Conducts access collection, processing, and/or geolocation of wired or wireless computer and digital networks in…

Workforce Element:

Core KSATs:
KSAT ID Description KSAT
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2020A

Analyze target operational architecture for ways to gain access.

Task
2105

Conduct access enabling of wireless computer and digital networks.

Task
2106

Conduct collection and processing of wireless computer and digital networks.

Task
2109

Conduct exploitation of wireless computer and digital networks.

Task
2119

Conduct network scouting and vulnerability analyses of systems within a network.

Task
2123

Conduct on-net and off-net activities to control, and exfiltrate data from deployed, automated technologies.

Task
2124

Conduct open source data collection via various online tools.

Task
2133

Conduct survey of computer and digital networks.

Task
2205

Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers).

Task
2408

Exploit network devices, security devices, and/or terminals or environments using various methods or tools.

Task
2412

Facilitate access enabling by physical and/or wireless means.

Task
2477

Identify potential points of strength and vulnerability within a network.

Task
2612

Operate and maintain automated systems for gaining and maintaining access to target systems.

Task
3059

Ability to interpret and translate customer requirements into operational action.

Ability
3130

Knowledge of auditing and logging procedures (including server-based logging).

Knowledge
3140

Knowledge of basic programming concepts (e.g., levels, structures, compiled vs. interpreted languages).

Knowledge
3144

Knowledge of basic wireless applications, including vulnerabilities in various types of wireless applications.

Knowledge
3206

Knowledge of current software and methodologies for active defense and system hardening.

Knowledge
3253

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Knowledge
3254

Knowledge of encryption algorithms and tools for WLANs.

Knowledge
3261

Knowledge of evasion strategies and techniques.

Knowledge
3267

Knowledge of deconfliction reporting to include external organization interaction.

Knowledge
3270

Knowledge of forensic implications of operating system structure and operations.

Knowledge
3280

Knowledge of Global Systems for Mobile Communications (GSM) architecture.

Knowledge
3286

Knowledge of host-based security products and how they affect exploitation and vulnerability.

Knowledge
3317

Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP.

Knowledge
3374

Knowledge of malware.

Knowledge
3399

Knowledge of network administration.

Knowledge
3402

Knowledge of network construction and topology.

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3473

Knowledge of satellite-based communication systems.

Knowledge
3479

Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation.

Knowledge
3480

Knowledge of security implications of software configurations.

Knowledge
3508

Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network).

Knowledge
3513

Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems.

Knowledge
3543

Knowledge of the basic structure, architecture, and design of modern communication networks.

Knowledge
3561

Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

Knowledge
3579

Knowledge of the fundamentals of digital forensics in order to extract actionable intelligence.

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3637

Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).

Knowledge
3644

Knowledge of virtual machine technologies.

Knowledge
3658

Knowledge of network collection procedures to include decryption capabilities/tools, techniques, and procedures.

Knowledge
3658B

Ability to perform network collection tactics, techniques, and procedures to include decryption capabilities/tools.

Ability
3658A

Ability to perform wireless collection procedures to include decryption capabilities/tools.

Ability
3670

Skill in analyzing terminal or environment collection data.

Skill
3677

Skill in analyzing target communications internals and externals collected from wireless LANs.

Skill
3690

Skill in assessing current tools to identify needed improvements.

Skill
3740

Skill in determining installed patches on various operating systems and identifying patch signatures.

Skill
3779

Skill in extracting information from packet captures.

Skill
3801

Skill in identifying the devices that work at each level of protocol models.

Skill
3815

Skill in interpreting vulnerability scanner results to identify vulnerabilities.

Skill
3817

Skill in knowledge management, including technical documentation techniques (e.g., Wiki page).

Skill
3848

Skill in processing collected data for follow-on analysis.

Skill
3871

Skill in remote command line and Graphic User Interface (GUI) tool usage.

Skill
3889

Skill in survey, collection, and analysis of wireless LAN metadata.

Skill
3929A

Skill in using tools, techniques, and procedures to exploit a target.

Skill
3948

Skill in verifying the integrity of all files.

Skill
3949

Skill in wireless network target analysis, templating, and geolocation.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
2088

Collaborate with development organizations to create and deploy the tools needed to achieve objectives.

Task
2294

Develop new techniques for gaining and keeping access to target systems.

Task
2708

Process exfiltrated data for analysis and/or dissemination to customers.

Task
2762

Provide real-time actionable geolocation information.

Task
2846

Test and evaluate locally developed tools for operational use.

Task
3141

Knowledge of basic software applications (e.g., data storage and backup, database applications) and their vulnerabilities.

Knowledge
3155

Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3883

Skill in server administration.

Skill
3899

Skill in testing and evaluating tools for implementation.

Skill
3931

Skill in using various open source data collection tools (online trade, DNS, mail, etc.).

Skill

Facilitates AI adoption by supporting the users of AI-enabled solutions.

Workforce Element:
Data/AI

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
466A

Consult with customers and key stakeholders to evaluate functional requirements for AI and data applications.

Task
479A

Correlates training and learning to business or mission requirements.

Task
538

Develop new or identify existing awareness and training materials that are appropriate for intended audiences.

Task
918

Ability to prepare and deliver education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures.

Ability
1000B

Ensure that AI design and development activities are properly documented and updated.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
5380

Gather feedback on customer satisfaction and internal service performance to foster continual improvement.

Task
5430

Present technical information to technical and non-technical audiences.

Task
5843

Analyze national security/DoD mission priorities and gaps suitable for the application of AI solutions.

Task
5861

Coordinate with change management employees to plan, foster, and track change.

Task
5891

Identify viable AI projects based on organizational needs.

Task
5892

Identify ways to lead and motivate people to adopt AI solutions through cultural, organizational, or other types of change.

Task
5896

Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI.

Task
5909

Promote awareness of AI limitations and benefits.

Task
5918

Support an AI adoption strategy that aligns with the organization’s vision, mission, and goals.

Task
5921

Test how users interact with AI solutions.

Task
6311

Knowledge of machine learning theory and principles.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6915A

Skill in communicating with all levels of the organization, including senior/mid-level executives, and operational-level personnel (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience).

Skill
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7001

Ability to inspire and lead a culture of innovation.

Ability
7003

Knowledge of AI security risks, threats, and vulnerabilities and potential risk mitigation solutions.

Knowledge
7008

Knowledge of change models and frameworks.

Knowledge
7020

Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable).

Knowledge
7021

Knowledge of emerging trends and future use cases of AI.

Knowledge
7024

Knowledge of how AI is developed and operated.

Knowledge
7027

Knowledge of how humans interact with and/or are impacted by AI solutions within the DoD context.

Knowledge
7031

Knowledge of how to structure and display data.

Knowledge
7032

Knowledge of how to use data to tell a story.

Knowledge
7033

Knowledge of human factor engineering.

Knowledge
7037

Knowledge of machine learning operations (MLOps) processes and best practices.

Knowledge
7045

Knowledge of the AI lifecycle.

Knowledge
7046

Knowledge of the basic requirements for the successful delivery of AI solutions.

Knowledge
7047

Knowledge of the basics of customer experience, customer design, psychology of customer decision-making, and human-computer interaction.

Knowledge
7048

Knowledge of the benefits and limitations of AI capabilities.

Knowledge
7051

Knowledge of the possible impacts of machine learning blind spots and edge cases.

Knowledge
7053

Knowledge of the user experience (e.g., decision making, user design, and human-computer interaction) as it relates to AI systems.

Knowledge
7058

Skill in communicating AI and/or machine learning solutions to a wide range of audiences.

Skill
7065

Skill in explaining AI concepts and terminology.

Skill
7072

Skill in leading AI adoption efforts.

Skill

Additional KSATs:
KSAT ID Description KSAT
5861

Coordinate with change management employees to plan, foster, and track change.

Task
5880

Engage and collaborate with allies and partners to advance shared strategic AI objectives.

Task
5925

Use knowledge of business processes to create or recommend AI solutions.

Task
6380

Knowledge of principles and processes for conducting training and education needs assessment.

Knowledge
7013

Knowledge of customer mission priorities and capabilities, as related to the integration and adoption of AI solutions.

Knowledge
7033

Knowledge of human factor engineering.

Knowledge
7036

Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government.

Knowledge
7041

Knowledge of remedies against unintended bias in AI solutions.

Knowledge
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Builds the organization’s AI vision and plan and leads policy and doctrine formation including how…

Workforce Element:
Data/AI

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
391A

Acquire and manage the necessary resources, including leadership support, financial resources, infrastructure, and key personnel, to support AI innovation adoption goals and objectives.

Task
395A

Advise senior management on risk levels, security posture, and necessary changes to existing AI policies.​

Task
492B

Design and integrate an AI adoption strategy that supports the organization’s vision, mission, and goals.

Task
524

Develop and maintain strategic plans.

Task
629B

Identify and address AI workforce planning and management issues (e.g., recruitment, retention, and training).

Task
680B

Oversee AI budget, staffing, and contracting decisions.

Task
942

Knowledge of the organization’s core business/mission processes.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2416

Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives.

Task
2558

Maintain relationships with internal and external partners involved in cyber planning or related areas.

Task
2624A

Conduct long-range, strategic planning efforts with internal and external partners to support AI capability development and use.

Task
3591

Knowledge of organization objectives, leadership priorities, and decision-making risks.

Knowledge
5843

Analyze national security/DoD mission priorities and gaps suitable for the application of AI solutions.

Task
5845

Appoint and guide a multidisciplinary team of AI experts to identify and assess risk throughout the AI development lifecycle.

Task
5849

Assess value of implemented AI projects based on organizational metrics.

Task
5862

Create and/or maintain governance structure for oversight and accountability of AI solutions.

Task
5879

Direct and/or support organizational and project-level AI risk management activities.

Task
5880

Engage and collaborate with allies and partners to advance shared strategic AI objectives.

Task
5882

Establish and/or maintain processes to ensure Responsible AI practices are reflected in an organization’s approach to AI acquisition, development, and deployment.

Task
5883

Evaluate and develop AI workforce structure resources and requirements.

Task
5887

Identify and address key roadblocks to AI implementation.

Task
5891

Identify viable AI projects based on organizational needs.

Task
5892

Identify ways to lead and motivate people to adopt AI solutions through cultural, organizational, or other types of change.

Task
5896

Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI.

Task
5909

Promote awareness of AI limitations and benefits.

Task
5913

Remove barriers to data acquisition, collection, and curation efforts required for AI solutions.

Task
6040

Ability to assess and forecast manpower requirements to meet organizational objectives.

Ability
6250

Knowledge of Workforce Framework, work roles, and associated tasks, knowledge, skills, and abilities.

Knowledge
6311

Knowledge of machine learning theory and principles.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6915A

Skill in communicating with all levels of the organization, including senior/mid-level executives, and operational-level personnel (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience).

Skill
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7000

Ability to identify, connect, and influence key stakeholders to speed AI adoption.

Ability
7001

Ability to inspire and lead a culture of innovation.

Ability
7003

Knowledge of AI security risks, threats, and vulnerabilities and potential risk mitigation solutions.

Knowledge
7007

Knowledge of best practices in organizational conflict management.

Knowledge
7014

Knowledge of data acquisition, collection, and curation best practices required for AI solutions.

Knowledge
7020

Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable).

Knowledge
7021

Knowledge of emerging trends and future use cases of AI.

Knowledge
7024

Knowledge of how AI is developed and operated.

Knowledge
7034

Knowledge of interactions and integration of DataOps, MLOps, and DevSecOps in AI.

Knowledge
7042

Knowledge of resources and capabilities required to complete AI projects.

Knowledge
7043

Knowledge of staffing, contracting, and budgetary requirements to run an AI-enabled organization.

Knowledge
7045

Knowledge of the AI lifecycle.

Knowledge
7046

Knowledge of the basic requirements for the successful delivery of AI solutions.

Knowledge
7048

Knowledge of the benefits and limitations of AI capabilities.

Knowledge
7050

Knowledge of the nature and function of technology platforms and tools used to create and employ AI.

Knowledge
7058

Skill in communicating AI and/or machine learning solutions to a wide range of audiences.

Skill
7061

Skill in developing and influencing policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational AI activities.

Skill
7065

Skill in explaining AI concepts and terminology.

Skill
7068

Skill in identifying organizational and project-level AI risks, including AI security risks and requirements.

Skill
7072

Skill in leading AI adoption efforts.

Skill
7073

Skill in leveraging and optimizing resources required to complete AI projects and programs.

Skill

Additional KSATs:
KSAT ID Description KSAT
3146

Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3356

Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations.

Knowledge
5330A

Establish and collect metrics to monitor and validate AI workforce readiness.

Task
5868

Define and/or implement policies and procedures to enable an AI risk assessment process and assess risk mitigation efforts.

Task
5902

Monitor and evaluate the organization’s use of AI to ensure capabilities are performing as intended and to reduce the likelihood and severity of unintended consequences.

Task
5912

Recommend updates to military strategy and doctrine with respect to advances in AI technology, legal obligations, Responsible AI, and DoD AI Ethical Principles.

Task
6290

Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems.

Knowledge
7005

Knowledge of AI-specific acquisition models (e.g., pay per use or per data element).

Knowledge
7036

Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government.

Knowledge
7038

Knowledge of metrics to evaluate the effectiveness of machine learning models.

Knowledge
7039

Knowledge of organization’s structure, training requirements, and existing operational hardware/software related to the AI solution to be adopted.

Knowledge
7041

Knowledge of remedies against unintended bias in AI solutions.

Knowledge
7051

Knowledge of the possible impacts of machine learning blind spots and edge cases.

Knowledge

Educates those involved in the development of AI and conducts assessments on the technical and…

Workforce Element:
Data/AI

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
537A

Develop methods to monitor and measure risk and assurance efforts on a continuous basis.

Task
765B

Perform AI architecture security reviews, identify gaps, and develop a risk management plan to address issues.

Task
952

Knowledge of emerging security issues, risks, and vulnerabilities.

Knowledge
963A

Ensure risk mitigation plans of action and milestones are in place.

Task
1000B

Ensure that AI design and development activities are properly documented and updated.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5854

Collaborate with appropriate personnel to address Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data resusability concerns for AI solutions.

Task
5856

Communicate the results of AI risk assessments to relevant stakeholders.

Task
5860

Coordinate with appropriate personnel to identify methods for users and developers to report concerns about the implementation of DoD AI Ethical Principles.

Task
5863

Create and/or maintain processes to ensure data management efforts comply with AI ethical principles.

Task
5873

Determine methods and metrics for quantitative and qualitative measurement of AI risks so that sensitivity, specificity, likelihood, confidence levels, and other metrics are identified, documented, and applied.

Task
5878

Develop risk mitigation strategies to ensure enumerated risks are prioritized, mitigated, shared, transferred, and/or accepted.

TAsk
5879

Direct and/or support organizational and project-level AI risk management activities.

Task
5881

Ensure risk management responsibilities are clearly defined, assigned, and communicated to relevant stakeholders.

Task
5889

Identify and submit exemplary AI use cases, best practices, failure modes, and risk mitigation strategies, including after-action reports.

Task
5893

Implement Responsible AI best practices and standards within AI solutions according to the DoD AI Ethical Principles, Responsible AI Guidelines, and/or any other pertinent laws.

Task
5896

Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI.

Task
5900

Measure the compliance of AI tools with DoD AI Ethical Principles.

Task
5904

Perform risk assessment on AI applications to identify technical, societal, organizational, and mission risks.

Task
6311

Knowledge of machine learning theory and principles.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7003

Knowledge of AI security risks, threats, and vulnerabilities and potential risk mitigation solutions.

Knowledge
7020

Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable).

Knowledge
7021

Knowledge of emerging trends and future use cases of AI.

Knowledge
7024

Knowledge of how AI is developed and operated.

Knowledge
7034

Knowledge of interactions and integration of DataOps, MLOps, and DevSecOps in AI.

Knowledge
7036

Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government.

Knowledge
7038

Knowledge of metrics to evaluate the effectiveness of machine learning models.

Knowledge
7040

Knowledge of Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data reusability considerations for AI solutions.

Knowledge
7041

Knowledge of remedies against unintended bias in AI solutions.

Knowledge
7045

Knowledge of the AI lifecycle.

Knowledge
7048

Knowledge of the benefits and limitations of AI capabilities.

Knowledge
7051

Knowledge of the possible impacts of machine learning blind spots and edge cases.

Knowledge
7052

Knowledge of the principles, methods, and tools used for risk and bias assessment and mitigation, including assessment of failures and their consequences.

Knowledge
7056

Skill in assessing AI capabilities for bias or ethical concerns.

Skill
7064

Skill in developing solutions and/or recommendations to minimize negative impacts of machine learning, especially for edge cases.

Skill
7065

Skill in explaining AI concepts and terminology.

Skill
7067

Skill in identifying low-probability, high-impact risks in machine learning training data sets.

Skill
7068

Skill in identifying organizational and project-level AI risks, including AI security risks and requirements.

Skill
7069

Skill in identifying risk over the lifespan of an AI solution.

Skill
7075

Skill in testing and evaluating machine learning algorithms or AI solutions.

Skill

Additional KSATs:
KSAT ID Description KSAT
5905

Perform risk assessment whenever an AI application or AI-enabled system undergoes a major change, when emergent behaviors are detected, and/or unintended consequences are reported.

Task
7044

Knowledge of testing, evaluation, validation, and verification (T&E V&V) tools and procedures to ensure systems are working as intended.

Knowledge
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Performs testing, evaluation, verification, and validation on AI solutions to ensure they are developed to…

Workforce Element:
Data/AI

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
182

Skill in determining an appropriate level of test rigor for a given system.

Skill
508

Determine level of assurance of developed capabilities based on test results.

Task
550

Develop test plans to address specifications and requirements.

Task
694

Make recommendations based on test results.

Task
858A

Test, evaluate, and verify hardware and/or software to determine compliance with defined specifications and requirements.

Task
858B

Record and manage test data.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5120

Conduct hypothesis testing using statistical processes.

Task
5848

Assess technical risks and limitations of planned tests on AI systems.

Task
5851

Build assurance cases for AI systems that support the needs of different stakeholders (e.g., acquisition community, commanders, and operators).

Task
5858

Conduct AI risk assessments to ensure models and/or other solutions are performing as designed.

Task
5866

Create or customize existing Test and Evaluation Master Plans (TEMPs) for AI systems.

Task
5873

Determine methods and metrics for quantitative and qualitative measurement of AI risks so that sensitivity, specificity, likelihood, confidence levels, and other metrics are identified, documented, and applied.

Task
5876

Develop machine learning code testing and validation procedures.

Task
5877

Develop possible solutions for technical risks and limitations of planned tests on AI solutions.

Task
5896

Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI.

Task
5901

Measure the effectiveness, security, robustness, and trustworthiness of AI tools.

Task
5910

Provide quality assurance of AI products throughout their lifecycle.

Task
5914

Report test and evaluation deficiencies and possible solutions to appropriate personnel.

Task
5916

Select and use the appropriate models and prediction methods for evaluating AI performance.

Task
5919

Test AI tools against adversarial attacks in operationally realistic environments.

Task
5920

Test components to ensure they work as intended in a variety of scenarios for all aspects of the AI application.

Task
5921

Test how users interact with AI solutions.

Task
5922

Test the reliability, functionality, security, and compatibility of AI tools within systems.

Task
5923

Test the trustworthiness of AI solutions.

Task
5926

Use models and other methods for evaluating AI performance.

Task
6060

Ability to collect, verify, and validate test data.

Ability
6170

Ability to translate data and test results into evaluative conclusions.

Ability
6311

Knowledge of machine learning theory and principles.

Knowledge
6490

Skill in assessing the predictive power and subsequent generalizability of a model.

Skill
6630

Skill in preparing Test & Evaluation reports.

Skill
6641

Skill in providing Test & Evaluation resource estimate.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7003

Knowledge of AI security risks, threats, and vulnerabilities and potential risk mitigation solutions.

Knowledge
7004

Knowledge of AI Test & Evaluation frameworks.

Knowledge
7006

Knowledge of best practices from industry and academia in test design activities for verification and validation of AI and machine learning systems.

Knowledge
7009

Knowledge of coding and scripting in languages that support AI development and use.

Knowledge
7020

Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable).

Knowledge
7024

Knowledge of how AI is developed and operated.

Knowledge
7025

Knowledge of how AI solutions integrate with cloud or other IT infrastructure.

Knowledge
7028

Knowledge of how to automate development, testing, security, and deployment of AI/machine learning-enabled software to the DoD.

Knowledge
7029

Knowledge of how to collect, store, and monitor data.

Knowledge
7030

Knowledge of how to deploy test infrastructures with AI systems.

Knowledge
7034

Knowledge of interactions and integration of DataOps, MLOps, and DevSecOps in AI.

Knowledge
7036

Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government.

Knowledge
7037

Knowledge of machine learning operations (MLOps) processes and best practices.

Knowledge
7038

Knowledge of metrics to evaluate the effectiveness of machine learning models.

Knowledge
7041

Knowledge of remedies against unintended bias in AI solutions.

Knowledge
7044

Knowledge of testing, evaluation, validation, and verification (T&E V&V) tools and procedures to ensure systems are working as intended.

Knowledge
7045

Knowledge of the AI lifecycle.

Knowledge
7048

Knowledge of the benefits and limitations of AI capabilities.

Knowledge
7051

Knowledge of the possible impacts of machine learning blind spots and edge cases.

Knowledge
7053

Knowledge of the user experience (e.g., decision making, user design, and human-computer interaction) as it relates to AI systems.

Knowledge
7054

Knowledge of tools for testing the robustness and resilience of AI products and solutions.

Knowledge
7065

Skill in explaining AI concepts and terminology.

Skill
7067

Skill in identifying low-probability, high-impact risks in machine learning training data sets.

Skill
7069

Skill in identifying risk over the lifespan of an AI solution.

Skill
7070

Skill in integrating AI Test & Evaluation frameworks into test strategies for specific projects.

Skill
7075

Skill in testing and evaluating machine learning algorithms or AI solutions.

Skill
7076

Skill in testing for bias in data sets and AI system outputs as well as determining historically or often underrepresented and marginalized groups are properly represented in the training, testing, and validation data sets and AI system outputs.

Skill
7077

Skill in translating operation requirements for AI systems into testing requirements.

Skill

Additional KSATs:
KSAT ID Description KSAT
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
5850

Assist integrated project teams to identify, curate, and manage data.

Task
5889

Identify and submit exemplary AI use cases, best practices, failure modes, and risk mitigation strategies, including after-action reports.

Task
7012

Knowledge of current test standards and safety standards that are applicable to AI (e.g. MIL-STD 882E, DO-178C, ISO26262).

Knowledge
7040

Knowledge of Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data reusability considerations for AI solutions.

Knowledge
765B

Perform AI architecture security reviews, identify gaps, and develop a risk management plan to address issues.

Task
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Designs, develops, and modifies AI applications, tools, and/or other solutions to enable successful accomplishment of…

Workforce Element:
Data/AI

Core KSATs:
KSAT ID Description KSAT
21

Knowledge of computer algorithms.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
75A

Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis.

Knowledge
102

Knowledge of programming language structures and logic.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
166

Skill in conducting queries and developing algorithms to analyze data structures.

Skill
477

Correct errors by making appropriate changes and rechecking the program to ensure desired results are produced.

Task
506

Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design.

Task
543

Develop secure code and error handling.

Task
764

Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities.

Task
1000B

Ensure that AI design and development activities are properly documented and updated.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5120

Conduct hypothesis testing using statistical processes.

Task
5847

Assess and address the limitations of methods to deliver machine learning models.

Task
5858

Conduct AI risk assessments to ensure models and/or other solutions are performing as designed.

Task
5871

Design and develop machine learning models to achieve organizational objectives.

Task
5872

Design, develop, and implement AI tools and techniques to achieve organizational objectives.

Task
5873

Determine methods and metrics for quantitative and qualitative measurement of AI risks so that sensitivity, specificity, likelihood, confidence levels, and other metrics are identified, documented, and applied.

Task
5896

Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI.

Task
5915

Research the latest machine learning and AI tools, techniques, and best practices.

Task
5926

Use models and other methods for evaluating AI performance.

Task
5927

Write and document reproducible code.

Task
6060

Ability to collect, verify, and validate test data.

Ability
6311

Knowledge of machine learning theory and principles.

Knowledge
6760

Skill in writing scripts using R, Python, PIG, HIVE, SQL, etc.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7009

Knowledge of coding and scripting in languages that support AI development and use.

Knowledge
7011

Knowledge of current AI and machine learning systems design and performance analysis models, algorithms, and tools.

Knowledge
7020

Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable).

Knowledge
7024

Knowledge of how AI is developed and operated.

Knowledge
7028

Knowledge of how to automate development, testing, security, and deployment of AI/machine learning-enabled software to the DoD.

Knowledge
7029

Knowledge of how to collect, store, and monitor data.

Knowledge
7031

Knowledge of how to structure and display data.

Knowledge
7032

Knowledge of how to use data to tell a story.

Knowledge
7037

Knowledge of machine learning operations (MLOps) processes and best practices.

Knowledge
7038

Knowledge of metrics to evaluate the effectiveness of machine learning models.

Knowledge
7045

Knowledge of the AI lifecycle.

Knowledge
7046

Knowledge of the basic requirements for the successful delivery of AI solutions.

Knowledge
7048

Knowledge of the benefits and limitations of AI capabilities.

Knowledge
7049

Knowledge of the latest machine learning and AI tools, techniques, and best practices.

Knowledge
7050

Knowledge of the nature and function of technology platforms and tools used to create and employ AI.

Knowledge
7051

Knowledge of the possible impacts of machine learning blind spots and edge cases.

Knowledge
7055

Skill in analyzing the output from machine learning models.

Skill
7057

Skill in building and deploying machine learning models.

Skill
7059

Skill in creating machine learning models.

Skill
7065

Skill in explaining AI concepts and terminology.

Skill
7067

Skill in identifying low-probability, high-impact risks in machine learning training data sets.

Skill
7075

Skill in testing and evaluating machine learning algorithms or AI solutions.

Skill

Additional KSATs:
KSAT ID Description KSAT
5854

Collaborate with appropriate personnel to address Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data resusability concerns for AI solutions.

Task
5859

Consider energy implications (graphical processing unit, tensor processing unit, etc.) when designing AI solutions.

Task
5870

Design and develop continuous integration/continuous delivery (CI/CD) in a containerized or other reproducible computing environment to support the machine learning life cycle.

Task
5889

Identify and submit exemplary AI use cases, best practices, failure modes, and risk mitigation strategies, including after-action reports.

Task
5893

Implement Responsible AI best practices and standards within AI solutions according to the DoD AI Ethical Principles, Responsible AI Guidelines, and/or any other pertinent laws.

Task
5925

Use knowledge of business processes to create or recommend AI solutions.

Task
6290

Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems.

Knowledge
7003

Knowledge of AI security risks, threats, and vulnerabilities and potential risk mitigation solutions.

Knowledge
7021

Knowledge of emerging trends and future use cases of AI.

Knowledge
7022

Knowledge of how AI adoption can assist developers with service-oriented design.

Knowledge
7025

Knowledge of how AI solutions integrate with cloud or other IT infrastructure.

Knowledge
7026

Knowledge of how commercial and federal solutions solve Defense-related data environment and platform challenges.

Knowledge
7036

Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government.

Knowledge
7040

Knowledge of Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data reusability considerations for AI solutions.

Knowledge
7041

Knowledge of remedies against unintended bias in AI solutions.

Knowledge
7044

Knowledge of testing, evaluation, validation, and verification (T&E V&V) tools and procedures to ensure systems are working as intended.

Knowledge
7069

Skill in identifying risk over the lifespan of an AI solution.

Skill
7071

Skill in labeling data to make it more discoverable and understandable.

Skill
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to…

Workforce Element:
Intelligence (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
87

Knowledge of network traffic analysis methods.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2028

Answer requests for information.

Task
2060A

Maintain a common intelligence picture.

Task
2075

Brief threat and/or target current situations.

Task
2115

Conduct in-depth research and analysis.

Task
2429

Generate requests for information.

Task
2434

Identify threat tactics, and methodologies.

Task
2603

Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements.

Task
2771

Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3002

Ability to focus research efforts to meet the customer’s decision-making needs.

Ability
3019

Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3041

Ability to effectively collaborate via virtual teams.

Ability
3042

Ability to evaluate information for reliability, validity, and relevance.

Ability
3043

Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.

Ability
3047

Ability to function effectively in a dynamic, fast-paced environment.

Ability
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3052

Ability to identify intelligence gaps.

Ability
3073

Ability to recognize and mitigate cognitive biases which may affect analysis.

Ability
3077

Ability to think critically.

Ability
3081

Ability to utilize multiple intelligence sources across all intelligence disciplines.

Ability
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3107

Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.).

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3177

Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3274

Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects.

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3298

Knowledge of how to extract, analyze, and use metadata.

Knowledge
3335

Knowledge of intelligence disciplines.

Knowledge
3342

Knowledge of intelligence support to planning, execution, and assessment.

Knowledge
3374

Knowledge of malware.

Knowledge
3431

Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3539

Knowledge of telecommunications fundamentals.

Knowledge
3543

Knowledge of the basic structure, architecture, and design of modern communication networks.

Knowledge
3545

Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3561

Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

Knowledge
3582

Knowledge of the intelligence frameworks, processes, and related systems.

Knowledge
3584

Knowledge of intelligence preparation of the environment and similar processes.

Knowledge
3630

Knowledge of the ways in which targets or threats use the Internet.

Knowledge
3651

Knowledge of what constitutes a “threat” to a network.

Knowledge
3659

Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.

Knowledge
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3794

Skill in identifying cyber threats which may jeopardize organization and/or partner interests.

Skill
3844

Skill in preparing and presenting briefings.

Skill
3851

Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.

Skill
3876

Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources.

Skill
3910

Skill in using Boolean operators to construct simple and complex queries.

Skill
3920

Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).

Skill
3921

Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.

Skill
3938

Skill in utilizing feedback in order to improve processes, products, and services.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
2059

Provide expertise to course of action development.

Task
2060

Provide subject matter expertise to the development of a common operational picture.

Task
2061

Provide subject matter expertise to the development of cyber operations specific indicators.

Task
2063

Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.

Task
2068

Assist in the identification of intelligence collection shortfalls.

Task
2087

Collaborate with intelligence analysts/targeting organizations involved in related areas.

Task
2121

Conduct nodal analysis.

Task
2195

Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology.

Task
2288

Develop information requirements necessary for answering priority information requests.

Task
2356

Engage customers to understand customers’ intelligence needs and wants.

Task
2379

Evaluate threat decision-making processes.

Task
2379A

Identify threat vulnerabilities.

Task
2379B

Identify threats to Blue Force vulnerabilities.

Task
2441

Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.

Task
2446

Identify and submit intelligence requirements for the purposes of designating priority information requirements.

Task
2459

Identify intelligence gaps and shortfalls.

Task
2593

Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.

Task
2594

Monitor and report on validated threat activities.

Task
2602

Monitor open source websites for hostile content directed towards organizational or partner interests.

Task
2617

Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).

Task
2621

Provide SME and support to planning/developmental forums and working groups as appropriate.

Task
2685A

Provide subject matter expertise to website characterizations.

Task
2730

Provide analyses and support for effectiveness assessment.

Task
2735

Provide current intelligence support to critical internal/external stakeholders as appropriate.

Task
2738

Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.

Task
2745

Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.

Task
2747

Provide input and assist in post-action effectiveness assessments.

Task
2748

Provide input and assist in the development of plans and guidance.

Task
2754

Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.

Task
2767

Provide target recommendations which meet leadership objectives.

Task
2789

Report intelligence-derived significant network events and intrusions.

Task
2881

Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date.

Task
3039

Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3074

Ability to recognize and mitigate deception in reporting and analysis.

Ability
3078A

Ability to think like threat actors.

Ability
3079

Ability to understand objectives and effects.

Ability
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3098

Knowledge of virtualization products (Vmware, Virtual PC).

Knowledge
3205

Knowledge of current computer-based intrusion sets.

Knowledge
3210

Knowledge of cyber laws and their effect on Cyber planning.

Knowledge
3253

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Knowledge
3271

Knowledge of internal and external partner cyber operations capabilities and tools.

Knowledge
3277

Knowledge of general SCADA system components.

Knowledge
3286

Knowledge of host-based security products and how they affect exploitation and vulnerability.

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3334

Knowledge of intelligence confidence levels.

Knowledge
3343

Knowledge of cyber intelligence/information collection capabilities and repositories.

Knowledge
3358

Knowledge of organizational hierarchy and cyber decision making processes.

Knowledge
3419

Knowledge of organization or partner exploitation of digital networks.

Knowledge
3446

Knowledge of analytical constructs and their use in assessing the operational environment.

Knowledge
3460

Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions.

Knowledge
3504

Knowledge of threat and/or target systems.

Knowledge
3527

Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.).

Knowledge
3528

Knowledge of specific target identifiers, and their usage.

Knowledge
3533

Knowledge of target vetting and validation procedures.

Knowledge
3587

Knowledge of targeting cycles.

Knowledge
3615

Knowledge of the structure and intent of organization specific plans, guidance and authorizations.

Knowledge
3691

Skill in assessing and/or estimating effects generated during and after cyber operations.

Skill
3704

Skill in conducting non-attributable research.

Skill
3724

Skill in defining and characterizing all pertinent aspects of the operational environment.

Skill
3756

Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Skill
3788

Skill in identifying alternative analytical interpretations in order to minimize unanticipated outcomes.

Skill
3893

Skill in tailoring analysis to the necessary levels (e.g., classification and organizational).

Skill
3946

Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).

Skill
3953A

Skill in providing analysis to aid writing phased after action reports.

Skill
52

Knowledge of human-computer interaction principles.

Knowledge

Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to…

Workforce Element:
Intelligence (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2005

Adjust collection operations or collection plan to address identified issues/challenges and to synchronize collections with overall operational requirements.

Task
2015

Analyze feedback to determine extent to which collection products and services are meeting requirements.

Task
2021

Analyze plans, directives, guidance and policy for factors that would influence collection management’s operational structure and requirement s (e.g., duration, scope, communication requirements, interagency/international agreements).

Task
2035

Assess and apply operational environment factors and risks to collection management process.

Task
2096A

Compare allocated and available assets to collection demand as expressed through requirements.

Task
2165

Coordinate resource allocation of collection assets against prioritized collection requirements with collection discipline leads.

Task
2235

Determine how identified factors affect the tasking, collection, processing, exploitation and dissemination architecture’s form and function.

Task
2245

Develop a method for comparing collection reports to outstanding requirements to identify information gaps.

Task
2290

Allocate collection assets based on leadership’s guidance, priorities, and/or operational emphasis.

Task
2376

Establish processing, exploitation and dissemination management activity using approved guidance and/or procedures.

Task
2421

Formulate collection strategies based on knowledge of available intelligence discipline capabilities and gathering methods that align multi-discipline collection capabilities and accesses with targets and their observables.

Task
2451

Identify collaboration forums that can serve as mechanisms for coordinating processes, functions, and outputs with specified organizations and functional groups.

Task
2613

Optimize mix of collection assets and resources to increase effectiveness and efficiency against essential information associated with priority intelligence requirements.

Task
2705

Prioritize collection requirements for collection platforms based on platform capabilities.

Task
3010

Ability to apply collaborative skills and strategies.

Ability
3011

Ability to apply critical reading/thinking skills.

Ability
3102

Knowledge of operational planning processes.

Knowledge
3127

Knowledge of asset availability, capabilities and limitations.

Knowledge
3128

Knowledge of tasking mechanisms.

Knowledge
3148

Knowledge of collection capabilities and limitations.

Knowledge
3160

Knowledge of collaborative tools and environments.

Knowledge
3195

Knowledge of criteria for evaluating collection products.

Knowledge
3204

Knowledge of current collection requirements.

Knowledge
3297

Knowledge of how to establish priorities for resources.

Knowledge
3380

Knowledge of methods for ascertaining collection asset posture and availability.

Knowledge
3436

Knowledge of production exploitation and dissemination needs and architectures.

Knowledge
3464

Knowledge of research strategies and knowledge management.

Knowledge
3575

Knowledge of the factors of threat that could impact collection operations.

Knowledge
3619

Knowledge of the systems/architecture/communications used for coordination.

Knowledge
3663

Knowledge of tasking, collection, processing, exploitation and dissemination.

Knowledge
3974

Skill to apply the capabilities, limitations and tasking methodologies of available platforms, sensors, architectures and apparatus as they apply to organization objectives.

Skill
3991

Ability to coordinate and collaborate with analysts regarding surveillance requirements and essential information development.

Ability
3994

Ability to coordinate, collaborate and disseminate information to subordinate, lateral and higher-level organizations.

Ability
4002

Skill to determine feasibility of collection.

Skill
4004

Skill to develop a collection plan that clearly shows the discipline that can be used to collect the information needed.

Skill
4012

Skill to ensure that the collection strategy leverages all available resources.

Skill
4014

Skill to evaluate factors of the operational environment to objectives, and information requirements.

Skill
4019

Skill to extract information from available tools and applications associated with collection requirements and collection operations management.

Skill
4024

Skill to identify and apply tasking, collection, processing, exploitation and dissemination to associated collection disciplines.

Skill
4026

Skill in information prioritization as it relates to operations.

Skill
4033

Skill to interpret readiness reporting, its operational relevance and intelligence collection impact.

Skill
4049

Skill to prepare and deliver reports, presentations and briefings, to include using visual aids or presentation technology.

Skill
4056

Skill to review performance specifications and historical information about collection assets.

Skill
4066

Skill to use collaborative tools and environments.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
2051

Assess performance of collection assets against prescribed specifications.

Task
2098

Compile lessons learned from collection management activity’s execution of organization collection objectives.

Task
2147

Consider efficiency and effectiveness of collection assets and resources if/when applied against priority information requirements.

Task
2153

Construct collection plans and matrixes using established guidance and procedures.

Task
2167

Coordinate inclusion of collection plan in appropriate documentation.

Task
2172

Re-task or re-direct collection assets and resources.

Task
2232

Determine course of action for addressing changes to objectives, guidance, and operational environment.

Task
2233

Determine existing collection management webpage databases, libraries and storehouses.

Task
2239

Determine organizations and/or echelons with collection authority over all accessible collection assets.

Task
2271

Develop coordinating instructions by collection discipline for each phase of an operation.

Task
2342

Disseminate tasking messages and collection plans.

Task
2373

Establish alternative processing, exploitation and dissemination pathways to address identified issues or problems.

Task
2414

Facilitate continuously updated intelligence, surveillance, and visualization input to common operational picture managers.

Task
2456

Identify coordination requirements and procedures with designated collection authorities.

Task
2464

Identify issues or problems that can disrupt and/or degrade processing, exploitation and dissemination architecture effectiveness.

Task
2475

Identify potential collection disciplines for application against priority information requirements.

Task
2479

Identify and mitigate risks to collection management ability to support the plan, operations and target cycle.

Task
2529

Issue requests for information.

Task
2538

Link priority collection requirements to optimal assets and resources.

Task
2597

Monitor completion of reallocated collection efforts.

Task
2604

Monitor operational status and effectiveness of the processing, exploitation and dissemination architecture.

Task
2609

Monitor the operational environment for potential factors and risks to the collection operation management process.

Task
2726

Provide advice/assistance to operations and intelligence decision makers with reassignment of collection assets and resources in response to dynamic operational situations.

Task
2793

Request discipline-specific processing, exploitation, and disseminate information collected using discipline’s collection assets and resources in accordance with approved guidance and/or procedures.

Task
2807

Review capabilities of allocated collection assets.

Task
2809

Review intelligence collection guidance for accuracy/applicability.

Task
2810

Review list of prioritized collection requirements and essential information.

Task
2812

Review and update overarching collection plan, as required.

Task
2817

Revise collection matrix based on availability of optimal assets and resources.

Task
2828

Specify changes to collection plan and/or operational environment that necessitate re-tasking or re-directing of collection assets and resources.

Task
2829

Specify discipline-specific collections and/or taskings that must be executed in the near term.

Task
2845

Synchronize the integrated employment of all available organic and partner intelligence collection assets using available collaboration capabilities and techniques.

Task
3092

Knowledge of database administration and maintenance.

Knowledge
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3098

Knowledge of virtualization products (Vmware, Virtual PC).

Knowledge
3116

Knowledge of all possible circumstances that would result in changing collection management authorities.

Knowledge
3131

Knowledge of available databases and tools necessary to assess appropriate collection tasking.

Knowledge
3135

Knowledge of basic computer components and architectures, including the functions of various peripherals.

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3156

Knowledge of collection management tools.

Knowledge
3162

Knowledge of collection capabilities, accesses, performance specifications, and constraints utilized to satisfy collection plan.

Knowledge
3165

Knowledge of collection planning process and collection plan.

Knowledge
3175

Knowledge of leadership’s Intent and objectives.

Knowledge
3177

Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3205

Knowledge of current computer-based intrusion sets.

Knowledge
3217

Knowledge of cyber lexicon/terminology

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3253

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Knowledge
3275

Knowledge of fundamental cyber concepts, principles, limitations, and effects.

Knowledge
3286

Knowledge of host-based security products and how they affect exploitation and vulnerability.

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3298

Knowledge of how to extract, analyze, and use metadata.

Knowledge
3322

Knowledge of indications and warning.

Knowledge
3325

Knowledge of information needs.

Knowledge
3332

Knowledge of tasking processes for organic and subordinate collection assets.

Knowledge
3361

Knowledge of key cyber threat actors and their equities.

Knowledge
3362A

Knowledge of key factors of the operational environment and related threats and vulnerabilities.

Knowledge
3374

Knowledge of malware.

Knowledge
3389

Knowledge of organization objectives and associated demand on collection management.

Knowledge
3417

Knowledge of non-traditional collection methodologies.

Knowledge
3420

Knowledge of ongoing and future operations.

Knowledge
3424

Knowledge of operational asset constraints.

Knowledge
3428

Knowledge of organization formats of resource and asset readiness reporting, its operational relevance and intelligence collection impact.

Knowledge
3430

Knowledge of organizational priorities, legal authorities and requirements submission processes.

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3470

Knowledge of risk management and mitigation strategies.

Knowledge
3541

Knowledge of the available tools and applications associated with collection requirements and collection management.

Knowledge
3543

Knowledge of the basic structure, architecture, and design of modern communication networks.

