware availability, functionality, integrity, and efficiency. |
Task |
452 | Conduct functional and connectivity testing to ensure continuing operability. |
Task |
456A | Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing. |
Task |
461 | Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces. |
Task |
462 | Configure and optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling). |
Task |
467 | Consult with engineering staff to evaluate interface between hardware and software. |
Task |
499 | Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs. |
Task |
518 | Develop and document systems administration standard operating procedures. |
Task |
518A | Comply with organization systems administration standard operating procedures. |
Task |
602 | Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration. |
Task |
667 | Install or replace network hubs, routers, and switches. |
Task |
683 | Maintain baseline system security according to organizational policies. |
Task |
695 | Manage accounts, network rights, and access to systems and equipment. |
Task |
701A | Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. |
Task |
728A | Oversee installation, implementation, configuration, and support of system components. |
Task |
736 | Patch network vulnerabilities to ensure information is safeguarded against outside parties. |
Task |
763A | Diagnose faulty system/server hardware. |
Task |
763B | Perform repairs on faulty system/server hardware. |
Task |
765 | Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. |
Task |
781 | Plan, execute, and verify data redundancy and system recovery procedures. |
Task |
782 | Plan and recommend modifications or adjustments based on exercise results or system environment. |
Task |
802 | Provide feedback on network requirements, including network architecture and infrastructure. |
Task |
811 | Provide ongoing optimization and problem solving support. |
Task |
835A | Troubleshoot hardware/software interface and interoperability problems. |
Task |
902 | Knowledge of the range of existing networks (e.g., PBX, LANs, WANs, WIFI, SCADA). |
Knowledge |
986 | Knowledge of organizational information technology (IT) user security policies (e.g., account creation, password rules, access control). |
Knowledge |
990 | Knowledge of the common attack vectors on the network layer. |
Knowledge |
991 | Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution). |
Knowledge |
1033 | Knowledge of basic system administration, network, and operating system hardening techniques. |
Knowledge |
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1063A | Knowledge of operating system structures and internals (e.g., process management, directory structure, installed applications). |
Knowledge |
1072A | Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Ability |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1104 | Examine network topologies to understand data flows through the network. |
Task |
1109 | Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools. |
Task |
1153A | Install, update, and troubleshoot systems/servers. |
Task |
2062 | Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the NE or enclave. |
Task |
2102 | Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access. |
Task |
2119 | Conduct network scouting and vulnerability analyses of systems within a network. |
Task |
2232 | Determine course of action for addressing changes to objectives, guidance, and operational environment. |
Task |
2379B | Identify threats to Blue Force vulnerabilities. |
Task |
2477 | Identify potential points of strength and vulnerability within a network. |
Task |
2611 | Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan. |
Task |
3063 | Ability to monitor system operations and react to events in response to triggers and/or observation of trends or unusual activity. |
Ability |
3076 | Ability to tailor technical and planning information to a customer’s level of understanding. |
Ability |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3246 | Knowledge of confidentiality, integrity, and availability requirements. |
Knowledge |
3277 | Knowledge of general SCADA system components. |
Knowledge |
3353 | Knowledge of the Risk Management Framework Assessment Methodology. |
Knowledge |
3402 | Knowledge of network construction and topology. |
Knowledge |
3431 | Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). |
Knowledge |
3539 | Knowledge of telecommunications fundamentals. |
Knowledge |
3741 | Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments. |
Skill |
3871 | Skill in remote command line and Graphic User Interface (GUI) tool usage. |
Skill |
4196 | Ability to build, implement, and maintain distributed sensor grid. |
Ability |
4201 | Ability to characterize network traffic for trends and patterns. |
Ability |
4215 | Ability to configure and place distributed sensor grid |
Ability |
4224 | Ability to coordinate with Sr Leaders of an Org. to ensure shared responsibility for supporting Org. mission/business functions using external providers of systems, services and apps receives visibility and is elevated to the appropriate decision-making authorities |
Ability |
4228 | Ability to create rule sets within an Intrusion Detection System (IDS). |
Ability |
4230 | Ability to create rules/alerts for traffic validation. |
Ability |
4273 | Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations. |