Knowledge
3545

Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3549

Knowledge of the capabilities and limitations of new and emerging collection capabilities, accesses and/or processes.

Knowledge
3552

Knowledge of the capabilities, limitations and tasking methodologies of internal and external collections as they apply to planned cyber activities.

Knowledge
3557

Knowledge of collection strategies.

Knowledge
3558

Knowledge of the priority information requirements from subordinate, lateral and higher levels of the organization.

Knowledge
3561

Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

Knowledge
3574

Knowledge of the existent tasking, collection, processing, exploitation and dissemination architecture.

Knowledge
3595

Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements.

Knowledge
3598

Knowledge of the organizational plans/directives/guidance that describe objectives.

Knowledge
3599

Knowledge of the organizational policies/procedures for temporary transfer of collection authority.

Knowledge
3602

Knowledge of the POC’s, databases, tools and applications necessary to establish environment preparation and surveillance products.

Knowledge
3624

Knowledge of different organization objectives at all levels, including subordinate, lateral and higher.

Knowledge
3625

Knowledge of the organization’s established format for collection plan.

Knowledge
3626

Knowledge of the organization’s planning, operations and targeting cycles.

Knowledge
3631

Knowledge of internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities).

Knowledge
3633

Knowledge of tipping, cueing, mixing, and redundancy.

Knowledge
3650

Knowledge of priority information, how it is derived, where it is published, how to access, etc.

Knowledge
3651

Knowledge of what constitutes a “threat” to a network.

Knowledge
3654

Knowledge of who the organization’s operational planners are, how and where they can be contacted, and what are their expectations.

Knowledge
3957

Skill to access information on current assets available, usage.

Skill
3960

Skill to access the databases where plans/directives/guidance are maintained.

Skill
3977

Skill to articulate a needs statement/requirement and integrate new and emerging collection capabilities, accesses and/or processes into collection operations.

Skill
3985

Skill to associate Intelligence gaps to priority information requirements and observables.

Skill
3986

Skill to compare and contrast indicators/observables with requirements.

Skill
3995

Ability to correctly employ each organization or element into the collection plan and matrix.

Ability
4016

Skill to evaluate the capabilities, limitations and tasking methodologies of organic, theater, national, coalition and other collection capabilities.

Skill
4025

Skill to identify Intelligence gaps.

Skill
4027

Skill to identify when priority information requirements are satisfied.

Skill
4029

Skill to translate the capabilities, limitations and tasking methodologies of organic, theater, national, coalition and other collection capabilities.

Skill
4044

Skill to optimize collection system performance through repeated adjustment, testing, and re-adjustment.

Skill
4113

Knowledge of the request for information process.

Knowledge
52

Knowledge of human-computer interaction principles.

Knowledge
87

Knowledge of network traffic analysis methods.

Knowledge

Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to…

Workforce Element:
Intelligence (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2015

Analyze feedback to determine extent to which collection products and services are meeting requirements.

Task
2017

Analyze incoming collection requests.

Task
2021

Analyze plans, directives, guidance and policy for factors that would influence collection management’s operational structure and requirement s (e.g., duration, scope, communication requirements, interagency/international agreements).

Task
2053

Assess the effectiveness of collections in satisfying priority information gaps, using available capabilities and methods, and then adjust collection strategies and collection requirements accordingly.

Task
2093

Collaborate with customer to define information requirements.

Task
2245

Develop a method for comparing collection reports to outstanding requirements to identify information gaps.

Task
2375

Validate the link between collection requests and critical information requirements and priority intelligence requirements of leadership.

Task
2398

Evaluate the effectiveness of collection operations against the collection plan.

Task
2857

Translate collection requests into applicable discipline-specific collection requirements.

Task
3010

Ability to apply collaborative skills and strategies.

Ability
3011

Ability to apply critical reading/thinking skills.

Ability
3102

Knowledge of operational planning processes.

Knowledge
3380

Knowledge of methods for ascertaining collection asset posture and availability.

Knowledge
3557

Knowledge of collection strategies.

Knowledge
4024

Skill to identify and apply tasking, collection, processing, exploitation and dissemination to associated collection disciplines.

Skill
4066

Skill to use collaborative tools and environments.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
2046

Assess efficiency of existing information exchange and management systems.

Task
2051

Assess performance of collection assets against prescribed specifications.

Task
2082

Close requests for information once satisfied.

Task
2098

Compile lessons learned from collection management activity’s execution of organization collection objectives.

Task
2111

Conduct formal and informal coordination of collection requirements in accordance with established guidelines and procedures.

Task
2311

Develop procedures for providing feedback to collection managers, asset managers, and processing, exploitation and dissemination centers.

Task
2341

Disseminate reports to inform decision makers on collection issues.

Task
2347

Conduct and document an assessment of the collection results using established procedures.

Task
2384

Evaluate extent to which collected information and/or produced intelligence satisfy information requests.

Task
2397

Evaluate extent to which collection operations are synchronized with operational requirements.

Task
2451

Identify collaboration forums that can serve as mechanisms for coordinating processes, functions, and outputs with specified organizations and functional groups.

Task
2479

Identify and mitigate risks to collection management ability to support the plan, operations and target cycle.

Task
2514

Inform stakeholders (e.g., collection managers, asset managers, processing, exploitation and dissemination centers) of evaluation results using established procedures.

Task
2529

Issue requests for information.

Task
2587

Modify collection requirements as necessary.

Task
2727

Provide advisory and advocacy support to promote collection planning as an integrated component of the strategic campaign plans and other adaptive plans.

Task
2807

Review capabilities of allocated collection assets.

Task
2809

Review intelligence collection guidance for accuracy/applicability.

Task
2810

Review list of prioritized collection requirements and essential information.

Task
2827

Solicit and manage to completion feedback from requestors on quality, timeliness, and effectiveness of collection against collection requirements.

Task
2835

Submit information requests to collection requirement management section for processing as collection requests.

Task
2856

Track status of information requests, including those processed as collection requests and production requirements, using established procedures.

Task
2867

Use feedback results (e.g., lesson learned) to identify opportunities to improve collection management efficiency and effectiveness.

Task
2875

Validate requests for information according to established criteria.

Task
3092

Knowledge of database administration and maintenance.

Knowledge
3098

Knowledge of virtualization products (Vmware, Virtual PC).

Knowledge
3116

Knowledge of all possible circumstances that would result in changing collection management authorities.

Knowledge
3127

Knowledge of asset availability, capabilities and limitations.

Knowledge
3128

Knowledge of tasking mechanisms.

Knowledge
3131

Knowledge of available databases and tools necessary to assess appropriate collection tasking.

Knowledge
3135

Knowledge of basic computer components and architectures, including the functions of various peripherals.

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3148

Knowledge of collection capabilities and limitations.

Knowledge
3156

Knowledge of collection management tools.

Knowledge
3160

Knowledge of collaborative tools and environments.

Knowledge
3162

Knowledge of collection capabilities, accesses, performance specifications, and constraints utilized to satisfy collection plan.

Knowledge
3165

Knowledge of collection planning process and collection plan.

Knowledge
3175

Knowledge of leadership’s Intent and objectives.

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3195

Knowledge of criteria for evaluating collection products.

Knowledge
3204

Knowledge of current collection requirements.

Knowledge
3217

Knowledge of cyber lexicon/terminology

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3234

Knowledge of databases, portals and associated dissemination vehicles.

Knowledge
3253

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3275

Knowledge of fundamental cyber concepts, principles, limitations, and effects.

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3297

Knowledge of how to establish priorities for resources.

Knowledge
3322

Knowledge of indications and warning.

Knowledge
3325

Knowledge of information needs.

Knowledge
3361

Knowledge of key cyber threat actors and their equities.

Knowledge
3362A

Knowledge of key factors of the operational environment and related threats and vulnerabilities.

Knowledge
3374

Knowledge of malware.

Knowledge
3389

Knowledge of organization objectives and associated demand on collection management.

Knowledge
3417

Knowledge of non-traditional collection methodologies.

Knowledge
3420

Knowledge of ongoing and future operations.

Knowledge
3424

Knowledge of operational asset constraints.

Knowledge
3430

Knowledge of organizational priorities, legal authorities and requirements submission processes.

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3464

Knowledge of research strategies and knowledge management.

Knowledge
3470

Knowledge of risk management and mitigation strategies.

Knowledge
3541

Knowledge of the available tools and applications associated with collection requirements and collection management.

Knowledge
3543

Knowledge of the basic structure, architecture, and design of modern communication networks.

Knowledge
3545

Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3549

Knowledge of the capabilities and limitations of new and emerging collection capabilities, accesses and/or processes.

Knowledge
3552

Knowledge of the capabilities, limitations and tasking methodologies of internal and external collections as they apply to planned cyber activities.

Knowledge
3556

Knowledge of collection management functionality (e.g., positions, functions, responsibilities, products, reporting requirements).

Knowledge
3558

Knowledge of the priority information requirements from subordinate, lateral and higher levels of the organization.

Knowledge
3561

Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

Knowledge
3568

Knowledge of the definition of collection management and collection management authority.

Knowledge
3574

Knowledge of the existent tasking, collection, processing, exploitation and dissemination architecture.

Knowledge
3575

Knowledge of the factors of threat that could impact collection operations.

Knowledge
3595

Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements.

Knowledge
3599

Knowledge of the organizational policies/procedures for temporary transfer of collection authority.

Knowledge
3602

Knowledge of the POC’s, databases, tools and applications necessary to establish environment preparation and surveillance products.

Knowledge
3624

Knowledge of different organization objectives at all levels, including subordinate, lateral and higher.

Knowledge
3625

Knowledge of the organization’s established format for collection plan.

Knowledge
3626

Knowledge of the organization’s planning, operations and targeting cycles.

Knowledge
3631

Knowledge of internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities).

Knowledge
3633

Knowledge of tipping, cueing, mixing, and redundancy.

Knowledge
3650

Knowledge of priority information, how it is derived, where it is published, how to access, etc.

Knowledge
3651

Knowledge of what constitutes a “threat” to a network.

Knowledge
3663

Knowledge of tasking, collection, processing, exploitation and dissemination.

Knowledge
3957

Skill to access information on current assets available, usage.

Skill
3960

Skill to access the databases where plans/directives/guidance are maintained.

Skill
3985

Skill to associate Intelligence gaps to priority information requirements and observables.

Skill
3986

Skill to compare and contrast indicators/observables with requirements.

Skill
3994

Ability to coordinate, collaborate and disseminate information to subordinate, lateral and higher-level organizations.

Ability
4012

Skill to ensure that the collection strategy leverages all available resources.

Skill
4016

Skill to evaluate the capabilities, limitations and tasking methodologies of organic, theater, national, coalition and other collection capabilities.

Skill
4025

Skill to identify Intelligence gaps.

Skill
4027

Skill to identify when priority information requirements are satisfied.

Skill
4028

Skill to implement established procedures for evaluating collection management and operations activities.

Skill
4033

Skill to interpret readiness reporting, its operational relevance and intelligence collection impact.

Skill
4049

Skill to prepare and deliver reports, presentations and briefings, to include using visual aids or presentation technology.

Skill
4055

Skill to resolve conflicting collection requirements.

Skill
4056

Skill to review performance specifications and historical information about collection assets.

Skill
4057

Skill to specify collections and/or taskings that must be conducted in the near term.

Skill
4063

Skill to evaluate requests for information to determine if response information exists.

Skill
4065

Skill to use systems and/or tools to track collection requirements and determine whether or not they are satisfied.

Skill
4113

Knowledge of the request for information process.

Knowledge
52

Knowledge of human-computer interaction principles.

Knowledge
87

Knowledge of network traffic analysis methods.

Knowledge

Senior official or executive with the authority to formally assume responsibility for operating an information…

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
38

Knowledge of organization’s enterprise information security architecture system.

Knowledge
53

Knowledge of the Security Assessment and Authorization process.

Knowledge
55

Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
69

Knowledge of Risk Management Framework (RMF) requirements.

Knowledge
77

Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities.

Knowledge
88

Knowledge of new and emerging information technology (IT) and cybersecurity technologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
121

Knowledge of structured analysis principles and methods.

Knowledge
156A

Knowledge of confidentiality, integrity, and availability principles.

Knowledge
197

Skill in discerning the protection needs (i.e., security controls) of information systems and networks.

Skill
801B

Knowledge of threat and risk assessment.

Knowledge
979

Knowledge of supply chain risk management standards, processes, and practices.

Knowledge
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
1037A

Knowledge of information technology (IT) risk management policies, requirements, and procedures.

Knowledge
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1040A

Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure.

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5320

Establish acceptable limits for the software application, network, or system.

Task
5824

Authorizing Official only: Approve security and privacy assessment plans for systems and environments of operation.

Task
5838

Review and approve security categorization results for systems.

Task
5839

Review security and privacy assessment plans for systems and environments of operation.

Task
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6936

Knowledge of types of authorizations.

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
5827

Determine the authorization boundaries of systems.

Task

Additional KSATs:
KSAT ID Description KSAT
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1038

Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
1131

Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]).

Knowledge
1142

Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

Knowledge
1146

Develop and Implement cybersecurity independent audit processes for application software/networks/systems and oversee ongoing independent audits to ensure that operational and Research and Design (R&D) processes and procedures are in compliance with organizational and mandatory cybersecurity requirements and accurately followed by Systems Administrators and other cybersecurity staff when performing their day-to-day activities.

Task
1157A

Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity and AI.

Knowledge
128

Knowledge of systems diagnostic tools and fault identification techniques.

Knowledge
143

Knowledge of the organization’s enterprise information technology (IT) goals and objectives.

Knowledge
177B

Knowledge of countermeasures for identified security risks.

Knowledge
179

Skill in designing security controls based on cybersecurity principles and tenets.

Skill
19

Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities.

Knowledge
27

Knowledge of cryptography and cryptographic key management concepts.

Knowledge
325

Knowledge of secure acquisitions (e.g., relevant Contracting Officer’s Technical Representative [COTR] duties, secure procurement, supply chain risk management).

Knowledge
3591

Knowledge of organization objectives, leadership priorities, and decision-making risks.

Knowledge
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
43A

Knowledge of embedded systems.

Knowledge
58

Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins.

Knowledge
5837

Respond to threats and vulnerabilities based on the results of ongoing/continuous monitoring activities and risk assessments and decide if risk remains acceptable.

Task
600

Evaluate cost benefit, economic, and risk analysis in decision making process.

Task
6931

Knowledge of methods and techniques for analyzing risk.

Knowledge
696B

Authorizing Official only: Approve authorization packages.

Task
696C

Manage authorization packages.

Task
70

Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).

Knowledge
710

Monitor and evaluate a system’s compliance with information technology (IT) security, resilience, and dependability requirements.

Task
836A

Authorizing Official only: Determine if the security and privacy risk from operating a system or using a system, service, or application from an external provider is acceptable.

Task
942

Knowledge of the organization’s core business/mission processes.

Knowledge
952

Knowledge of emerging security issues, risks, and vulnerabilities.

Knowledge
95A

Knowledge of penetration testing principles, tools, and techniques.

Knowledge
965

Knowledge of organization’s risk tolerance and/or risk management approach.

Knowledge
98

Knowledge of policy-based and risk adaptive access controls.

Knowledge

Manages the Communications Security (COMSEC) resources of an organization (CNSSI No. 4009).

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
25

Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]).

Knowledge
37

Knowledge of disaster recovery continuity of operations plans.

Knowledge
55

Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data.

Knowledge
61

Knowledge of incident response and handling methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
395

Advise senior management (e.g., CIO) on risk levels and security posture.

Task
578

Ensure security improvement actions are evaluated, validated, and implemented as required.

Task
824

Recognize a possible security violation and take appropriate action to report the incident, as required.

Task
852

Supervise or manage protective or corrective measures when an cybersecurity incident or vulnerability is discovered.

Task
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1004

Knowledge of critical information technology (IT) procurement requirements.

Knowledge
1040A

Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure.

Knowledge
129

Knowledge of system life cycle management principles, including software security and usability.

Knowledge
143

Knowledge of the organization’s enterprise information technology (IT) goals and objectives.

Knowledge
183

Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Skill
299

Knowledge of information security program management and project management principles and techniques.

Knowledge
325

Knowledge of secure acquisitions (e.g., relevant Contracting Officer’s Technical Representative [COTR] duties, secure procurement, supply chain risk management).

Knowledge
396

Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, and systems, and elements.

Task
445

Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.

Task
475

Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance.

Task
596

Establish overall enterprise information security architecture (EISA) with the organization’s overall security strategy.

Task
600

Evaluate cost benefit, economic, and risk analysis in decision making process.

Task

Responsible for device, equipment, and system-level cybersecurity configuration and day-to-day security operations of control systems,…

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
106

Knowledge of remote access technology concepts.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
708A

Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance for the appropriate senior leader or authorized representative.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
3277

Knowledge of general SCADA system components.

Knowledge
3740

Skill in determining installed patches on various operating systems and identifying patch signatures.

Skill
5823

Apply updates, patches, and security technical implementation while maintaining control system performance and availability requirements.

Task
5829

Establish and maintain security configuration baseline for the control system(s), including field devices, IT components, interconnections, and interfaces.

Task
5830

Implement Risk Management Framework (RMF) Assessment requirements for control systems, and document/maintain records for them.

Task
5831

Maintain knowledge of the function and security of control system and IT technologies with which the control systems interface.

Task
5832

Maintain network segmentation to isolate control systems from business networks and other external connections as directed.

Task
5836

Perform asset management and maintain inventory of control system devices and components through physical inspection or logical scans.

Task
5840

Support risk assessments by reviewing and documenting the implementation status of security requirements of control systems.

Task
6929

Knowledge of control system technologies, such as Programmable Logic Controllers (PLCs), Supervisory Control and Data Acquisition (SCADA) software, Distributed Control Systems (DCS) and Operational Technology (OT).

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6927

Knowledge of control system environment risks, threats and vulnerabilities.

Knowledge
6933

Knowledge of risk management processes specific to control systems.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
6940

Skill in applying security and managing risk in resource-constrained systems and networks.

Skill
6941

Skill in architecting compensating security controls to reduce risk for control systems and control system components that do not have adequate or compliant security capabilities.

Skill
6946

Skill in securing control system communication protocols (e.g., IP/TCP, SSL/TLS, MODBUS/DNP3/PROFINET SCADA, GOOSE) and media used for field device control.

Skill

Additional KSATs:
KSAT ID Description KSAT
3353

Knowledge of the Risk Management Framework Assessment Methodology.

Knowledge
342A

Knowledge of operating system command line/prompt.

Knowledge
3A

Skill in recognizing vulnerabilities in security systems.

Skill
43A

Knowledge of embedded systems.

Knowledge
5821

Act as a liaison between facility operations/engineer teams and IT or network security teams to coordinate security activities.

Task
5822

Apply tailored organizational security policies and procedures for control system environments to maintain security, but also to ensure system availability.

Task
5826

Consult on control system security matters (e.g., risk assessment, configuration management) as needed.

Task
5828

Ensure configuration and collection of control system audit logs for monitoring and forensic analysis as appropriate.

Task
5833

Off-load and review control system audit logs and review for anomalies.

Task
5834

Participate in control system change management in conjunction with IT personnel and control system experts (e.g., system supplier).

Task
5835

Participate in control system incident and disaster response, including secure system recovery.

Task
6928

Knowledge of control system performance and availability requirements.

Knowledge
6934

Knowledge of RMF assessment types (e.g., Assess & Authorize (A&A), Assess Only) and authorization boundaries (e.g., Closed Restricted Network (CRN), Stand-alone Information System (SIS)).

Knowledge
6937

Knowledge of what “normal” control system operations for specific mission/business functions look like.

Knowledge
6939

Skill in active and passive methods to safely gather information and conduct vulnerability and network analysis scans in control system environments.

Skill
6943

Skill in identifying and investigating “abnormal” control system operations based on what specific mission/business functions look like.

Skill
69A

Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).

Knowledge
809

Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).

Task
88A

Knowledge of current and emerging cyber technologies.

Knowledge

Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques.

Workforce Element:
Cyberspace Enablers / Legal/Law Enforcement

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
217

Skill in preserving evidence integrity according to standard operating procedures or national standards.

Skill
281

Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, electronic organizers, hard drives, memory cards, modems, network components, printers, removable storage devices, scanners, telephones, copiers, credit card skimmers, facsimile machines, global positioning systems [GPSs]).

Knowledge
290

Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody).

Knowledge
340

Knowledge of types and collection of persistent data.

Knowledge
369

Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data.

Skill
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
3155

Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3159

Knowledge of cyber operations support or enabling processes.

Knowledge
3211

Knowledge of cyber laws and legal considerations and their effect on cyber planning.

Knowledge
3235

Knowledge of deconfliction processes and procedures.

Knowledge
3257

Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities.

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3264

Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization.

Knowledge
3356

Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations.

Knowledge
3419

Knowledge of organization or partner exploitation of digital networks.

Knowledge
3585

Knowledge of accepted organization planning systems.

Knowledge
3591

Knowledge of organization objectives, leadership priorities, and decision-making risks.

Knowledge
3615

Knowledge of the structure and intent of organization specific plans, guidance and authorizations.

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3638

Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations.

Knowledge
3639

Knowledge of organization cyber operations programs, strategies, and resources.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1039

Skill in evaluating the trustworthiness of the supplier and/or product.

Skill
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
310

Knowledge of legal governance related to admissibility (e.g., Federal Rules of Evidence).

Knowledge
3480

Knowledge of security implications of software configurations.

Knowledge
383

Skill in using scientific rules and methods to solve problems.

Skill
454

Conduct interviews of victims and witnesses and conduct interviews or interrogations of suspects.

Task
5040

Analyze the crisis situation to ensure public, personal, and resource protection.

Task
5070

Assess the behavior of the individual victim, witness, or suspect as it relates to the investigation.

Task
507A

Determine and develop leads and identify sources of information in order to identify and/or prosecute the responsible parties to an intrusion or other crimes.

Task
512

Develop a plan to investigate alleged crime, violation, or suspicious activity utilizing computers and the internet.

Task
5210

Determine the extent of threats and recommend courses of action and countermeasures to mitigate risks.

Task
5580

Provide criminal investigative support to trial counsel during the judicial process.

Task
564A

Document original condition of digital and/or associated evidence (e.g., via digital photographs, written reports, hash function checking).

Task
597

Establish relationships, if applicable, between the incident response team and other groups, both internal (e.g., legal department) and external (e.g., law enforcement agencies, vendors, and public relations professionals).

Task
620A

Employ information technology (IT) systems and digital storage media to solve, investigate, and/or prosecute cybercrimes and fraud committed against people and property.

Task
623

Fuse computer network attack analyses with criminal and counterintelligence investigations and operations.

Task
6230

Knowledge of crisis management protocols, processes, and techniques.

Knowledge
633

Identify and/or determine whether a security incident is indicative of a violation of law that requires specific legal action.

Task
636

Identify digital evidence for examination and analysis in such a way as to avoid unintentional alteration.

Task
6370

Knowledge of physical and physiological behaviors that may indicate suspicious or abnormal activity.

Knowledge
6440

Knowledge of the judicial process, including the presentation of facts and evidence.

Knowledge
649

Identify, collect, and seize documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents, investigations, and operations.

Task
788A

Prepare reports to document the investigation following legal standards and requirements.

Task
843

Secure the electronic device or information source.

Task
917

Knowledge of social dynamics of computer attackers in a global context.

Knowledge

Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network…

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
19

Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
59A

Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.

Knowledge
66

Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies.

Knowledge
70

Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).

Knowledge
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
87

Knowledge of network traffic analysis methods.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
150

Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities.

Knowledge
214A

Skill in performing packet-level analysis.

Skill
353

Skill in collecting data from a variety of cyber defense resources.

Skill
433

Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.

Task
472

Coordinate with enterprise-wide cyber defense staff to validate network alerts.

Task
723

Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.

Task
745

Perform cyber defense trend analysis and reporting.

Task
750

Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.

Task
767

Perform security reviews and identify security gaps in security architecture resulting in recommendations for the inclusion into the risk mitigation strategy.

Task
800

Provide daily summary reports of network events and activity relevant to cyber defense practices.

Task
823

Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.

Task
895

Skill in recognizing and categorizing types of vulnerabilities and associated attacks.

Skill
922B

Skill in using network analysis tools, including specialized tools for non-traditional systems and networks (e.g., control systems), to identify vulnerabilities.​

Skill
956

Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities.

Task
958

Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity.

Task
959

Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.

Task
984

Knowledge of cyber defense policies, procedures, and regulations.

Knowledge
990

Knowledge of the common attack vectors on the network layer.

Knowledge
991

Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution).

Knowledge
1069A

Knowledge of general kill chain (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).

Knowledge
1107

Identify and analyze anomalies in network traffic using metadata (e.g., CENTAUR).

Task
1108

Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).

Task
1111

Identify applications and operating systems of a network device based on network traffic.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
110

Knowledge of key concepts in security management (e.g., Release Management, Patch Management).

Knowledge
1103

Determine tactics, techniques, and procedures (TTPs) for intrusion sets.

Task
1104

Examine network topologies to understand data flows through the network.

Task
1105

Recommend computing environment vulnerability corrections.

Task
1109

Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools.

Task
111

Knowledge of security system design tools, methods, and techniques.

Knowledge
1110

Isolate and remove malware.

Task
1111

Identify applications and operating systems of a network device based on network traffic.

Task
1112

Reconstruct a malicious attack or activity based off network traffic.

Task
1113

Identify network mapping and operating system (OS) fingerprinting activities.

Task
1114

Knowledge of encryption methodologies.

Knowledge
1118

Skill in reading and interpreting signatures (e.g., snort).

Skill
1119

Knowledge of signature implementation impact.

Knowledge
1120

Ability to interpret and incorporate data from multiple tool sources.

Ability
1121

Knowledge of Windows/Unix ports and services.

Knowledge
1142

Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

Knowledge
130A

Knowledge of systems security testing and evaluation methods.

Knowledge
133

Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).

Knowledge
138

Knowledge of the cyber defense Service Provider reporting structure and processes within one’s own organization.

Knowledge
139

Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications.

Knowledge
148

Knowledge of Virtual Private Network (VPN) security.

Knowledge
175

Skill in developing and deploying signatures.

Skill
177B

Knowledge of countermeasures for identified security risks.

Knowledge
179A

Skill in assessing security controls based on cybersecurity principles and tenets.

Skill
181A

Skill in detecting host and network based intrusions via intrusion detection technologies.

Skill
183

Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Skill
199

Skill in evaluating the adequacy of security designs.

Skill
2062

Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the NE or enclave.

Task
21

Knowledge of computer algorithms.

Knowledge
212A

Knowledge of network mapping and recreating network topologies.

Knowledge
229

Skill in using incident handling methodologies.

Skill
233

Skill in using protocol analyzers.

Skill
234B

Knowledge of the use of sub-netting tools.

Knowledge
25

Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]).

Knowledge
2611

Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan.

Task
27

Knowledge of cryptography and cryptographic key management concepts.

Knowledge
270

Knowledge of common adversary tactics, techniques, and procedures in assigned area of responsibility (i.e., historical country-specific tactics, techniques, and procedures; emerging capabilities).

Knowledge
271

Knowledge of common network tools (e.g., ping, traceroute, nslookup).

Knowledge
277

Knowledge of defense-in-depth principles and network security architecture.

Knowledge
278

Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).

Knowledge
286

Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip).

Knowledge
3007

Ability to analyze malware.

Ability
34

Knowledge of database systems.

Knowledge
342A

Knowledge of operating system command line/prompt.

Knowledge
3431

Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).

Knowledge
3461

Knowledge of relevant laws, legal authorities, restrictions, and regulations pertaining to cyber defense activities.

Knowledge
3C

Skill in recognizing vulnerabilities in information and/or data systems.

Skill
427

Develop content for cyber defense tools.

Task
43A

Knowledge of embedded systems.

Knowledge
49

Knowledge of host/network access control mechanisms (e.g., access control list).

Knowledge
559A

Analyze and report organizational security posture trends.

Task
559B

Analyze and report system security posture trends.

Task
576

Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.

Task
58

Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins.

Knowledge
593A

Assess adequate access controls based on principles of least privilege and need-to-know.

Task
61

Knowledge of incident response and handling methodologies.

Knowledge
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
716A

Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.

Task
717A

Assess and monitor cybersecurity related to system implementation and testing practices.

Task
75C

Skill in conducting trend analysis.

Skill
782

Plan and recommend modifications or adjustments based on exercise results or system environment.

Task
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
8

Knowledge of authentication, authorization, and access control methods.

Knowledge
806A

Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities.

Task
880A

Work with stakeholders to resolve computer security incidents and vulnerability compliance.

Task
88B

Knowledge of new and emerging control systems technologies.

Knowledge
90

Knowledge of operating systems.

Knowledge
904

Knowledge of interpreted and compiled computer languages.

Knowledge
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
915

Knowledge of front-end collection systems, including traffic collection, filtering, and selection.

Knowledge
938A

Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans.

Task
95A

Knowledge of penetration testing principles, tools, and techniques.

Knowledge
98

Knowledge of policy-based and risk adaptive access controls.

Knowledge
992C

Knowledge of threat environments (e.g., first generation threat actors, threat activities).

Knowledge

Analyzes digital evidence and investigates computer security incidents to derive useful information in support of…

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
24A

Knowledge of basic concepts and practices of processing digital forensic data.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
217

Skill in preserving evidence integrity according to standard operating procedures or national standards.

Skill
302

Knowledge of investigative implications of hardware, Operating Systems, and network technologies.

Knowledge
350

Skill in analyzing memory dumps to extract information.

Skill
381

Skill in using forensic tool suites (e.g., EnCase, Sleuthkit, FTK).

Skill
438A

Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.

Task
447

Conduct analysis of log files, evidence, and other information in order to determine best methods for identifying the perpetrator(s) of a network intrusion.

Task
463

Confirm what is known about an intrusion and discover new information, if possible, after identifying intrusion via dynamic analysis.

Task
541

Provide technical summary of findings in accordance with established reporting procedures.

Task
613

Examine recovered data for information of relevance to the issue at hand.

Task
752

Perform file signature analysis.

Task
890

Skill in conducting forensic analyses in multiple operating system environments (e.g., mobile device systems).

Skill
1082

Perform file system forensic analysis.

Task
1086

Knowledge of data carving tools and techniques (e.g., Foremost).

Knowledge
1087

Skill in deep analysis of captured malicious code (e.g., malware forensics).

Skill
1088

Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump).

Skill
1089

Knowledge of reverse engineering concepts.

Knowledge
1092

Knowledge of anti-forensics tactics, techniques, and procedures.

Knowledge
1096

Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro).

Knowledge
1098

Skill in analyzing anomalous code as malicious or benign.

Skill
1099

Skill in analyzing volatile data.

Skill
1100

Skill in identifying obfuscation techniques.

Skill
1101

Skill in interpreting results of debugger to ascertain tactics, techniques, and procedures.

Skill
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6810

Knowledge of binary analysis.

Knowledge
6850

Skill in analyzing malware.

Skill
6860

Skill in conducting bit-level analysis.

Skill
6870

Skill in processing digital evidence, to include protecting and making legally sound copies of evidence.

Skill
6890

Ability to conduct forensic analyses in and for both Windows and Unix/Linux environments.

Ability
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1031

Serve as technical expert and liaison to law enforcement personnel and explain incident details as required.

Task
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1081

Perform virus scanning on digital media.

Task
1083

Perform static analysis to mount an “image” of a drive (without necessarily having the original drive).

Task
1084

Perform static malware analysis.

Task
1085

Utilize deployable forensics tool kit to support operations as necessary.

Task
1091

Skill in one way hash functions (e.g., Secure Hash Algorithm [SHA], Message Digest Algorithm [MD5]).

Skill
1093

Knowledge of common forensics tool configuration and support applications (e.g., VMWare, WIRESHARK).

Knowledge
1094

Knowledge of debugging procedures and tools.

Knowledge
1095

Knowledge of how different file types can be used for anomalous behavior.

Knowledge
1097

Knowledge of virtual machine aware malware, debugger aware malware, and packing.

Knowledge
113

Knowledge of server and client operating systems.

Knowledge
114

Knowledge of server diagnostic tools and fault identification techniques.

Knowledge
139

Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications.

Knowledge
193

Skill in developing, testing, and implementing network infrastructure contingency and recovery plans.

Skill
214A

Skill in performing packet-level analysis.

Skill
2179

Coordinate with intelligence analysts to correlate threat assessment data.

Task
25

Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]).

Knowledge
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
287

Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]).

Knowledge
29

Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.

Knowledge
290

Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody).

Knowledge
294

Knowledge of hacking methodologies in Windows or Unix/Linux environment.

Knowledge
310

Knowledge of legal governance related to admissibility (e.g., Federal Rules of Evidence).

Knowledge
316

Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data.

Knowledge
340

Knowledge of types and collection of persistent data.

Knowledge
345

Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies.

Knowledge
346

Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files.

Knowledge
3461

Knowledge of relevant laws, legal authorities, restrictions, and regulations pertaining to cyber defense activities.

Knowledge
3513

Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems.

Knowledge
360

Skill in identifying and extracting data of forensic interest in diverse media (i.e., media forensics).

Skill
364

Skill in identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files).

Skill
369

Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data.

Skill
374

Skill in setting up a forensic workstation.

Skill
386

Skill in using virtual machines.

Skill
389

Skill in physically disassembling PCs.

Skill
480

Create a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes. This includes, but is not limited to, hard drives, floppy diskettes, CD, PDA, mobile phones, GPS, and all tape formats.

Task
482

Decrypt seized data using technical means.

Task
5690

Process image with appropriate tools depending on analyst’s goals.

Task
5700

Perform Windows registry analysis.

Task
5720

Perform file and registry monitoring on the running system after identifying intrusion via dynamic analysis.

Task
573

Ensure chain of custody is followed for all digital media acquired in accordance with the Federal Rules of Evidence.

Task
5730

Enter media information into tracking database (e.g. Product Tracker Tool) for digital media that has been acquired.

Task
5740

Correlate incident data and perform cyber defense reporting.

Task
5760

Maintain deployable cyber defense toolkit (e.g. specialized cyber defense software/hardware) to support IRT mission.

Task
61

Knowledge of incident response and handling methodologies.

Knowledge
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
636

Identify digital evidence for examination and analysis in such a way as to avoid unintentional alteration.

Task
6820

Knowledge of network architecture concepts including topology, protocols, and components.

Knowledge
749

Perform dynamic analysis to boot an “image” of a drive (without necessarily having the original drive) to see the intrusion as the user may have seen it, in a native environment.

Task
753

Perform hash comparison against established database.

Task
758

Perform real-time forensic analysis (e.g., using Helix in conjunction with LiveView).

Task
759

Perform timeline analysis.

Task
762

Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs).

Task
768

Perform static media analysis.

Task
771

Perform tier 1, 2, and 3 malware analysis.

Task
786

Prepare digital media for imaging by ensuring data integrity (e.g., write blockers in accordance with standard operating procedures).

Task
817

Provide technical assistance on digital evidence matters to appropriate personnel.

Task
825

Recognize and accurately report forensic artifacts indicative of a particular operating system.

Task
839A

Review forensic images and other data sources (e.g., volatile data) for recovery of potentially relevant information.

Task
868A

Use data carving techniques (e.g., FTK-Foremost) to extract data for further analysis.

Task
870

Capture and analyze network traffic associated with malicious activities using network monitoring tools.

Task
871

Use specialized equipment and techniques to catalog, document, extract, collect, package, and preserve digital evidence.

Task
882A

Write and publish cyber defense recommendations, reports, and white papers on incident findings to appropriate constituencies.

Task
888

Knowledge of types of digital forensics data and how to recognize them.

Knowledge
889

Knowledge of deployable forensics.

Knowledge
90

Knowledge of operating systems.

Knowledge
908

Ability to decrypt digital data collections.

Ability
923

Knowledge of security event correlation tools.

Knowledge
944

Conduct cursory binary analysis.

Task
983

Knowledge of legal rules of evidence and court procedure.

Knowledge

Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
37

Knowledge of disaster recovery continuity of operations plans.

Knowledge
50

Knowledge of how network services and protocols interact to provide network communications.

Knowledge
60

Knowledge of incident categories, incident responses, and timelines for responses.

Knowledge
61

Knowledge of incident response and handling methodologies.

Knowledge
66

Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies.

Knowledge
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
150

Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities.

Knowledge
153

Skill of identifying, capturing, containing, and reporting malware.

Skill
217

Skill in preserving evidence integrity according to standard operating procedures or national standards.

Skill
470

Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.

Task
716A

Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise.

Task
741A

Coordinate incident response functions.

Task
745

Perform cyber defense trend analysis and reporting.

Task
755

Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.

Task
823

Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.

Task
882

Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies.

Task
893

Skill in securing network communications.

Skill
895

Skill in recognizing and categorizing types of vulnerabilities and associated attacks.

Skill
896

Skill in protecting a network against malware.

Skill
897

Skill in performing damage assessments.

Skill
923A

Skill in using security event correlation tools.

Skill
984

Knowledge of cyber defense policies, procedures, and regulations.

Knowledge
991

Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution).

Knowledge
1029A

Knowledge of malware analysis concepts and methodologies.

Knowledge
1030

Collect intrusion artifacts (e.g., source code, malware, trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.

Task
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
1069

Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation or privileges, maintaining access, network exploitation, covering tracks).

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
3431

Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).

Knowledge
5670

Write and publish after action reviews.

Task
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1031

Serve as technical expert and liaison to law enforcement personnel and explain incident details as required.

Task
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
2179

Coordinate with intelligence analysts to correlate threat assessment data.

Task
29

Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.

Knowledge
3362A

Knowledge of key factors of the operational environment and related threats and vulnerabilities.

Knowledge
3561

Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

Knowledge
478

Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.

Task
49

Knowledge of host/network access control mechanisms (e.g., access control list).

Knowledge
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
738

Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.

Task
743

Perform cyber defense incident triage, to include determining scope, urgency, and potential impact; identifying the specific vulnerability; and making recommendations that enable expeditious remediation.

Task
762

Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs).

Task
861

Track and document cyber defense incidents from initial detection through final resolution.

Task
87

Knowledge of network traffic analysis methods.

Knowledge
93

Knowledge of packet-level analysis.

Knowledge
961

Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).

Task
992C

Knowledge of threat environments (e.g., first generation threat actors, threat activities).

Knowledge

Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
49

Knowledge of host/network access control mechanisms (e.g., access control list).

Knowledge
59A

Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.

Knowledge
61

Knowledge of incident response and handling methodologies.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
87A

Knowledge of network traffic analysis (tools, methodologies, processes).

Knowledge
92B

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol (TCP), Internet Protocol (IP), Open System Interconnection Model (OSI)).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
148

Knowledge of Virtual Private Network (VPN) security.

Knowledge
150

Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities.

Knowledge
643A

Identify potential conflicts with implementation of any cyber defense tools(e.g., tool and signature testing and optimization).

Task
960

Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.

Task
984

Knowledge of cyber defense policies, procedures, and regulations.

Knowledge
1012A

Knowledge of test procedures, principles, and methodologies (e.g., Capabilities and Maturity Model Integration (CMMI)).

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2772

Build, install, configure, and test dedicated cyber defense hardware.

Task
5090

Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure.

Task
6700

Skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1074A

Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.

Knowledge
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
157

Skill in applying host/network access controls (e.g., access control list).

Skill
227

Skill in tuning sensors.

Skill
229

Skill in using incident handling methodologies.

Skill
237

Skill in using Virtual Private Network (VPN) devices and encryption.

Skill
29

Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.

Knowledge
3143

Knowledge of basic system, network, and OS hardening techniques.

Knowledge
393B

Coordinate with system administrators to create cyber defense tools, test bed(s), and test and evaluate applications, hardware infrastructure, rules/signatures, access controls, and configurations of platforms managed by service provider(s).

Task
471

Coordinate with Cyber Defense Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, anti-virus, and content blacklists) for specialized cyber defense applications.

Task
481A

Create, edit, and manage network access control lists on specialized cyber defense systems (e.g., firewalls and intrusion prevention systems).

Task
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
654B

Implement risk assessment and authorization requirements per the Risk Management Framework (RMF) process for dedicated cyber defense systems within the enterprise, and document and maintain records for them.

Task
6670

Skill in system, network, and OS hardening techniques.

Skill
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
6919

Ability to determine the best cloud deployment model for the appropriate operating environment.

Ability
6942

Skill in designing or implementing cloud computing deployment models.

Skill
6945

Skill in migrating workloads to, from, and among the different cloud computing service models.

Skill
769

Perform system administration on specialized cyber defense applications and systems (e.g., anti-virus, audit and remediation) or Virtual Private Network (VPN) devices, to include installation, configuration, maintenance, backup and restoration.

Task
893

Skill in securing network communications.

Skill
896

Skill in protecting a network against malware.

Skill
900

Knowledge of web filtering technologies.

Knowledge
93

Knowledge of packet-level analysis.

Knowledge

Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.

Workforce Element:
Cyberspace Enablers / Training and Education

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
332

Ability to develop curriculum that speaks to the topic at the appropriate level for the target audience.

Ability
504A

Design training curriculum and course content based on requirements.

Task
841A

Conduct periodic reviews/revisions of course content for accuracy, completeness alignment, and currency (e.g., course content documents, lesson plans, student texts, examinations, schedules of instruction, and course descriptions).

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5260

Develop or assist in the development of training policies and protocols for cyber training.

Task
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1136A

Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud).

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
246A

Ability to apply the Instructional System Design (ISD) methodology.

Ability
314

Knowledge of multiple cognitive domains and appropriate tools and methods for learning in each domain.

Knowledge
359

Skill in developing and executing technical training programs and curricula.

Skill
363

Skill in identifying gaps in technical capabilities.

Skill
363A

Skill in identifying gaps in technical delivery capabilities.

Skill
376

Skill in talking to others to convey information effectively.

Skill
479A

Correlates training and learning to business or mission requirements.

Task
490A

Create training courses tailored to the audience and physical environment.

Task
5060

Assess effectiveness and efficiency of instruction according to ease of instructional technology use and student learning, knowledge transfer, and satisfaction.

Task
5130

Conduct learning needs assessments and identify requirements.

Task
5180

Create interactive learning exercises to create an effective learning environment.

Task
5280

Develop the goals and objectives for cyber curriculum.

Task
5420

Plan instructional strategies such as lectures, demonstrations, interactive exercises, multimedia presentations, video courses, web-based courses for most effective learning environment In conjunction with educators and trainers.

Task
6090

Ability to develop curriculum for use within a virtual environment.

Ability
6320

Knowledge of media production, communication, and dissemination techniques and methods, including alternative ways to inform via written, oral, and visual media.

Knowledge
6380

Knowledge of principles and processes for conducting training and education needs assessment.

Knowledge
6390

Knowledge of relevant concepts, procedures, software, equipment, and technology applications.

Knowledge
6450

Knowledge of training and education principles and methods for curriculum design, teaching and instruction for individuals and groups, and the measurement of training and education effects.

Knowledge
6480

Skill in applying technical delivery capabilities.

Skill
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
6919

Ability to determine the best cloud deployment model for the appropriate operating environment.

Ability
845A

Serve as an internal consultant and advisor in own area of expertise (e.g., technical, copyright, print media, electronic media).

Task
855

Support the design and execution of exercise scenarios.

Task
885

Write instructional materials (e.g., standard operating procedures, production manual) to provide detailed guidance to relevant portion of the workforce.

Task
88A

Knowledge of current and emerging cyber technologies.

Knowledge
905

Knowledge of secure coding techniques.

Knowledge
942

Knowledge of the organization’s core business/mission processes.

Knowledge
952

Knowledge of emerging security issues, risks, and vulnerabilities.

Knowledge

Develops and conducts training or education of personnel within cyber domain.

Workforce Element:
Cyberspace Enablers / Training and Education

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
282

Knowledge of emerging computer-based technology that has potential for exploitation by adversaries.

Knowledge
359

Skill in developing and executing technical training programs and curricula.

Skill
551A

Ensure training meets the goals and objectives for cybersecurity training, education, or awareness.

Task
952

Knowledge of emerging security issues, risks, and vulnerabilities.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1136A

Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud).

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
2295

Develop or assist in the development of computer based training modules or classes.

Task
2296

Develop or assist in the development of course assignments.

Task
2299

Develop or assist in the development of course evaluations.

Task
2300

Develop or assist in the development of grading and proficiency standards.

Task
2301

Assist in the development of individual/collective development, training, and/or remediation plans.

Task
2303

Develop or assist in the development of learning objectives and goals.

Task
2304

Develop or assist in the development of on-the-job training materials or programs.

Task
2306

Develop or assist in the development of written tests for measuring and assessing learner proficiency.

Task
3009

Ability to answer questions in a clear and concise manner.

Ability
3016

Ability to ask clarifying questions.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3024

Ability to communicate effectively when writing.

Ability
3046

Ability to facilitate small group discussions.

Ability
3049

Ability to gauge learner understanding and knowledge level.

Ability
3070

Ability to provide effective feedback to students for improving learning.

Ability
3126

Knowledge of assessment techniques (rubrics, evaluation plans, tests, quizzes).

Knowledge
314

Knowledge of multiple cognitive domains and appropriate tools and methods for learning in each domain.

Knowledge
3186

Knowledge of computer based training and e-learning services.

Knowledge
332A

Ability to tailor curriculum that speaks to the topic at the appropriate level for the target audience.

Ability
3330

Knowledge of instructional design and evaluation models (e.g., ADDIE, Smith/Ragan model, Gagne’s Events of Instruction, Kirkpatrick’s model of evaluation).

Knowledge
3360

Knowledge of organizational training policies.

Knowledge
3364

Knowledge of learning levels (i.e., Bloom’s Taxonomy of learning).

Knowledge
3365

Knowledge of Learning Management Systems and their use in managing learning.

Knowledge
3366

Knowledge of learning styles (e.g., assimilator, auditory, kinesthetic).

Knowledge
3395

Knowledge of modes of learning (e.g., rote learning, observation).

Knowledge
344

Knowledge of virtualization technologies and virtual machine development and maintenance.

Knowledge
3588

Knowledge of organizational training systems.

Knowledge
3604

Ability to apply principles of adult learning.

Ability
363B

Knowledge of technical delivery capabilities and their limitations.

Knowledge
3734

Ability to design valid and reliable assessments.

Ability
3749

Ability to develop clear directions and instructional materials.

Ability
376

Skill in talking to others to convey information effectively.

Skill
3942

Skill in utilizing or developing learning activities (e.g., scenarios, instructional games, interactive exercises).

Skill
3944

Skill in utilizing technologies (e.g., SmartBoards, websites, computers, projectors) for instructional purposes.

Skill
453

Conduct interactive training exercises to create an effective learning environment.

Task
490B

Deliver training courses tailored to the audience and physical/virtual environments.

Task
491A

Apply concepts, procedures, software, equipment, and/or technology applications to students.

Task
504B

Participate in development of training curriculum and course content.

Task
538

Develop new or identify existing awareness and training materials that are appropriate for intended audiences.

Task
606

Evaluate the effectiveness and comprehensiveness of existing training programs.

Task
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
6919

Ability to determine the best cloud deployment model for the appropriate operating environment.

Ability
778A

Plan and coordinate the delivery of classroom techniques and formats (e.g., lectures, demonstrations, interactive exercises, multimedia presentations) for most effective learning environment.

Task
779A

Plan non-classroom educational techniques and formats (e.g., video courses, mentoring, web-based courses).

Task
841

Review training documentation (e.g., Course Content Documents [CCD], lesson plans, student texts, examinations, Schedules of Instruction [SOI], and course descriptions).

Task
842A

Recommend revisions to curriculum end course content based on feedback from previous training sessions.

Task
845A

Serve as an internal consultant and advisor in own area of expertise (e.g., technical, copyright, print media, electronic media).

Task
855

Support the design and execution of exercise scenarios.

Task
885

Write instructional materials (e.g., standard operating procedures, production manual) to provide detailed guidance to relevant portion of the workforce.

Task
88A

Knowledge of current and emerging cyber technologies.

Knowledge
905A

Skill in applying secure coding techniques.

Skill
918

Ability to prepare and deliver education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures.

Ability
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to…

Workforce Element:
Intelligence (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
1056

Knowledge of operations security.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2009

Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives.

Task
2043

Coordinate for intelligence support to operational planning activities.

Task
2045

Assess all-source intelligence and recommend targets to support cyber operation objectives.

Task
2052

Assess target vulnerabilities and/or operational capabilities to determine course of action.

Task
2064

Assist in the development and refinement of priority information requirements.

Task
2070

Enable synchronization of intelligence support plans across partner organizations as required.

Task
2159

Contribute to crisis action planning for cyber operations.

Task
2163

Incorporate intelligence equities into the overall design of cyber operations plans.

Task
2181

Coordinate with intelligence planners to ensure collection managers receive information requirements.

Task
2185

Coordinate with the intelligence planning team to assess capability to satisfy assigned intelligence tasks.

Task
2186

Coordinate, produce and track intelligence requirements.

Task
2187

Coordinate, synchronize and draft applicable intelligence sections of cyber operations plans.

Task
2237

Determine indicators (e.g., measures of effectiveness) that are best suited to specific cyber operation objectives.

Task
2267

Develop and review intelligence guidance for integration into supporting cyber operations planning and execution.

Task
2276

Develop detailed intelligence support to cyber operations requirements.

Task
2352

Draft cyber intelligence collection and production requirements.

Task
2368

Ensure that intelligence planning activities are integrated and synchronized with operational planning timelines.

Task
2386

Evaluate intelligence estimates to support the planning cycle.

Task
2425

Incorporate intelligence and counterintelligence to support plan development.

Task
2442

Identify, draft, evaluate, and prioritize relevant intelligence or information requirements.

Task
2459A

Identify cyber intelligence gaps and shortfalls.

Task
2484

Identify the need, scope, and timeframe for applicable intelligence environment preparation derived production.

Task
2509

Provide input to or develop courses of action based on threat factors.

Task
2529

Issue requests for information.

Task
2530

Knowledge and understanding of operational design.

Knowledge
2531

Knowledge of organizational planning concepts.

Knowledge
2532

Lead and coordinate intelligence support to operational planning.

Task
2558

Maintain relationships with internal and external partners involved in cyber planning or related areas.

Task
2619

Provide subject matter expertise to planning teams, coordination groups, and task forces as necessary.

Task
2624

Conduct long-range, strategic planning efforts with internal and external partners in cyber activities.

Task
2736

Provide cyber focused guidance and advice on intelligence support plan inputs.

Task
2778

Recommend refinement, adaption, termination, and execution of operational plans as appropriate.

Task
2806

Review and comprehend organizational leadership objectives and guidance for planning.

Task
2819

Scope the cyber intelligence planning effort.

Task
2888

Document lessons learned that convey the results of events and/or exercises.

Task
3003

Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment.

Ability
3011

Ability to apply critical reading/thinking skills.

Ability
3015

Ability to apply approved planning development and staffing processes.

Ability
3021

Ability to collaborate effectively with others.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3033

Ability to coordinate cyber operations with other organization functions or support activities.

Ability
3040

Ability to develop or recommend planning solutions to problems and situations for which no precedent exists.

Ability
3041

Ability to effectively collaborate via virtual teams.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3060

Ability to interpret and understand complex and rapidly evolving concepts.

Ability
3066

Ability to participate as a member of planning teams, coordination groups, and task forces as necessary.

Ability
3076

Ability to tailor technical and planning information to a customer’s level of understanding.

Ability
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3107

Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.).

Knowledge
3114

Knowledge of all forms of intelligence support needs, topics, and focus areas.

Knowledge
3117

Knowledge of all-source reporting and dissemination procedures.

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3155

Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3159

Knowledge of cyber operations support or enabling processes.

Knowledge
3174

Knowledge of the intelligence requirements development and request for information processes.

Knowledge
3177

Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3194

Knowledge of crisis action planning and time sensitive planning procedures.

Knowledge
3215

Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber attack) principles, capabilities, limitations, and effects.

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3257

Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities.

Knowledge
3264

Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization.

Knowledge
3274

Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects.

Knowledge
3275

Knowledge of fundamental cyber concepts, principles, limitations, and effects.

Knowledge
3287

Knowledge of how collection requirements and information needs are translated, tracked, and prioritized across the extended enterprise.

Knowledge
3311

Knowledge of analytical standards and the purpose of intelligence confidence levels.

Knowledge
3336

Knowledge of intelligence employment requirements (i.e., logistical, communications support, maneuverability, legal restrictions, etc.).

Knowledge
3340

Knowledge of intelligence requirements tasking systems.

Knowledge
3342

Knowledge of intelligence support to planning, execution, and assessment.

Knowledge
3388

Knowledge of crisis action planning for cyber operations.

Knowledge
3397

Knowledge of intelligence capabilities and limitations.

Knowledge
3443

Knowledge of PIR approval process.

Knowledge
3444

Knowledge of planning activity initiation.

Knowledge
3445

Knowledge of planning timelines adaptive, crisis action, and time-sensitive planning.

Knowledge
3463

Knowledge of required intelligence planning products associated with cyber operational planning.

Knowledge
3489

Knowledge of organizational structures and associated intelligence capabilities.

Knowledge
3554

Knowledge of the critical information requirements and how they’re used in planning.

Knowledge
3560

Knowledge of the production responsibilities and organic analysis and production capabilities.

Knowledge
3561

Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

Knowledge
3582

Knowledge of the intelligence frameworks, processes, and related systems.

Knowledge
3584

Knowledge of intelligence preparation of the environment and similar processes.

Knowledge
3585

Knowledge of accepted organization planning systems.

Knowledge
3606

Knowledge of the process used to assess the performance and impact of operations.

Knowledge
3609

Knowledge of the range of cyber operations and their underlying intelligence support needs, topics, and focus areas.

Knowledge
3610

Knowledge of the relationships between end states, objectives, effects, lines of operation, etc.

Knowledge
3611

Knowledge of the relationships of operational objectives, intelligence requirements, and intelligence production tasks.

Knowledge
3629

Knowledge of the various collection disciplines and capabilities.

Knowledge
3651

Knowledge of what constitutes a “threat” to a network.

Knowledge
3659

Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.

Knowledge
3665

Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures.

Skill
3681

Skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action.

Skill
3685

Skill in applying crisis planning procedures.

Skill
3742

Skill in determining the physical location of network devices.

Skill
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3844

Skill in preparing and presenting briefings.

Skill
3845

Skill in preparing plans and related correspondence.

Skill
3879

Skill in reviewing and editing plans.

Skill
3938

Skill in utilizing feedback in order to improve processes, products, and services.

Skill
3965

Skill to analyze strategic guidance for issues requiring clarification and/or additional guidance.

Skill
3966

Skill to anticipate intelligence capability employment requirements.

Skill
3967

Skill to anticipate key target or threat activities which are likely to prompt a leadership decision.

Skill
3971

Skill to apply analytical standards to evaluate intelligence products.

Skill
3976

Skill to apply the process used to assess the performance and impact of cyber operations.

Skill
3978

Skill to articulate the needs of joint planners to all-source analysts.

Skill
3979

Skill to articulate intelligence capabilities available to support execution of the plan.

Skill
3987

Skill to conceptualize the entirety of the intelligence process in the multiple domains and dimensions.

Skill
3990

Skill to convert intelligence requirements into intelligence production tasks.

Skill
3992

Skill to coordinate the development of tailored intelligence products.

Skill
3996

Skill to correlate intelligence priorities to the allocation of intelligence resources/assets.

Skill
3998

Skill to craft indicators of operational progress/success.

Skill
4000

Skill to create and maintain up-to-date planning documents and tracking of services/production.

Skill
4018

Skill to express orally and in writing the relationship between intelligence capability limitations and decision making risk and impacts on the overall operation.

Skill
4032

Skill to interpret planning guidance to discern level of analytical support required.

Skill
4045

Skill to orchestrate intelligence planning teams, coordinate collection and production support, and monitor status.

Skill
4053

Skill to relate intelligence resources/assets to anticipated intelligence requirements.

Skill
4059

Skill to synchronize planning activities and required intelligence support.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
2058

Assist and advise inter-agency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives.

Task
2073

Provide input to the identification of cyber-related success criteria.

Task
2091

Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials).

Task
2160

Contribute to the development of the organization’s decision support tools if necessary.

Task
2192

Use intelligence estimates to counter potential target actions.

Task
2310

Develop potential courses of action.

Task
2327

Develop, implement, and recommend changes to appropriate planning procedures and policies.

Task
2392

Evaluate the conditions that affect employment of available cyber intelligence capabilities.

Task
2435

Identify all available partner intelligence capabilities and limitations supporting cyber operations.

Task
2528

Interpret environment preparations assessments to determine a course of action.

Task
2564

Maintain situational awareness to determine if changes to the operating environment require review of the plan.

Task
2702

Prepare for and provide subject matter expertise to exercises.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3054

Ability to identify external partners with common cyber operations interests.

Ability
3057

Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.

Ability
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3098

Knowledge of virtualization products (Vmware, Virtual PC).

Knowledge
3205

Knowledge of current computer-based intrusion sets.

Knowledge
3211

Knowledge of cyber laws and legal considerations and their effect on cyber planning.

Knowledge
3235

Knowledge of deconfliction processes and procedures.

Knowledge
3253

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3271

Knowledge of internal and external partner cyber operations capabilities and tools.

Knowledge
3286

Knowledge of host-based security products and how they affect exploitation and vulnerability.

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3326

Knowledge of information security concepts, facilitating technologies and methods.

Knowledge
3356

Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations.

Knowledge
3358

Knowledge of organizational hierarchy and cyber decision making processes.

Knowledge
3374

Knowledge of malware.

Knowledge
3391

Knowledge of objectives, situation, operational environment, and the status and disposition of internal and external partner collection capabilities available to support planning.

Knowledge
3419

Knowledge of organization or partner exploitation of digital networks.

Knowledge
3459

Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization.

Knowledge
3539

Knowledge of telecommunications fundamentals.

Knowledge
3543

Knowledge of the basic structure, architecture, and design of modern communication networks.

Knowledge
3545

Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3570

Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements.

Knowledge
3571

Knowledge of the organizational planning and staffing process.

Knowledge
3572

Knowledge of organization decision support tools and/or methods.

Knowledge
3578

Knowledge of the impacts of internal and external partner staffing estimates.

Knowledge
3591

Knowledge of organization objectives, leadership priorities, and decision-making risks.

Knowledge
3601

Knowledge of the outputs of course of action and exercise analysis.

Knowledge
3607

Knowledge of the processes to synchronize operational assessment procedures with the critical information requirement process.

Knowledge
3615

Knowledge of the structure and intent of organization specific plans, guidance and authorizations.

Knowledge
3616

Knowledge of the structure, architecture, and design of modern digital and telephony networks.

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3630

Knowledge of the ways in which targets or threats use the Internet.

Knowledge
3638

Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations.

Knowledge
3639

Knowledge of organization cyber operations programs, strategies, and resources.

Knowledge
3766

Skill in documenting and communicating complex technical and programmatic information.

Skill
3877

Skill in reviewing and editing intelligence products from various sources for cyber operations.

Skill
3893

Skill in tailoring analysis to the necessary levels (e.g., classification and organizational).

Skill
3946

Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).

Skill
3964

Skill to analyze target or threat sources of strength and morale.

Skill
4023

Skill to graphically depict decision support materials containing intelligence and partner capability estimates.

Skill
4041

Skill to monitor threat effects to partner capabilities and maintain a running estimate.

Skill
4042

Skill to monitor target or threat situation and environmental factors.

Skill
52

Knowledge of human-computer interaction principles.

Knowledge

Provides legal advice and recommendations on relevant topics related to cyber law.

Workforce Element:
Cyberspace Enablers / Legal/Law Enforcement

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
390A

Acquire and maintain a working knowledge of constitutional issues relevant laws, regulations, policies, agreements, standards, procedures, or other issuances.

Task
574A

Provide legal analysis and decisions to inspector generals, privacy officers, oversight and compliance personnel with regard to compliance with cybersecurity policies and relevant legal and regulatory requirements.

Task
984

Knowledge of cyber defense policies, procedures, and regulations.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1070A

Ability to monitor and assess the potential impact of emerging technologies on laws, regulations, and/or policies.

Ability
24

Knowledge of concepts and practices of processing digital forensic data.

Knowledge
252

Knowledge of and experience in Insider Threat investigations, reporting, investigative tools and laws/regulations.

Knowledge
300A

Knowledge of intelligence principles, policies, and procedures including legal authorities and restrictions.

Knowledge
398

Advocate organization’s official position in legal and legislative proceedings.

Task
451A

Conduct framing of pleadings to properly identify alleged violations of law, regulations, or policy/guidance.

Task
539A

Develop guidelines for implementation.

Task
599

Evaluate contracts to ensure compliance with funding, legal, and program requirements.

Task
607

Evaluate the effectiveness of laws, regulations, policies, standards, or procedures.

Task
612A

Evaluate the impact of changes to laws, regulations, policies, standards, or procedures.

Task
618A

Provide guidance on laws, regulations, policies, standards, or procedures to management, personnel, or clients.

Task
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
655A

Facilitate implementation of new or revised laws, regulations, executive orders, policies, standards, or procedures.

Task
675

Interpret and apply laws, regulations, policies, standards, or procedures to specific issues.

Task
787A

Prepare legal and other relevant documents (e.g., depositions, briefs, affidavits, declarations, appeals, pleadings, discovery).

Task
834

Resolve conflicts in laws, regulations, policies, standards, or procedures.

Task
88A

Knowledge of current and emerging cyber technologies.

Knowledge
954A

Knowledge of foreign disclosure policies and import/export control regulations as related to cybersecurity.

Knowledge

Develops detailed plans for the conduct or support of the applicable range of cyber operations…

Workforce Element:
Cyberspace Effects

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

KSA
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
2009

Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives.

Task
2052

Assess target vulnerabilities and/or operational capabilities to determine course of action.

Task
2058

Assist and advise inter-agency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives.

Task
2073

Provide input to the identification of cyber-related success criteria.

Task
2130

Develop, review and implement all levels of planning guidance in support of cyber operations.

Task
2159

Contribute to crisis action planning for cyber operations.

Task
2160

Contribute to the development of the organization’s decision support tools if necessary.

Task
2186

Coordinate, produce and track intelligence requirements.

Task
2237

Determine indicators (e.g., measures of effectiveness) that are best suited to specific cyber operation objectives.

Task
2265

Develop and maintain deliberate and/or crisis plans.

Task
2266

Develop and review specific cyber operations guidance for integration into broader planning activities.

Task
2272

Develop cyber operations plans and guidance to ensure that execution and resource allocation decisions align with organization objectives.

Task
2327

Develop, implement, and recommend changes to appropriate planning procedures and policies.

Task
2365

Ensure operational planning efforts are effectively transitioned to current operations.

Task
2368

Ensure that intelligence planning activities are integrated and synchronized with operational planning timelines.

Task
2386

Evaluate intelligence estimates to support the planning cycle.

Task
2417

Facilitate the sharing of “best practices” and “lessons learned” throughout the cyber operations community.

Task
2424

Incorporate cyber operations and communications security support plans into organization objectives.

Task
2425

Incorporate intelligence and counterintelligence to support plan development.

Task
2446

Identify and submit intelligence requirements for the purposes of designating priority information requirements.

Task
2459

Identify intelligence gaps and shortfalls.

Task
2459A

Identify cyber intelligence gaps and shortfalls.

Task
2509

Provide input to or develop courses of action based on threat factors.

Task
2524

Integrate cyber planning/targeting efforts with other organizations.

Task
2528

Interpret environment preparations assessments to determine a course of action.

Task
2529

Issue requests for information.

Task
2531

Knowledge of organizational planning concepts.

Knowledge
2558

Maintain relationships with internal and external partners involved in cyber planning or related areas.

Task
2561

Maintain situational awareness of cyber-related intelligence requirements and associated tasking.

Task
2562

Maintain situational awareness of partner capabilities and activities.

Task
2590

Monitor and evaluate integrated cyber operations to identify opportunities to meet organization objectives.

Task
2621

Provide SME and support to planning/developmental forums and working groups as appropriate.

Task
2624

Conduct long-range, strategic planning efforts with internal and external partners in cyber activities.

Task
2626

Provide subject matter expertise to planning efforts with internal and external cyber operations partners.

Task
2628

Participate in exercises.

Task
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
270

Knowledge of common adversary tactics, techniques, and procedures in assigned area of responsibility (i.e., historical country-specific tactics, techniques, and procedures; emerging capabilities).

Knowledge
2752

Provide input to the administrative and logistical elements of an operational support plan.

Task
2770

Provide time sensitive targeting support.

Task
2806

Review and comprehend organizational leadership objectives and guidance for planning.

Task
2837

Submit or respond to requests for deconfliction of cyber operations.

Task
2888

Document lessons learned that convey the results of events and/or exercises.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3011

Ability to apply critical reading/thinking skills.

Ability
3021

Ability to collaborate effectively with others.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3033

Ability to coordinate cyber operations with other organization functions or support activities.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3054

Ability to identify external partners with common cyber operations interests.

Ability
3076

Ability to tailor technical and planning information to a customer’s level of understanding.

Ability
3098

Knowledge of virtualization products (Vmware, Virtual PC).

Knowledge
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3114

Knowledge of all forms of intelligence support needs, topics, and focus areas.

Knowledge
3146

Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3159

Knowledge of cyber operations support or enabling processes.

Knowledge
3194

Knowledge of crisis action planning and time sensitive planning procedures.

Knowledge
3211

Knowledge of cyber laws and legal considerations and their effect on cyber planning.

Knowledge
3218

Knowledge of cyber operations terminology/lexicon.

Knowledge
3219

Knowledge of cyber operations.

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3235

Knowledge of deconfliction processes and procedures.

Knowledge
3257

Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities.

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3264

Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization.

Knowledge
3268

Knowledge of staff management, assignment, and allocation processes.

Knowledge
3271

Knowledge of internal and external partner cyber operations capabilities and tools.

Knowledge
3287

Knowledge of how collection requirements and information needs are translated, tracked, and prioritized across the extended enterprise.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3338

Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions.

Knowledge
3342

Knowledge of intelligence support to planning, execution, and assessment.

Knowledge
3356

Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations.

Knowledge
3358

Knowledge of organizational hierarchy and cyber decision making processes.

Knowledge
3374

Knowledge of malware.

Knowledge
3391

Knowledge of objectives, situation, operational environment, and the status and disposition of internal and external partner collection capabilities available to support planning.

Knowledge
3419

Knowledge of organization or partner exploitation of digital networks.

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3463

Knowledge of required intelligence planning products associated with cyber operational planning.

Knowledge
3489

Knowledge of organizational structures and associated intelligence capabilities.

Knowledge
3571

Knowledge of the organizational planning and staffing process.

Knowledge
3572

Knowledge of organization decision support tools and/or methods.

Knowledge
3582

Knowledge of the intelligence frameworks, processes, and related systems.

Knowledge
3585

Knowledge of accepted organization planning systems.

Knowledge
3605

Knowledge of the information environment.

Knowledge
3607

Knowledge of the processes to synchronize operational assessment procedures with the critical information requirement process.

Knowledge
3610

Knowledge of the relationships between end states, objectives, effects, lines of operation, etc.

Knowledge
3615

Knowledge of the structure and intent of organization specific plans, guidance and authorizations.

Knowledge
3616

Knowledge of the structure, architecture, and design of modern digital and telephony networks.

Knowledge
3638

Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations.

Knowledge
3665

Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures.

Skill
3766

Skill in documenting and communicating complex technical and programmatic information.

Skill
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3844

Skill in preparing and presenting briefings.

Skill
3976

Skill to apply the process used to assess the performance and impact of cyber operations.

Skill
3998

Skill to craft indicators of operational progress/success.

Skill
4008

Skill to distinguish between notional and actual resources and their applicability to the plan under development.

Skill
4058

Skill to synchronize operational assessment procedures with the critical information requirement process.

Skill
4106

Knowledge of analytic tools and techniques.

Knowledge
4451

Knowledge of the full-spectrum of cyberspace operational missions (e.g., DODIN Operations, DCO, OCO), principles, capabilities, limitations, and effects.

KSA
4471

Knowledge of intelligence/SIGINT reporting and dissemination procedures.

KSA
8069

Develop cyberspace operations TTPs for integration into operational and tactical levels of planning.

Task

Develops cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and…

Workforce Element:
Cyberspace Enablers / Leadership

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
88A

Knowledge of current and emerging cyber technologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
282A

Knowledge of emerging technologies that have potential for exploitation by adversaries.

Knowledge
320A

Knowledge of external organizations and academic institutions with cyber focus (e.g., cyber curriculum/training and Research & Development).

Knowledge
410A

Analyze organizational cyber policy.

Task
424B

Assess policy needs and collaborate with stakeholders to develop policies to govern cyber activities.

Task
492A

Design/integrate a cyber strategy that outlines the vision, mission, and goals that align with the organization’s strategic plan.

Task
565A

Draft, staff, and publish cyber policy.

Task
720A

Monitor the rigorous application of cyber policies, principles, and practices in the delivery of planning and management services.

Task
812A

Provide policy guidance to cyber management, staff, and users.

Task
840A

Review, conduct, or participate in audits of cyber programs and projects.

Task
854A

Support the CIO in the formulation of cyber-related policies.

Task
1027A

Interpret and apply applicable laws, statutes, and regulatory documents and integrate into policy.

Task
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5020

Advocate for adequate funding for cyber training resources, to include both internal and industry-provided courses, instructors, and related materials.

Task
5560

Promote awareness of cyber policy and strategy as appropriate among management and ensure sound principles are reflected in the organization’s mission, vision, and goals.

Task
6100

Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities.

Ability
6140

Ability to leverage best practices and lessons learned of external organizations and academic institutions dealing with cyber issues.

Ability
6270

Knowledge of full spectrum cyber capabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
244

Ability to determine the validity of technology trend data.

Ability
297A

Knowledge of industry indicators useful for identifying technology trends.

Knowledge
336

Knowledge of the nature and function of the relevant information structure (e.g., National Information Infrastructure).

Knowledge
485A

Define and integrate current and future mission environments.

Task
5300

Ensure cyber workforce management policies and processes comply with legal and organizational requirements regarding equal opportunity, diversity, and fair hiring/employment practices.

Task
539

Develop policy, programs, and guidelines for implementation.

Task
5620

Review/Assess cyber workforce effectiveness to adjust skill and/or qualification standards.

Task
594

Establish and maintain communication channels with stakeholders.

Task
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
6410

Knowledge of strategic theory and practice.

Knowledge
724A

Seek consensus on proposed policy changes from stakeholders.

Task
838

Review existing and proposed policies with stakeholders.

Task
847

Serve on agency and interagency policy boards.

Task
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Develop cyberspace workforce plans, strategies and guidance to support cyberspace workforce manpower, personnel, training and…

Workforce Element:
Cyberspace Enablers / Leadership

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
320A

Knowledge of external organizations and academic institutions with cyber focus (e.g., cyber curriculum/training and Research & Development).

Knowledge
492A

Design/integrate a cyber strategy that outlines the vision, mission, and goals that align with the organization’s strategic plan.

Task
629A

Identify and address cyber workforce planning and management issues (e.g. recruitment, retention, and training).

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5020

Advocate for adequate funding for cyber training resources, to include both internal and industry-provided courses, instructors, and related materials.

Task
5160

Coordinate with internal and external subject matter experts to ensure existing qualification standards reflect organizational functional requirements and meet industry standards.

Task
5230

Develop and implement standardized position descriptions based on established cyber work roles.

Task
5250

Develop cyber career field classification structure to include establishing career field entry requirements and other nomenclature such as codes and identifiers.

Task
5290

Ensure cyber career fields are managed in accordance with organizational Human Resource (HR) policies and directives.

Task
5300

Ensure cyber workforce management policies and processes comply with legal and organizational requirements regarding equal opportunity, diversity, and fair hiring/employment practices.

Task
5330

Establish and collect metrics to monitor and validate cyber workforce readiness including analysis of cyber workforce data to assess the status of positions identified, filled, and filled with qualified personnel.

Task
5350

Establish cyber career paths to allow career progression, deliberate development, and growth within and between cyber career fields.

Task
5360

Establish manpower, personnel, and qualification data element standards to support cyber workforce management and reporting requirements.

Task
5370

Establish, resource, implement, and assess cyber workforce management programs in accordance with organizational requirements.

Task
5590

Review and apply cyber career field qualification standards.

Task
5600

Review and apply organizational policies related to or having an effect on the cyber workforce.

Task
5620

Review/Assess cyber workforce effectiveness to adjust skill and/or qualification standards.

Task
5630

Support integration of qualified cyber workforce personnel into information systems lifecycle development processes.

Task
6040

Ability to assess and forecast manpower requirements to meet organizational objectives.

Ability
6100

Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities.

Ability
6140

Ability to leverage best practices and lessons learned of external organizations and academic institutions dealing with cyber issues.

Ability
6250

Knowledge of Workforce Framework, work roles, and associated tasks, knowledge, skills, and abilities.

Knowledge
6560

Skill in developing workforce and position qualification standards.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1027A

Interpret and apply applicable laws, statutes, and regulatory documents and integrate into policy.

Task
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
244A

Ability to determine the validity of workforce trend data.

Ability
282A

Knowledge of emerging technologies that have potential for exploitation by adversaries.

Knowledge
297A

Knowledge of industry indicators useful for identifying technology trends.

Knowledge
336

Knowledge of the nature and function of the relevant information structure (e.g., National Information Infrastructure).

Knowledge
410A

Analyze organizational cyber policy.

Task
424B

Assess policy needs and collaborate with stakeholders to develop policies to govern cyber activities.

Task
485A

Define and integrate current and future mission environments.

Task
5170

Coordinate with organizational manpower stakeholders to ensure appropriate allocation and distribution of human capital assets.

Task
5240

Develop and review recruiting, hiring, and retention procedures in accordance with current Human Resource (HR) policies.

Task
5340

Establish and oversee waiver processes for cyber career field entry and training qualification requirements.

Task
539

Develop policy, programs, and guidelines for implementation.

Task
5560

Promote awareness of cyber policy and strategy as appropriate among management and ensure sound principles are reflected in the organization’s mission, vision, and goals.

Task
565A

Draft, staff, and publish cyber policy.

Task
594

Establish and maintain communication channels with stakeholders.

Task
6270

Knowledge of full spectrum cyber capabilities.

Knowledge
6340

Knowledge of organizational human resource policies, processes, and procedures.

Knowledge
6360

Knowledge of organizational training and education policies, processes, and procedures.

Knowledge
641

Identify organizational policy stakeholders.

Task
6740

Skill in using manpower and personnel IT systems.

Skill
6800

Ability to develop career path opportunities.

Ability
720A

Monitor the rigorous application of cyber policies, principles, and practices in the delivery of planning and management services.

Task
724A

Seek consensus on proposed policy changes from stakeholders.

Task
812A

Provide policy guidance to cyber management, staff, and users.

Task
838

Review existing and proposed policies with stakeholders.

Task
840A

Review, conduct, or participate in audits of cyber programs and projects.

Task
847

Serve on agency and interagency policy boards.

Task
854A

Support the CIO in the formulation of cyber-related policies.

Task
88A

Knowledge of current and emerging cyber technologies.

Knowledge
942

Knowledge of the organization’s core business/mission processes.

Knowledge
955B

Review and approve a supply chain security/risk management policy.

Task

Provides software and hardware capabilities that produce cyberspace effects in and throughout cyberspace operations through…

Workforce Element:
Cyberspace Effects

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
102

Knowledge of programming language structures and logic.

Knowledge
1020A

Skill in secure test plan design (e. g. unit, integration, system, acceptance).

Skill
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
1056

Knowledge of operations security.

Knowledge
1062

Knowledge of software reverse engineering techniques.

Knowledge
1071A

Ability to develop secure software according to secure software deployment methodologies, tools, and practices.

Ability
1076

Collaborate with stakeholders to identify and/or develop appropriate solutions technology.

Task
1140A

Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic).

Skill
1149A

Enable applications with public keying by leveraging existing public key infrastructure (PKI) libraries and incorporating certificate management and encryption functionalities when appropriate.

Task
1151

Identify and leverage the enterprise-wide version control system while designing and developing secure applications.

Task
116

Knowledge of software debugging principles.

Knowledge
118

Knowledge of software development models (e.g., Waterfall Model, Spiral Model).

Knowledge
119

Knowledge of software engineering.

Knowledge
168

Skill in conducting software debugging.

Skill
185A

Skill in developing applications that can log and handle errors, exceptions, and application faults and logging.

Skill
23

Knowledge of computer programming principles such as object-oriented design.

Knowledge
2335

Direct software programming and development of documentation.

Task
2417

Facilitate the sharing of “best practices” and “lessons learned” throughout the cyber operations community.

Task
2561

Maintain situational awareness of cyber-related intelligence requirements and associated tasking.

Task
27

Knowledge of cryptography and cryptographic key management concepts.

Knowledge
278

Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).

Knowledge
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3140

Knowledge of basic programming concepts (e.g., levels, structures, compiled vs. interpreted languages).

Knowledge
3146

Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
320A

Knowledge of external organizations and academic institutions with cyber focus (e.g., cyber curriculum/training and Research & Development).

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3622

Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives.

Knowledge
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
408

Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application.

Task
414

Analyze user needs and software requirements to determine feasibility of design within time and cost constraints.

Task
417

Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews.

Task
4333

Ability to program in at least one assembly languages.

Ability
4366

Ability to use common networking protocols.

Ability
4368

Ability to use data structures.

Ability
4372

Ability to use reference documentation for C, Python, assembly, and other international technical standards and specifications (IEEE, ISO, IETF, etc.).

Ability
4382

Ability to analyze, modify, develop, debug and document software and applications in C programming language.

Ability
4383

Ability to analyze, modify, develop, debug and document software and applications in Python programming language.

Ability
4384

Ability to analyze, modify, develop, debug and document software and applications utilizing standard, non-standard, specialized, serialization and/or unique network communication protocols.

Ability
4385

Ability to interpret customer requirements and evaluate resource and system constraints to create solution design specifications.

Ability
4424

Knowledge of cyber adversary threat tier taxonomy (2014 National Intelligence Estimate [NIE]), DIA/NSA Standard Cyber Threat Model, etc.).

Knowledge
4426

Knowledge of cyber mission force equipment taxonomy (Platform-Access-Payloads/Toolset), capability development process and repository.

Knowledge
4433

Knowledge of data serialization formats (e.g. XML, JSON, etc.).

Knowledge
4441

Knowledge of embedded systems

Knowledge
4497

Knowledge of modern software development methodologies (e.g. Continuous Integration (CI), Continuous Delivery (CD), Test Driven Development (TDD), etc.).

Knowledge
4517

Knowledge of principles, methodologies, and tools used to improve quality of software (e.g. regression testing, test coverage, code review, pair programming, etc.).

Knowledge
4527

Knowledge of relevant mission processes including version control processes, release processes, documentation requirements, and testing requirements.

Knowledge
4534

Knowledge of sources and locations (public and classified) of capability development TTPs and tradecraft information/intelligence used by the US Gov and others.

Knowledge
4535

Knowledge of sources and locations of cyber capability registries and repositories (e.g. Joint Cyber Tactics Manual (JCTM), Cyber Capability Registry (CCR), Agency and service repositories, etc.).

Knowledge
4546

Knowledge of task and project management tools used for software development (e.g. Jira, Confluence, Trac, MediaWiki, etc.).

Knowledge
4548

Knowledge of terms and concepts of operating system fundamentals (e.g. virtualization, paging, file systems, I/O, memory management, process abstraction, etc.).

Knowledge
4554

Knowledge of the concepts and terminology of datastructures and associated algorithms (e.g., search, sort, traverse, insert, delete).

Knowledge
4580

Knowledge of the supported organization’s approval process for operational use of a capability.

Knowledge
4584

Knowledge of the use and application of static and dynamic program analysis.

Knowledge
4598

Knowledge of your organizations project management, timeline estimation, and software engineering philosophy (e.g. CI/CD, TDD, etc.).

Knowledge
4611

Skill in conducting “open source” research.

Skill
4684

Knowledge of techniques to harden capabilities to prevent attacks and forensics.

KSA
506

Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design.

Task
515A

Develop software system testing and validation procedures, programming, and documentation.

Task
538

Develop new or identify existing awareness and training materials that are appropriate for intended audiences.

Task
543

Develop secure code and error handling.

Task
56

Knowledge of cybersecurity principles and methods that apply to software development.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
630

Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find work-arounds for communication protocols that are not interoperable).

Task
645

Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.

Task
6780

Utilize different programming languages to write code, open files, read files, and write output to different files.

Task
709A

Modify and maintain existing software to correct errors, to adapt it to new hardware, or to upgrade interfaces and improve performance.

Task
74

Knowledge of low-level computer languages (e.g., assembly languages).

Knowledge
756

Perform integrated quality assurance testing for security functionality and resiliency attack.

Task
764

Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities.

Task
770

Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.

Task
785

Prepare detailed workflow charts and diagrams that describe input, output, and logical operation, and convert them into a series of instructions coded in a computer language.

Task
8002

Analyze and document applications using assembly languages.

Task
8003

Analyze countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements.

Task
8006

Analyze, modify, develop, debug, and document software and applications using assembly languages.

Task
8007

Analyze, modify, develop, debug, and document software and applications utilizing standard, non-standard, specialized, and/or unique communication protocols.

Task
8008

Analyze, modify, develop, debug, and document software and applications which run in kernel space.

Task
8009

Analyze, modify, develop, debug, and document software and applications which run in user space.

Task
8012

Apply cryptography primitives to protect the confidentiality and integrity of sensitive data.

Task
8014

Apply software engineering best practices to enable sustainability and extensibility (Agile, TDD, CI/CD, etc.) to include containerization and virtualization technologies.

Task
8016

Architect design documents that describe input, output, and logical operation.

Task
8032

Conduct hardware and/or software static and dynamic analysis to reverse engineer malicious or benign systems.

Task
8049

Create or enhance cyberspace capabilities to compromise, deny, degrade, disrupt, destroy, or manipulate automated information systems.

Task
8050

Create or enhance cyberspace solutions to enable surveillance and reconnaissance of automated information systems.

Task
8054

Describe the most likely cause of an error and recommend a list of possible solutions given the description of error or system crash.

Task
8055

Design and develop data storage requirements, database structure, process flow, systematic procedures, algorithms, data analysis, and file structures.

Task
8056

Design and develop user interfaces (e.g. web pages, GUIs, CLIs, Console Interfaces)

Task
8057

Design and direct software development efforts to detect and disrupt nation-state cyber threat actors.

Task
8068

Develop content for cyber capabilities.

Task
8076

Develop, modify, and utilize automation technologies to enable employment of capabilities as efficiently as possible (e.g. TDD, CI/CD, etc.)

Task
8080

Document and communicate tradecraft, best practices, TTPs, training, briefings, presentations, papers, studies, lessons learned, etc. to both technical and non-technical audiences.

Task
8092

Enhance capability design strategies and tactics by synthesizing information, processes, and techniques in the areas of malicious software, vulnerabilities, reverse engineering, secure software engineering, and exploitation.

Task
8095

Enter work into Task and project management tools used for software development (e.g. Jira, Confluence, Trac, MediaWiki, etc.)

Task
8106

Generate proper supporting documentation of cyber capability.

Task
8118

Implement project management, software engineering philosophies, modern capability development methodologies (Agile, TDD, CI/CD, etc), at the team level.

Task
8129

Locate and utilize technical specifications and industry standards (e.g. Internet Engineering Task Force (IETF), IEEE, IEC, International Standards Organization (ISO)).

Task
8135

Make use of compiler attributes and platform-specific features.

Task
8144

Perform code review and analysis to inform OPSEC analysis and application (attribution, sanitization, etc.)

Task
8150

Perform requirements analysis to identify workable tasks needed to organize collaborative software and documentation development.

Task
8152

Perform static and dynamic analysis in order to find errors and flaws.

Task
8156

Produce artifacts to inform risk analysis, acceptance testing, and legal review.

Task
8186

Reference capability repositories and other sources to identify existing capabilities which fully/partially meet customer requirements (with or without modification).

Task
8207

Utilize data structures to organize, sort, and manipulate elements of information

Task
8210

Utilize secure coding techniques during development of software and applications

Task
8211

Utilize tools to decompile, disassembe, analzye, and reverse engineer compiled binaries.

Task
826

Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing.

Task
865

Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria.

Task
904

Knowledge of interpreted and compiled computer languages.

Knowledge
905

Knowledge of secure coding techniques.

Knowledge
95A

Knowledge of penetration testing principles, tools, and techniques.