Ability |
4290 | Ability to implement network TAP configuration |
Ability |
4291 | Ability to implement sensors according to sensor plan |
Ability |
4294 | Ability to integrate information security requirements into the acquisition process, using applicable baseline security controls as one of the sources for security requirements, ensuring a robust software quality control process and establishing multiple source |
Ability |
4316 | Ability to organize policy standards to insure procedures and guidelines comply with cybersecurity policies. |
Ability |
4352 | Ability to setup Serial and Ethernet interfaces. |
Ability |
4354 | Ability to share meaningful insights about the context of an organization’s threat environment that improve its risk management posture. |
Ability |
4357 | Ability to test tools within sensor grid. |
Ability |
4358 | Ability to track the location and configuration of networked devices and software across departments, locations, facilities and potentially supporting business functions. |
Ability |
4360 | Ability to troubleshoot computer software and hardware issues, make repairs, and schedule updates. |
Ability |
4365 | Ability to use and/or integrate a Security Information and Event Management (SIEM) platform. |
Ability |
4390 | Knowledge of active directory federated services. |
Knowledge |
4396 | Knowledge of basic cloud-based technologies and concepts. |
Knowledge |
4398 | Knowledge of basic Cyber Threat Emulation concepts. |
Knowledge |
4399 | Knowledge of basic Embedded Systems concepts. |
Knowledge |
4415 | Knowledge of common obfuscation techniques (e.g. command line execution, string substitution, clandestine side channel, Base64). |
Knowledge |
4429 | Knowledge of cybersecurity controls and design principles and methods (e.g., firewalls, DMZ, and encryption). |
Knowledge |
4438 | Knowledge of different types of log subscriptions (e.g. push vs pull, MS Windows event forwarding, winlogbeat, syslog). |
Knowledge |
4451 | Knowledge of the full-spectrum of cyberspace operational missions (e.g., DODIN Operations, DCO, OCO), principles, capabilities, limitations, and effects. |
KSA |
4481 | Knowledge of long haul circuits. |
Knowledge |
4499 | Knowledge of Network OSs. |
Knowledge |
4500 | Knowledge of network systems management methods including end-to-end systems performance monitoring. |
Knowledge |
4501 | Knowledge of non-Active Directory domains (e.g. IDM, LDAP). |
Knowledge |
4516 | Knowledge of principles and methods for integrating system and network components. |
Knowledge |
4522 | Knowledge of public key infrastructure (PKI) libraries, certificate authorities, certificate management, and encryption functionalities. |
Knowledge |
4529 | Knowledge of routing protocols such as RIPv1/v2, OSPF, IGRP, and EIGRP |
Knowledge |
4532 | Knowledge of Security Technical Implementation Guide (STIG) |
Knowledge |
4537 | Knowledge of stream providers (e.g. KAFKA). |
Knowledge |
4539 | Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model). |
Knowledge |
4588 | Knowledge of transmission capabilities (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)). |
Knowledge |
4594 | Knowledge of WAN technologies such as PPP, Frame-relay, dedicated T1s, ISDN, and routing protocols |
Knowledge |
4595 | Knowledge of web applications and their common attack vectors. |
Knowledge |
4606 | Skill in applying STIG upgrades |
Skill |
4609 | Skill in cable management and organization |
Skill |
4615 | Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, anti-virus software, anti-spyware). |
Skill |
4635 | Skill in implementing DHCP and DNS |
Skill |
4664 | Skill in router IOS backup, recovery, and upgrade. |
Skill |
4671 | Skill in understanding cybersecurity architecture, its implementation, and its expected behaviors and how changes in conditions affect outcomes. |
Skill |
6100 | Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities. |
Ability |
6240 | Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE). |
Knowledge |
6590 | Skill in interfacing with customers. |
Skill |
8042 | Consult with customers about network system design and maintenance. |
Task |
8058 | Design countermeasures and mitigations against potential weaknesses and vulnerabilities in system and elements. |
Task |
8059 | Design, develop, and modify network systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design. |
Task |
8078 | Diagnose network connectivity problems. |
Task |
8091 | Engage customers to understand their expectations and wants. |
Task |
8099 | Evaluate security architecture and its design against cyberspace threats as identified in operational and acquisition documents. |
Task |
8110 | Identify optimal locations for network sensor placement to collect on targeted devices. |
Task |
8117 | Implement and enforce DCO policies and procedures reflecting applicable laws, policies, procedures, and regulations (such as United States Code Titles 10 and 50). |
Task |
8131 | Maintain Operational, technical, and authoritative situational awareness during effects-based operations |
Task |
8139 | Notify designated mission leadership or applicable team members of any suspected cyber incident. |
Task |
8161 | Provide and maintain documentation for TTPs as inputs to training programs. |
Task |
8165 | Provide feedback for RFI generation. |
Task |
8187 | Repair network connectivity problems. |
Task |