Knowledge
970A

Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities.

Task
971

Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements.

Task
973A

Skill in using code analysis tools.

Skill
978A

Knowledge of root cause analysis techniques.

Knowledge
979

Knowledge of supply chain risk management standards, processes, and practices.

Knowledge
980A

Skill in performing root cause analysis.

Skill

Cyberspace Operators use a wide range of software applications for network navigation, tactical forensic analysis,…

Workforce Element:
Cyberspace Effects

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
1063A

Knowledge of operating system structures and internals (e.g., process management, directory structure, installed applications).

Knowledge
1064

Knowledge of Extensible Markup Language (XML) schemas.

Knowledge
1094

Knowledge of debugging procedures and tools.

Knowledge
1128A

Knowledge of database access application programming interfaces (APIs) (e.g., Java Database Connectivity [JDBC]).

Knowledge
2020

Analyze internal operational architecture, tools, and procedures for ways to improve performance.

Task
2020A

Analyze target operational architecture for ways to gain access.

Task
2088

Collaborate with development organizations to create and deploy the tools needed to achieve objectives.

Task
2119

Conduct network scouting and vulnerability analyses of systems within a network.

Task
2123

Conduct on-net and off-net activities to control, and exfiltrate data from deployed, automated technologies.

Task
2124

Conduct open source data collection via various online tools.

Task
2133

Conduct survey of computer and digital networks.

Task
2205

Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers).

Task
2226

Detect exploits against targeted networks and hosts and react accordingly.

Task
2353

Edit or execute simple scripts (e.g., PERL, VBS) on Windows and UNIX systems.

Task
2477

Identify potential points of strength and vulnerability within a network.

Task
2559

Maintain situational awareness and functionality of organic operational infrastructure.

Task
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
2660

Conduct cyber activities to degrade/remove information resident in computers and computer networks.

Task
2708

Process exfiltrated data for analysis and/or dissemination to customers.

Task
286

Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip).

Knowledge
287

Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]).

Knowledge
3003

Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment.

Ability
3007

Ability to analyze malware.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3059

Ability to interpret and translate customer requirements into operational action.

Ability
3063

Ability to monitor system operations and react to events in response to triggers and/or observation of trends or unusual activity.

Ability
3069

Ability to produce technical documentation.

Ability
3103A

Ability to identify/describe target vulnerability.

Ability
3125

Knowledge of assembly code.

Knowledge
3130

Knowledge of auditing and logging procedures (including server-based logging).

Knowledge
3133

Knowledge of basic back-up and recovery procedures including different types of backups (e.g., full, incremental).

Knowledge
3140

Knowledge of basic programming concepts (e.g., levels, structures, compiled vs. interpreted languages).

Knowledge
3141

Knowledge of basic software applications (e.g., data storage and backup, database applications) and their vulnerabilities.

Knowledge
3144

Knowledge of basic wireless applications, including vulnerabilities in various types of wireless applications.

Knowledge
3206

Knowledge of current software and methodologies for active defense and system hardening.

Knowledge
3235

Knowledge of deconfliction processes and procedures.

Knowledge
3253

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Knowledge
3259

Knowledge of enterprise-wide information management.

Knowledge
3261

Knowledge of evasion strategies and techniques.

Knowledge
3267

Knowledge of deconfliction reporting to include external organization interaction.

Knowledge
3267A

Knowledge of internal and external partner reporting.

Knowledge
3270

Knowledge of forensic implications of operating system structure and operations.

Knowledge
3286

Knowledge of host-based security products and how they affect exploitation and vulnerability.

Knowledge
3317

Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP.

Knowledge
3346

Knowledge of Internet and routing protocols.

Knowledge
3374

Knowledge of malware.

Knowledge
3378

Knowledge of methods and techniques used to detect various exploitation activities.

Knowledge
3399

Knowledge of network administration.

Knowledge
3402

Knowledge of network construction and topology.

Knowledge
344

Knowledge of virtualization technologies and virtual machine development and maintenance.

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3454

Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, Panda, Kaspersky) and how differences affect exploitation/vulnerabilities.

Knowledge
3473

Knowledge of satellite-based communication systems.

Knowledge
3479

Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation.

Knowledge
3480

Knowledge of security implications of software configurations.

Knowledge
350

Skill in analyzing memory dumps to extract information.

Skill
3508

Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network).

Knowledge
3513

Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems.

Knowledge
3525

Knowledge of organizational and partner policies, tools, capabilities, and procedures.

Knowledge
3534

Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference.

Knowledge
3543

Knowledge of the basic structure, architecture, and design of modern communication networks.

Knowledge
3561

Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

Knowledge
3579

Knowledge of the fundamentals of digital forensics in order to extract actionable intelligence.

Knowledge
3587

Knowledge of targeting cycles.

Knowledge
3631

Knowledge of internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities).

Knowledge
3637

Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).

Knowledge
3642

Knowledge of various types of computer architectures.

Knowledge
3644

Knowledge of virtual machine technologies.

Knowledge
3658

Knowledge of network collection procedures to include decryption capabilities/tools, techniques, and procedures.

Knowledge
3658B

Ability to perform network collection tactics, techniques, and procedures to include decryption capabilities/tools.

Ability
3670

Skill in analyzing terminal or environment collection data.

Skill
3690

Skill in assessing current tools to identify needed improvements.

Skill
3695

Skill in auditing firewalls, perimeters, routers, and intrusion detection systems.

Skill
3722

Skill in data mining techniques (e.g., searching file systems) and analysis.

Skill
3740

Skill in determining installed patches on various operating systems and identifying patch signatures.

Skill
3777

Skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools.

Skill
3779

Skill in extracting information from packet captures.

Skill
3801

Skill in identifying the devices that work at each level of protocol models.

Skill
3815

Skill in interpreting vulnerability scanner results to identify vulnerabilities.

Skill
3817

Skill in knowledge management, including technical documentation techniques (e.g., Wiki page).

Skill
3859

Skill in reading, interpreting, writing, modifying, and executing simple scripts (e.g., PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data).

Skill
3859A

Ability to read, interpret, write, modify, and execute simple scripts (e.g. PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data).

Ability
3871

Skill in remote command line and Graphic User Interface (GUI) tool usage.

Skill
3883

Skill in server administration.

Skill
3897

Skill in technical writing.

Skill
3899

Skill in testing and evaluating tools for implementation.

Skill
3929

Skill in using tools, techniques, and procedures to remotely exploit and establish persistence on a target.

Skill
3929A

Skill in using tools, techniques, and procedures to exploit a target.

Skill
3948

Skill in verifying the integrity of all files.

Skill
4086

Knowledge of relevant laws, regulations, and policies.

Knowledge
4191

Ability to apply tradecraft to minimize risk of detection, mitigate risk, and minimize creation of behavioral signature

Ability
4199

Ability to characterize a target admin/user’s technical abilities, habits, and skills.

Ability
4204

Ability to communicate operational plans and actions and provide feedback regarding OPSEC and tradecraft during mission pre-brief

Ability
4213

Ability to conduct open source research.

Ability
4219

Ability to construct a COA using available tools and techniques.

Ability
4222

Ability to continually research and develop new tools/techniques

Ability
4229

Ability to create rules and filters (e.g., Berkeley Packet Filter, Regular Expression).

Ability
4243

Ability to ensure collected data is transferred to the appropriate storage locations.

Ability
4244

Ability to enumerate a network.

Ability
4248

Ability to enumerate user permissions and privileges.

Ability
4249

Ability to evade or counter security products or host based defenses.

Ability
4261

Ability to exploit vulnerabilities to gain additional access.

Ability
4263

Ability to extract credentials from hosts

Ability
4271

Ability to identify capability gaps (e.g., insufficient tools, training, or infrastructure)

Ability
4276

Ability to identify files containing information critical to operational objectives.

Ability
4278

Ability to identify legal, policy, and technical limitations when conducting cyberspace operations.

Ability
4279

Ability to identify logging capabilities on host

Ability
4285

Ability to identify what tools or Tactics, Techniques, and Procedures (TTPs) are applicable to a given situation

Ability
4292

Ability to improve the performance of cyberspace operators by providing constructive (positive and negative) feedback.

Ability
4293

Ability to install/modify/uninstall tools on target systems in accordance with current policies and procedures.

Ability
4296

Ability to interpret device configurations.

Ability
4297

Ability to interpret cyberspace technical materials and documentation (e.g. CVEs, API).

Ability
4298

Ability to maintain situational awareness of target environment.

Ability
4305

Ability to model a simulated environment to conduct mission rehearsal and mitigate risk of actions taken during operations.

Ability
4308

Ability to operate automated systems to interact with target environment.

Ability
4324

Ability to perform masquerade operations.

Ability
4325

Ability to perform privilege escalation.

Ability
4327

Ability to persist access to a target.

Ability
4330

Ability to plan, brief, execute, and debrief a mission.

Ability
4334

Ability to promote and enable organizational change.

Ability
4335

Ability to provide advice and guidance to various stakeholders regarding technical issues, capabilities, and approaches.

Ability
4336

Ability to provide feedback to developers if a tool requires continued development.

Ability
4340

Ability to provide technical leadership within an organization.

Ability
4341

Ability to read, write, modify, and execute compiled languages (e.g., C).

Ability
4342

Ability to extract specific information from large data set (e.g., grep, regex critical).

Ability
4343

Ability to recognize and report mistakes or poor tradecraft to appropriate leadership in accordance with Standard Operating Procedures (SOPs).

Ability
4344

Ability to recognize and respond appropriately to Non-Standard Events.

Ability
4345

Ability to redirect and tunnel through target systems.

Ability
4346

Ability to remediate indicators of compromise.

Ability
4347

Ability to research non-standards within a project.

Ability
4350

Ability to retrieve historical operational data.

Ability
4359

Ability to train other cyberspace operators.

Ability
4361

Ability to troubleshoot technical problems.

Ability
4367

Ability to use core toolset (e.g., implants, remote access tools).

Ability
4369

Ability to use dynamic analysis tools (e.g. process monitor, process explorer, and registry analysis)

Ability
4370

Ability to use enterprise tools to enumerate target information.

Ability
4378

Ability to verify file integrity for both uploads and downloads.

Ability
4379

Ability to weaken a target to facilitate/enable future access.

Ability
4380

Ability to write and modify markup languages (e.g., HTML, XML).

Ability
4381

Ability to write and modify source code (e.g., C).

Ability
4388

Knowledge of access control models (Role Based Access Control, Attribute Based Access Control).

Knowledge
4391

Knowledge of advanced redirection techniques.

Knowledge
4393

Knowledge of appropriate/inappropriate information to include in operational documentation (e.g., OPNOTES, technical summaries, action maps, etc.).

Knowledge
4395

Knowledge of basic client software applications and their attack surfaces.

Knowledge
4396

Knowledge of basic cloud-based technologies and concepts.

Knowledge
4399

Knowledge of basic Embedded Systems concepts.

Knowledge
4402

Knowledge of basic redirection techniques (e.g. IP Tables, SSH Tunneling, netsh)

Knowledge
4403

Knowledge of basic server software applications and their attack surfaces.

Knowledge
4404

Knowledge of code injection and its employment in cyberspace operations.

Knowledge
4414

Knowledge of common network administration best practices and the impact to operations.

Knowledge
4419

Knowledge of credential sources and restrictions related to credential usage.

Knowledge
4437

Knowledge of device reboots, including when they occur and their impact on tool functionality.

Knowledge
4444

Knowledge of evolving technologies.

Knowledge
4447

Knowledge of factors that would suspend or abort an operation.

Knowledge
4458

Knowledge of historical data relating to particular targets and projects, prior to an operation to include reviewing TECHSUMs, previous OPNOTEs, etc.

Knowledge
4463

Knowledge of how computer programs are executed

Knowledge
4464

Knowledge of how host-based security products, logging, and malware may affect tool functionality

Knowledge
4465

Knowledge of how other actors may affect operations

Knowledge
4466

Knowledge of how race conditions occur and can be employed to compromise shared resources

Knowledge
4482

Knowledge of malware triage.

Knowledge
4485

Knowledge of methods and procedures for sending a payload via an existing implant

Knowledge
4486

Knowledge of methods, strategies, and techniques of evading detection while conducting operations, such as noise, stealth, situational awareness, etc.

Knowledge
4487

Knowledge of methods, tools, and procedures for collecting information, including accessing databases and file systems

Knowledge
4488

Knowledge of methods, tools, and procedures for exploiting target systems

Knowledge
4489

Knowledge of methods, tools, and techniques used to determine the path to a target host/network (e.g., identify satellite hops).

Knowledge
4496

Knowledge of models for examining cyber threats (e.g. cyber kill chain, MITRE ATT&CK).

Knowledge
4498

Knowledge of modes of communication used by a target, such as cable, fiber optic, satellite, microwave, VSAT, or combinations of these.

Knowledge
4502

Knowledge of open source tactics that enable initial access (e.g. social engineering, phishing)

Knowledge
4503

Knowledge of operating system command shells, configuration data.

Knowledge
4505

Knowledge of operational infrastructure

Knowledge
4508

Knowledge of operational security, logging, admin concepts, and troubleshooting.

Knowledge
4510

Knowledge of password cracking techniques.

Knowledge
4519

Knowledge of process migration

Knowledge
4540

Knowledge of system administration concepts for distributed or managed operating environments.

Knowledge
4541

Knowledge of system administration concepts for stand alone operating systems.

Knowledge
4542

Knowledge of system calls

Knowledge
4552

Knowledge of the components of an authentication system.

Knowledge
4553

Knowledge of the concept of an advanced persistent threat (APT)

Knowledge
4563

Knowledge of the location and use of tool documentation.

Knowledge
4564

Knowledge of the methods and procedures for communicating with tools/modules, including the use of listening posts.

Knowledge
4565

Knowledge of the methods of persistence.

Knowledge
4567

Knowledge of the Mission Improvement Process

Knowledge
4571

Knowledge of the Plan, Brief, Execute, and Debrief process

Knowledge
4581

Knowledge of the tactics development process

Knowledge
4586

Knowledge of threats to OPSEC when installing, using, modifying, and uninstalling tools.

Knowledge
4587

Knowledge of tool release/testing process

Knowledge
4593

Knowledge of VPNs, their purpose, and how they can be leveraged.

Knowledge
4628

Skill in enumerating a host (e.g. file systems, host meta data host characteristics).

Skill
4641

Skill in manipulating firewall/host based security configuration and rulesets.

Skill
4663

Skill in retrieving memory resident data.

Skill
4670

Skill in transferring files to target devices (e.g., scp, tftp, http, ftp).

Skill
4674

Skill in using network enumeration and analysis tools, both active and passive.

Skill
49

Knowledge of host/network access control mechanisms (e.g., access control list).

Knowledge
6100

Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities.

Ability
8001

Advise leadership on operational tradecraft, emerging technology, and technical health of the force.

Task
8015

Approve remediation actions.

Task
8017

As authorized, train cyberspace operators at one’s certification level or below.

Task
8020

Assess the technical health of the cyberspace operator work role.

Task
8021

Assess, recommend, and evaluate remediation actions.

Task
8030

Conduct cyber activities to deny, degrade, disrupt, destroy, manipulate, (D4M).

Task
8037

Conduct post-mission actions.

Task
8039

Conduct pre-mission actions

Task
8040

Conduct pre-operation research and prep.

Task
8052

Create/normalize/document/evaluate TTPs in cyberspace operations.

Task
8067

Develop and/or inform risk assessments.

Task
8071

Develop Operational Training Solultions.

Task
8073

Develop remediation actions.

Task
8074

Develop risk assessments for non-standard events and ad hoc tradecraft.

Task
8083

Employ collection TTPs in cyberspace operations.

Task
8084

Employ credential access TTPs in cyberspace operations.

Task
8086

Employ discovery TTPs in cyberspace operations.

Task
8087

Employ exfiltration TTPs in cyberspace operations.

Task
8088

Employ lateral movement TTPs in cyberspace operations.

Task
8089

Employ TTPs in categories at one’s certification level or below.

Task
8097

Evaluate cyberspace operator performance at one’s certification level or below.

Task
8112

Identify targets of opportunity in order to influence operational planning.

Task
8113

Identify the appropriate operating authorities and guidance

Task
8130

Maintain operational and technical situational awareness during operations

Task
8158

Produce strategy to inform commander’s decision making process.

Task
8167

Provide input to mission debrief.

Task
8168

Provide input to operational policy.

Task
8169

Provide input to post mission planning.

Task
8170

Provide input to pre-mission planning.

Task
8181

Recognize and respond to indicators of compromise (IOC).

Task
8183

Recognize and respond to events that change risk.

Task
8184

Record and document activities during cyberspace operations.

Task
8192

Steward the cyberspace operator work role.

Task
8197

Train cyberspace operators at their certified level or below.

Task
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge

Analyzes and interprets data from multiple disparate sources and builds visualizations and dashboards to report…

Workforce Element:
Data/AI

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
31

Knowledge of data mining and data warehousing principles.

Knowledge
104

Knowledge of query languages such as SQL (structured query language).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
166

Skill in conducting queries and developing algorithms to analyze data structures.

Skill
201

Skill in generating queries and reports.

Skill
1120

Ability to interpret and incorporate data from multiple tool sources.

Ability
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
5030

Analyze data sources to provide actionable recommendations.

Task
5100

Collect metrics and trending data.

Task
5270

Develop strategic insights from large data sets.

Task
5430

Present technical information to technical and non-technical audiences.

Task
5899

Manipulate and clean large, disparate datasets for bulk analysis to identify connections.

Task
6130

Ability to identify basic common coding flaws at a high level.

Ability
6180

Ability to use data visualization tools (e.g., Flare, HighCharts, AmCharts, D3.js, Processing, Google Visualization API, Tableau, Raphael.js).

Ability
6300

Knowledge of how to utilize Hadoop, Java, Python, SQL, Hive, and PIG to explore data.

Knowledge
6470A

Read, interpret, write, modify, and execute scripts, macros, and functions.

Task
6570

Skill in identifying hidden patterns or relationships.

Skill
6710

Skill in using basic descriptive statistics and techniques (e.g., normality, model distribution, scatter plots).

Skill
6720

Skill in using data analysis tools (e.g., Excel, STATA SAS, SPSS).

Skill
6780

Utilize different programming languages to write code, open files, read files, and write output to different files.

Task
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7029

Knowledge of how to collect, store, and monitor data.

Knowledge
7031

Knowledge of how to structure and display data.

Knowledge
7032

Knowledge of how to use data to tell a story.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
5030

Analyze data sources to provide actionable recommendations.

Task
5440

Present data in creative formats.

Task
5570

Provide actionable recommendations to critical stakeholders based on data analysis and findings.

Task
5896

Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI.

Task
6915A

Skill in communicating with all levels of the organization, including senior/mid-level executives, and operational-level personnel (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience).

Skill
7020

Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable).

Knowledge
7036

Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government.

Knowledge
796

Provide a managed flow of relevant information (via web-based portals or other means) based on a mission requirements.

Task
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Designs a system’s data models, data flow, interfaces, and infrastructure to meet the information requirements…

Workforce Element:
Data/AI

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
28

Knowledge of data administration and data standardization policies and standards.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
135

Knowledge of the capabilities and functionality associated with various technologies for organizing and managing information (e.g., databases, bookmarking engines).

Knowledge
137

Knowledge of the characteristics of physical and virtual data storage media.

Knowledge
187

Skill in developing data models.

Skill
401

Analyze and plan for anticipated changes in data capacity requirements.

Task
408

Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application.

Task
466A

Consult with customers and key stakeholders to evaluate functional requirements for AI and data applications.

Task
815

Provide recommendations on new database technologies and architectures.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5140

Confer with systems analysts, engineers, programmers and others to design application.

Task
5841

Advise higher level leadership on critical data management issues.

Task
5854

Collaborate with appropriate personnel to address Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data resusability concerns for AI solutions.

Task
5885

Examine and identify database structural necessities by evaluating operations, applications, and programming.

Task
5908

Prepare database design and architecture reports.

Task
6190

Effectively allocate storage capacity in the design of data management systems.

Task
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7017

Knowledge of data operations (DataOps) processes and best practices.

Knowledge
7029

Knowledge of how to collect, store, and monitor data.

Knowledge
7060

Skill in designing the best approach and architecture for automated data labeling and data lifecycle.

Skill

Additional KSATs:
KSAT ID Description KSAT
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
28

Knowledge of data administration and data standardization policies and standards.

Knowledge
296

Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.

Knowledge
5896

Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI.

Task
6650

Skill in developing machine understandable semantic ontologies.

Skill
7010

Knowledge of container orchestration and resource management platforms.

Knowledge
7020

Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable).

Knowledge
7025

Knowledge of how AI solutions integrate with cloud or other IT infrastructure.

Knowledge
7026

Knowledge of how commercial and federal solutions solve Defense-related data environment and platform challenges.

Knowledge
7028

Knowledge of how to automate development, testing, security, and deployment of AI/machine learning-enabled software to the DoD.

Knowledge
7036

Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government.

Knowledge
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
942

Knowledge of the organization’s core business/mission processes.

Knowledge
952

Knowledge of emerging security issues, risks, and vulnerabilities.

Knowledge

Holds responsibility for developing, promoting, and overseeing implementation of data as an asset and the…

Workforce Element:
Data/AI

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
120

Knowledge of sources, characteristics, and uses of the organization’s data assets.

Knowledge
296

Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.

Knowledge
524

Develop and maintain strategic plans.

Task
529

Develop data standards, policies, and procedures.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2416

Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives.

Task
3591

Knowledge of organization objectives, leadership priorities, and decision-making risks.

Knowledge
5841

Advise higher level leadership on critical data management issues.

Task
5842

Analyze existing and planned data investments to ensure they address key business problems, are compatible with the organization’s mission, and align with the target data architecture.

Task
5867

Create policies for effective data management (e.g., data sharing agreements and security policies).

Task
5869

Demonstrate to executive stakeholders how data and analytics initiatives address agency challenges.

Task
5874

Develop a data management strategy that helps to prioritize investments and resource allocations (e.g., data analytics, data infrastructure).

Task
5875

Develop an organizational change management plan to support a data management strategy.

Task
5886

Facilitate cross-sharing of best practices for data usage.

Task
5894

Lead the development and documentation of solutions for assigned data analytical objectives and projects.

Task
5895

Lead the improvement of data system design processes that affect the success and continuation of key programs.

Task
5896

Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI.

Task
5898

Manage risk to the data program.

Task
5903

Oversee the management of data classification and handling requirements.

Task
5913

Remove barriers to data acquisition, collection, and curation efforts required for AI solutions.

Task
5917

Set strategic priorities by leveraging data insights.

Task
6040

Ability to assess and forecast manpower requirements to meet organizational objectives.

Ability
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6915A

Skill in communicating with all levels of the organization, including senior/mid-level executives, and operational-level personnel (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience).

Skill
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7001

Ability to inspire and lead a culture of innovation.

Ability
7014

Knowledge of data acquisition, collection, and curation best practices required for AI solutions.

Knowledge
7015

Knowledge of data architecture and data services implementation.

Knowledge
7016

Knowledge of data model development (e.g., conceptual, logical, and physical).

Knowledge
7019

Knowledge of data security roles and responsibilities.

Knowledge
7020

Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable).

Knowledge
7029

Knowledge of how to collect, store, and monitor data.

Knowledge
7036

Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government.

Knowledge
7063

Skill in developing enterprise-level/Agency-level policies.

Skill
7074

Skill in performing strategic-level analysis to develop Enterprise Data Management (EDM) strategies.

Skill
7083

Ability to measure human systems interaction (usability, workload, system trust).

Ability
7110

Ability to understand technology, management, and leadership issues related to organization processes and problem solving.

Ability

Additional KSATs:
KSAT ID Description KSAT
1018

Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.

Task
2558

Maintain relationships with internal and external partners involved in cyber planning or related areas.

Task
3146

Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3356

Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations.

Knowledge
559C

Oversee the evaluation of contracts to ensure compliance with funding, legal, and program requirements.

Task
6250

Knowledge of Workforce Framework, work roles, and associated tasks, knowledge, skills, and abilities.

Knowledge
6290

Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems.

Knowledge
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Builds, manages, and operationalizes data pipelines.

Workforce Element:
Data/AI

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
28

Knowledge of data administration and data standardization policies and standards.

Knowledge
31

Knowledge of data mining and data warehousing principles.

Knowledge
32

Knowledge of database management systems, query languages, table relationships, and views.

Knowledge
104

Knowledge of query languages such as SQL (structured query language).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
179B

Skill in establishing data security controls.

Skill
186

Skill in developing data dictionaries.

Skill
400A

Implement data management standards, requirements, and specifications.

Task
520B

Develop and implement data mining and data warehousing programs.

Task
543

Develop secure code and error handling.

Task
702

Manage the compilation, cataloging, caching, distribution, and retrieval of data.

Task
764

Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities.

Task
858B

Record and manage test data.

Task
1128

Knowledge of Java-based database access application programming interface (API) (e.g., Java Database Connectivity [JDBC]).

Knowledge
1128A

Knowledge of database access application programming interfaces (APIs) (e.g., Java Database Connectivity [JDBC]).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
3722

Skill in data mining techniques (e.g., searching file systems) and analysis.

Skill
5550

Program custom algorithms.

Task
5841

Advise higher level leadership on critical data management issues.

Task
5844

Apply data acquisition, cleaning, transformation, and ingestion best practices for machine learning data conduits.

Task
5846

Assess and address the limitations of methods to deliver data.

Task
5850

Assist integrated project teams to identify, curate, and manage data.

Task
5852

Build automated data management conduits.

Task
5857

Comply with data classification and handling requirements through access control and security best practices.

Task
5899

Manipulate and clean large, disparate datasets for bulk analysis to identify connections.

Task
6060

Ability to collect, verify, and validate test data.

Ability
6300

Knowledge of how to utilize Hadoop, Java, Python, SQL, Hive, and PIG to explore data.

Knowledge
6470

Read, interpret, write, modify, and execute simple scripts (e.g., PERL, VBS) on Windows and UNIX systems (e.g., those that perform tasks such as: parsing large data files, automating manual tasks, and fetching/processing remote data).

Task
6520

Skill in data pre-processing (e.g., imputation, dimensionality reduction, normalization, transformation, extraction, filtering, smoothing).

Skill
6610

Skill in performing format conversions to create a standard representation of the data.

Skill
6690

Skill in transformation analytics (e.g., aggregation, enrichment, processing).

Skill
6730

Skill in using data mapping tools.

Skill
6760

Skill in writing scripts using R, Python, PIG, HIVE, SQL, etc.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7017

Knowledge of data operations (DataOps) processes and best practices.

Knowledge
7019

Knowledge of data security roles and responsibilities.

Knowledge
7029

Knowledge of how to collect, store, and monitor data.

Knowledge
7062

Skill in developing and maintaining automation scripts.

Skill
7066

Skill in identifying data acquisition, collection, and curation risks.

Skill

Additional KSATs:
KSAT ID Description KSAT
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
520A

Implement data mining and data warehousing applications.

Task
5854

Collaborate with appropriate personnel to address Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data resusability concerns for AI solutions.

Task
5896

Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI.

Task
7010

Knowledge of container orchestration and resource management platforms.

Knowledge
7020

Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable).

Knowledge
7025

Knowledge of how AI solutions integrate with cloud or other IT infrastructure.

Knowledge
7028

Knowledge of how to automate development, testing, security, and deployment of AI/machine learning-enabled software to the DoD.

Knowledge
7036

Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government.

Knowledge
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Uncovers and explains actionable insights from data by combining scientific method, math and statistics, specialized…

Workforce Element:
Data/AI

Core KSATs:
KSAT ID Description KSAT
21A

Knowledge of statistical/machine learning algorithms.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
75A

Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis.

Knowledge
102

Knowledge of programming language structures and logic.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
166

Skill in conducting queries and developing algorithms to analyze data structures.

Skill
172

Skill in creating and utilizing mathematical or statistical models.

Skill
1120

Ability to interpret and incorporate data from multiple tool sources.

Ability
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
3080

Ability to use and understand complex mathematical concepts (e.g., discrete math).

Ability
3756

Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Skill
5030

Analyze data sources to provide actionable recommendations.

Task
5120

Conduct hypothesis testing using statistical processes.

Task
5550

Program custom algorithms.

Task
5640

Utilize technical documentation or resources to implement a new mathematical, data science, or computer science method.

Task
5853

Build predictive, prescriptive, or descriptive models in collaboration with stakeholders.

Task
5906

Plan and conduct complex analytical, mathematical, and statistical research that informs operational requirements.

Task
5907

Plan, coordinate, and execute complex studies using advanced data modeling techniques and procedures, data trend analysis, and data algorithms.

Task
5924

Train and evaluate machine learning models.

Task
5927

Write and document reproducible code.

Task
6050

Ability to build complex data structures and high-level programming languages.

Ability
6060

Ability to collect, verify, and validate test data.

Ability
6120

Ability to dissect a problem and examine the interrelationships between data that may appear unrelated.

Ability
6490

Skill in assessing the predictive power and subsequent generalizability of a model.

Skill
6570

Skill in identifying hidden patterns or relationships.

Skill
6651

Skill in Regression Analysis (e.g., Hierarchical Stepwise, Generalized Linear Model, Ordinary Least Squares, Tree-Based Methods, Logistic).

Skill
6750

Skill in using outlier identification and removal techniques.

Skill
6760

Skill in writing scripts using R, Python, PIG, HIVE, SQL, etc.

Skill
6790A

Utilize open source languages, as appropriate, and apply quantitative techniques (e.g., descriptive and inferential statistics, sampling, experimental design, parametric and non-parametric tests of difference, ordinary least squares regression, general line).

Task
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7002

Assist integrated project teams identify, curate, and manage test data.

Task
7029

Knowledge of how to collect, store, and monitor data.

Knowledge
7071

Skill in labeling data to make it more discoverable and understandable.

Skill

Additional KSATs:
KSAT ID Description KSAT
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
35

Knowledge of digital rights management.

Knowledge
506

Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design.

Task
5854

Collaborate with appropriate personnel to address Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data resusability concerns for AI solutions.

Task
5884

Evaluate energy implications (graphical processing unit, tensor processing unit, etc.) when designing AI solutions.

Task
5896

Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI.

Task
5907

Plan, coordinate, and execute complex studies using advanced data modeling techniques and procedures, data trend analysis, and data algorithms.

Task
6290

Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems.

Knowledge
6651

Skill in Regression Analysis (e.g., Hierarchical Stepwise, Generalized Linear Model, Ordinary Least Squares, Tree-Based Methods, Logistic).

Skill
7020

Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable).

Knowledge
7036

Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government.

Knowledge
7078

Skill in using deep learning approaches to build machine learning models.

Skill
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Develops and maintains plans, policies, and processes for data management, data governance, security, quality, accessibility,…

Workforce Element:
Data/AI

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
28

Knowledge of data administration and data standardization policies and standards.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
186

Skill in developing data dictionaries.

Skill
400A

Implement data management standards, requirements, and specifications.

Task
400

Analyze and define data requirements and specifications.

Task
702

Manage the compilation, cataloging, caching, distribution, and retrieval of data.

Task
918

Ability to prepare and deliver education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures.

Ability
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5080

Assess the validity of source data and subsequent findings.

Task
5380A

Review feedback on customer satisfaction and internal service performance to foster continual improvement.

Task
5850

Assist integrated project teams to identify, curate, and manage data.

Task
5854

Collaborate with appropriate personnel to address Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data resusability concerns for AI solutions.

Task
5855

Collaborate with data owners to establish data quality rules and definitions.

Task
5864

Create data catalogs and dictionaries.

Task
5865

Create metrics that characterize the usability, timeliness, completeness, and accuracy of data for multiple users to reference and use.

Task
5888

Identify and document customer requirements when on-boarding new data assets.

Task
5897

Manage compliance with data classification and handling requirements.

Task
5911

Recommend data collection, integration, and retention requirements.

Task
6060

Ability to collect, verify, and validate test data.

Ability
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6915A

Skill in communicating with all levels of the organization, including senior/mid-level executives, and operational-level personnel (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience).

Skill
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7018

Knowledge of data protection standards and frameworks to prevent unauthorized access to data, and safeguard against unauthorized disclosure of data.

Knowledge
7019

Knowledge of data security roles and responsibilities.

Knowledge
7029

Knowledge of how to collect, store, and monitor data.

Knowledge
7036

Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government.

Knowledge
7040

Knowledge of Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data reusability considerations for AI solutions.

Knowledge
7071

Skill in labeling data to make it more discoverable and understandable.

Skill

Additional KSATs:
KSAT ID Description KSAT
296

Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.

Knowledge
466A

Consult with customers and key stakeholders to evaluate functional requirements for AI and data applications.

Task
5896

Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI.

Task
6650

Skill in developing machine understandable semantic ontologies.

Skill
7020

Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable).

Knowledge
7035

Knowledge of key decision-support needs and questions to drive prioritization of data efforts.

Knowledge
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Administers databases and/or data management systems that allow for the storage, query, and utilization of…

Workforce Element:
IT (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
28

Knowledge of data administration and data standardization policies and standards.

Knowledge
29

Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.

Knowledge
32

Knowledge of database management systems, query languages, table relationships, and views.

Knowledge
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
98

Knowledge of policy-based and risk adaptive access controls.

Knowledge
104

Knowledge of query languages such as SQL (structured query language).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
137

Knowledge of the characteristics of physical and virtual data storage media.

Knowledge
179B

Skill in establishing data security controls.

Skill
208

Skill in maintaining databases.

Skill
213

Skill in optimizing database performance.

Skill
401

Analyze and plan for anticipated changes in data capacity requirements.

Task
664A

Install and configure database management systems and software.

Task
684

Maintain database management systems software.

Task
712

Monitor and maintain databases to ensure optimal performance.

Task
740

Perform backup and recovery of databases to ensure data integrity.

Task
815

Provide recommendations on new database technologies and architectures.

Task
910

Knowledge of database theory.

Knowledge
952

Knowledge of emerging security issues, risks, and vulnerabilities.

Knowledge
1123A

Knowledge of current and emerging data encryption (e.g., Column and Tablespace Encryption, file and disk encryption) security features in databases, including built-in cryptographic key management features.

Knowledge
1128A

Knowledge of database access application programming interfaces (APIs) (e.g., Java Database Connectivity [JDBC]).

Knowledge
1154

Performs configuration management, problem management, capacity management, and financial management for databases and data management systems.

Task
1155

Supports incident management, service level management, change management, release management, continuity management, and availability management for databases and data management systems.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5890

Identify data consolidation opportunities across database systems, including data sharing and access between business lines.

Task
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7029

Knowledge of how to collect, store, and monitor data.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1124A

Knowledge of current and emerging data remediation security features in databases.

Knowledge
31

Knowledge of data mining and data warehousing principles.

Knowledge
520A

Implement data mining and data warehousing applications.

Task
6945

Skill in migrating workloads to, from, and among the different cloud computing service models.

Skill
7036

Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government.

Knowledge
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Selects/Deploys/Maintains the set of Continuous Integration/Continuous Deployment (CI/CD) tools and processes used by the development…

Workforce Element:
Software Engineering

Core KSATs:
KSAT ID Description KSAT
3C

Skill in recognizing vulnerabilities in information and/or data systems.

Skill
3B

Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks.

Skill
4

Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.

Ability
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
34

Knowledge of database systems.

Knowledge
58

Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
130

Knowledge of systems testing and evaluation methods.

Knowledge
130A

Knowledge of systems security testing and evaluation methods.

Knowledge
142A

Knowledge of the operations and processes for incident, problem, and event management.

Knowledge
144

Knowledge of the systems engineering process.

Knowledge
190

Skill in developing operations-based testing scenarios.

Skill
238A

Skill in writing code in a currently supported programming language (e.g., Java, C++).

Skill
412A

Analyze the results of software, hardware, or interoperability testing.

Task
420

Apply security policies to meet security objectives of the system.

Task
421a

Apply security architecture principles to meet organization’s confidentiality, integrity, and availability requirements.

Task
452

Conduct functional and connectivity testing to ensure continuing operability.

Task
559B

Analyze and report system security posture trends.

Task
568

Employ secure configuration management processes.

Task
572

Ensure application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment.

Task
576

Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.

Task
653B

Implement security measures to mitigate or remediate vulnerabilities and security deficiencies, and provide justification for acceptance of residual risk.

Task
661A

Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation.

Task
708A

Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance for the appropriate senior leader or authorized representative.

Task
726

Oversee and make recommendations regarding configuration management.

Task
729A

Verify minimum security requirements are in place for all applications.

Task
754

Perform cybersecurity testing of developed applications and/or systems.

Task
880A

Work with stakeholders to resolve computer security incidents and vulnerability compliance.

Task
1037A

Knowledge of information technology (IT) risk management policies, requirements, and procedures.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2054

Assess the effectiveness of security controls.

Task
3030

Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.

Ability
3822

Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results.

Skill
5940

Work with designers and developers throughout the design, development and testing process.

Task
5939

Choose and deploy the appropriate automated application security testing tools.

Task
5941

Utilize tools and techniques like risk assessment, threat modeling, and cybersecurity to detect and analyze the threats.

Task
5942

Work with Security Engineers to ensure that all security threats are dealt with during the development phase.

Task
5943

Work with Automation tools are used to identify the vulnerabilities.

Task
5944

Identify and implement tooling for controlling the steps in a continuous integration (CI) and continuous deployment (CD) pipeline.

Task
5945

Develop and implement automatic test tools in a CI/CD pipeline, which could include Static Application Security Test (SAST) tools, Dynamic Application Security Test (DAST) tools, Unit Test tools, Static Code Analysis (SCA) tools, etc.

Task
5946

Develop code within a CI/CD Pipeline.

Task
5947

Select appropriate language and coding standards for software application for appropriate Continuous Integration/Continuous Deployment (CI/CD) framework.

Task
5948

Apply testing activities, understands fault vs. failures, conduct basic test planning, develop test selection or adequacy criteria, crafts test documentation, ensures test coverages, and conducts automated testing.

Task
5950

Develop and deploy software using continuous integration methods, processes, and tools, including test case writing against completion criteria (for each release, capability, micro-service, or component), build automation, and build processes.

Task
5953

Provide DevSecOps guidance to leadership.

Task
5955

Work closely with development teams to provide and support the environment needed to deliver an organization’s services.

Task
6090

Ability to develop curriculum for use within a virtual environment.

Ability
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7087

Knowledge of programming languages.

Knowledge
7088

Knowledge of continuous integration/continuous deployment (CI/CD) processes and pipeline tools.

Knowledge
7089

Knowledge of portable, extensible, open source platform for managing containerized workloads and services.

Knowledge
7090

Knowledge of cloud hosting providers.

Knowledge
7091

Knowledge of threat modeling, risk assessment techniques, code reviews, current best practices and the latest cybersecurity threats.

Knowledge
7092

Knowledge of how security impacts each development phase and the services.

Knowledge
7093

Knowledge of a Continuous Integration/Continuous Deployment (CI/CD) environment and processes.

Knowledge
7094

Knowledge of the steps for release to higher levels of integration testing, certification activities, and/or operations using testbeds, modeling and simulation to synchronize software releases with the development of an operations environment(s) to ensure compatibility.

Knowledge
7095

Knowledge of every stage in the software project lifecycle, from initial design and build to rollout and maintenance.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1040A

Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure.

Knowledge
1139A

Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption.

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
21

Knowledge of computer algorithms.

Knowledge
220

Skill in systems integration testing.

Skill
225A

Skill in the use of penetration testing tools and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems).

Skill
25B

Knowledge of encryption algorithms.

Knowledge
27A

Knowledge of cryptology.

Knowledge
3642

Knowledge of various types of computer architectures.

Knowledge
5050

Assess all the configuration management (change configuration/release management) processes.

Task
571

Ensure all systems security operations and maintenance activities are properly documented and updated as necessary.

Task
5949

Transition embedded and non-embedded software developed and sustained using traditional software methods into a DevSecOps environment.

Task
5951

Select and implement telemetry within the CI/CD pipeline and Ops software to support metrics and problem discovery and resolution.

Task
5954

Build test interfaces and perform complex integration.

Task
6240

Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE).

Knowledge
717A

Assess and monitor cybersecurity related to system implementation and testing practices.

Task
75B

Knowledge of statistics.

Knowledge
765

Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.

Task
795

Properly document all systems security implementation, operations and maintenance activities and update as necessary.

Task
806A

Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities.

Task
809

Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).

Task
876

Verify and update security documentation reflecting the application/system security design features.

Task
938A

Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans.

Task
94

Knowledge of parallel and distributed computing concepts.

Knowledge

The DNEA analyzes intercepted intelligence information for metadata and content. They use this data to…

Workforce Element:
Cyberspace Effects

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1056

Knowledge of operations security.

Knowledge
1107

Identify and analyze anomalies in network traffic using metadata (e.g., CENTAUR).

Task
1112

Reconstruct a malicious attack or activity based off network traffic.

Task
2001

Accurately characterize targets.

Task
2059

Provide expertise to course of action development.

Task
2066

Provide expertise to the development of measures of effectiveness and measures of performance.

Task
2072

Perform analysis for target infrastructure exploitation activities.

Task
2081

Classify documents in accordance with classification guidelines.

Task
2087

Collaborate with intelligence analysts/targeting organizations involved in related areas.

Task
2099

Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets.

Task
2101

Identify and conduct analysis of target communications to identify information essential to support operations.

Task
2102

Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access.

Task
2127

Conduct quality control in order to determine validity and relevance of information gathered about networks.

Task
2134

Conduct target research and analysis.

Task
2194

Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.

Task
2195

Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology.

Task
2235

Determine how identified factors affect the tasking, collection, processing, exploitation and dissemination architecture’s form and function.

Task
2236

Determine if information meets reporting requirements.

Task
2243

Determine what technologies are used by a given target.

Task
2251

Apply analytic techniques to gain more target information.

Task
2289

Develop measures of effectiveness and measures of performance.

Task
2356

Engage customers to understand customers’ intelligence needs and wants.

Task
2373

Establish alternative processing, exploitation and dissemination pathways to address identified issues or problems.

Task
2393

Generate and evaluate the effectiveness of network analysis strategies.

Task
2400

Examine intercept-related metadata and content with an understanding of targeting significance.

Task
2427

Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.)

Task
2429

Generate requests for information.

Task
2434

Identify threat tactics, and methodologies.

Task
244

Ability to determine the validity of technology trend data.

Ability
2441

Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.

Task
2453

Identify collection gaps and potential collection strategies against targets.

Task
2458

Identify critical target elements.

Task
2459

Identify intelligence gaps and shortfalls.

Task
2469

Identify network components and their functionality to enable analysis and target development.

Task
2515

Initiate requests to guide tasking and assist with collection management.

Task
2542

Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications.

Task
2568

Make recommendations to guide collection in support of customer requirements.

Task
2608

Monitor target networks to provide indications and warning of target communications changes or processing failures.

Task
2621

Provide SME and support to planning/developmental forums and working groups as appropriate.

Task
2628

Participate in exercises.

Task
2628A

Provide subject matter expertise to development of exercises.

Task
2639

Perform content and/or metadata analysis to meet organization objectives.

Task
2714

Produce network reconstructions.

Task
2719

Profile targets and their activities.

Task
2770

Provide time sensitive targeting support.

Task
2779

Review appropriate information sources to determine validity and relevance of information gathered.

Task
2781

Reconstruct networks in diagram or report format.

Task
2798

Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources.

Task
2818

Sanitize and minimize information to protect sources and methods.

Task
282

Knowledge of emerging computer-based technology that has potential for exploitation by adversaries.

Knowledge
2840

Support identification and documentation of collateral effects.

Task
2894

Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination.

Task
2897

Conduct analysis of target communications to identify essential information in support of organization objectives.

Task
2902

Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing.

Task
2905

Identify target communications within the global network.

Task
2906

Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis.

Task
2909

Provide feedback to collection managers to enhance future collection and analysis.

Task
2912

Perform or support technical network analysis and mapping.

Task
2919

Perform social network analysis and document as appropriate.

Task
2922

Tip critical or time-sensitive information to appropriate customers.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3002

Ability to focus research efforts to meet the customer’s decision-making needs.

Ability
3020

Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information.

Ability
3021

Ability to collaborate effectively with others.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3039

Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Ability
3043

Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3047

Ability to function effectively in a dynamic, fast-paced environment.

Ability
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3052

Ability to identify intelligence gaps.

Ability
3073

Ability to recognize and mitigate cognitive biases which may affect analysis.

Ability
3074

Ability to recognize and mitigate deception in reporting and analysis.

Ability
3077

Ability to think critically.

Ability
3078

Knowledge of target methods and procedures.

Knowledge
3081

Ability to utilize multiple intelligence sources across all intelligence disciplines.

Ability
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3113

Knowledge of target intelligence gathering and operational preparation techniques and life cycles.

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3146

Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3158

Knowledge of cyber operation objectives, policies, and legalities.

Knowledge
3166

Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.

Knowledge
3172

Knowledge of collection sources including conventional and non-conventional sources.

Knowledge
3174

Knowledge of the intelligence requirements development and request for information processes.

Knowledge
3179

Knowledge of common networking devices and their configurations.

Knowledge
3181

Knowledge of common reporting databases and tools.

Knowledge
3219

Knowledge of cyber operations.

Knowledge
321A

Knowledge of industry technologies and how differences affect exploitation/vulnerabilities.

Knowledge
3237

Knowledge of denial and deception techniques.

Knowledge
3242

Knowledge of document classification procedures, policy, resources, and personnel.

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3277

Knowledge of general SCADA system components.

Knowledge
3288

Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless).

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3296

Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).

Knowledge
3298

Knowledge of how to extract, analyze, and use metadata.

Knowledge
3324

Knowledge of information and collateral intelligence sources.

Knowledge
3338

Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions.

Knowledge
3346

Knowledge of Internet and routing protocols.

Knowledge
3348

Knowledge of intrusion detection systems and signature development.

Knowledge
3372

Knowledge of malware analysis and characteristics.

Knowledge
3382

Knowledge of methods to integrate and summarize information from any potential sources.

Knowledge
3386

Knowledge of midpoint collection (process, objectives, organization, targets, etc.).

Knowledge
3407

Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3418

Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors).

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3450

Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure.

Knowledge
3505

Knowledge of strategies and tools for target research.

Knowledge
3534

Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference.

Knowledge
3542

Knowledge of the basic structure, architecture, and design of converged applications.

Knowledge
3564

Knowledge of the data flow from collection origin to repositories and tools.

Knowledge
3582

Knowledge of the intelligence frameworks, processes, and related systems.

Knowledge
3595

Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements.

Knowledge
3603

Knowledge of the principal methods, procedures, and techniques of gathering information and producing intelligence.

Knowledge
3608

Knowledge of the purpose and contribution of target templates.

Knowledge
3616

Knowledge of the structure, architecture, and design of modern digital and telephony networks.

Knowledge
3617

Knowledge of the structure, architecture, and design of modern wireless communications systems.

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3637

Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).

Knowledge
3664

Skill in identifying how a target communicates.

Skill
3667

Skill in analyzing a target’s communication networks.

Skill
3671

Skill in analyzing essential network data (e.g., router configuration files, routing protocols).

Skill
3678

Skill in analyzing traffic to identify network devices.

Skill
3689

Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses).

Skill
3692

Skill in assessing the applicability of available analytical tools to various situations.

Skill
3708

Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis.

Skill
3726

Skill in depicting source or collateral data on a network map.

Skill
3742

Skill in determining the physical location of network devices.

Skill
3765

Skill in disseminating items of highest intelligence value in a timely manner.

Skill
3771

Skill in evaluating data sources for relevance, reliability, and objectivity.

Skill
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3773

Skill in evaluating information to recognize relevance, priority, etc.

Skill
3774

Skill in evaluating accesses for intelligence value.

Skill
3778

Skill in exploiting/querying organizational and/or partner collection databases.

Skill
3787

Skill in identifying a target’s communications networks.

Skill
3797

Skill in identifying leads for target development.

Skill
3803

Skill in identifying, locating, and tracking targets via geospatial analysis techniques

Skill
3810

Skill in interpreting compiled and interpretive programming languages.

Skill
3812

Skill in interpreting metadata and content as applied by collection systems.

Skill
3814

Skill in using trace route tools and interpreting the results as they apply to network analysis and reconstruction.

Skill
3822

Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results.

Skill
3828

Skill in navigating network visualization software.

Skill
3860

Skill in recognizing and interpreting malicious network activity in traffic.

Skill
3864

Skill in recognizing relevance of information.

Skill
3865

Skill in recognizing significant changes in a target’s communication patterns.

Skill
3866

Skill in recognizing technical information that may be used for leads for metadata analysis.

Skill
3867A

Skill in recognizing technical information that may be used for target development including intelligence development.

Skill
3873

Skill in researching essential information.

Skill
3874

Skill in researching vulnerabilities and exploits utilized in traffic.

Skill
3885

Skill in fusion analysis

Skill
3889

Skill in survey, collection, and analysis of wireless LAN metadata.

Skill
3890

Skill in synthesizing, analyzing, and prioritizing meaning across data sets.

Skill
3895

Skill in target network anomaly identification (e.g., intrusions, dataflow or processing, target implementation of new technologies).

Skill
3908

Skill in using research methods including multiple, different sources to reconstruct a target network.

Skill
3915

Skill in using geospatial data and applying geospatial resources.

Skill
3923

Skill in using non-attributable networks.

Skill
3951

Skill in writing about facts and ideas in a clear, convincing, and organized manner.

Skill
4072

Knowledge of collection systems, capabilities, and processes.

Knowledge
4073

Knowledge of the feedback cycle in collection processes.

Knowledge
4078

Knowledge of target or threat cyber actors and procedures.

Knowledge
4079

Knowledge of basic cyber operations activity concepts (e.g., foot printing, scanning and enumeration, penetration testing, white/black listing).

Knowledge
4085

Knowledge of approved intelligence dissemination processes.

Knowledge
4086

Knowledge of relevant laws, regulations, and policies.

Knowledge
4088

Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure).

Knowledge
4089

Knowledge of target communication tools and techniques.

Knowledge
4090

Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes).

Knowledge
4094

Knowledge of networking and internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.).

Knowledge
4095

Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML).

Knowledge
4097

Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network.

Knowledge
4099

Knowledge of customer information needs.

Knowledge
4106

Knowledge of analytic tools and techniques.

Knowledge
4118

Skill in identifying a target’s network characteristics.

Skill
4121

Skill in assessing a target’s frame of reference (e.g., motivation, technical capability, organizational structure, sensitivities).

Skill
4123

Skill in conducting research using all available sources.

Skill
4125

Skill in complying with the legal restrictions for targeted information.

Skill
4128

Skill in developing intelligence reports.

Skill
4129

Skill in evaluating and interpreting metadata.

Skill
4134

Skill in identifying intelligence gaps and limitations.

Skill
4141

Skill in providing analysis on target-related matters (e.g., language, cultural, communications).

Skill
4160

Skill in interpreting traceroute results, as they apply to network analysis and reconstruction.

Skill
4165

Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption).

Knowledge
4166

Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types.

Knowledge
4396

Knowledge of basic cloud-based technologies and concepts.

Knowledge
4399

Knowledge of basic Embedded Systems concepts.

Knowledge
4401

Knowledge of basic reconnaissance activity concepts and techniques (foot printing, scanning and enumeration).

Knowledge
4420

Knowledge of Critical Intelligence Communication (CRITIC) identification and reporting process.

Knowledge
4423

Knowledge of cryptologic and SIGINT reporting and dissemination procedures.

Knowledge
4428

Knowledge of cybersecurity concepts and principles.

Knowledge
4431

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
4460

Knowledge of how and when to request assistance from the Cryptanalysis and Signals Analysis and/or CNO.

Knowledge
4470

Knowledge of intelligence sources and their characteristics.

Knowledge
4490

Knowledge of methods, tools, sources, and techniques used to research, integrate and summarize all-source information pertaining to target.

Knowledge
4523

Knowledge of quality review process and procedures.

Knowledge
4533

Knowledge of SIGINT laws and directives.

Knowledge
4539

Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model).

Knowledge
4570

Knowledge of the overall mission of the Cyber Mission Forces (CMF).

Knowledge
4578

Knowledge of the specific missions for CMF (i.e., Cyber Mission Teams (CMT), National Mission Teams (NMT), Combat Support Team (CST), National Support Team (NST), Cyber Protection Team (CPT).

Knowledge
4582

Knowledge of the U.S. SIGNIT System (USSS) authorities, responsibilities, and contributions to the cyberspace operations mission.

Knowledge
4601

Skill in analyzing endpoint collection data.

Skill
4620

Skill in developing and maintaining target profiles.

Skill
4631

Skill in geolocating targets.

Skill
4643

Skill in operational use of raw collection databases.

Skill
4645

Skill in performing data fusion from all-source intelligence for geospatial analysis.

Skill
4646

Skill in performing data fusion from all-source intelligence for network analysis and reconstruction (e.g., Single Table Inheritance (STIs), network maps).

Skill
4647

Skill in performing data fusion from all-source intelligence.

Skill
4651

Skill in providing feedback to enhance future collection and analysis.

Skill
4656

Skill in recognizing exploitation opportunities.

Skill
4659

Skill in recognizing the value of survey data.

Skill
4667

Skill in selector normalization.

Skill
4669

Skill in targeting (e.g., selectors).

Skill
8011

Apply and/or develop analytic techniques to provide better intelligence.

Task
8013

Apply customer requirements to the analysis process.

Task
8023

Assist planners in the development of courses of action

Task
8063

Develop analytical techniques to gain more target information.

Task
8064

Develop and lead exercises

Task
8065

Develop and maintain target profiles using appropriate corporate tools and databases (e.g. Target associations, activities, communication infrastructures, etc.).

Task
8081

Document and disseminate analytic findings.

Task
8090

Enable targeting offices to find new sources of collection.

Task
8100

Evaluate the strengths and weaknesses of the intelligence source.

Task
8101

Evaluate threat critical capabilities, requirements, and vulnerabilities.

Task
8102

Facilitate collaboration with customers, Intelligence and targeting organizations involved in related cyber areas.

Task
8108

Identify and facilitate partner relationships to enhance mission capabilities

Task
8128

Lead work role working groups/planning and development forums

Task
8137

Manipulate information in mission relevant databases (e.g., converting data, generating reports).

Task
8138

Mitigate collection gaps

Task
8145

Perform network analysis to support new or continued collection.

Task
8157

Produce digital network intelligence against specific named target sets.

Task
8164

Provide expertise in support of operational effects generated through cyber activities.

Task
8173

Provide intel target recommendations which meet leadership objectives.

Task
8191

Select, build, and develop query strategies against appropriate collection databases.

Task
8205

Understand technologies used by a given target

Task
8206

Understand TTPs and methodologies to enable access ops or access vector opportunities.

Task
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
915

Knowledge of front-end collection systems, including traffic collection, filtering, and selection.

Knowledge
959

Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.

Task

Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information…

Workforce Element:
IT (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
38

Knowledge of organization’s enterprise information security architecture system.

Knowledge
68A

Ability to build architectures and frameworks.

Ability
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
82A

Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
141A

Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures.

Knowledge
143A

Knowledge of integrating the organization’s goals and objectives into the architecture.

Knowledge
144

Knowledge of the systems engineering process.

Knowledge
413A

Analyze user needs and requirements to plan architecture.

Task
569A

Document and update as necessary all definition and architecture activities.

Task
579

Ensure acquired or developed system(s) and architecture(s) are consistent with organization’s cybersecurity architecture guidelines.

Task
780A

Plan implementation strategy to ensure enterprise components can be integrated and aligned.

Task
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1037B

Knowledge of program protection planning to include information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements.

Knowledge
1038B

Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability).

Knowledge
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
108A

Knowledge of the DoD implementation of the Risk Management Framework (RMF) to include processes.

Knowledge
109A

Knowledge of configuration management techniques.

Knowledge
110

Knowledge of key concepts in security management (e.g., Release Management, Patch Management).

Knowledge
111

Knowledge of security system design tools, methods, and techniques.

Knowledge
1130

Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1136A

Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud).

Knowledge
113A

Knowledge of N-tiered typologies including server and client operating systems.

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
1142

Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

Knowledge
1147A

Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce.

Task
119

Knowledge of software engineering.

Knowledge
130

Knowledge of systems testing and evaluation methods.

Knowledge
132A

Ability to execute technology integration processes.

Ability
133

Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).

Knowledge
155

Skill in applying and incorporating information technologies into proposed solutions.

Skill
180

Skill in designing the integration of hardware and software solutions.

Skill
183

Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Skill
183A

Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Knowledge
2014

Analyze candidate architectures, allocate security services, and select security mechanisms.

Task
224

Skill in design modeling and building use cases (e.g., unified modeling language).

Skill
2390

Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents.

Task
2887

Write detailed functional specifications that document the architecture development process.

Task
3153

Knowledge of circuit analysis.

Knowledge
3246

Knowledge of confidentiality, integrity, and availability requirements.

Knowledge
3307

Knowledge of cybersecurity-enabled software products.

Knowledge
34

Knowledge of database systems.

Knowledge
3642

Knowledge of various types of computer architectures.

Knowledge
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
42

Knowledge of electrical engineering as applied to computer architecture, including circuit boards, processors, chips, and associated computer hardware.

Knowledge
43A

Knowledge of embedded systems.

Knowledge
46A

Knowledge of system fault tolerance methodologies.

Knowledge
483A

Captures and integrates essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.

Task
484

Define appropriate levels of system availability based on critical system functions and ensure system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration.

Task
502B

Develop enterprise architecture required to meet user needs.

Task
51

Knowledge of how system components are installed, integrated, and optimized.

Knowledge
53A

Knowledge of risk assessments and authorization per Risk Management Framework processes.

Knowledge
602

Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.

Task
6030

Ability to apply an organization’s goals and objectives to develop and maintain architecture.

Ability
6150

Ability to optimize systems to meet enterprise performance requirements.

Ability
62

Knowledge of industry-standard and organizationally accepted analysis principles and methods.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
631

Identify and prioritize critical business functions in collaboration with organizational stakeholders.

Task
6330

Knowledge of multi-level/security cross domain solutions.

Knowledge
65A

Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).

Knowledge
6680

Skill in the use of design methods.

Skill
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
6942

Skill in designing or implementing cloud computing deployment models.

Skill
6945

Skill in migrating workloads to, from, and among the different cloud computing service models.

Skill
69A

Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).

Knowledge
70A

Knowledge of cybersecurity methods, such as firewalls, demilitarized zones, and encryption.

Knowledge
765A

Integrate results regarding the identification of gaps in security architecture.

Task
797

Provide advice on project costs, design concepts, or design changes.

Task
809

Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).

Task
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
864A

Translate proposed capabilities into technical requirements.

Task
90

Knowledge of operating systems.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
94

Knowledge of parallel and distributed computing concepts.

Knowledge
993A

Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization’s enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).

Ability
994A

Document how the implementation of a new system or new interface between systems impacts the current and target environment including but not limited to security posture.

Task
996B

Integrate key management functions as related to cyberspace.

Task

Executes decision-making authorities and establishes vision and direction for an organization’s cyber and cyber-related policies,…

Workforce Element:
Cyberspace Enablers / Leadership

Core KSATs:
KSAT ID Description KSAT
10

Knowledge of application vulnerabilities.

Knowledge
15A

Knowledge of capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
150

Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities.

Knowledge
173

Skill in creating policies that reflect system security objectives.

Skill
321A

Knowledge of industry technologies and how differences affect exploitation/vulnerabilities.

Knowledge
391

Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.

Task
392

Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program.

Task
395

Advise senior management (e.g., CIO) on risk levels and security posture.

Task
396

Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, and systems, and elements.

Task
424B

Assess policy needs and collaborate with stakeholders to develop policies to govern cyber activities.

Task
445

Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.

Task
475

Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance.

Task
492A

Design/integrate a cyber strategy that outlines the vision, mission, and goals that align with the organization’s strategic plan.

Task
524

Develop and maintain strategic plans.

Task
542A

Develop mitigation strategies to address cost, schedule, performance, and security risks.

Task
599

Evaluate contracts to ensure compliance with funding, legal, and program requirements.

Task
600

Evaluate cost benefit, economic, and risk analysis in decision making process.

Task
674

Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information.

Task
679

Lead and align information technology (IT) security priorities with the security strategy.

Task
680A

Lead and oversee budget, staffing, and contracting.

Task
680

Lead and oversee information security budget, staffing, and contracting.

Task
711

Monitor and evaluate the effectiveness of the enterprise’s cybersecurity safeguards to ensure they provide the intended level of protection.

Task
737B

Perform an information security risk assessment.

Task
797

Provide advice on project costs, design concepts, or design changes.

Task
801

Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans.

Task
801A

Provide enterprise cybersecurity and supply chain risk management guidance.

Task
807

Provide input on security requirements to be included in statements of work and other appropriate procurement documents.

Task
810

Provide leadership and direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities.

Task
848

Recommend policy and coordinate review and approval.

Task
852

Supervise or manage protective or corrective measures when an cybersecurity incident or vulnerability is discovered.

Task
919

Promote awareness of security issues among management and ensure sound security principles are reflected in the organization’s vision and goals.

Task
947

Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.

Task
952

Knowledge of emerging security issues, risks, and vulnerabilities.

Knowledge
962

Identify security requirements specific to an information technology (IT) system in all phases of the System Life Cycle.

Task
963

Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.

Task
979

Knowledge of supply chain risk management standards, processes, and practices.

Knowledge
1004A

Knowledge of information technology (IT) acquisition/procurement requirements.

Knowledge
1018

Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.

Task
1041

Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate.

Task
1061A

Knowledge of the acquisition/procurement life cycle process.

Knowledge
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1148B

Ensure supply chain, system, network, performance, and cyber security requirements are included in contract language and delivered.

Task
1148

Develop contract language to ensure supply chain, system, network, and operational security are met.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2090

Collaborate with other internal and external partner organizations on target access and operational issues.

Task
2091

Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials).

Task
2416

Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives.

Task
2558

Maintain relationships with internal and external partners involved in cyber planning or related areas.

Task
2624

Conduct long-range, strategic planning efforts with internal and external partners in cyber activities.

Task
2823

Serve as a liaison with external partners.

Task
2839

Supervise and assign work to programmers, designers, technologists and technicians and other engineering and scientific personnel.

Task
2894

Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination.

Task
3011

Ability to apply critical reading/thinking skills.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3057

Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.

Ability
3076

Ability to tailor technical and planning information to a customer’s level of understanding.

Ability
3077

Ability to think critically.

Ability
3994

Ability to coordinate, collaborate and disseminate information to subordinate, lateral and higher-level organizations.

Ability
5170

Coordinate with organizational manpower stakeholders to ensure appropriate allocation and distribution of human capital assets.

Task
5560

Promote awareness of cyber policy and strategy as appropriate among management and ensure sound principles are reflected in the organization’s mission, vision, and goals.

Task
5767

Collaborate on cyber privacy and security policies and procedures.

Task
5768

Collaborate with cyber security personnel on the security risk assessment process to address privacy compliance and risk mitigation.

Task
5820

Appoint and guide a team of IT security experts.

Task
5825

Collaborate with key stakeholders to establish a cybersecurity risk management program

Task
6100

Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities.

Ability
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6915

Skill in communicating with all levels of management including Board members (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience).

Skill
6920

Ability to ensure information security management processes are integrated with strategic and operational planning processes.

Ability
6921

Ability to ensure that senior officials within the organization provide information security for the information and systems that support the operations and assets under their control.

Ability
6922

Ability to prioritize and allocate cybersecurity resources correctly and efficiently.

Ability
6923

Ability to relate strategy, business, and technology in the context of organizational dynamics.

Ability
6925

Ability to understand the basic concepts and issues related to cyber and its organizational impact.

Ability
6926

Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list).

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
6947

Skill to anticipate new security threats.

Skill
6948

Skill to remain aware of evolving technical infrastructures.

Skill
6949

Skill to use critical thinking to analyze organizational patterns and relationships.

Skill
7110

Ability to understand technology, management, and leadership issues related to organization processes and problem solving.

Ability

Additional KSATs:
KSAT ID Description KSAT
1004

Knowledge of critical information technology (IT) procurement requirements.

Knowledge
2058

Assist and advise inter-agency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives.

Task
2328

Develop, maintain, and assess cyber cooperation security agreements with external partners.

Task
2443

Identify and manage security cooperation priorities with external partners.

Task
325

Knowledge of secure acquisitions (e.g., relevant Contracting Officer’s Technical Representative [COTR] duties, secure procurement, supply chain risk management).

Knowledge
398

Advocate organization’s official position in legal and legislative proceedings.

Task
5763

Act as, or work with, counsel relating to business partner contracts.

Task
6160

Ability to oversee the development and update of the lifecycle cost estimate.

Ability
6930

Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations.

Knowledge
706

Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency.

Task
949

Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements.

Task
954

Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk.

Knowledge
955B

Review and approve a supply chain security/risk management policy.

Task
965

Knowledge of organization’s risk tolerance and/or risk management approach.

Knowledge

Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or…

Workforce Element:
Cyberspace Effects

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
102

Knowledge of programming language structures and logic.

Knowledge
1032

Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.

Task
2029A

Apply and utilize authorized cyber capabilities to enable access to targeted networks.

Task
2033

Apply cyber collection, environment preparation and engagement expertise to enable new exploitation and/or continued collection operations, or in support of customer requirements.

Task
2040

Apply and obey applicable statutes, laws, regulations and policies.

Task
2063

Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.

Task
2072

Perform analysis for target infrastructure exploitation activities.

Task
2087

Collaborate with intelligence analysts/targeting organizations involved in related areas.

Task
2090

Collaborate with other internal and external partner organizations on target access and operational issues.

Task
2095

Communicate new developments, breakthroughs, challenges and lessons learned to leadership, and internal and external customers.

Task
2102

Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access.

Task
2114

Conduct independent in-depth target and technical analysis including target-specific information (e.g., cultural, organizational, political) that results in access.

Task
2134

Conduct target research and analysis.

Task
2194

Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.

Task
230

Skill in using knowledge management technologies.

Skill
2400

Examine intercept-related metadata and content with an understanding of targeting significance.

Task
2419

Collaborate with developers, conveying target and technical knowledge in tool requirements submissions, to enhance tool development.

Task
2441

Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.

Task
2461

Identify gaps in our understanding of target technology and developing innovative collection approaches.

Task
2490

Identify, locate, and track targets via geospatial analysis techniques.

Task
2534

Lead or enable exploitation operations in support of organization objectives and target requirements.

Task
2542

Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications.

Task
2608

Monitor target networks to provide indications and warning of target communications changes or processing failures.

Task
2714

Produce network reconstructions.

Task
2718

Profile network or system administrators and their activities.

Task
2922

Tip critical or time-sensitive information to appropriate customers.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3021

Ability to collaborate effectively with others.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3024

Ability to communicate effectively when writing.

Ability
3039

Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Ability
3043

Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.

Ability
3047

Ability to function effectively in a dynamic, fast-paced environment.

Ability
3055A

Ability to select the appropriate implant to achieve operational goals.

Ability
3055B

Knowledge of basic implants.

Knowledge
3059

Ability to interpret and translate customer requirements into operational action.

Ability
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3101

Ability to expand network access by conducting target analysis and collection in order to identify targets of interest.

Ability
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3107

Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.).

Knowledge
3113

Knowledge of target intelligence gathering and operational preparation techniques and life cycles.

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3139

Knowledge of basic principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis).

Knowledge
3146

Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3155

Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3166

Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.

Knowledge
3179

Knowledge of common networking devices and their configurations.

Knowledge
3181

Knowledge of common reporting databases and tools.

Knowledge
3191

Knowledge of concepts for operating systems (e.g., Linux, Unix).

Knowledge
3201

Knowledge of all relevant reporting and dissemination procedures.

Knowledge
3206

Knowledge of current software and methodologies for active defense and system hardening.

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3226

Knowledge of data flow process for terminal or environment collection.

Knowledge
3235

Knowledge of deconfliction processes and procedures.

Knowledge
3253

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Knowledge
3256

Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.).

Knowledge
3261

Knowledge of evasion strategies and techniques.

Knowledge
3289

Knowledge of how hubs, switches, routers work together in the design of a network.

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3296

Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).

Knowledge
3297

Knowledge of how to establish priorities for resources.

Knowledge
3317

Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP.

Knowledge
3346

Knowledge of Internet and routing protocols.

Knowledge
3349

Knowledge of intrusion sets.

Knowledge
3367

Knowledge of all applicable statutes, laws, regulations and policies governing cyber targeting and exploitation.

Knowledge
3378

Knowledge of methods and techniques used to detect various exploitation activities.

Knowledge
3386

Knowledge of midpoint collection (process, objectives, organization, targets, etc.).

Knowledge
3407

Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3410

Knowledge of network topology.

Knowledge
3432

Knowledge of identification and reporting processes.

Knowledge
345

Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies.

Knowledge
3454

Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, Panda, Kaspersky) and how differences affect exploitation/vulnerabilities.

Knowledge
3474

Knowledge of scripting

Knowledge
3479

Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation.

Knowledge
3480

Knowledge of security implications of software configurations.

Knowledge
3505

Knowledge of strategies and tools for target research.

Knowledge
3513

Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems.

Knowledge
3525

Knowledge of organizational and partner policies, tools, capabilities, and procedures.

Knowledge
3542

Knowledge of the basic structure, architecture, and design of converged applications.

Knowledge
3564

Knowledge of the data flow from collection origin to repositories and tools.

Knowledge
3587

Knowledge of targeting cycles.

Knowledge
3622

Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives.

Knowledge
363

Skill in identifying gaps in technical capabilities.

Skill
3637

Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).

Knowledge
3658

Knowledge of network collection procedures to include decryption capabilities/tools, techniques, and procedures.

Knowledge
3678

Skill in analyzing traffic to identify network devices.

Skill
3715

Skill in creating and extracting important information from packet captures.

Skill
3718

Skill in creating plans in support of remote operations.

Skill
3718A

Skill in creating collection requirements in support of data acquisition activities.

Skill
3722

Skill in data mining techniques (e.g., searching file systems) and analysis.

Skill
3726

Skill in depicting source or collateral data on a network map.

Skill
3740

Skill in determining installed patches on various operating systems and identifying patch signatures.

Skill
3741

Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments.

Skill
3774

Skill in evaluating accesses for intelligence value.

Skill
3778

Skill in exploiting/querying organizational and/or partner collection databases.

Skill
3801

Skill in identifying the devices that work at each level of protocol models.

Skill
3803

Skill in identifying, locating, and tracking targets via geospatial analysis techniques

Skill
3810

Skill in interpreting compiled and interpretive programming languages.

Skill
3812

Skill in interpreting metadata and content as applied by collection systems.

Skill
3814

Skill in using trace route tools and interpreting the results as they apply to network analysis and reconstruction.

Skill
3815

Skill in interpreting vulnerability scanner results to identify vulnerabilities.

Skill
3818

Skill in generating operation plans in support of mission and target requirements.

Skill
3828

Skill in navigating network visualization software.

Skill
3837

Skill in performing data fusion from existing intelligence for enabling new and continued collection.

Skill
3859

Skill in reading, interpreting, writing, modifying, and executing simple scripts (e.g., PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data).

Skill
3860

Skill in recognizing and interpreting malicious network activity in traffic.

Skill
3863

Skill in recognizing midpoint opportunities and essential information.

Skill
3867

Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information).

Skill
3874

Skill in researching vulnerabilities and exploits utilized in traffic.

Skill
3894

Skill in target development in direct support of collection operations.

Skill
3913

Skill in using databases to identify target-relevant information.

Skill
3923

Skill in using non-attributable networks.

Skill
3948

Skill in verifying the integrity of all files.

Skill
3950

Skill in writing (and submitting) requirements to meet gaps in technical capabilities.

Skill
5210

Determine the extent of threats and recommend courses of action and countermeasures to mitigate risks.

Task
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
915

Knowledge of front-end collection systems, including traffic collection, filtering, and selection.

Knowledge

Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media…

Workforce Element:
Cyberspace Enablers / Legal/Law Enforcement

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
24

Knowledge of concepts and practices of processing digital forensic data.

Knowledge
25A

Knowledge of encryption algorithms, stenography, and other forms of data concealment.

Knowledge
61

Knowledge of incident response and handling methodologies.

Knowledge
90

Knowledge of operating systems.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
217

Skill in preserving evidence integrity according to standard operating procedures or national standards.

Skill
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
287

Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]).

Knowledge
302

Knowledge of investigative implications of hardware, Operating Systems, and network technologies.

Knowledge
310

Knowledge of legal governance related to admissibility (e.g., Federal Rules of Evidence).

Knowledge
316

Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data.

Knowledge
350

Skill in analyzing memory dumps to extract information.

Skill
381

Skill in using forensic tool suites (e.g., EnCase, Sleuthkit, FTK).

Skill
389

Skill in physically disassembling PCs.

Skill
447

Conduct analysis of log files, evidence, and other information in order to determine best methods for identifying the perpetrator(s) of a network intrusion.

Task
480

Create a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes. This includes, but is not limited to, hard drives, floppy diskettes, CD, PDA, mobile phones, GPS, and all tape formats.

Task
482A

Detect and analyze encrypted data, stenography, alternate data streams and other forms of concealed data.

Task
541

Provide technical summary of findings in accordance with established reporting procedures.

Task
564A

Document original condition of digital and/or associated evidence (e.g., via digital photographs, written reports, hash function checking).

Task
573

Ensure chain of custody is followed for all digital media acquired in accordance with the Federal Rules of Evidence.

Task
613

Examine recovered data for information of relevance to the issue at hand.

Task
636

Identify digital evidence for examination and analysis in such a way as to avoid unintentional alteration.

Task
749

Perform dynamic analysis to boot an “image” of a drive (without necessarily having the original drive) to see the intrusion as the user may have seen it, in a native environment.

Task
752

Perform file signature analysis.

Task
753

Perform hash comparison against established database.

Task
768

Perform static media analysis.

Task
786

Prepare digital media for imaging by ensuring data integrity (e.g., write blockers in accordance with standard operating procedures).

Task
817

Provide technical assistance on digital evidence matters to appropriate personnel.

Task
839A

Review forensic images and other data sources (e.g., volatile data) for recovery of potentially relevant information.

Task
871

Use specialized equipment and techniques to catalog, document, extract, collect, package, and preserve digital evidence.

Task
888

Knowledge of types of digital forensics data and how to recognize them.

Knowledge
890

Skill in conducting forensic analyses in multiple operating system environments (e.g., mobile device systems).

Skill
982

Knowledge of electronic evidence law.

Knowledge
1081

Perform virus scanning on digital media.

Task
1082

Perform file system forensic analysis.

Task
1083

Perform static analysis to mount an “image” of a drive (without necessarily having the original drive).

Task
1085

Utilize deployable forensics tool kit to support operations as necessary.

Task
1086

Knowledge of data carving tools and techniques (e.g., Foremost).

Knowledge
1092

Knowledge of anti-forensics tactics, techniques, and procedures.

Knowledge
1093

Knowledge of common forensics tool configuration and support applications (e.g., VMWare, WIRESHARK).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1084

Perform static malware analysis.

Task
1087

Skill in deep analysis of captured malicious code (e.g., malware forensics).

Skill
1088

Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump).

Skill
1089

Knowledge of reverse engineering concepts.

Knowledge
1091

Skill in one way hash functions (e.g., Secure Hash Algorithm [SHA], Message Digest Algorithm [MD5]).

Skill
1094

Knowledge of debugging procedures and tools.

Knowledge
1095

Knowledge of how different file types can be used for anomalous behavior.

Knowledge
1096

Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro).

Knowledge
1097

Knowledge of virtual machine aware malware, debugger aware malware, and packing.

Knowledge
1098

Skill in analyzing anomalous code as malicious or benign.

Skill
1099

Skill in analyzing volatile data.

Skill
1100

Skill in identifying obfuscation techniques.

Skill
1101

Skill in interpreting results of debugger to ascertain tactics, techniques, and procedures.

Skill
113

Knowledge of server and client operating systems.

Knowledge
114

Knowledge of server diagnostic tools and fault identification techniques.

Knowledge
139

Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications.

Knowledge
193

Skill in developing, testing, and implementing network infrastructure contingency and recovery plans.

Skill
214

Skill in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).

Skill
29

Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.

Knowledge
290

Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody).

Knowledge
294

Knowledge of hacking methodologies in Windows or Unix/Linux environment.

Knowledge
340

Knowledge of types and collection of persistent data.

Knowledge
345

Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies.

Knowledge
346

Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files.

Knowledge
360

Skill in identifying and extracting data of forensic interest in diverse media (i.e., media forensics).

Skill
364

Skill in identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files).

Skill
369

Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data.

Skill
374

Skill in setting up a forensic workstation.

Skill
386

Skill in using virtual machines.

Skill
438A

Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.

Task
463

Confirm what is known about an intrusion and discover new information, if possible, after identifying intrusion via dynamic analysis.

Task
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
649

Identify, collect, and seize documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents, investigations, and operations.

Task
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
758

Perform real-time forensic analysis (e.g., using Helix in conjunction with LiveView).

Task
759

Perform timeline analysis.

Task
771

Perform tier 1, 2, and 3 malware analysis.

Task
792

Process crime scenes.

Task
825

Recognize and accurately report forensic artifacts indicative of a particular operating system.

Task
868

Extract data using data carving techniques (e.g., Forensic Tool Kit [FTK], Foremost).

Task
870

Capture and analyze network traffic associated with malicious activities using network monitoring tools.

Task
882

Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies.

Task
889

Knowledge of deployable forensics.

Knowledge
908

Ability to decrypt digital data collections.

Ability
923

Knowledge of security event correlation tools.

Knowledge
944

Conduct cursory binary analysis.

Task
983

Knowledge of legal rules of evidence and court procedure.

Knowledge

A Host Analyst (HA) will have knowledge of various system configurations encountered. This work role…

Workforce Element:
Cyberspace Effects

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
1037B

Knowledge of program protection planning to include information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements.

Knowledge
1038

Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
1072A

Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Ability
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
109

Knowledge of secure configuration management techniques.

Knowledge
109A

Knowledge of configuration management techniques.

Knowledge
110

Knowledge of key concepts in security management (e.g., Release Management, Patch Management).

Knowledge
110A

Knowledge of security management.

Knowledge
111

Knowledge of security system design tools, methods, and techniques.

Knowledge
1110

Isolate and remove malware.

Task
1111

Identify applications and operating systems of a network device based on network traffic.

Task
1113

Identify network mapping and operating system (OS) fingerprinting activities.

Task
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
117

Knowledge of software design tools, methods, and techniques.

Knowledge
124

Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools.

Knowledge
130

Knowledge of systems testing and evaluation methods.

Knowledge
139

Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications.

Knowledge
141A

Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures.

Knowledge
143A

Knowledge of integrating the organization’s goals and objectives into the architecture.

Knowledge
148

Knowledge of Virtual Private Network (VPN) security.

Knowledge
15

Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.

Knowledge
150

Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities.

Knowledge
155

Skill in applying and incorporating information technologies into proposed solutions.

Skill
156

Skill in applying confidentiality, integrity, and availability principles.

Skill
183A

Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Knowledge
202A

Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems.

Skill
205

Skill in implementing, maintaining, and improving established network security practices.

Skill
2062

Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the NE or enclave.

Task
2063

Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.

Task
2119

Conduct network scouting and vulnerability analyses of systems within a network.

Task
2205

Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers).

Task
2226

Detect exploits against targeted networks and hosts and react accordingly.

Task
2232

Determine course of action for addressing changes to objectives, guidance, and operational environment.

Task
233

Skill in using protocol analyzers.

Skill
2353

Edit or execute simple scripts (e.g., PERL, VBS) on Windows and UNIX systems.

Task
2379B

Identify threats to Blue Force vulnerabilities.

Task
2429

Generate requests for information.

Task
2603

Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements.

Task
2611

Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan.

Task
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
270

Knowledge of common adversary tactics, techniques, and procedures in assigned area of responsibility (i.e., historical country-specific tactics, techniques, and procedures; emerging capabilities).

Knowledge
27A

Knowledge of cryptology.

Knowledge
3002

Ability to focus research efforts to meet the customer’s decision-making needs.

Ability
3063

Ability to monitor system operations and react to events in response to triggers and/or observation of trends or unusual activity.

Ability
3130

Knowledge of auditing and logging procedures (including server-based logging).

Knowledge
3140

Knowledge of basic programming concepts (e.g., levels, structures, compiled vs. interpreted languages).

Knowledge
3141

Knowledge of basic software applications (e.g., data storage and backup, database applications) and their vulnerabilities.

Knowledge
3153

Knowledge of circuit analysis.

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3201

Knowledge of all relevant reporting and dissemination procedures.

Knowledge
3206

Knowledge of current software and methodologies for active defense and system hardening.

Knowledge
3222

Knowledge of data backup and restoration concepts.

Knowledge
3253

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Knowledge
3261

Knowledge of evasion strategies and techniques.

Knowledge
3270

Knowledge of forensic implications of operating system structure and operations.

Knowledge
3317

Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP.

Knowledge
3348

Knowledge of intrusion detection systems and signature development.

Knowledge
3353

Knowledge of the Risk Management Framework Assessment Methodology.

Knowledge
3378

Knowledge of methods and techniques used to detect various exploitation activities.

Knowledge
34

Knowledge of database systems.

Knowledge
3431

Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).

Knowledge
3454

Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, Panda, Kaspersky) and how differences affect exploitation/vulnerabilities.

Knowledge
3459

Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization.

Knowledge
3479

Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation.

Knowledge
3480

Knowledge of security implications of software configurations.

Knowledge
350

Skill in analyzing memory dumps to extract information.

Skill
3508

Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network).

Knowledge
3513

Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems.

Knowledge
3539

Knowledge of telecommunications fundamentals.

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3637

Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).

Knowledge
3642

Knowledge of various types of computer architectures.

Knowledge
3740

Skill in determining installed patches on various operating systems and identifying patch signatures.

Skill
3777

Skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools.

Skill
3801

Skill in identifying the devices that work at each level of protocol models.

Skill
3815

Skill in interpreting vulnerability scanner results to identify vulnerabilities.

Skill
3859

Skill in reading, interpreting, writing, modifying, and executing simple scripts (e.g., PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data).

Skill
3859A

Ability to read, interpret, write, modify, and execute simple scripts (e.g. PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data).

Ability
3871

Skill in remote command line and Graphic User Interface (GUI) tool usage.

Skill
3948

Skill in verifying the integrity of all files.

Skill
4095

Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML).

Knowledge
4171

Ability to analyze a finding of a compromise and develop a custom signature(s) and/or rule(s) to identify it throughout the network

Ability
4172

Ability to analyze adversarial avenues of approach on a mission-critical system

Ability
4174

Ability to analyze Data at Rest and Data in Transit encryption methodologies and assess Data at Rest and Data in Transit policies in support of identifying outliers to delineate possible avenues of approach.

Ability
4176

Ability to analyze how the tools operate to enumerate the system

Ability
4179

Ability to analyze multiple memory captures, determine anomalous behavior and developed a detailed report that includes timeline of compromise

Ability
4182

Ability to analyze organizational policies and documentation for appropriate use and user privileges to determine current user access rights policies

Ability
4184

Ability to analyze potentially malicious processes, libraries and modules on a system

Ability
4185

Ability to analyze process lists within Windows, Unix, or Linux operating systems

Ability
4186

Ability to analyze software installed and in use on a system, and on a host machine and compare it to the authorized software list provided by the network owner

Ability
4187

Ability to analyze tools/hardware used to extract/analyze/capture memory and disk images

Ability
4188

Ability to analyze user-mode/kernel mode rootkits and how they function and differ

Ability
4189

Ability to analyze vulnerabilities and misconfiguration without Information Assurance artifacts.

Ability
4195

Ability to build a baseline of configuration/state for host machines

Ability
4197

Ability to capture a memory image from a host workstation

Ability
4198

Ability to capture forensically sound memory and disk images with regard to timeline analysis

Ability
4206

Ability to compare active user accounts on a network to appropriate Standard Operating Procedure (SOP), gather active user accounts on a network and compare to authorized user list

Ability
4207

Ability to compare current state against baselines

Ability
4209

Ability to compile group policies and access control lists from mission partner networks.

Ability
4210

Ability to compile host-based firewall configurations and host intrusion prevention system through group policy modifications from mission partner networks.

Ability
4211

Ability to conduct disk forensics on multiple images

Ability
4216

Ability to configure log aggregation

Ability
4217

Ability to configure, forward and statistically analyze logs

Ability
4225

Ability to correlate indicators of compromise

Ability
4232

Ability to de-obfuscate (e.g. command line execution, string substitution, clandestine side channel, Base64).

Ability
4234

Ability to develop a risk defense plan (e.g. behavioral development, etc.) and put active measures in place in defense of a network, endpoint, and/or host.

Ability
4237

Ability to develop dashboards to better visualize data

Ability
4238

Ability to develop host-based IDS/IPS signatures and settings

Ability
4239

Ability to develop the reporting and recording of discovered potentially malicious processes, libraries, and modules on a compromised system

Ability
4245

Ability to enumerate domain security groups.

Ability
4246

Ability to enumerate knowledge management applications (e.g. SharePoint) and their service accounts/security groups.

Ability
4247

Ability to enumerate network shares and identify ACLs/security permissions and analyze for vulnerabilities/misconfigurations (e.g. SMB, NFS, ISCSI).

Ability
4250

Ability to evaluate common Tactics, Techniques and Procedures (TTP) used in malware and open-source and Intelligence Community (IC) resources available to identify emerging TTPs

Ability
4251

Ability to evaluate compliance with Security Technical Implementation Guides (STIGs) on host machines by utilizing a compliance scanner in support of identifying outliers in order to delineate possible avenues of approach

Ability
4252

Ability to evaluate if patches are up to date for all hosts, determine current process for updating patches and determine current patch level for all hosts on a network according to NIST Special Publications 800-40 in support of identifying outliers in order to delineate possible avenues of approach.

Ability
4256

Ability to evaluate rogue/unauthorized systems on a network

Ability
4257

Ability to evaluate security posture shortcomings in group policy

Ability
4258

Ability to evaluate steps taken after host-based IDS/IPS alerts, verify the finding and ensure its volatility

Ability
4259

Ability to evaluate systems resiliency in adverse conditions

Ability
4262

Ability to export/enumerate information (e.g., users, groups) from a Domain Controller.

Ability
4266

Ability to identify activity context in log entries to correlate indicators of compromise.

Ability
4269

Ability to identify anomalous network traffic on a host machine.

Ability
4273

Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.

Ability
4281

Ability to identify new indicators of compromise through anomalous behavior in log entries.

Ability
4283

Ability to identify security posture shortcomings

Ability
4284

Ability to identify tools and techniques available for analyzing binary applications and interpreted scripts.

Ability
4287

Ability to identify/select the most appropriate tools and solutions for the specific environment (e.g. disk/memory forensics/capture, host enumeration, application whitelisting, log aggregation and analysis, HIPS/HIDS solutions, etc.).

Ability
4288

Ability to implement and configure host-based firewalls and host intrusion prevention systems

Ability
4289

Ability to implement Data at Rest and Data in Transit encryption methodologies, Assess Data at Rest and Data in Transit polices.

Ability
4302

Ability to measure known vulnerabilities against known vectors of approach.

Ability
4306

Ability to monitor Active Directory (AD) for creation of unauthorized/potentially malicious accounts.

Ability
4309

Ability to operate specified tools to enumerate a system.

Ability
4312

Ability to organize Active Directories (AD) hierarchy structure.

Ability
4313

Ability to organize logging and auditing procedures including server-based logging.

Ability
4315

Ability to organize order of the volatility when capturing artifacts.

Ability
4318

Ability to perform and analyze situational awareness commands within Windows, Unix, and Linux operating systems (e.g. system info, net stat, ipconfig, task list, ls, ifconfig, etc…)

Ability
4319

Ability to perform and analyze vulnerability scans on host machines in support of identifying outliers in order to delineate possible avenues of approach.

Ability
4320

Ability to perform complex root-cause analysis and recommend mitigations to determine root cause of an intrusion.

Ability
4323

Ability to perform dynamic analysis.

Ability
4326

Ability to perform static analysis.

Ability
4331

Ability to prioritize how Operating System (OS) and application patches are distributed in different systems.

Ability
4332

Ability to prioritize Operating Systems (OS) default processes, library, and modules based on boot order, dependencies, or key operations.

Ability
4337

Ability to provide host analysis for Risk Mitigation Plan (RMP) to improve customer security overall posture.

Ability
4339

Ability to provide mitigations to recover from a full network compromise.

Ability
4351

Ability to select the best tools to enumerate a given set of host machines in order to validate whether they match known baselines.

Ability
4363

Ability to use and integrate a Security Information and Event Management (SIEM) platform.

Ability
4371

Ability to use host volatile data to compare active processes, libraries and modules against databases of known good/bad.

Ability
4375

Ability to utilize Defense Information Systems Agency (DISA)/ Department of Defense (DoD) system configuration guidelines.

Ability
4390

Knowledge of active directory federated services.

Knowledge
43A

Knowledge of embedded systems.

Knowledge
4413

Knowledge of common information network malware (e.g., viruses, trojans, etc.) and vectors of attack (e.g., ports, attachments, etc.).

Knowledge
4415

Knowledge of common obfuscation techniques (e.g. command line execution, string substitution, clandestine side channel, Base64).

Knowledge
4416

Knowledge of common persistence locations within Windows, Unix, or Linux operating systems.

Knowledge
4427

Knowledge of cybersecurity and cybersecurity-enabled software products.

Knowledge
4429

Knowledge of cybersecurity controls and design principles and methods (e.g., firewalls, DMZ, and encryption).

Knowledge
4430

Knowledge of cybersecurity Risk Management Framework (RMF) process.

Knowledge
4434

Knowledge of DCO capabilities, including open-source tools, and their capabilities.

Knowledge
4435

Knowledge of Defense-In-Depth principles.

Knowledge
4438

Knowledge of different types of log subscriptions (e.g. push vs pull, MS Windows event forwarding, winlogbeat, syslog).

Knowledge
4443

Knowledge of evasion strategies and TTPs (e.g., noise, stealth, situational awareness, bandwidth throttling).

Knowledge
4445

Knowledge of existing cybersecurity principles, policies, and procedures

Knowledge
4452

Knowledge of full-spectrum of cyberspace operations in an intelligence-driven DCO environment.

Knowledge
4501

Knowledge of non-Active Directory domains (e.g. IDM, LDAP).

Knowledge
4522

Knowledge of public key infrastructure (PKI) libraries, certificate authorities, certificate management, and encryption functionalities.

Knowledge
4537

Knowledge of stream providers (e.g. KAFKA).

Knowledge
4539

Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model).

Knowledge
4583

Knowledge of the U.S. Security System authorities, responsibilities, and contributions to the cyberspace operations mission.

Knowledge
4585

Knowledge of the Windows registry hive keys and the information contained within each one.

Knowledge
4589

Knowledge of typical system processes within Windows, Unix, or Linux operating systems

Knowledge
4595

Knowledge of web applications and their common attack vectors.

Knowledge
4599

Skill in analyzing endpoint collection data.

Skill
46

Knowledge of fault tolerance.

Knowledge
4655

Skill in providing support to intelligence analysts to understand the operational environment and how it ties to intelligence reporting.

Skill
4660

Skill in refining research (e.g., vulnerabilities, TTPs) to assist intelligence analysts’ preparation of products.

Skill
4665

Skill in run level configurations in a Linux or UNIX environment

Skill
4679

Skill in using various online tools for open-source research (e.g., online trade, DNS, mail, etc.).

Skill
49

Knowledge of host/network access control mechanisms (e.g., access control list).

Knowledge
51

Knowledge of how system components are installed, integrated, and optimized.

Knowledge
52

Knowledge of human-computer interaction principles.

Knowledge
53

Knowledge of the Security Assessment and Authorization process.

Knowledge
61

Knowledge of incident response and handling methodologies.

Knowledge
62

Knowledge of industry-standard and organizationally accepted analysis principles and methods.

Knowledge
6240

Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE).

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
6330

Knowledge of multi-level/security cross domain solutions.

Knowledge
65A

Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).

Knowledge
66

Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies.

Knowledge
6820

Knowledge of network architecture concepts including topology, protocols, and components.

Knowledge
68A

Ability to build architectures and frameworks.

Ability
69

Knowledge of Risk Management Framework (RMF) requirements.

Knowledge
70A

Knowledge of cybersecurity methods, such as firewalls, demilitarized zones, and encryption.

Knowledge
78

Knowledge of microprocessors.

Knowledge
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
8036

Conduct open source research via various online tools.

Task
8041

Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces.

Task
8111

Identify potential points of strength and vulnerability among segments of a network map.

Task
8115

Identify tools/hardware used to extract/analyze/capture memory and disk images.

Task
8151

Perform security reviews and identify gaps in security architecture that can be used in the development of a security risk management plan.

Task
8161

Provide and maintain documentation for TTPs as inputs to training programs.

Task
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
8212

Validate intrusion detection system (IDS) alerts.

Task
82A

Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs.

Knowledge
868

Extract data using data carving techniques (e.g., Forensic Tool Kit [FTK], Foremost).

Task
88

Knowledge of new and emerging information technology (IT) and cybersecurity technologies.

Knowledge
880A

Work with stakeholders to resolve computer security incidents and vulnerability compliance.

Task
892

Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, anti-virus software, anti-spyware).

Skill
90

Knowledge of operating systems.

Knowledge
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
915

Knowledge of front-end collection systems, including traffic collection, filtering, and selection.

Knowledge
92B

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol (TCP), Internet Protocol (IP), Open System Interconnection Model (OSI)).

Knowledge
958

Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity.

Task
959

Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.

Task
95A

Knowledge of penetration testing principles, tools, and techniques.

Knowledge
972A

Determine and document software patches or the extent of releases that would leave software vulnerable.

Task
973A

Skill in using code analysis tools.

Skill

Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
8A

Knowledge of access authentication methods.

Knowledge
21

Knowledge of computer algorithms.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
25

Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]).

Knowledge
27A

Knowledge of cryptology.

Knowledge
34

Knowledge of database systems.

Knowledge
38

Knowledge of organization’s enterprise information security architecture system.

Knowledge
43A

Knowledge of embedded systems.

Knowledge
46

Knowledge of fault tolerance.

Knowledge
51

Knowledge of how system components are installed, integrated, and optimized.

Knowledge
52

Knowledge of human-computer interaction principles.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
64

Knowledge of information security systems engineering principles.

Knowledge
70

Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).

Knowledge
72

Knowledge of local area and wide area networking principles and concepts including bandwidth management.

Knowledge
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
82A

Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs.

Knowledge
90

Knowledge of operating systems.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
94

Knowledge of parallel and distributed computing concepts.

Knowledge
98

Knowledge of policy-based and risk adaptive access controls.

Knowledge
101

Knowledge of process engineering concepts.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
109

Knowledge of secure configuration management techniques.

Knowledge
110A

Knowledge of security management.

Knowledge
118

Knowledge of software development models (e.g., Waterfall Model, Spiral Model).

Knowledge
119

Knowledge of software engineering.

Knowledge
121

Knowledge of structured analysis principles and methods.

Knowledge
124

Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools.

Knowledge
126

Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.

Knowledge
129

Knowledge of system life cycle management principles, including software security and usability.

Knowledge
130

Knowledge of systems testing and evaluation methods.

Knowledge
144

Knowledge of the systems engineering process.

Knowledge
177

Skill in designing countermeasures to identified security risks.

Skill
179

Skill in designing security controls based on cybersecurity principles and tenets.

Skill
197

Skill in discerning the protection needs (i.e., security controls) of information systems and networks.

Skill
199

Skill in evaluating the adequacy of security designs.

Skill
416

Analyze design constraints, analyze trade-offs and detailed system and security design, and consider lifecycle support.

Task
419

Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications.

Task
425

Assess the effectiveness of cybersecurity measures utilized by system(s).

Task
426

Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile.

Task
431

Build, test, and modify product prototypes using working models or theoretical models.

Task
457

Conduct Privacy Impact Assessments (PIA) of the application’s security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII).

Task
494

Design and develop cybersecurity or cybersecurity-enabled products.

Task
496A

Design, develop, integrate, and update system security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation.

Task
501

Design or integrate appropriate data backup capabilities into overall system designs, and ensure appropriate technical and procedural processes exist for secure system backups and protected storage of backup data.

Task
503A

Design to security requirements to ensure requirements are met for all systems and/or applications.

Task
516

Develop and direct system testing and validation procedures and documentation.

Task
530

Develop detailed security design documentation for component and interface specifications to support system design and development.

Task
531

Develop Disaster Recovery and Continuity of Operations plans for systems under development and ensure testing prior to systems entering a production environment.

Task
630

Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find work-arounds for communication protocols that are not interoperable).

Task
659

Implement security designs for new or existing system(s).

Task
662

Incorporate cybersecurity vulnerability solutions into system designs (e.g., Cybersecurity Vulnerability Alerts).

Task
737B

Perform an information security risk assessment.

Task
766A

Perform security reviews and identify security gaps in architecture.

Task
770

Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.

Task
809

Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).

Task
850

Store, retrieve, and manipulate data for analysis of system capabilities and requirements.

Task
856

Provide support to security/certification test and evaluation activities.

Task
997

Design and develop key management functions (as related to cybersecurity).

Task
998

Analyze user needs and requirements to plan and conduct system security development.

Task
1000

Ensure security design and cybersecurity development activities are properly documented (providing a functional description of security implementation) and updated as necessary.

Task
1002

Skill in conducting audits or reviews of technical systems.

Skill
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1142

Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

Knowledge
1152

Implement and integrate system development life cycle (SDLC) methodologies (e.g., IBM Rational Unified Process) into development environment.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2354

Employ configuration management processes.

Task
5200

Design, implement, test, and evaluate secure interfaces between information systems, physical systems, and/or embedded technologies.

Task
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
100

Knowledge of Privacy Impact Assessments.

Knowledge
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1038B

Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability).

Knowledge
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1135

Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing).

Knowledge
1140A

Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic).

Skill
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
133

Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).

Knowledge
173A

Skill in integrating and applying policies that meet system security objectives.

Skill
177A

Knowledge of countermeasure design for identified security risks.

Knowledge
180

Skill in designing the integration of hardware and software solutions.

Skill
191

Skill in developing and applying security system access controls.

Skill
224A

Skill in the use of design modeling (e.g., unified modeling language).

Skill
3B

Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks.

Skill
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
42

Knowledge of electrical engineering as applied to computer architecture, including circuit boards, processors, chips, and associated computer hardware.

Knowledge
542A

Develop mitigation strategies to address cost, schedule, performance, and security risks.

Task
542A

Develop risk mitigation strategies and cybersecurity countermeasures to address cost, performance, and security risks and to resolve vulnerabilities and recommend security changes to system or system components as needed.

Task
626

Identify components or elements, allocate security functions to those elements, and describe the relationships between the elements.

Task
632

Identify and prioritize essential system functions or sub-systems required to support essential capabilities or business functions for restoration or recovery after a system failure or during a system recovery event based on overall system requirements for continuity and availability.

Task
648

Identify, assess, and recommend cybersecurity or cybersecurity-enabled products for use within a system and ensure recommended products are in compliance with organization’s evaluation and validation requirements.

Task
65A

Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).

Knowledge
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
6919

Ability to determine the best cloud deployment model for the appropriate operating environment.

Ability
710

Monitor and evaluate a system’s compliance with information technology (IT) security, resilience, and dependability requirements.

Task
75

Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, and statistics.

Knowledge
78

Knowledge of microprocessors.

Knowledge
803

Provide guidelines for implementing developed systems to customers or installation teams.

Task
808A

Provide input to implementation plans and standard operating procedures as they relate to information systems security.

Task
860A

Trace system requirements to design components and perform gap analysis.

Task
874

Utilize models and simulations to analyze or predict system performance under different operating conditions.

Task
877A

Verify stability, interoperability, portability, and/or scalability of system architecture.

Task
904

Knowledge of interpreted and compiled computer languages.

Knowledge
936

Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).

Task
999

Develop cybersecurity designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations, high integrity and availability requirements, multilevel security/processing of multiple classification levels, and processing Sensitive Compartmented Information).

Task

Responsible for the cybersecurity of a program, organization, system, or enclave.

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
29

Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.

Knowledge
37

Knowledge of disaster recovery continuity of operations plans.

Knowledge
49

Knowledge of host/network access control mechanisms (e.g., access control list).

Knowledge
55

Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data.

Knowledge
58

Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins.

Knowledge
61

Knowledge of incident response and handling methodologies.

Knowledge
66

Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies.

Knowledge
77

Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
112

Knowledge of server administration and systems engineering theories, concepts, and methods.

Knowledge
126

Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.

Knowledge
129

Knowledge of system life cycle management principles, including software security and usability.

Knowledge
143

Knowledge of the organization’s enterprise information technology (IT) goals and objectives.

Knowledge
150

Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities.

Knowledge
173

Skill in creating policies that reflect system security objectives.

Skill
183

Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Skill
299

Knowledge of information security program management and project management principles and techniques.

Knowledge
391

Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.

Task
395

Advise senior management (e.g., CIO) on risk levels and security posture.

Task
397

Advise appropriate senior leadership or Authorizing Official of changes affecting the organization’s cybersecurity posture.

Task
440

Collect and maintain data needed to meet system cybersecurity reporting.

Task
445

Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.

Task
578

Ensure security improvement actions are evaluated, validated, and implemented as required.

Task
584

Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment.

Task
585

Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s).

Task
628

Identify alternative information security strategies to address organizational security objective.

Task
640

Identify information technology (IT) security program implications of new technologies or technology upgrades.

Task
677

Interpret patterns of non compliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise’s cybersecurity program.

Task
705

Manage the monitoring of information security data sources to maintain organizational situational awareness.

Task
730

Oversee the information security training and awareness program.

Task
733

Participate in the development or modification of the computer environment cybersecurity program plans and requirements.

Task
790

Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations.

Task
816

Provide system related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents.

Task
824

Recognize a possible security violation and take appropriate action to report the incident, as required.

Task
828

Recommend resource allocations required to securely operate and maintain an organization’s cybersecurity requirements.

Task
852

Supervise or manage protective or corrective measures when an cybersecurity incident or vulnerability is discovered.

Task
862

Track audit findings and recommendations to ensure appropriate mitigation actions are taken.

Task
919

Promote awareness of security issues among management and ensure sound security principles are reflected in the organization’s vision and goals.

Task
947

Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.

Task
962

Identify security requirements specific to an information technology (IT) system in all phases of the System Life Cycle.

Task
963

Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.

Task
964

Assure successful implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization’s mission and goals.

Task
965

Knowledge of organization’s risk tolerance and/or risk management approach.

Knowledge
966

Knowledge of enterprise incident response program, roles, and responsibilities.

Knowledge
967

Knowledge of current and emerging threats/threat vectors.

Knowledge
1016

Support necessary compliance activities (e.g., ensure system security configuration guidelines are followed, compliance monitoring occurs).

Task
1032

Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance.

Task
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1004

Knowledge of critical information technology (IT) procurement requirements.

Knowledge
1017

Participate in the acquisition process as necessary, following appropriate supply chain risk management practices.

Task
1018

Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.

Task
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1035

Forecast ongoing service demands and ensure security assumptions are reviewed as necessary.

Task
1038B

Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability).

Knowledge
1039

Skill in evaluating the trustworthiness of the supplier and/or product.

Skill
1040A

Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure.

Knowledge
1041

Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate.

Task
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
107

Knowledge of resource management principles and techniques.

Knowledge
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
113

Knowledge of server and client operating systems.

Knowledge
1131

Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]).

Knowledge
132

Knowledge of technology integration processes.

Knowledge
25

Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]).

Knowledge
325

Knowledge of secure acquisitions (e.g., relevant Contracting Officer’s Technical Representative [COTR] duties, secure procurement, supply chain risk management).

Knowledge
392

Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program.

Task
396

Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, and systems, and elements.

Task
475

Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance.

Task
572

Ensure application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment.

Task
590

Ensure that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture.

Task
596

Establish overall enterprise information security architecture (EISA) with the organization’s overall security strategy.

Task
598A

Evaluate and approve development efforts to ensure that baseline security safeguards controls/measures are appropriately installed.​

Task
600

Evaluate cost benefit, economic, and risk analysis in decision making process.

Task
62

Knowledge of industry-standard and organizationally accepted analysis principles and methods.

Knowledge
674

Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information.

Task
676

Interpret and/or approve security requirements relative to the capabilities of new information technologies.

Task
679

Lead and align information technology (IT) security priorities with the security strategy.

Task
680

Lead and oversee information security budget, staffing, and contracting.

Task
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
69A

Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).

Knowledge
706

Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency.

Task
707

Manage threat or target analysis of cyber defense information and production of threat information within the enterprise.

Task
711

Monitor and evaluate the effectiveness of the enterprise’s cybersecurity safeguards to ensure they provide the intended level of protection.

Task
731A

Participate in risk assessment and authorization per Risk Management Framework processes.

Task
76

Knowledge of measures or indicators of system performance and availability.

Knowledge
801

Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans.

Task
810

Provide leadership and direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities.

Task
818

Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to higher headquarters.

Task
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
848

Recommend policy and coordinate review and approval.

Task
869

Use federal and organization-specific published documents to manage operations of their computing environment system(s).

Task
87

Knowledge of network traffic analysis methods.

Knowledge
88B

Knowledge of new and emerging control systems technologies.

Knowledge
9

Knowledge of applicable business processes and operations of customer organizations.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
948

Participate in Risk Governance process to provide security risks, mitigations, and input on other technical risk.

Task
949

Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements.

Task
95A

Knowledge of penetration testing principles, tools, and techniques.

Knowledge

Manages a portfolio of IT capabilities that align with the overall needs of mission and…

Workforce Element:
Cyberspace Enablers / Acquisition

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1004A

Knowledge of information technology (IT) acquisition/procurement requirements.

Knowledge
1018

Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.

Task
1148B

Ensure supply chain, system, network, performance, and cyber security requirements are included in contract language and delivered.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1021

Knowledge of risk threat assessment.

Knowledge
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1061A

Knowledge of the acquisition/procurement life cycle process.

Knowledge
107

Knowledge of resource management principles and techniques.

Knowledge
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1148

Develop contract language to ensure supply chain, system, network, and operational security are met.

Task
296

Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.

Knowledge
325

Knowledge of secure acquisitions (e.g., relevant Contracting Officer’s Technical Representative [COTR] duties, secure procurement, supply chain risk management).

Knowledge
5380

Gather feedback on customer satisfaction and internal service performance to foster continual improvement.

Task
6160

Ability to oversee the development and update of the lifecycle cost estimate.

Ability
6290

Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems.

Knowledge
680A

Lead and oversee budget, staffing, and contracting.

Task
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
6919

Ability to determine the best cloud deployment model for the appropriate operating environment.

Ability
69A

Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).

Knowledge
834

Resolve conflicts in laws, regulations, policies, standards, or procedures.

Task
840B

Review or conduct audits of programs and projects.

Task
942

Knowledge of the organization’s core business/mission processes.

Knowledge
955A

Draft and publish supply chain security and risk management documents.

Task
979

Knowledge of supply chain risk management standards, processes, and practices.

Knowledge

Conducts evaluations of an IT program or its individual components, to determine compliance with published…

Workforce Element:
Cyberspace Enablers / Acquisition

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
203

Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.

Skill
537

Develop methods to monitor and measure risk, compliance, and assurance efforts.

Task
1002

Skill in conducting audits or reviews of technical systems.

Skill
1143A

Conduct import/export reviews for acquiring systems and software.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1004A

Knowledge of information technology (IT) acquisition/procurement requirements.

Knowledge
1021

Knowledge of risk threat assessment.

Knowledge
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1061A

Knowledge of the acquisition/procurement life cycle process.

Knowledge
107

Knowledge of resource management principles and techniques.

Knowledge
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1130

Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1136A

Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud).

Knowledge
1147A

Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce.

Task
1148B

Ensure supply chain, system, network, performance, and cyber security requirements are included in contract language and delivered.

Task
129

Knowledge of system life cycle management principles, including software security and usability.

Knowledge
296

Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.

Knowledge
325A

Ability to ensure security practices are followed throughout the acquisition process.

Ability
5610

Review service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up.

Task
62

Knowledge of industry-standard and organizationally accepted analysis principles and methods.

Knowledge
6290

Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems.

Knowledge
68

Knowledge of information technology (IT) architectural concepts and frameworks.

Knowledge
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
6919

Ability to determine the best cloud deployment model for the appropriate operating environment.

Ability
6942

Skill in designing or implementing cloud computing deployment models.

Skill
6945

Skill in migrating workloads to, from, and among the different cloud computing service models.

Skill
69A

Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).

Knowledge
811

Provide ongoing optimization and problem solving support.

Task
813

Provide recommendations for possible improvements and upgrades.

Task
840B

Review or conduct audits of programs and projects.

Task
936

Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).

Task
949

Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements.

Task
954

Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk.

Knowledge
979

Knowledge of supply chain risk management standards, processes, and practices.

Knowledge

Work that involves directly managing information technology projects to provide a unique service or product.

Workforce Element:
Cyberspace Enablers / Acquisition

Core KSATs:
KSAT ID Description KSAT
16

Knowledge of capabilities and requirements analysis.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
68

Knowledge of information technology (IT) architectural concepts and frameworks.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
129

Knowledge of system life cycle management principles, including software security and usability.

Knowledge
143

Knowledge of the organization’s enterprise information technology (IT) goals and objectives.

Knowledge
203

Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.

Skill
325A

Ability to ensure security practices are followed throughout the acquisition process.

Ability
537

Develop methods to monitor and measure risk, compliance, and assurance efforts.

Task
949

Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements.

Task
979

Knowledge of supply chain risk management standards, processes, and practices.

Knowledge
1004A

Knowledge of information technology (IT) acquisition/procurement requirements.

Knowledge
1018

Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.

Task
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1039A

Ability to evaluate/ensure the trustworthiness of the supplier and/or product.

Ability
1127

Knowledge of Import/Export Regulations related to cryptography and other security technologies.

Knowledge
1130

Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1148B

Ensure supply chain, system, network, performance, and cyber security requirements are included in contract language and delivered.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5010

Act as a primary stakeholder in the underlying information technology (IT) operational processes and functions that support the service, provide direction and monitor all significant activities so the service is delivered successfully.

Task
5410

Manage the internal relationship with information technology (IT) process owners supporting the service, assisting with the definition and agreement of operating level agreements (OLAs).

Task
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1003

Develop and document supply chain risks for critical system elements, as appropriate.

Task
1005

Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes).

Knowledge
1017A

Participate in the acquisition process as necessary.

Task
1021

Knowledge of risk threat assessment.

Knowledge
1061A

Knowledge of the acquisition/procurement life cycle process.

Knowledge
107

Knowledge of resource management principles and techniques.

Knowledge
1122

Ability to apply supply chain risk management standards.

Ability
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1143A

Conduct import/export reviews for acquiring systems and software.

Task
1148A

Develop supply chain, system, network, performance, and cyber security requirements.

Task
296

Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.

Knowledge
5150

Coordinate and manage the overall service provided to a customer end-to-end.

Task
5310

Ensure that appropriate SLAs and underpinning contracts have been defined that clearly set out for the customer a description of the service and the measures for monitoring the service.

Task
5380

Gather feedback on customer satisfaction and internal service performance to foster continual improvement.

Task
5610

Review service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up.

Task
5660

Work with other service managers and product owners to balance and prioritize services to meet overall customer requirements, constraints, and objectives.

Task
6160

Ability to oversee the development and update of the lifecycle cost estimate.

Ability
62

Knowledge of industry-standard and organizationally accepted analysis principles and methods.

Knowledge
6290

Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems.

Knowledge
629A

Identify and address cyber workforce planning and management issues (e.g. recruitment, retention, and training).

Task
680A

Lead and oversee budget, staffing, and contracting.

Task
69A

Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).

Knowledge
760

Perform needs analysis to determine opportunities for new and improved business process solutions.

Task
797

Provide advice on project costs, design concepts, or design changes.

Task
801

Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans.

Task
811

Provide ongoing optimization and problem solving support.

Task
813

Provide recommendations for possible improvements and upgrades.

Task
834

Resolve conflicts in laws, regulations, policies, standards, or procedures.

Task
840B

Review or conduct audits of programs and projects.

Task
88A

Knowledge of current and emerging cyber technologies.

Knowledge
942

Knowledge of the organization’s core business/mission processes.

Knowledge
954

Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk.

Knowledge
955A

Draft and publish supply chain security and risk management documents.

Task

Conducts target development at the system, component and entity levels. Builds and maintains Electronic Target…

Workforce Element:
Cyberspace Effects

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1056

Knowledge of operations security.

Knowledge
2001

Accurately characterize targets.

Task
2068

Assist in the identification of intelligence collection shortfalls.

Task
2089

Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.

Task
2134

Conduct target research and analysis.

Task
2170

Coordinate target vetting with appropriate partners.

Task
2289

Develop measures of effectiveness and measures of performance.

Task
2459

Identify intelligence gaps and shortfalls.

Task
2524

Integrate cyber planning/targeting efforts with other organizations.

Task
2628

Participate in exercises.

Task
2716

Produce target system analysis products.

Task
2882

Work closely with planners, analysts, and collection managers to identify intelligence gaps and ensure intelligence requirements are accurate and up-to-date.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3040

Ability to develop or recommend planning solutions to problems and situations for which no precedent exists.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3073

Ability to recognize and mitigate cognitive biases which may affect analysis.

Ability
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3197

Knowledge of criticality and vulnerability factors (e.g., value, recuperation, cushion, countermeasures) for target selection and applicability to the cyber domain.

Knowledge
3218

Knowledge of cyber operations terminology/lexicon.

Knowledge
3250

Knowledge of dynamic and deliberate targeting.

Knowledge
3271

Knowledge of internal and external partner cyber operations capabilities and tools.

Knowledge
3281

Knowledge of governing authorities for targeting.

Knowledge
3334

Knowledge of intelligence confidence levels.

Knowledge
3335

Knowledge of intelligence disciplines.

Knowledge
3358

Knowledge of organizational hierarchy and cyber decision making processes.

Knowledge
3446

Knowledge of analytical constructs and their use in assessing the operational environment.

Knowledge
3527

Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.).

Knowledge
3530

Knowledge of target list development (i.e. RTL, JTL, CTL, etc.).

Knowledge
3533

Knowledge of target vetting and validation procedures.

Knowledge
3539

Knowledge of telecommunications fundamentals.

Knowledge
3541

Knowledge of the available tools and applications associated with collection requirements and collection management.

Knowledge
3584

Knowledge of intelligence preparation of the environment and similar processes.

Knowledge
3587

Knowledge of targeting cycles.

Knowledge
3630

Knowledge of the ways in which targets or threats use the Internet.

Knowledge
3651

Knowledge of what constitutes a “threat” to a network.

Knowledge
3691

Skill in assessing and/or estimating effects generated during and after cyber operations.

Skill
3724

Skill in defining and characterizing all pertinent aspects of the operational environment.

Skill
3737

Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects.

Skill
3844

Skill in preparing and presenting briefings.

Skill
3851

Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.

Skill
3880

Skill in reviewing and editing target materials.

Skill
3893

Skill in tailoring analysis to the necessary levels (e.g., classification and organizational).

Skill
3920

Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).

Skill
3946

Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).

Skill
4202

Ability to collaborate with the IC to leverage analytical and technical expertise.

Ability
4203

Ability to communicate effectively when writing and speaking.

Ability
4227

Ability to create products to meet decision making needs.

Ability
4356

Ability to support the joint targeting cycle in a dynamic environment.

Ability
4362

Ability to understand US Code Titles as they apply to targeting in support of operations in cyberspace.

Ability
4373

Ability to utilize analytical constructs.

Ability
4374

Ability to utilize and synthesize multiple intelligence sources to create products.

Ability
4405

Knowledge of Collateral Damage Estimate (CDE) methodology

Knowledge
4409

Knowledge of combat assessment.

Knowledge
4412

Knowledge of Command Structure.

Knowledge
4451

Knowledge of the full-spectrum of cyberspace operational missions (e.g., DODIN Operations, DCO, OCO), principles, capabilities, limitations, and effects.

KSA
4468

Knowledge of IC, to include members, structure, and associated missions.

Knowledge
4473

Knowledge of ISR capabilities and repositories (e.g., Geospatial Intelligence Information Management Services (GIMS), National SIGINT Requirements Process (NSRP), etc.).

Knowledge
4484

Knowledge of metadata.

Knowledge
4492

Knowledge of Mission Packages.

Knowledge
4514

Knowledge of Political, Military, Economic, Social, PMESII and Counter-Terrorism Analytical Framework analytical constructs and their use in assessing the operational environment.

Knowledge
4536

Knowledge of state and non-state target systems.

KSA
4556

Knowledge of the development of Intelligence Needs (INs), Intelligence Requirements (IRs), and Essential Elements of Information (EEI).

Knowledge
4559

Knowledge of the target entity types.

Knowledge
4562

Knowledge of the Joint Tactical Cyber Request (JTCR).

Knowledge
4569

Knowledge of the National SIGINT system.

Knowledge
4572

Knowledge of the Request for Support (RFS) process.

Knowledge
4574

Knowledge of the review and approval process for cyberspace operations Review and Approval Process of Cyber Operations (RAP-CO) process.

Knowledge
4576

Knowledge of the sensitive target and review (STAR) process.

Knowledge
4596

Knowledge of what a Tasking Order is and the information contained in it (e.g., ATO, CTO, and MTO).

Knowledge
4617

Skill in creating and maintaining target materials.

Skill
4622

Skill in developing TSA products.

Skill
4634

Skill in identifying intelligence gaps to generate RFIs.

Skill
4654

Skill in providing input into Mission Packages.

Skill
4681

Skill in utilizing Microsoft Office applications (e.g., Word, PowerPoint, Excel, etc.).

Skill
4683

Skill in writing phased BDA reports.

Skill
8024

Attend or provide input for targeting community meetings (e.g., Targeting Issues Working Group (TIWG), Military Targeting Committee (MTC), etc.).

Task
8027

Build and maintain target materials.

Task
8077

Develop, or assist in the development, of a Collateral Effects Estimation (CEE) methodology for cyberspace.

Task
8133

Maintain situational awareness of the common intelligence picture and/or common operational picture as applicable

Task
8140

Participate in Boards, Bureaus, Cells, Centers, and Working Groups (B2C2WGs).

Task
8143

Participate in the Joint Planning Process and other commander and staff planning processes.

Task
8160

Provide analysis and support for combat assessments.

Task
8177

Provide targeting support to TST planning and operations.

Task
8195

Support target list management (i.e. Restricted Target List (RTL), Joint Target List (JTL), Candidate Target List (CTL), etc.).

Task
8214

Understand measures of effectiveness and measures of performance.

Task

Responsible for the management and administration of processes and tools that enable the organization to…

Workforce Element:
IT (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
134

Knowledge of the capabilities and functionality associated with various content creation technologies (e.g., wikis, social networking, blogs).

Knowledge
135

Knowledge of the capabilities and functionality associated with various technologies for organizing and managing information (e.g., databases, bookmarking engines).

Knowledge
136

Knowledge of the capabilities and functionality of various collaborative technologies (e.g., groupware, SharePoint).

Knowledge
394A

Manage the indexing/cataloguing, storage, and access of explicit organizational knowledge (e.g., hard copy documents, digital files).

Task
464

Construct access paths to suites of information (e.g., link pages) to facilitate access by end-users.

Task
910

Knowledge of database theory.

Knowledge
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1126

Knowledge of data classification standards and methodologies based on sensitivity and other risk factors.

Knowledge
1136A

Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud).

Knowledge
163

Skill in conducting information searches.

Skill
164

Skill in conducting knowledge mapping (e.g., map of knowledge repositories).

Skill
19

Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities.

Knowledge
223

Skill in the measuring and reporting of intellectual capital.

Skill
230

Skill in using knowledge management technologies.

Skill
338A

Knowledge of the principal methods, procedures, and techniques of gathering information and producing, reporting, and sharing information.

Knowledge
5

Ability to match the appropriate knowledge repository technology for a given application or environment.

Ability
5000

Leads efforts to promote the organization’s use of knowledge management and information sharing.

Task
505A

Design, build, implement, and maintain a knowledge management framework that provides end-users access to the organization’s intellectual capital.

Task
513

Develop an understanding of the needs and requirements of information end-users.

Task
6000

Knowledge of taxonomy and semantic ontology theory.

Knowledge
721

Monitor and report the usage of knowledge management assets and resources.

Task
777

Plan and manage the delivery of knowledge management projects.

Task
794A

Promote knowledge sharing between information owners/users through an organization’s operational processes and systems.

Task
814

Provide recommendations on data structures and databases that ensure correct and quality production of reports/management information.

Task
907A

Knowledge of data mining techniques.

Knowledge
942

Knowledge of the organization’s core business/mission processes.

Knowledge

Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate…

Workforce Element:
Intelligence (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1056

Knowledge of operations security.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2099

Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets.

Task
2890

Advise managers and operators on language and cultural issues that impact organization objectives.

Task
2891

Analyze and process information using language and/or cultural expertise.

Task
2897

Conduct analysis of target communications to identify essential information in support of organization objectives.

Task
2902

Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing.

Task
2905

Identify target communications within the global network.

Task
2906

Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis.

Task
2910

Perform foreign language and dialect identification in initial source data.

Task
2912

Perform or support technical network analysis and mapping.

Task
2921

Scan, identify and prioritize target graphic (including machine-to-machine communications) and/or voice language material.

Task
2922

Tip critical or time-sensitive information to appropriate customers.

Task
2923

Transcribe target voice materials in the target language.

Task
2924

Translate (e.g., verbatim, gists, and/or summaries) target graphic material.

Task
2925

Translate (e.g., verbatim, gists, and/or summaries) target voice material.

Task
2927

Identify foreign language terminology within computer programs (e.g., comments, variable names).

Task
2930

Provide near-real time language analysis support (e.g., live operations).

Task
2931

Identify cyber/technology-related terminology in the target language.

Task
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3158

Knowledge of cyber operation objectives, policies, and legalities.

Knowledge
3219

Knowledge of cyber operations.

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3298

Knowledge of how to extract, analyze, and use metadata.

Knowledge
3338

Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions.

Knowledge
3407

Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3450

Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure.

Knowledge
3534

Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference.

Knowledge
3616

Knowledge of the structure, architecture, and design of modern digital and telephony networks.

Knowledge
3617

Knowledge of the structure, architecture, and design of modern wireless communications systems.

Knowledge
3678

Skill in analyzing traffic to identify network devices.

Skill
3689

Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses).

Skill
3708A

Skill in conducting social network analysis.

Skill
3765

Skill in disseminating items of highest intelligence value in a timely manner.

Skill
3867A

Skill in recognizing technical information that may be used for target development including intelligence development.

Skill
4086

Knowledge of relevant laws, regulations, and policies.

Knowledge
4087

Knowledge of target cultural references, dialects, expressions, idioms, and abbreviations.

Knowledge
4094

Knowledge of networking and internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.).

Knowledge
4105

Knowledge of language processing tools and techniques.

Knowledge
4106

Knowledge of analytic tools and techniques.

Knowledge
4116

Knowledge of transcript development processes and techniques (e.g., verbatim, gists, summaries).

Knowledge
4117

Knowledge of translation processes and techniques.

Knowledge
4123

Skill in conducting research using all available sources.

Skill
4124

Skill in translating target graphic and/or voice language materials.

Skill
4125

Skill in complying with the legal restrictions for targeted information.

Skill
4128

Skill in developing intelligence reports.

Skill
4129

Skill in evaluating and interpreting metadata.

Skill
4133

Skill in gisting target communications.

Skill
4135

Skill in identifying non-target regional languages and dialects

Skill
4140

Skill in prioritizing target language material.

Skill
4141

Skill in providing analysis on target-related matters (e.g., language, cultural, communications).

Skill
4148

Ability to review processed target language materials for accuracy and completeness.

Ability
4149

Skill in transcribing target language communications.

Skill
4152

Knowledge of specialized target language (e.g., acronyms, jargon, technical terminology, codewords).

Knowledge
4165

Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption).

Knowledge
4167

Knowledge of target language(s).

Knowledge
4169

Ability to apply language and cultural expertise to analysis.

Ability
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
2243

Determine what technologies are used by a given target.

Task
2434

Identify threat tactics, and methodologies.

Task
2453

Identify collection gaps and potential collection strategies against targets.

Task
2568

Make recommendations to guide collection in support of customer requirements.

Task
2621

Provide SME and support to planning/developmental forums and working groups as appropriate.

Task
2893

Assess, document, and apply a target’s motivation and/or frame of reference to facilitate analysis, targeting and collection opportunities.

Task
2894

Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination.

Task
2896

Conduct all-source target research to include the use of open source materials in the target language.

Task
2901

Perform quality review and provide feedback on transcribed or translated materials.

Task
2909

Provide feedback to collection managers to enhance future collection and analysis.

Task
2916

Provide requirements and feedback to optimize the development of language processing tools.

Task
2919

Perform social network analysis and document as appropriate.

Task
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3564

Knowledge of the data flow from collection origin to repositories and tools.

Knowledge
3595

Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements.

Knowledge
3771

Skill in evaluating data sources for relevance, reliability, and objectivity.

Skill
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3822

Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results.

Skill
3861

Skill in recognizing denial and deception techniques of the target.

Skill
3865

Skill in recognizing significant changes in a target’s communication patterns.

Skill
3890

Skill in synthesizing, analyzing, and prioritizing meaning across data sets.

Skill
3923

Skill in using non-attributable networks.

Skill
4072

Knowledge of collection systems, capabilities, and processes.

Knowledge
4073

Knowledge of the feedback cycle in collection processes.

Knowledge
4078

Knowledge of target or threat cyber actors and procedures.

Knowledge
4079

Knowledge of basic cyber operations activity concepts (e.g., foot printing, scanning and enumeration, penetration testing, white/black listing).

Knowledge
4085

Knowledge of approved intelligence dissemination processes.

Knowledge
4088

Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure).

Knowledge
4089

Knowledge of target communication tools and techniques.

Knowledge
4090

Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes).

Knowledge
4095

Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML).

Knowledge
4097

Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network.

Knowledge
4099

Knowledge of customer information needs.

Knowledge
4108

Knowledge of the impact of language analysis on on-net operator functions.

Knowledge
4113

Knowledge of the request for information process.

Knowledge
4118

Skill in identifying a target’s network characteristics.

Skill
4119

Skill in analyzing language processing tools to provide feedback to enhance tool development.

Skill
4121

Skill in assessing a target’s frame of reference (e.g., motivation, technical capability, organizational structure, sensitivities).

Skill
4134

Skill in identifying intelligence gaps and limitations.

Skill
4160

Skill in interpreting traceroute results, as they apply to network analysis and reconstruction.

Skill
4164

Skill in identifying language issues that may have an impact on organization objectives.

Skill
4166

Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types.

Knowledge
915

Knowledge of front-end collection systems, including traffic collection, filtering, and selection.

Knowledge

The Network Analyst will understand network traffic signatures and discover anomalies through network traffic and…

Workforce Element:
Cyberspace Effects

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1020A

Skill in secure test plan design (e. g. unit, integration, system, acceptance).

Skill
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
1037A

Knowledge of information technology (IT) risk management policies, requirements, and procedures.

Knowledge
1037B

Knowledge of program protection planning to include information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements.

Knowledge
1038

Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability.

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
1073A

Skill in network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Skill
1074A

Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.

Knowledge
109

Knowledge of secure configuration management techniques.

Knowledge
1091

Skill in one way hash functions (e.g., Secure Hash Algorithm [SHA], Message Digest Algorithm [MD5]).

Skill
110

Knowledge of key concepts in security management (e.g., Release Management, Patch Management).

Knowledge
1107

Identify and analyze anomalies in network traffic using metadata (e.g., CENTAUR).

Task
1109

Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools.

Task
110A

Knowledge of security management.

Knowledge
1111

Identify applications and operating systems of a network device based on network traffic.

Task
1113

Identify network mapping and operating system (OS) fingerprinting activities.

Task
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
12

Knowledge of communication methods, principles, and concepts (e.g., crypto, dual hubs, time multiplexers) that support the network infrastructure.

Knowledge
132

Knowledge of technology integration processes.

Knowledge
133

Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).

Knowledge
139

Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications.

Knowledge
143A

Knowledge of integrating the organization’s goals and objectives into the architecture.

Knowledge
145

Knowledge of the type and frequency of routine maintenance needed to keep equipment functioning properly.

Knowledge
148

Knowledge of Virtual Private Network (VPN) security.

Knowledge
15

Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.

Knowledge
150

Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities.

Knowledge
154

Skill in analyzing network traffic capacity and performance characteristics.

Skill
155

Skill in applying and incorporating information technologies into proposed solutions.

Skill
167A

Skill in conducting system/server planning, management, and maintenance.

Skill
171A

Skill in correcting physical and technical problems that impact system/server performance.

Skill
177

Skill in designing countermeasures to identified security risks.

Skill
177A

Knowledge of countermeasure design for identified security risks.

Knowledge
183A

Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Knowledge
19

Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities.

Knowledge
191

Skill in developing and applying security system access controls.

Skill
193

Skill in developing, testing, and implementing network infrastructure contingency and recovery plans.

Skill
194

Skill in diagnosing connectivity problems.

Skill
197

Skill in discerning the protection needs (i.e., security controls) of information systems and networks.

Skill
198

Skill in establishing a routing schema.

Skill
202A

Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems.

Skill
2062

Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the NE or enclave.

Task
206A

Skill in installing system and component upgrades.

Skill
207

Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches.

Skill
2087

Collaborate with intelligence analysts/targeting organizations involved in related areas.

Task
2102

Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access.

Task
2119

Conduct network scouting and vulnerability analyses of systems within a network.

Task
211A

Skill in monitoring and optimizing system/server performance.

Skill
2124

Conduct open source data collection via various online tools.

Task
2226

Detect exploits against targeted networks and hosts and react accordingly.

Task
231

Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol).

Skill
2379B

Identify threats to Blue Force vulnerabilities.

Task
2429

Generate requests for information.

Task
244

Ability to determine the validity of technology trend data.

Ability
2477

Identify potential points of strength and vulnerability within a network.

Task
2603

Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements.

Task
2611

Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan.

Task
270

Knowledge of common adversary tactics, techniques, and procedures in assigned area of responsibility (i.e., historical country-specific tactics, techniques, and procedures; emerging capabilities).

Knowledge
27A

Knowledge of cryptology.

Knowledge
29

Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.

Knowledge
3030

Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.

Ability
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3146

Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3201

Knowledge of all relevant reporting and dissemination procedures.

Knowledge
3206

Knowledge of current software and methodologies for active defense and system hardening.

Knowledge
3261

Knowledge of evasion strategies and techniques.

Knowledge
3277

Knowledge of general SCADA system components.

Knowledge
3346

Knowledge of Internet and routing protocols.

Knowledge
3349

Knowledge of intrusion sets.

Knowledge
3353

Knowledge of the Risk Management Framework Assessment Methodology.

Knowledge
3378

Knowledge of methods and techniques used to detect various exploitation activities.

Knowledge
3399

Knowledge of network administration.

Knowledge
3431

Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).

Knowledge
3454

Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, Panda, Kaspersky) and how differences affect exploitation/vulnerabilities.

Knowledge
3479

Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation.

Knowledge
3508

Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network).

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3695

Skill in auditing firewalls, perimeters, routers, and intrusion detection systems.

Skill
3740

Skill in determining installed patches on various operating systems and identifying patch signatures.

Skill
3779

Skill in extracting information from packet captures.

Skill
38

Knowledge of organization’s enterprise information security architecture system.

Knowledge
3801

Skill in identifying the devices that work at each level of protocol models.

Skill
3815

Skill in interpreting vulnerability scanner results to identify vulnerabilities.

Skill
3871

Skill in remote command line and Graphic User Interface (GUI) tool usage.

Skill
3910

Skill in using Boolean operators to construct simple and complex queries.

Skill
3931

Skill in using various open source data collection tools (online trade, DNS, mail, etc.).

Skill
3948

Skill in verifying the integrity of all files.

Skill
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
408

Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application.

Task
4170

Ability to accurately document results

Ability
4171

Ability to analyze a finding of a compromise and develop a custom signature(s) and/or rule(s) to identify it throughout the network

Ability
4173

Ability to analyze Data at Rest and Data in Transit encryption methodologies and assess Data at Rest and Data in Transit polices

Ability
4175

Ability to analyze device/protocol discovery tool output

Ability
4177

Ability to analyze interior and exterior routing protocols (e.g. RIP, EIGRP, OSPF, IS-IS, etc…)

Ability
4178

Ability to analyze mitigations to recover from a full network compromise

Ability
4180

Ability to analyze network infrastructure to identify and recommend key terrain or critical infrastructure.

Ability
4181

Ability to analyze organizational policies and documentation for appropriate use and user privileges as they apply to networking devices.

Ability
4183

Ability to analyze potential adversarial attack vectors on a mission-critical system.

Ability
4193

Ability to assess Data in Transit encryption policies.

Ability
4201

Ability to characterize network traffic for trends and patterns.

Ability
4205

Ability to communicate with Sr Leaders of an Org. to ensure shared responsibility for supporting Org. mission/business functions using external providers of systems, services and apps receives visibility and is elevated to the appropriate decisionmaking authorities.

Ability
4208

Ability to compile access control lists and firewall configurations.

Ability
4212

Ability to Conduct flow data analysis

Ability
4214

Ability to conduct research on vulnerabilites found and correlate current versions to known vulnerable releases

Ability
4217

Ability to configure, forward and statistically analyze logs

Ability
4218

Ability to configure, place, and maintain a distributed sensor grid.

Ability
4220

Ability to construct accurate maps of the network devices

Ability
4221

Ability to construct log aggregation solutions and analysis platforms

Ability
4225

Ability to correlate indicators of compromise

Ability
4226

Ability to create baselines/PPS documents and to compare current state against documentation.

Ability
4230

Ability to create rules/alerts for traffic validation.

Ability
4231

Ability to define caching and analyze the information contained within

Ability
4233

Ability to detect mismatched port-application traffic

Ability
4235

Ability to develop a risk defense plan to put active measure in place in defense of a network

Ability
4237

Ability to develop dashboards to better visualize data

Ability
4241

Ability to dissect and analyze a packet header

Ability
4242

Ability to document findings of any anomalous connections

Ability
4250

Ability to evaluate common Tactics, Techniques and Procedures (TTP) used in malware and open-source and Intelligence Community (IC) resources available to identify emerging TTPs

Ability
4253

Ability to evaluate information (e.g. trust relationships and security policies) from a domain to identify vulnerabilities/misconfiguration

Ability
4254

Ability to evaluate mitigations to recover from a full-network compromise.

Ability
4255

Ability to evaluate network diagram

Ability
4256

Ability to evaluate rogue/unauthorized systems on a network

Ability
4259

Ability to evaluate systems resiliency in adverse conditions

Ability
4267

Ability to identify activity in log entries to correlate indicators of compromise.

Ability
4268

Ability to identify anomalous activity based off of known trends and patterns.

Ability
427

Develop content for cyber defense tools.

Task
4270

Ability to identify C2 Beaconing in normal network traffic.

Ability
4272

Ability to identify complex root-cause analysis and recommend mitigations

Ability
4274

Ability to identify Data in Transit encryption methodologies.

Ability
4275

Ability to identify exfiltration of data in normal network traffic

Ability
4277

Ability to identify IPv6 and differentiate between Link Local, Multicast, Unicast, and Anycast.

Ability
4286

Ability to identify wireless encryption and differentiate between WEP, WPA (all versions) and WAPI

Ability
4290

Ability to implement network TAP configuration

Ability
4295

Ability to integrate information security requirements into the acquisition process, using applicable baseline security controls as one of the sources for security requirements, and ensuring a robust software quality control process.

Ability
4301

Ability to measure application whitelisting/blacklisting solutions.

Ability
4303

Ability to measure principle of vulnerability exploitation.

Ability
4304

Ability to measure the effectiveness of white/blacklisting solutions on network devices.

Ability
4307

Ability to monitor network data and perform triage on triggered events.

Ability
4310

Ability to operate the tools to enumerate a system.

Ability
4311

Ability to organize a list of mission infrastructure to identify which dependent systems are key terrain.

Ability
4314

Ability to organize Network System Architecture and the dependencies formed from relationships between systems.

Ability
4321

Ability to perform conversation calculations across Hexadecimal, Octal, Decimal, and binary.

Ability
4322

Ability to perform device discovery.

Ability
4348

Ability to research protocol utilization and determine anomalous use.

Ability
4357

Ability to test tools within sensor grid.

Ability
4364

Ability to use and integrate Security Information and Event Management (SIEM) capabilities in the analysis process.

Ability
4375

Ability to utilize Defense Information Systems Agency (DISA)/ Department of Defense (DoD) system configuration guidelines.

Ability
4392

Knowledge of anomaly-based detection and threat hunting.

Knowledge
4394

Knowledge of attack principles, tools, and techniques.

Knowledge
4396

Knowledge of basic cloud-based technologies and concepts.

Knowledge
4398

Knowledge of basic Cyber Threat Emulation concepts.

Knowledge
4399

Knowledge of basic Embedded Systems concepts.

Knowledge
4427

Knowledge of cybersecurity and cybersecurity-enabled software products.

Knowledge
4440

Knowledge of DOD Component-level cybersecurity architecture.

Knowledge
4442

Knowledge of encryption algorithms and their implementation.

Knowledge
4450

Knowledge of Friendly Network Forces (FNF) reporting procedures (i.e. deconfliction) to include external organization interaction.

Knowledge
4455

Knowledge of hardware components and architecture including functions and limitations.

Knowledge
4456

Knowledge of hashing algorithms.

Knowledge
4457

Knowledge of Hexadecimal, Octal, Decimal, and binary

Knowledge
4467

Knowledge of HTML source code and the intelligence that can be derived from it.

Knowledge
4472

Knowledge of IPv6

Knowledge
4499

Knowledge of Network OSs.

Knowledge
4531

Knowledge of security implications of device and software configurations.

Knowledge
4539

Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model).

Knowledge
4547

Knowledge of TCP flags

Knowledge
4557

Knowledge of the differences between distance vector and link-state routing protocols

Knowledge
4558

Knowledge of the different DNS resource records

Knowledge
4583

Knowledge of the U.S. Security System authorities, responsibilities, and contributions to the cyberspace operations mission.

Knowledge
4591

Knowledge of User Agent Strings and the intelligence that can be derived from them

Knowledge
4603

Skill in analyzing PCAP data

Skill
461

Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces.

Task
4614

Skill in conducting system planning, management, and maintenance.

Skill
4623

Skill in discerning the protection requirements (i.e. security controls) of IS and networks.

Skill
4636

Skill in implementing encryption algorithms.

Skill
4637

Skill in intrusion detection methodologies and techniques for detecting host and network-based intrusions for utilizing intrusion detection systems and signature development.

Skill
4642

Skill in network operating system administration.

Skill
4650

Skill in providing an understanding of the adversary through the identification and link analysis of physical, functional, or behavioral relationships within an operational environment.

Skill
4661

Skill in regular expressions

Skill
4671

Skill in understanding cybersecurity architecture, its implementation, and its expected behaviors and how changes in conditions affect outcomes.

Skill
4672

Skill in using Berkeley Packet filters.

Skill
4675

Skill in using network mapping tools to analyze identify and enumerate a network.

Skill
4680

Skill in utilizing a network traffic packet analyzer in order to detect anomalies in protocol utilization.

Skill
472

Coordinate with enterprise-wide cyber defense staff to validate network alerts.

Task
49

Knowledge of host/network access control mechanisms (e.g., access control list).

Knowledge
53

Knowledge of the Security Assessment and Authorization process.

Knowledge
6030

Ability to apply an organization’s goals and objectives to develop and maintain architecture.

Ability
61

Knowledge of incident response and handling methodologies.

Knowledge
6150

Ability to optimize systems to meet enterprise performance requirements.

Ability
62

Knowledge of industry-standard and organizationally accepted analysis principles and methods.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
6330

Knowledge of multi-level/security cross domain solutions.

Knowledge
6590

Skill in interfacing with customers.

Skill
70A

Knowledge of cybersecurity methods, such as firewalls, demilitarized zones, and encryption.

Knowledge
70B

Skill in applying cybersecurity methods, such as firewalls, demilitarized zones, and encryption.

Skill
718

Monitor network capacity and performance.

Task
72

Knowledge of local area and wide area networking principles and concepts including bandwidth management.

Knowledge
765

Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.

Task
782

Plan and recommend modifications or adjustments based on exercise results or system environment.

Task
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
8000

Adhere to DCO policies and procedures reflecting applicable laws, policies, procedures, and regulations (such as United States Code Titles 10 and 50).

Task
8019

Assess exploited systems’ potential to provide additional access, target development information, intelligence and/or covert infrastructure.

Task
802

Provide feedback on network requirements, including network architecture and infrastructure.

Task
8061

Determine and document software patches or the extent of releases that would harden vulnerable software.

Task
8062

Determine location of tool(s) deployment and utilize them once deployed (e.g., monitor agent, sensor).

Task
8066

Develop and review cyberspace operations TTPs for integration into strategic, operational and tactical levels of planning.

Task
8099

Evaluate security architecture and its design against cyberspace threats as identified in operational and acquisition documents.

Task
8136

Manage threat or target analysis of DCO information and production of threat information for networks and enclave environments.

Task
8161

Provide and maintain documentation for TTPs as inputs to training programs.

Task
8171

Provide input to the analysis, design, development or acquisition of capabilities used for meeting mission objectives.

Task
8179

Read, write, and interpret simple scripts to collect remote data and automation tasks.

Task
818

Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to higher headquarters.

Task
8180

Read, write, and interpret simple scripts to parse large data files.

Task
8182

Recommend Patch network vulnerabilities to ensure information is safeguarded against outside parties via Risk Mitigation Plans.

Task
823

Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.

Task
82A

Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs.

Knowledge
850

Store, retrieve, and manipulate data for analysis of system capabilities and requirements.

Task
87

Knowledge of network traffic analysis methods.

Knowledge
88

Knowledge of new and emerging information technology (IT) and cybersecurity technologies.

Knowledge
880A

Work with stakeholders to resolve computer security incidents and vulnerability compliance.

Task
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
958

Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity.

Task
959

Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.

Task
96

Knowledge of performance tuning tools and techniques.

Knowledge
971

Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements.

Task
978A

Knowledge of root cause analysis techniques.

Knowledge
986

Knowledge of organizational information technology (IT) user security policies (e.g., account creation, password rules, access control).

Knowledge
993A

Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization’s enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).

Ability
99A

Knowledge of principles and methods for integrating system components.

Knowledge

Plans, implements, and operates network services/systems, to include hardware and virtual environments.

Workforce Element:
IT (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
12

Knowledge of communication methods, principles, and concepts (e.g., crypto, dual hubs, time multiplexers) that support the network infrastructure.

Knowledge
15B

Ability to operate network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.

Ability
15

Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
41

Knowledge of organization’s LAN/WAN pathways.

Knowledge
55

Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data.

Knowledge
70

Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).

Knowledge
72

Knowledge of local area and wide area networking principles and concepts including bandwidth management.

Knowledge
76

Knowledge of measures or indicators of system performance and availability.

Knowledge
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
106

Knowledge of remote access technology concepts.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
112

Knowledge of server administration and systems engineering theories, concepts, and methods.

Knowledge
133

Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).

Knowledge
148

Knowledge of Virtual Private Network (VPN) security.

Knowledge
154

Skill in analyzing network traffic capacity and performance characteristics.

Skill
193A

Skill in implementing and testing network infrastructure contingency and recovery plans.

Skill
198

Skill in establishing a routing schema.

Skill
205

Skill in implementing, maintaining, and improving established network security practices.

Skill
207

Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches.

Skill
234A

Skill in sub-netting.

Skill
261

Knowledge of basic concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).

Knowledge
271

Knowledge of common network tools (e.g., ping, traceroute, nslookup).

Knowledge
271B

Ability to operate common network tools (e.g., ping, traceroute, nslookup).

Ability
278

Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).

Knowledge
347A

Ability to execute OS command line (e.g., ipconfig, netstat, dir, nbtstat).

Ability
462

Configure and optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling).

Task
522

Develop and implement network backup and recovery procedures.

Task
555

Diagnose network connectivity problem.

Task
666

Install and maintain network infrastructure device operating system software (e.g., IOS, firmware).

Task
667

Install or replace network hubs, routers, and switches.

Task
718

Monitor network capacity and performance.

Task
736

Patch network vulnerabilities to ensure information is safeguarded against outside parties.

Task
857

Test and maintain network infrastructure including software and hardware devices.

Task
891A

Skill in configuring and utilizing computer protection components (e.g., hardware firewalls, servers, routers, as appropriate).

Skill
893

Skill in securing network communications.

Skill
896

Skill in protecting a network against malware.

Skill
900

Knowledge of web filtering technologies.

Knowledge
901

Knowledge of the capabilities of different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).

Knowledge
901A

Ability to operate different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).

Ability
902

Knowledge of the range of existing networks (e.g., PBX, LANs, WANs, WIFI, SCADA).

Knowledge
985

Skill in configuring and utilizing network protection components (e.g., Firewalls, VPNs, network intrusion detection systems).

Skill
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1074A

Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1134

Knowledge of symmetric key rotation techniques and concepts.

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
1142

Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

Knowledge
231A

Skill in using network management tools (e.g., simple network management protocol (SNMP), (GrassMarlin)) to analyze network traffic patterns (e.g., including control system network analysis).​

Skill
41A

Ability to operate the organization’s LAN/WAN pathways.

Ability
572

Ensure application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment.

Task
656

Implement new system design procedures, test procedures, and quality standards.

Task
673

Integrate new systems into existing network architecture.

Task
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
6919

Ability to determine the best cloud deployment model for the appropriate operating environment.

Ability
76A

Ability to monitor measures or indicators of system performance and availability.

Ability
802

Provide feedback on network requirements, including network architecture and infrastructure.

Task
903

Knowledge of Wi-Fi.

Knowledge
92A

Ability to monitor traffic flows across the network.

Ability
989

Knowledge of Voice over IP (VoIP).

Knowledge
990

Knowledge of the common attack vectors on the network layer.

Knowledge

The Network Technician provides enterprise and tactical infrastructure knowledge, experience, and integration to the Cyber…

Workforce Element:
Cyberspace Effects

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
106

Knowledge of remote access technology concepts.

Knowledge
1063A

Knowledge of operating system structures and internals (e.g., process management, directory structure, installed applications).

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1072A

Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Ability
1104

Examine network topologies to understand data flows through the network.

Task
1109

Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools.

Task
112A

Knowledge of systems engineering theories, concepts, and methods.

Knowledge
113

Knowledge of server and client operating systems.

Knowledge
114A

Knowledge of system/server diagnostic tools and fault identification techniques.

Knowledge
1153A

Install, update, and troubleshoot systems/servers.

Task
12

Knowledge of communication methods, principles, and concepts (e.g., crypto, dual hubs, time multiplexers) that support the network infrastructure.

Knowledge
127

Knowledge of systems administration concepts.

Knowledge
141

Knowledge of the enterprise information technology (IT) architecture.

Knowledge
141A

Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures.

Knowledge
145

Knowledge of the type and frequency of routine maintenance needed to keep equipment functioning properly.

Knowledge
148

Knowledge of Virtual Private Network (VPN) security.

Knowledge
15

Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.

Knowledge
154

Skill in analyzing network traffic capacity and performance characteristics.

Skill
167A

Skill in conducting system/server planning, management, and maintenance.

Skill
170

Skill in configuring and optimizing software.

Skill
171A

Skill in correcting physical and technical problems that impact system/server performance.

Skill
180

Skill in designing the integration of hardware and software solutions.

Skill
183

Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Skill
191

Skill in developing and applying security system access controls.

Skill
193

Skill in developing, testing, and implementing network infrastructure contingency and recovery plans.

Skill
194

Skill in diagnosing connectivity problems.

Skill
195A

Skill in troubleshooting failed system components (i.e., servers)

Skill
202A

Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems.

Skill
2062

Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the NE or enclave.

Task
206A

Skill in installing system and component upgrades.

Skill
207

Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches.

Skill
209

Skill in maintaining directory services.

Skill
2102

Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access.

Task
2119

Conduct network scouting and vulnerability analyses of systems within a network.

Task
211A

Skill in monitoring and optimizing system/server performance.

Skill
212A

Knowledge of network mapping and recreating network topologies.

Knowledge
216A

Skill in recovering failed systems/servers.

Skill
219A

Skill in operating system administration.

Skill
2232

Determine course of action for addressing changes to objectives, guidance, and operational environment.

Task
231

Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol).

Skill
2379B

Identify threats to Blue Force vulnerabilities.

Task
2477

Identify potential points of strength and vulnerability within a network.

Task
2611

Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan.

Task
278

Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).

Knowledge
287

Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]).

Knowledge
3063

Ability to monitor system operations and react to events in response to triggers and/or observation of trends or unusual activity.

Ability
3076

Ability to tailor technical and planning information to a customer’s level of understanding.

Ability
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3246

Knowledge of confidentiality, integrity, and availability requirements.

Knowledge
3277

Knowledge of general SCADA system components.

Knowledge
3353

Knowledge of the Risk Management Framework Assessment Methodology.

Knowledge
3402

Knowledge of network construction and topology.

Knowledge
342A

Knowledge of operating system command line/prompt.

Knowledge
3431

Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).

Knowledge
344

Knowledge of virtualization technologies and virtual machine development and maintenance.

Knowledge
3539

Knowledge of telecommunications fundamentals.

Knowledge
3741

Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments.

Skill
3871

Skill in remote command line and Graphic User Interface (GUI) tool usage.

Skill
4196

Ability to build, implement, and maintain distributed sensor grid.

Ability
41A

Ability to operate the organization’s LAN/WAN pathways.

Ability
4201

Ability to characterize network traffic for trends and patterns.

Ability
4215

Ability to configure and place distributed sensor grid

Ability
4224

Ability to coordinate with Sr Leaders of an Org. to ensure shared responsibility for supporting Org. mission/business functions using external providers of systems, services and apps receives visibility and is elevated to the appropriate decision-making authorities

Ability
4228

Ability to create rule sets within an Intrusion Detection System (IDS).

Ability
4230

Ability to create rules/alerts for traffic validation.

Ability
4273

Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.

Ability
4290

Ability to implement network TAP configuration

Ability
4291

Ability to implement sensors according to sensor plan

Ability
4294

Ability to integrate information security requirements into the acquisition process, using applicable baseline security controls as one of the sources for security requirements, ensuring a robust software quality control process and establishing multiple source

Ability
4316

Ability to organize policy standards to insure procedures and guidelines comply with cybersecurity policies.

Ability
433

Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.

Task
434A

Check system hardware availability, functionality, integrity, and efficiency.

Task
4352

Ability to setup Serial and Ethernet interfaces.

Ability
4354

Ability to share meaningful insights about the context of an organization’s threat environment that improve its risk management posture.

Ability
4357

Ability to test tools within sensor grid.

Ability
4358

Ability to track the location and configuration of networked devices and software across departments, locations, facilities and potentially supporting business functions.

Ability
4360

Ability to troubleshoot computer software and hardware issues, make repairs, and schedule updates.

Ability
4365

Ability to use and/or integrate a Security Information and Event Management (SIEM) platform.

Ability
4390

Knowledge of active directory federated services.

Knowledge
4396

Knowledge of basic cloud-based technologies and concepts.

Knowledge
4398

Knowledge of basic Cyber Threat Emulation concepts.

Knowledge
4399

Knowledge of basic Embedded Systems concepts.

Knowledge
4415

Knowledge of common obfuscation techniques (e.g. command line execution, string substitution, clandestine side channel, Base64).

Knowledge
4429

Knowledge of cybersecurity controls and design principles and methods (e.g., firewalls, DMZ, and encryption).

Knowledge
4438

Knowledge of different types of log subscriptions (e.g. push vs pull, MS Windows event forwarding, winlogbeat, syslog).

Knowledge
4451

Knowledge of the full-spectrum of cyberspace operational missions (e.g., DODIN Operations, DCO, OCO), principles, capabilities, limitations, and effects.

KSA
4481

Knowledge of long haul circuits.

Knowledge
4499

Knowledge of Network OSs.

Knowledge
4500

Knowledge of network systems management methods including end-to-end systems performance monitoring.

Knowledge
4501

Knowledge of non-Active Directory domains (e.g. IDM, LDAP).

Knowledge
4516

Knowledge of principles and methods for integrating system and network components.

Knowledge
452

Conduct functional and connectivity testing to ensure continuing operability.

Task
4522

Knowledge of public key infrastructure (PKI) libraries, certificate authorities, certificate management, and encryption functionalities.

Knowledge
4529

Knowledge of routing protocols such as RIPv1/v2, OSPF, IGRP, and EIGRP

Knowledge
4532

Knowledge of Security Technical Implementation Guide (STIG)

Knowledge
4537

Knowledge of stream providers (e.g. KAFKA).

Knowledge
4539

Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model).

Knowledge
456A

Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing.

Task
4588

Knowledge of transmission capabilities (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)).

Knowledge
4594

Knowledge of WAN technologies such as PPP, Frame-relay, dedicated T1s, ISDN, and routing protocols

Knowledge
4595

Knowledge of web applications and their common attack vectors.

Knowledge
4606

Skill in applying STIG upgrades

Skill
4609

Skill in cable management and organization

Skill
461

Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces.

Task
4615

Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, anti-virus software, anti-spyware).

Skill
462

Configure and optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling).

Task
4635

Skill in implementing DHCP and DNS

Skill
4664

Skill in router IOS backup, recovery, and upgrade.

Skill
467

Consult with engineering staff to evaluate interface between hardware and software.

Task
4671

Skill in understanding cybersecurity architecture, its implementation, and its expected behaviors and how changes in conditions affect outcomes.

Skill
499

Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.

Task
51

Knowledge of how system components are installed, integrated, and optimized.

Knowledge
518

Develop and document systems administration standard operating procedures.

Task
518A

Comply with organization systems administration standard operating procedures.

Task
602

Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.

Task
6100

Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities.

Ability
6240

Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE).

Knowledge
6590

Skill in interfacing with customers.

Skill
667

Install or replace network hubs, routers, and switches.

Task
683

Maintain baseline system security according to organizational policies.

Task
68A

Ability to build architectures and frameworks.

Ability
695

Manage accounts, network rights, and access to systems and equipment.

Task
70

Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).

Knowledge
701A

Manage system/server resources including performance, capacity, availability, serviceability, and recoverability.

Task
72

Knowledge of local area and wide area networking principles and concepts including bandwidth management.

Knowledge
728A

Oversee installation, implementation, configuration, and support of system components.

Task
736

Patch network vulnerabilities to ensure information is safeguarded against outside parties.

Task
76

Knowledge of measures or indicators of system performance and availability.

Knowledge
763A

Diagnose faulty system/server hardware.

Task
763B

Perform repairs on faulty system/server hardware.

Task
765

Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.

Task
781

Plan, execute, and verify data redundancy and system recovery procedures.

Task
782

Plan and recommend modifications or adjustments based on exercise results or system environment.

Task
802

Provide feedback on network requirements, including network architecture and infrastructure.

Task
8042

Consult with customers about network system design and maintenance.

Task
8058

Design countermeasures and mitigations against potential weaknesses and vulnerabilities in system and elements.

Task
8059

Design, develop, and modify network systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design.

Task
8078

Diagnose network connectivity problems.

Task
8091

Engage customers to understand their expectations and wants.

Task
8099

Evaluate security architecture and its design against cyberspace threats as identified in operational and acquisition documents.

Task
811

Provide ongoing optimization and problem solving support.

Task
8110

Identify optimal locations for network sensor placement to collect on targeted devices.

Task
8117

Implement and enforce DCO policies and procedures reflecting applicable laws, policies, procedures, and regulations (such as United States Code Titles 10 and 50).

Task
8131

Maintain Operational, technical, and authoritative situational awareness during effects-based operations

Task
8139

Notify designated mission leadership or applicable team members of any suspected cyber incident.

Task
8161

Provide and maintain documentation for TTPs as inputs to training programs.

Task
8165

Provide feedback for RFI generation.

Task
8187

Repair network connectivity problems.

Task
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
835A

Troubleshoot hardware/software interface and interoperability problems.

Task
90

Knowledge of operating systems.

Knowledge
902

Knowledge of the range of existing networks (e.g., PBX, LANs, WANs, WIFI, SCADA).

Knowledge
96

Knowledge of performance tuning tools and techniques.

Knowledge
986

Knowledge of organizational information technology (IT) user security policies (e.g., account creation, password rules, access control).

Knowledge
990

Knowledge of the common attack vectors on the network layer.

Knowledge
991

Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution).

Knowledge

Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance needs of…

Workforce Element:
Cyberspace Enablers / Leadership

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
100

Knowledge of Privacy Impact Assessments.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
395

Advise senior management (e.g., CIO) on risk levels and security posture.

Task
396

Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, and systems, and elements.

Task
457

Conduct Privacy Impact Assessments (PIA) of the application’s security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII).

Task
677

Interpret patterns of non compliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise’s cybersecurity program.

Task
784

Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.

Task
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
3076

Ability to tailor technical and planning information to a customer’s level of understanding.

Ability
3651

Knowledge of what constitutes a “threat” to a network.

Knowledge
5430

Present technical information to technical and non-technical audiences.

Task
5560

Promote awareness of cyber policy and strategy as appropriate among management and ensure sound principles are reflected in the organization’s mission, vision, and goals.

Task
5761

Account for and administer individual requests for release or disclosure of personal and/or protected information.

Task
5762

Act as a liaison to the information systems department.

Task
5763

Act as, or work with, counsel relating to business partner contracts.

Task
5764

Administer action on all complaints concerning the organization’s privacy policies and procedures in coordination and collaboration with other similar functions and, when necessary, legal counsel.

Task
5765

Assist the Security Officer with the development and implementation of an information infrastructure.

Task
5766

Assure that the use of technologies maintain, and do not erode, privacy protections on use, collection and disclosure of personal information.

Task
5767

Collaborate on cyber privacy and security policies and procedures.

Task
5768

Collaborate with cyber security personnel on the security risk assessment process to address privacy compliance and risk mitigation.

Task
5769

Conduct on-going privacy training and awareness activities.

Task
5770

Conduct periodic information privacy impact assessments and ongoing compliance monitoring activities in coordination with the organization’s other compliance and operational assessment functions.

Task
5771

Conduct privacy impact assessments of proposed rules on the privacy of personal information, including the type of personal information collected and the number of people affected.

Task
5772

Coordinate with the appropriate regulating bodies to ensure that programs, policies and procedures involving civil rights, civil liberties and privacy considerations are addressed in an integrated and comprehensive manner.

Task
5773

Coordinate with the Chief Information Security Officer to ensure alignment between security and privacy practices.

Task
5774

Coordinate with the Corporate Compliance Officer re: procedures for documenting and reporting self-disclosures of any evidence of privacy violations.

Task
5776

Develop and coordinate a risk management and compliance framework for privacy.

Task
5777

Develop and manage enterprise-wide procedures to ensure the development of new products and services is consistent with company privacy policies and legal obligations.

Task
5778

Develop and manage procedures for vetting and auditing vendors for compliance with the privacy and data security policies and legal requirements.

Task
5779

Develop privacy training materials and other communications to increase employee understanding of company privacy policies, data handling practices and procedures and legal obligations.

Task
5780

Direct and oversee privacy specialists and coordinate privacy and data security programs with senior executives globally to ensure consistency across the organization.

Task
5781

Ensure all processing and/or databases are registered with the local privacy/data protection authorities where required.

Task
5782

Ensure compliance with privacy practices and consistent application of sanctions for failure to comply with privacy policies for all individuals in the organization’s workforce, extended workforce and for all business associates in cooperation with Human Resources, the information security officer, administration and legal counsel as applicable.

Task
5783

Ensure that the company maintains appropriate privacy and confidentiality notices, consent and authorization forms, and materials.

Task
5784

Establish a process for receiving, documenting, tracking, investigating and taking action on all complaints concerning the organization’s privacy policies and procedures.

Task
5785

Establish an internal privacy audit program.

Task
5786

Establish with management and operations a mechanism to track access to protected health information, within the purview of the organization and as required by law and to allow qualified individuals to review or receive a report on such activity.

Task
5787

Establish, implement and maintains organization-wide policies and procedures to comply with privacy regulations.

Task
5788

Identify and correct potential company compliance gaps and/or areas of risk to ensure full compliance with privacy regulations.

Task
5789

Interface with Senior Management to develop strategic plans for the collection, use and sharing of information in a manner that maximizes its value while complying with applicable privacy regulations.

Task
5791

Maintain current knowledge of applicable federal and state privacy laws and accreditation standards, and monitor advancements in information privacy technologies to ensure organizational adaptation and compliance.

Task
5792

Manage privacy incidents and breaches in conjunction with the Privacy Officer, Chief Information Security Officer, legal counsel, and the business units.

Task
5793

Mitigate effects of a use or disclosure of personal information by employees or business partners.

Task
5794

Monitor systems development and operations for security and privacy compliance.

Task
5795

Oversee, direct, deliver or ensure delivery of initial privacy training and orientation to all employees, volunteers, contractors, alliances, business associates and other appropriate third parties.

Task
5796

Participate in the implementation and ongoing compliance monitoring of all trading partner and business associate agreements, to ensure all privacy concerns, requirements, and responsibilities are addressed.

Task
5797

Periodically revise the privacy program in light of changes in laws, regulatory, or company policy.

Task
5798

Provide development guidance and assist in the identification, implementation, and maintenance of organization information privacy policies and procedures in coordination with organization management and administration and legal counsel.

Task
5799

Provide leadership for the organization’s privacy program.

Task
5800

Provide leadership in the planning, design and evaluation of privacy and security related projects.

Task
5801

Provide strategic guidance to corporate officers regarding information resources and technology.

Task
5802

Report on a periodic basis regarding the status of the privacy program to the Board, CEO or other responsible individual or committee.

Task
5803

Resolve allegations of non-compliance with the corporate privacy policies or notice of information practices.

Task
5804

Review all system-related information security plans to ensure alignment between security and privacy practices.

Task
5805

Serve as the information privacy liaison for users of technology systems.

Task
5806

Serve in a leadership role for Privacy Oversight Committee activities.

Task
5807

Support the organization’s privacy compliance program, working closely with the Privacy Officer, Chief Information Security Officer, and other business leaders to ensure compliance with federal and state privacy laws and regulations.

Task
5808

Develop appropriate sanctions for failure to comply with the corporate privacy policies and procedures.

Task
5809

Undertake a comprehensive review of the company’s data and privacy projects and ensure that they are consistent with corporate privacy and data security goals and policies.

Task
5810

Work cooperatively with applicable organization units in overseeing consumer information access rights.

Task
5811

Work with all organization personnel involved with any aspect of release of protected information to ensure coordination with the organization’s policies, procedures and legal requirements.

Task
5812

Work with business teams and senior management to ensure awareness of “best practices” on privacy and data security issues.

Task
5813

Work with external affairs to develop relationships with consumer organizations and other NGOs with an interest in privacy and data security issues—and to manage company participation in public events related to privacy and data security.

Task
5815

Work with External Affairs to respond to press and other inquiries with regard to concern over consumer and employee data.

Task
5816

Work with legal counsel and management, key departments and committees to ensure the organization has and maintains appropriate privacy and confidentiality consent, authorization forms and information notices and materials reflecting current organization and legal practices and requirements.

Task
5817

Work with organization administration, legal counsel and other related parties to represent the organization’s information privacy interests with external parties, including government bodies, which undertake to adopt or amend privacy legislation, regulation or standard.

Task
5818

Work with organization senior management to establish an organization-wide Privacy Oversight Committee.

Task
5819

Work with the general counsel, external affairs and businesses to ensure both existing and new services comply with privacy and data security obligations.

Task
6100

Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities.

Ability
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6910

Ability to determine whether a security incident violates a privacy principle or legal standard requiring specific legal action.

Ability
6912

Ability to monitor advancements in information privacy laws to ensure organizational adaptation and compliance.

Ability
6913

Ability to monitor advancements in information privacy technologies to ensure organizational adaptation and compliance.

Ability
6914

Ability to work across departments and business units to implement organization’s privacy principles and programs, and align privacy objectives with security objectives.

Ability
6916

Skill in creating policies that reflect the business’s core privacy objectives.

Skill
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1136A

Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud).

Knowledge
3055A

Ability to select the appropriate implant to achieve operational goals.

Ability
3098

Knowledge of virtualization products (Vmware, Virtual PC).

Knowledge
345

Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies.

Knowledge
3637

Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).

Knowledge
3644

Knowledge of virtual machine technologies.

Knowledge
3654

Knowledge of who the organization’s operational planners are, how and where they can be contacted, and what are their expectations.

Knowledge
3659

Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.

Knowledge
3749

Ability to develop clear directions and instructional materials.

Ability
4116

Knowledge of transcript development processes and techniques (e.g., verbatim, gists, summaries).

Knowledge
4117

Knowledge of translation processes and techniques.

Knowledge
524

Develop and maintain strategic plans.

Task
5775

Develop and apply corrective action procedures.

Task
5790

Liaise with regulatory and accrediting bodies.

Task
5814

Work with external affairs to develop relationships with regulators and other government officials responsible for privacy and data security issues.

Task
599

Evaluate contracts to ensure compliance with funding, legal, and program requirements.

Task
600

Evaluate cost benefit, economic, and risk analysis in decision making process.

Task
6110

Ability to develop, update, and/or maintain standard operating procedures (SOPs).

Ability
618A

Provide guidance on laws, regulations, policies, standards, or procedures to management, personnel, or clients.

Task
675

Interpret and apply laws, regulations, policies, standards, or procedures to specific issues.

Task
6911

Ability to develop or procure curriculum that speaks to the topic at the appropriate level for the target.

Ability
6915

Skill in communicating with all levels of management including Board members (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience).

Skill
6917

Skill in negotiating vendor agreements and evaluating vendor privacy practices.

Skill
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
9

Knowledge of applicable business processes and operations of customer organizations.

Knowledge

Manages the user interface design portion of the design process of a product.

Workforce Element:
Software Engineering

Core KSATs:
KSAT ID Description KSAT
16

Knowledge of capabilities and requirements analysis.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
102

Knowledge of programming language structures and logic.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
155

Skill in applying and incorporating information technologies into proposed solutions.

Skill
414

Analyze user needs and software requirements to determine feasibility of design within time and cost constraints.

Task
927A

Research and evaluate available technologies and standards to meet customer requirements.

Task
968

Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
3822A

Skill in managing user relationships, including determining user needs/requirements, managing user expectations, and demonstrating commitment to delivering quality results.

Skill
5965

Design and prototype user interfaces.

Task
5966

Create prototypes, wireframes, and storyboards based on customer requirements.

Task
5967

Ensure proper integration of the user interface with back-end functionality.

Task
5969

Create style guides and unified approach (libraries, visual languages, etc) to the product.

Task
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7101

Knowledge of end to end product development processes.

Knowledge
7102

Skill in using industry-standard design and prototyping tools.

Skill
7103

Knowledge of design thinking processes.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
132

Knowledge of technology integration processes.

Knowledge
35

Knowledge of digital rights management.

Knowledge
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
467

Consult with engineering staff to evaluate interface between hardware and software.

Task
5968

Lead integrated design team to achieve a finished product.

Task
797

Provide advice on project costs, design concepts, or design changes.

Task
90

Knowledge of operating systems.

Knowledge

Manages the development of products including the resource management, product strategy (physical or digital), functional…

Workforce Element:
Software Engineering

Core KSATs:
KSAT ID Description KSAT
16

Knowledge of capabilities and requirements analysis.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
129

Knowledge of system life cycle management principles, including software security and usability.

Knowledge
130

Knowledge of systems testing and evaluation methods.

Knowledge
414

Analyze user needs and software requirements to determine feasibility of design within time and cost constraints.

Task
461

Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces.

Task
487

Define project scope and objectives based on customer requirements.

Task
797

Provide advice on project costs, design concepts, or design changes.

Task
811

Provide ongoing optimization and problem solving support.

Task
863A

Manage the translation of functional requirements into technical solutions.

Task
911A

Ability to interpret and translate customer requirements into operational capabilities.

Ability
968

Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2839

Supervise and assign work to programmers, designers, technologists and technicians and other engineering and scientific personnel.

Task
3822

Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results.

Skill
5150

Coordinate and manage the overall service provided to a customer end-to-end.

Task
5961

Orchestrate the various activities associated with ensuring that a product is delivered that meets users’ needs.

Task
5962

Create integrated vision, roadmaps, and strategies to enable product delivery.

Task
5963

Manage product releases.

Task
5964

Manage dependencies and risks.

Task
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7098

Skill in conducting strategy development and implementation.

Skill
7100

Skill in leading and managing multiple teams simultaneously.

Skill
7101

Knowledge of end to end product development processes.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1017A

Participate in the acquisition process as necessary.

Task
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
130A

Knowledge of systems security testing and evaluation methods.

Knowledge
182

Skill in determining an appropriate level of test rigor for a given system.

Skill
190

Skill in developing operations-based testing scenarios.

Skill
220

Skill in systems integration testing.

Skill
225B

Knowledge of penetration testing tools and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems).

Knowledge
3268

Knowledge of staff management, assignment, and allocation processes.

Knowledge
35

Knowledge of digital rights management.

Knowledge
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
524

Develop and maintain strategic plans.

Task
528A

Develop cost estimates for new or modified system(s).

Task
5380

Gather feedback on customer satisfaction and internal service performance to foster continual improvement.

Task
5660

Work with other service managers and product owners to balance and prioritize services to meet overall customer requirements, constraints, and objectives.

Task
680A

Lead and oversee budget, staffing, and contracting.

Task
69A

Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).

Knowledge
7099

Skill in conducting market and user research.

Skill
760

Perform needs analysis to determine opportunities for new and improved business process solutions.

Task
9

Knowledge of applicable business processes and operations of customer organizations.

Knowledge
90

Knowledge of operating systems.

Knowledge
965

Knowledge of organization’s risk tolerance and/or risk management approach.

Knowledge
967

Knowledge of current and emerging threats/threat vectors.

Knowledge
980A

Skill in performing root cause analysis.

Skill

Manages the package of support functions required to field and maintain the readiness and operational…

Workforce Element:
Cyberspace Enablers / Acquisition

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
203

Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.

Skill
760

Perform needs analysis to determine opportunities for new and improved business process solutions.

Task
801A

Provide enterprise cybersecurity and supply chain risk management guidance.

Task
808

Provide input to implementation plans and standard operating procedures.

Task
1005

Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes).

Knowledge
1018

Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.

Task
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1148

Develop contract language to ensure supply chain, system, network, and operational security are met.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5310

Ensure that appropriate SLAs and underpinning contracts have been defined that clearly set out for the customer a description of the service and the measures for monitoring the service.

Task
6420

Knowledge of sustainment technologies, processes and strategies.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1003

Develop and document supply chain risks for critical system elements, as appropriate.

Task
1004A

Knowledge of information technology (IT) acquisition/procurement requirements.

Knowledge
1021

Knowledge of risk threat assessment.

Knowledge
1039A

Ability to evaluate/ensure the trustworthiness of the supplier and/or product.

Ability
1061A

Knowledge of the acquisition/procurement life cycle process.

Knowledge
107

Knowledge of resource management principles and techniques.

Knowledge
1122

Ability to apply supply chain risk management standards.

Ability
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1127

Knowledge of Import/Export Regulations related to cryptography and other security technologies.

Knowledge
1130

Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1143A

Conduct import/export reviews for acquiring systems and software.

Task
1148A

Develop supply chain, system, network, performance, and cyber security requirements.

Task
129

Knowledge of system life cycle management principles, including software security and usability.

Knowledge
296

Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.

Knowledge
325A

Ability to ensure security practices are followed throughout the acquisition process.

Ability
5010

Act as a primary stakeholder in the underlying information technology (IT) operational processes and functions that support the service, provide direction and monitor all significant activities so the service is delivered successfully.

Task
5150

Coordinate and manage the overall service provided to a customer end-to-end.

Task
537

Develop methods to monitor and measure risk, compliance, and assurance efforts.

Task
5380

Gather feedback on customer satisfaction and internal service performance to foster continual improvement.

Task
5610

Review service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up.

Task
5660

Work with other service managers and product owners to balance and prioritize services to meet overall customer requirements, constraints, and objectives.

Task
6070

Ability to conduct and implement market research to understand government and industry capabilities and appropriate pricing.

Ability
6160

Ability to oversee the development and update of the lifecycle cost estimate.

Ability
62

Knowledge of industry-standard and organizationally accepted analysis principles and methods.

Knowledge
6290

Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems.

Knowledge
680A

Lead and oversee budget, staffing, and contracting.

Task
69A

Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).

Knowledge
797

Provide advice on project costs, design concepts, or design changes.

Task
811

Provide ongoing optimization and problem solving support.

Task
813

Provide recommendations for possible improvements and upgrades.

Task
834

Resolve conflicts in laws, regulations, policies, standards, or procedures.

Task
840B

Review or conduct audits of programs and projects.

Task
88

Knowledge of new and emerging information technology (IT) and cybersecurity technologies.

Knowledge
936

Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).

Task
949

Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements.

Task
954

Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk.

Knowledge
955A

Draft and publish supply chain security and risk management documents.

Task
966

Knowledge of enterprise incident response program, roles, and responsibilities.

Knowledge
970A

Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities.

Task
979

Knowledge of supply chain risk management standards, processes, and practices.

Knowledge

Leads, coordinates, communicates, integrates and is accountable for the overall success of the program, ensuring…

Workforce Element:
Cyberspace Enablers / Acquisition

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
143

Knowledge of the organization’s enterprise information technology (IT) goals and objectives.

Knowledge
801

Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans.

Task
1004A

Knowledge of information technology (IT) acquisition/procurement requirements.

Knowledge
1018

Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.

Task
1021

Knowledge of risk threat assessment.

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5010

Act as a primary stakeholder in the underlying information technology (IT) operational processes and functions that support the service, provide direction and monitor all significant activities so the service is delivered successfully.

Task
5410

Manage the internal relationship with information technology (IT) process owners supporting the service, assisting with the definition and agreement of operating level agreements (OLAs).

Task
6290

Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1003

Develop and document supply chain risks for critical system elements, as appropriate.

Task
1005

Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes).

Knowledge
1017A

Participate in the acquisition process as necessary.

Task
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1039A

Ability to evaluate/ensure the trustworthiness of the supplier and/or product.

Ability
1061A

Knowledge of the acquisition/procurement life cycle process.

Knowledge
107

Knowledge of resource management principles and techniques.

Knowledge
1122

Ability to apply supply chain risk management standards.

Ability
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1127

Knowledge of Import/Export Regulations related to cryptography and other security technologies.

Knowledge
1130

Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).

Knowledge
1143A

Conduct import/export reviews for acquiring systems and software.

Task
1148

Develop contract language to ensure supply chain, system, network, and operational security are met.

Task
1148A

Develop supply chain, system, network, performance, and cyber security requirements.

Task
1148B

Ensure supply chain, system, network, performance, and cyber security requirements are included in contract language and delivered.

Task
129

Knowledge of system life cycle management principles, including software security and usability.

Knowledge
203

Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.

Skill
296

Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.

Knowledge
325A

Ability to ensure security practices are followed throughout the acquisition process.

Ability
5150

Coordinate and manage the overall service provided to a customer end-to-end.

Task
524

Develop and maintain strategic plans.

Task
537

Develop methods to monitor and measure risk, compliance, and assurance efforts.

Task
5380

Gather feedback on customer satisfaction and internal service performance to foster continual improvement.

Task
6160

Ability to oversee the development and update of the lifecycle cost estimate.

Ability
629A

Identify and address cyber workforce planning and management issues (e.g. recruitment, retention, and training).

Task
68

Knowledge of information technology (IT) architectural concepts and frameworks.

Knowledge
680A

Lead and oversee budget, staffing, and contracting.

Task
69

Knowledge of Risk Management Framework (RMF) requirements.

Knowledge
69A

Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).

Knowledge
760

Perform needs analysis to determine opportunities for new and improved business process solutions.

Task
834

Resolve conflicts in laws, regulations, policies, standards, or procedures.

Task
840B

Review or conduct audits of programs and projects.

Task
942

Knowledge of the organization’s core business/mission processes.

Knowledge
949

Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements.

Task
954

Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk.

Knowledge
955A

Draft and publish supply chain security and risk management documents.

Task
979

Knowledge of supply chain risk management standards, processes, and practices.

Knowledge

Conducts software and systems engineering and software systems research in order to develop new capabilities,…

Workforce Element:
IT (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
88

Knowledge of new and emerging information technology (IT) and cybersecurity technologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
129

Knowledge of system life cycle management principles, including software security and usability.

Knowledge
144A

Skill in applying the systems engineering process.

Skill
925

Research current technology to understand capabilities of required system or network.

Task
927A

Research and evaluate available technologies and standards to meet customer requirements.

Task
934

Identify cyber capabilities strategies for custom hardware and software development based on mission requirements.

Task
1076

Collaborate with stakeholders to identify and/or develop appropriate solutions technology.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
10

Knowledge of application vulnerabilities.

Knowledge
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1038B

Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability).

Knowledge
1040A

Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure.

Knowledge
1056

Knowledge of operations security.

Knowledge
1062

Knowledge of software reverse engineering techniques.

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1077

Design and develop new tools/technologies as related to cybersecurity.

Task
1078A

Troubleshoot prototype design and process issues throughout the product design, development, and pre-launch phases.

Task
1079A

Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate vulnerabilities.

Task
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1135

Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing).

Knowledge
1142A

Knowledge of industry standard security models.

Knowledge
1147A

Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce.

Task
155

Skill in applying and incorporating information technologies into proposed solutions.

Skill
172

Skill in creating and utilizing mathematical or statistical models.

Skill
180A

Skill in designing the integration of technology processes and solutions, including legacy systems and modern programming languages.

Skill
27

Knowledge of cryptography and cryptographic key management concepts.

Knowledge
3068

Ability to prepare and present briefings.

Ability
3069

Ability to produce technical documentation.

Ability
321A

Knowledge of industry technologies and how differences affect exploitation/vulnerabilities.

Knowledge
383

Skill in using scientific rules and methods to solve problems.

Skill
4

Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.

Ability
6919

Ability to determine the best cloud deployment model for the appropriate operating environment.

Ability
6942

Skill in designing or implementing cloud computing deployment models.

Skill
95A

Knowledge of penetration testing principles, tools, and techniques.

Knowledge

Analyzes the security of new or existing computer applications, software, or specialized utility programs and…

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
56

Knowledge of cybersecurity principles and methods that apply to software development.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
90

Knowledge of operating systems.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
109

Knowledge of secure configuration management techniques.

Knowledge
177

Skill in designing countermeasures to identified security risks.

Skill
197

Skill in discerning the protection needs (i.e., security controls) of information systems and networks.

Skill
417

Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews.

Task
432

Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules.

Task
467

Consult with engineering staff to evaluate interface between hardware and software.

Task
515B

Develop secure software testing and validation procedures.

Task
634

Identify basic common coding flaws at a high level.

Task
645

Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.

Task
764A

Perform secure program testing, review, and/or assessment to identify potential flaws in codes and mitigate vulnerabilities.

Task
770

Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.

Task
826

Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing.

Task
865

Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria.

Task
972A

Determine and document software patches or the extent of releases that would leave software vulnerable.

Task
973A

Skill in using code analysis tools.

Skill
976

Knowledge of software quality assurance process.

Knowledge
1020A

Skill in secure test plan design (e. g. unit, integration, system, acceptance).

Skill
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1037A

Knowledge of information technology (IT) risk management policies, requirements, and procedures.

Knowledge
1071

Knowledge of secure software deployment methodologies, tools, and practices.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
100

Knowledge of Privacy Impact Assessments.

Knowledge
102

Knowledge of programming language structures and logic.

Knowledge
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1038B

Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability).

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1131

Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]).

Knowledge
1135

Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing).

Knowledge
1140A

Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic).

Skill
116

Knowledge of software debugging principles.

Knowledge
117

Knowledge of software design tools, methods, and techniques.

Knowledge
118

Knowledge of software development models (e.g., Waterfall Model, Spiral Model).

Knowledge
119

Knowledge of software engineering.

Knowledge
121

Knowledge of structured analysis principles and methods.

Knowledge
124

Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools.

Knowledge
149

Knowledge of web services, including service-oriented architecture, Simple Object Access Protocol, and web service description language.

Knowledge
168

Skill in conducting software debugging.

Skill
191

Skill in developing and applying security system access controls.

Skill
20

Knowledge of complex data structures.

Knowledge
2156

Consult with customers about software system design and maintenance.

Task
23

Knowledge of computer programming principles such as object-oriented design.

Knowledge
2335

Direct software programming and development of documentation.

Task
2839

Supervise and assign work to programmers, designers, technologists and technicians and other engineering and scientific personnel.

Task
3080

Ability to use and understand complex mathematical concepts (e.g., discrete math).

Ability
38

Knowledge of organization’s enterprise information security architecture system.

Knowledge
3B

Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks.

Skill
408A

Analyze and provide information to stakeholders that will support the development of security a application or modification of an existing security application.

Task
414A

Analyze security needs and software requirements to determine feasibility of design within time and cost constraints and security mandates.

Task
418

Apply secure code documentation.

Task
43A

Knowledge of embedded systems.

Knowledge
459A

Conduct trial runs of programs and software applications to ensure the desired information is produced and instructions and security levels are correct.

Task
465

Develop threat model based on customer interviews and requirements.

Task
515C

Develop system testing and validation procedures, programming, and documentation.

Task
602

Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.

Task
644

Identify security implications and apply methodologies within centralized and decentralized environments across the enterprises computer systems in software development.

Task
6932

Knowledge of mobile device (Android/iOS) development structures, principles, platforms, containers, languages, and the specific vulnerabilities associated with mobile device development.

Knowledge
6944

Skill in implementing defensive programming techniques.

Skill
710

Monitor and evaluate a system’s compliance with information technology (IT) security, resilience, and dependability requirements.

Task
72

Knowledge of local area and wide area networking principles and concepts including bandwidth management.

Knowledge
74

Knowledge of low-level computer languages (e.g., assembly languages).

Knowledge
756

Perform integrated quality assurance testing for security functionality and resiliency attack.

Task
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
850

Store, retrieve, and manipulate data for analysis of system capabilities and requirements.

Task
904

Knowledge of interpreted and compiled computer languages.

Knowledge
905

Knowledge of secure coding techniques.

Knowledge
936

Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).

Task
95A

Knowledge of penetration testing principles, tools, and techniques.

Knowledge
968

Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization).

Knowledge
969

Perform penetration testing as required for new or updated applications.

Task
975

Skill in integrating black box security testing tools into quality assurance process of software releases.

Skill
978A

Knowledge of root cause analysis techniques.

Knowledge
979

Knowledge of supply chain risk management standards, processes, and practices.

Knowledge
980A

Skill in performing root cause analysis.

Skill

Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g.,…

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
38

Knowledge of organization’s enterprise information security architecture system.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
68B

Ability to design architectures and frameworks.

Ability
70B

Skill in applying cybersecurity methods, such as firewalls, demilitarized zones, and encryption.

Skill
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
143A

Knowledge of integrating the organization’s goals and objectives into the architecture.

Knowledge
183

Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Skill
197A

Skill in translating operational requirements into protection needs (i.e., security controls).

Skill
534

Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data primarily applicable to government organizations (e.g., UNCLASSIFIED, SECRET, and TOP SECRET).

Task
561

Document and address organization’s information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition lifecycle.

Task
568

Employ secure configuration management processes.

Task
579

Ensure acquired or developed system(s) and architecture(s) are consistent with organization’s cybersecurity architecture guidelines.

Task
631

Identify and prioritize critical business functions in collaboration with organizational stakeholders.

Task
646A

Document the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately.

Task
765

Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.

Task
994

Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.

Task
1072A

Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Ability
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2248

Develop a system security context, a preliminary system security CONOPS, and define baseline system security requirements in accordance with applicable cybersecurity requirements.

Task
2390

Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents.

Task
3307

Knowledge of cybersecurity-enabled software products.

Knowledge
6030

Ability to apply an organization’s goals and objectives to develop and maintain architecture.

Ability
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1037B

Knowledge of program protection planning to include information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements.

Knowledge
1038

Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability.

Knowledge
1038B

Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability).

Knowledge
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
109A

Knowledge of configuration management techniques.

Knowledge
110

Knowledge of key concepts in security management (e.g., Release Management, Patch Management).

Knowledge
111A

Ability to apply secure system design tools, methods and techniques.

Ability
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1130

Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1135

Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing).

Knowledge
1136A

Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud).

Knowledge
113A

Knowledge of N-tiered typologies including server and client operating systems.

Knowledge
1140A

Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic).

Skill
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
1142B

Skill in applying security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

Skill
1147A

Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce.

Task
119

Knowledge of software engineering.

Knowledge
124A

Ability to apply system design tools, methods, and techniques, including automated systems analysis and design tools.

Ability
130

Knowledge of systems testing and evaluation methods.

Knowledge
132

Knowledge of technology integration processes.

Knowledge
133

Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).

Knowledge
141A

Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures.

Knowledge
144

Knowledge of the systems engineering process.

Knowledge
155

Skill in applying and incorporating information technologies into proposed solutions.

Skill
180

Skill in designing the integration of hardware and software solutions.

Skill
2014

Analyze candidate architectures, allocate security services, and select security mechanisms.

Task
21

Knowledge of computer algorithms.

Knowledge
224

Skill in design modeling and building use cases (e.g., unified modeling language).

Skill
238A

Skill in writing code in a currently supported programming language (e.g., Java, C++).

Skill
25

Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]).

Knowledge
27

Knowledge of cryptography and cryptographic key management concepts.

Knowledge
2887

Write detailed functional specifications that document the architecture development process.

Task
3153

Knowledge of circuit analysis.

Knowledge
3246

Knowledge of confidentiality, integrity, and availability requirements.

Knowledge
34

Knowledge of database systems.

Knowledge
3642

Knowledge of various types of computer architectures.

Knowledge
40A

Knowledge of organization’s evaluation and validation criteria.

Knowledge
413A

Analyze user needs and requirements to plan architecture.

Task
42

Knowledge of electrical engineering as applied to computer architecture, including circuit boards, processors, chips, and associated computer hardware.

Knowledge
43A

Knowledge of embedded systems.

Knowledge
465

Develop threat model based on customer interviews and requirements.

Task
46A

Knowledge of system fault tolerance methodologies.

Knowledge
483

Define and prioritize essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.

Task
484

Define appropriate levels of system availability based on critical system functions and ensure system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration.

Task
502A

Develop enterprise architecture or system components required to meet user needs.

Task
51

Knowledge of how system components are installed, integrated, and optimized.

Knowledge
52

Knowledge of human-computer interaction principles.

Knowledge
525A

Develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements.

Task
53

Knowledge of the Security Assessment and Authorization process.

Knowledge
53A

Knowledge of risk assessments and authorization per Risk Management Framework processes.

Knowledge
569A

Document and update as necessary all definition and architecture activities.

Task
602

Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.

Task
6150

Ability to optimize systems to meet enterprise performance requirements.

Ability
62

Knowledge of industry-standard and organizationally accepted analysis principles and methods.

Knowledge
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
6330

Knowledge of multi-level/security cross domain solutions.

Knowledge
65A

Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).

Knowledge
6640

Skill in designing multi-level security/cross domain solutions.

Skill
6680

Skill in the use of design methods.

Skill
669

Integrate and align information security and/or cybersecurity policies to ensure system analysis meets security requirements.

Task
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
6919

Ability to determine the best cloud deployment model for the appropriate operating environment.

Ability
6942

Skill in designing or implementing cloud computing deployment models.

Skill
6945

Skill in migrating workloads to, from, and among the different cloud computing service models.

Skill
69A

Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).

Knowledge
75

Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, and statistics.

Knowledge
78

Knowledge of microprocessors.

Knowledge
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
797

Provide advice on project costs, design concepts, or design changes.

Task
8

Knowledge of authentication, authorization, and access control methods.

Knowledge
807

Provide input on security requirements to be included in statements of work and other appropriate procurement documents.

Task
809

Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).

Task
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
82A

Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs.

Knowledge
864A

Translate proposed capabilities into technical requirements.

Task
865

Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria.

Task
90

Knowledge of operating systems.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
936

Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).

Task
94

Knowledge of parallel and distributed computing concepts.

Knowledge
993A

Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization’s enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).

Ability
996A

Assess and design security management functions as related to cyberspace.

Task

Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements…

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
19

Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
53A

Knowledge of risk assessments and authorization per Risk Management Framework processes.

Knowledge
55

Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data.

Knowledge
58

Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
70

Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).

Knowledge
77

Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
183

Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Skill
197

Skill in discerning the protection needs (i.e., security controls) of information systems and networks.

Skill
537

Develop methods to monitor and measure risk, compliance, and assurance efforts.

Task
548

Develop specifications to ensure risk, compliance, and assurance efforts conform with security, resilience, and dependability requirements at the software application, system, and network environment level.

Task
566

Draft statements of preliminary or residual security risks for system operation.

Task
691

Maintain information systems assurance and accreditation materials.

Task
710

Monitor and evaluate a system’s compliance with information technology (IT) security, resilience, and dependability requirements.

Task
1040A

Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure.

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1038B

Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability).

Knowledge
1039

Skill in evaluating the trustworthiness of the supplier and/or product.

Skill
1131

Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]).

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
1142

Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

Knowledge
1146

Develop and Implement cybersecurity independent audit processes for application software/networks/systems and oversee ongoing independent audits to ensure that operational and Research and Design (R&D) processes and procedures are in compliance with organizational and mandatory cybersecurity requirements and accurately followed by Systems Administrators and other cybersecurity staff when performing their day-to-day activities.

Task
121

Knowledge of structured analysis principles and methods.

Knowledge
128

Knowledge of systems diagnostic tools and fault identification techniques.

Knowledge
143

Knowledge of the organization’s enterprise information technology (IT) goals and objectives.

Knowledge
156

Skill in applying confidentiality, integrity, and availability principles.

Skill
203

Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.

Skill
27

Knowledge of cryptography and cryptographic key management concepts.

Knowledge
38

Knowledge of organization’s enterprise information security architecture system.

Knowledge
3B

Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks.

Skill
417

Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews.

Task
43A

Knowledge of embedded systems.

Knowledge
457

Conduct Privacy Impact Assessments (PIA) of the application’s security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII).

Task
69A

Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).

Knowledge
772

Perform validation steps, comparing actual results with expected results and analyze the differences to identify impact and risks.

Task
775

Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks.

Task
798

Provide an accurate technical evaluation of the software application, system, or network, documenting the security posture, capabilities, and vulnerabilities against relevant cybersecurity compliances.

Task
827

Recommend new or revised security, resilience, and dependability measures based on the results of reviews.

Task
836

Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network.

Task
836B

Review and approve security and privacy assessment plans.

Task
878

Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.

Task
879

Verify that the software application/network/system accreditation and assurance documentation is current.

Task
88

Knowledge of new and emerging information technology (IT) and cybersecurity technologies.

Knowledge
88B

Knowledge of new and emerging control systems technologies.

Knowledge
936

Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).

Task
942

Knowledge of the organization’s core business/mission processes.

Knowledge
95B

Knowledge of penetration testing principles, tools, and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems).

Knowledge

Manages the user experience of a product focused on human factors by making products intuitive…

Workforce Element:
Software Engineering

Core KSATs:
KSAT ID Description KSAT
16

Knowledge of capabilities and requirements analysis.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
414

Analyze user needs and software requirements to determine feasibility of design within time and cost constraints.

Task
466

Consult with customers to evaluate functional requirements.

Task
797

Provide advice on project costs, design concepts, or design changes.

Task
813

Provide recommendations for possible improvements and upgrades.

Task
850

Store, retrieve, and manipulate data for analysis of system capabilities and requirements.

Task
927A

Research and evaluate available technologies and standards to meet customer requirements.

Task
1144

Develop and document User Experience (UX) requirements including information architecture and user interface requirements.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
3822A

Skill in managing user relationships, including determining user needs/requirements, managing user expectations, and demonstrating commitment to delivering quality results.

Skill
5150

Coordinate and manage the overall service provided to a customer end-to-end.

Task
5970

Plan and conduct user research and competitor analysis.

Task
5971

Determine information architecture and create sitemaps.

Task
5972

Conduct usability testing.

Task
5973

Conduct qualitative and quantitative research and analysis.

Task
5974

Work with users as a human factors liaison to determine user needs/requirements, manage user expectations, perform analysis, and demonstrate commitment to delivering quality results.

Task
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7102

Skill in using industry-standard design and prototyping tools.

Skill
7104

Skill in interpreting data and feedback.

Skill
7105

Skill in operating UX tools and methods.

Skill
7106

Knowledge of developing user-centered conceptual and logical designs.

Knowledge
7107

Knowledge of usability standards and application of usability standards.

Knowledge
7108

Knowledge of user centered design principles.

Knowledge
7109

Knowledge of usability testing.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
35

Knowledge of digital rights management.

Knowledge
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge

Executes software planning, requirements, risk management, design, development, architecture, modeling, estimation, configuration management, quality, security,…

Workforce Element:
Software Engineering

Core KSATs:
KSAT ID Description KSAT
20

Knowledge of complex data structures.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
23

Knowledge of computer programming principles such as object-oriented design.

Knowledge
56

Knowledge of cybersecurity principles and methods that apply to software development.

Knowledge
90

Knowledge of operating systems.

Knowledge
102

Knowledge of programming language structures and logic.

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
116

Knowledge of software debugging principles.

Knowledge
117

Knowledge of software design tools, methods, and techniques.

Knowledge
118A

Knowledge of software development models, methodologies, and practices (Waterfall Model, Spiral, Agile, DevSecOps).

Knowledge
119

Knowledge of software engineering.

Knowledge
121

Knowledge of structured analysis principles and methods.

Knowledge
124

Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools.

Knowledge
149

Knowledge of web services, including service-oriented architecture, Simple Object Access Protocol, and web service description language.

Knowledge
168

Skill in conducting software debugging.

Skill
174

Skill in creating programs that validate and process multiple inputs including command line arguments, environmental variables, and input streams.

Skill
185A

Skill in developing applications that can log and handle errors, exceptions, and application faults and logging.

Skill
191A

Knowledge of development and application of security system access controls.

Knowledge
238A

Skill in writing code in a currently supported programming language (e.g., Java, C++).

Skill
408

Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application.

Task
414

Analyze user needs and software requirements to determine feasibility of design within time and cost constraints.

Task
417

Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews.

Task
418

Apply secure code documentation.

Task
432

Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules.

Task
446

Compile and write documentation of program development and subsequent revisions, inserting comments in the coded instructions so others can understand the program.

Task
459A

Conduct trial runs of programs and software applications to ensure the desired information is produced and instructions and security levels are correct.

Task
461

Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces.

Task
467

Consult with engineering staff to evaluate interface between hardware and software.

Task
477

Correct errors by making appropriate changes and rechecking the program to ensure desired results are produced.

Task
506

Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design.

Task
515A

Develop software system testing and validation procedures, programming, and documentation.

Task
543

Develop secure code and error handling.

Task
634

Identify basic common coding flaws at a high level.

Task
709A

Modify and maintain existing software to correct errors, to adapt it to new hardware, or to upgrade interfaces and improve performance.

Task
764

Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities.

Task
785

Prepare detailed workflow charts and diagrams that describe input, output, and logical operation, and convert them into a series of instructions coded in a computer language.

Task
865

Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria.

Task
904A

Knowledge of interpreted and compiled computer languages.

Knowledge
905A

Skill in applying secure coding techniques.

Skill
905

Knowledge of secure coding techniques.

Knowledge
968

Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization).

Knowledge
970A

Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities.

Task
973A

Skill in using code analysis tools.

Skill
1071A

Ability to develop secure software according to secure software deployment methodologies, tools, and practices.

Ability
1151

Identify and leverage the enterprise-wide version control system while designing and developing secure applications.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2335

Direct software programming and development of documentation.

Task
5200

Design, implement, test, and evaluate secure interfaces between information systems, physical systems, and/or embedded technologies.

Task
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
100

Knowledge of Privacy Impact Assessments.

Knowledge
1020A

Skill in secure test plan design (e. g. unit, integration, system, acceptance).

Skill
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1037A

Knowledge of information technology (IT) risk management policies, requirements, and procedures.

Knowledge
1038B

Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability).

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
109

Knowledge of secure configuration management techniques.

Knowledge
1131

Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]).

Knowledge
1135

Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing).

Knowledge
1140A

Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic).

Skill
1149A

Enable applications with public keying by leveraging existing public key infrastructure (PKI) libraries and incorporating certificate management and encryption functionalities when appropriate.

Task
1150A

Identify and leverage the enterprise-wide security services while designing and developing secure applications (e.g., Enterprise PKI, Federated Identity server, Enterprise AV solution) when appropriate.

Task
172

Skill in creating and utilizing mathematical or statistical models.

Skill
177

Skill in designing countermeasures to identified security risks.

Skill
197

Skill in discerning the protection needs (i.e., security controls) of information systems and networks.

Skill
2156

Consult with customers about software system design and maintenance.

Task
2839

Supervise and assign work to programmers, designers, technologists and technicians and other engineering and scientific personnel.

Task
3080

Ability to use and understand complex mathematical concepts (e.g., discrete math).

Ability
38

Knowledge of organization’s enterprise information security architecture system.

Knowledge
3822A

Skill in managing user relationships, including determining user needs/requirements, managing user expectations, and demonstrating commitment to delivering quality results.

Skill
3B

Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks.

Skill
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
43A

Knowledge of embedded systems.

Knowledge
602

Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.

Task
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
644

Identify security implications and apply methodologies within centralized and decentralized environments across the enterprises computer systems in software development.

Task
645

Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.

Task
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
6919

Ability to determine the best cloud deployment model for the appropriate operating environment.

Ability
6942

Skill in designing or implementing cloud computing deployment models.

Skill
6945

Skill in migrating workloads to, from, and among the different cloud computing service models.

Skill
7097

Knowledge of planning for long-term maintainability using architectural structures, viewpoints, styles, design decisions and frameworks, and the underlying data structures.

Knowledge
72

Knowledge of local area and wide area networking principles and concepts including bandwidth management.

Knowledge
726

Oversee and make recommendations regarding configuration management.

Task
74

Knowledge of low-level computer languages (e.g., assembly languages).

Knowledge
756

Perform integrated quality assurance testing for security functionality and resiliency attack.

Task
770

Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.

Task
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
826

Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing.

Task
850

Store, retrieve, and manipulate data for analysis of system capabilities and requirements.

Task
95B

Knowledge of penetration testing principles, tools, and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems).

Knowledge
971

Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements.

Task
972A

Determine and document software patches or the extent of releases that would leave software vulnerable.

Task
976

Knowledge of software quality assurance process.

Knowledge
978A

Knowledge of root cause analysis techniques.

Knowledge
979

Knowledge of supply chain risk management standards, processes, and practices.

Knowledge
980A

Skill in performing root cause analysis.

Skill

Plans, prepares, and performs testing, evaluation, verification, and validation of software to evaluate results against…

Workforce Element:
Software Engineering

Core KSATs:
KSAT ID Description KSAT
16

Knowledge of capabilities and requirements analysis.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
130

Knowledge of systems testing and evaluation methods.

Knowledge
130A

Knowledge of systems security testing and evaluation methods.

Knowledge
144

Knowledge of the systems engineering process.

Knowledge
169

Skill in conducting test events.

Skill
176

Skill in designing a data analysis structure (i.e., the types of data your test must generate and how to analyze those data).

Skill
182

Skill in determining an appropriate level of test rigor for a given system.

Skill
190

Skill in developing operations-based testing scenarios.

Skill
220

Skill in systems integration testing.

Skill
239

Skill in writing test plans.

Skill
412A

Analyze the results of software, hardware, or interoperability testing.

Task
414

Analyze user needs and software requirements to determine feasibility of design within time and cost constraints.

Task
452

Conduct functional and connectivity testing to ensure continuing operability.

Task
508

Determine level of assurance of developed capabilities based on test results.

Task
515A

Develop software system testing and validation procedures, programming, and documentation.

Task
550

Develop test plans to address specifications and requirements.

Task
694

Make recommendations based on test results.

Task
748A

Perform developmental testing on systems under development.

Task
757A

Perform interoperability testing on systems exchanging electronic information with other systems.

Task
761A

Perform operational testing.

Task
858A

Test, evaluate, and verify hardware and/or software to determine compliance with defined specifications and requirements.

Task
858B

Record and manage test data.

Task
950

Skill in evaluating test plans for applicability and completeness.

Skill
951

Determine scope, infrastructure, resources, and data sample size to ensure system requirements are adequately demonstrated.

Task
978A

Knowledge of root cause analysis techniques.

Knowledge
1020A

Skill in secure test plan design (e. g. unit, integration, system, acceptance).

Skill
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5650

Validate specifications and requirements for testability.

Task
5866A

Create or customize existing Test and Evaluation Master Plans (TEMPs) for systems.

Task
5877A

Develop possible solutions for technical risks and limitations of planned tests.

Task
5914

Report test and evaluation deficiencies and possible solutions to appropriate personnel.

Task
5920A

Test components to ensure they work as intended in a variety of scenarios for all aspects of the application.

Task
5933

Conduct automated testing for acceptance testing, functional testing, integration testing, interoperability testing, load/stress testing, performance testing, regression testing, and unit testing.

Task
5934

Develop and maintain a tool framework for automated test and evaluation.

Task
5936

Evaluate reliability, availability, and maintainability data.

Task
5937

Assess the system’s effectiveness and suitability for meeting user need and based on test and evaluation results.

Task
6020

Ability to analyze test data.

Ability
6060

Ability to collect, verify, and validate test data.

Ability
6170

Ability to translate data and test results into evaluative conclusions.

Ability
6430

Knowledge of Test & Evaluation processes.

Knowledge
6530

Skill in designing and documenting overall program Test & Evaluation strategies.

Skill
6630

Skill in preparing Test & Evaluation reports.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7003A

Knowledge of security risks, threats, and vulnerabilities and potential risk mitigation solutions.

Knowledge
7004A

Knowledge of Test & Evaluation frameworks.

Knowledge
7006A

Knowledge of best practices from industry and academia in test design activities for verification and validation of systems.

Knowledge
7025A

Knowledge of how software solutions integrate with cloud or other IT infrastructure.

Knowledge
7044

Knowledge of testing, evaluation, validation, and verification (T&E V&V) tools and procedures to ensure systems are working as intended.

Knowledge
7054A

Knowledge of tools for testing the robustness and resilience of software products and solutions.

Knowledge
7077A

Skill in translating operation requirements for systems into testing requirements.

Skill
7085

Knowledge of software environments (e.g., development, testing, integration, production, etc.) and appropriate T&E application in those environments.

Knowledge
7086

Ability to construct, maintain, and conduct testing in various test environments.

Ability

Additional KSATs:
KSAT ID Description KSAT
238A

Skill in writing code in a currently supported programming language (e.g., Java, C++).

Skill
393A

Administer test bed(s), and test and evaluate applications, hardware infrastructure, rules/signatures, access controls, and configurations of platforms managed by service provider(s).

Task
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
431A

Build, assess, and modify product prototypes using working models or theoretical models.

Task
53

Knowledge of the Security Assessment and Authorization process.

Knowledge
5910A

Provide quality assurance of software products throughout their lifecycle.

Task
5935

Perform usability surveys on operators/users of the system.

Task
5938

Integrate digital engineering models and data into test designs.

Task
6500

Skill in conducting Test Readiness Reviews.

Skill
6580

Skill in identifying Test & Evaluation infrastructure (people, ranges, tools, instrumentation) requirements.

Skill
6600

Skill in managing test assets, test resources, and test personnel to ensure effective completion of test events.

Skill
6641

Skill in providing Test & Evaluation resource estimate.

Skill
7009A

Knowledge of coding and scripting in languages that support software development and use.

Knowledge
7012A

Knowledge of current test standards and safety standards that are applicable to software development.

Knowledge
7028A

Knowledge of how to automate development, testing, security, and deployment of software to the DoD.

Knowledge
7034A

Knowledge of interactions and integration of DataOps, MLOps, and DevSecOps solution.

Knowledge
7036A

Knowledge of laws, regulations, and policies related to software development, cybersecurity, data security/privacy, and use of publicly procured data for government.

Knowledge
7070A

Skill in integrating software Test & Evaluation frameworks into test strategies for specific projects.

Skill
7083

Ability to measure human systems interaction (usability, workload, system trust).

Ability
7084

Ability to evaluate user training and documentation update processes.

Ability
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
83

Knowledge of network hardware devices and functions.

Knowledge
874

Utilize models and simulations to analyze or predict system performance under different operating conditions.

Task
904

Knowledge of interpreted and compiled computer languages.

Knowledge
965

Knowledge of organization’s risk tolerance and/or risk management approach.

Knowledge
980A

Skill in performing root cause analysis.

Skill

Manages and identifies program high-level technical specifications, which may include application design, cloud computing strategy…

Workforce Element:
Software Engineering

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
42A

Knowledge of engineering concepts as applied to computer architecture and associated computer hardware/software.

Knowledge
56

Knowledge of cybersecurity principles and methods that apply to software development.

Knowledge
68A

Ability to build architectures and frameworks.

Ability
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
116

Knowledge of software debugging principles.

Knowledge
117

Knowledge of software design tools, methods, and techniques.

Knowledge
118A

Knowledge of software development models, methodologies, and practices (Waterfall Model, Spiral, Agile, DevSecOps).

Knowledge
119

Knowledge of software engineering.

Knowledge
129

Knowledge of system life cycle management principles, including software security and usability.

Knowledge
141A

Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures.

Knowledge
170

Skill in configuring and optimizing software.

Skill
180

Skill in designing the integration of hardware and software solutions.

Skill
413A

Analyze user needs and requirements to plan architecture.

Task
414

Analyze user needs and software requirements to determine feasibility of design within time and cost constraints.

Task
467

Consult with engineering staff to evaluate interface between hardware and software.

Task
502A

Develop enterprise architecture or system components required to meet user needs.

Task
569A

Document and update as necessary all definition and architecture activities.

Task
785A

Prepare detailed workflow charts, models, and diagrams that describe input, output, and logical operation.

Task
1125

Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.

Knowledge
1151A

Leverage enterprise-wide version control system while designing and developing secure applications.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2156

Consult with customers about software system design and maintenance.

Task
2335

Direct software programming and development of documentation.

Task
5956

Provide Cloud and Cloud Security guidance to leadership.

Task
5957

Develop a company’s cloud computing strategy.

Task
5958

Develop and implements cloud strategies.

Task
5959

Convert the technical requirements of a project into the architecture and design that will guide the final product.

Task
5960

Design and implement cloud computing solutions, including designing the cloud infrastructure, the cloud application architecture, and the cloud security architecture.

Task
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7096

Knowledge of both cloud computing and how it is applied in a variety of industries.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1136A

Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud).

Knowledge
1147A

Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce.

Task
126

Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.

Knowledge
143A

Knowledge of integrating the organization’s goals and objectives into the architecture.

Knowledge
3080

Ability to use and understand complex mathematical concepts (e.g., discrete math).

Ability
38

Knowledge of organization’s enterprise information security architecture system.

Knowledge
412A

Analyze the results of software, hardware, or interoperability testing.

Task
414A

Analyze security needs and software requirements to determine feasibility of design within time and cost constraints and security mandates.

Task
44

Knowledge of enterprise messaging systems and associated software.

Knowledge
75

Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, and statistics.

Knowledge
971

Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements.

Task

Installs, configures, troubleshoots, and maintains hardware, software, and administers system accounts.

Workforce Element:
IT (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
76

Knowledge of measures or indicators of system performance and availability.

Knowledge
96

Knowledge of performance tuning tools and techniques.

Knowledge
99A

Knowledge of principles and methods for integrating system components.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
127

Knowledge of systems administration concepts.

Knowledge
171A

Skill in correcting physical and technical problems that impact system/server performance.

Skill
211A

Skill in monitoring and optimizing system/server performance.

Skill
216A

Skill in recovering failed systems/servers.

Skill
219A

Skill in operating system administration.

Skill
344

Knowledge of virtualization technologies and virtual machine development and maintenance.

Knowledge
452

Conduct functional and connectivity testing to ensure continuing operability.

Task
518

Develop and document systems administration standard operating procedures.

Task
518A

Comply with organization systems administration standard operating procedures.

Task
521A

Implement and enforce local network usage policies and procedures.

Task
683

Maintain baseline system security according to organizational policies.

Task
695

Manage accounts, network rights, and access to systems and equipment.

Task
701A

Manage system/server resources including performance, capacity, availability, serviceability, and recoverability.

Task
713A

Monitor and maintain system/server configuration.

Task
763B

Perform repairs on faulty system/server hardware.

Task
781

Plan, execute, and verify data redundancy and system recovery procedures.

Task
835A

Troubleshoot hardware/software interface and interoperability problems.

Task
986

Knowledge of organizational information technology (IT) user security policies (e.g., account creation, password rules, access control).

Knowledge
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
1153A

Install, update, and troubleshoot systems/servers.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1074A

Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.

Knowledge
112A

Knowledge of systems engineering theories, concepts, and methods.

Knowledge
113

Knowledge of server and client operating systems.

Knowledge
114A

Knowledge of system/server diagnostic tools and fault identification techniques.

Knowledge
141

Knowledge of the enterprise information technology (IT) architecture.

Knowledge
145

Knowledge of the type and frequency of routine maintenance needed to keep equipment functioning properly.

Knowledge
148

Knowledge of Virtual Private Network (VPN) security.

Knowledge
167A

Skill in conducting system/server planning, management, and maintenance.

Skill
170

Skill in configuring and optimizing software.

Skill
194

Skill in diagnosing connectivity problems.

Skill
195A

Skill in troubleshooting failed system components (i.e., servers)

Skill
202A

Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems.

Skill
206A

Skill in installing system and component upgrades.

Skill
209

Skill in maintaining directory services.

Skill
287

Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]).

Knowledge
342A

Knowledge of operating system command line/prompt.

Knowledge
386

Skill in using virtual machines.

Skill
434A

Check system hardware availability, functionality, integrity, and efficiency.

Task
456A

Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing.

Task
499

Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.

Task
572

Ensure application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment.

Task
6590

Skill in interfacing with customers.

Skill
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
6919

Ability to determine the best cloud deployment model for the appropriate operating environment.

Ability
6942

Skill in designing or implementing cloud computing deployment models.

Skill
6945

Skill in migrating workloads to, from, and among the different cloud computing service models.

Skill
70

Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).

Knowledge
72

Knowledge of local area and wide area networking principles and concepts including bandwidth management.

Knowledge
728A

Oversee installation, implementation, configuration, and support of system components.

Task
763A

Diagnose faulty system/server hardware.

Task
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
811

Provide ongoing optimization and problem solving support.

Task
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
892

Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, anti-virus software, anti-spyware).

Skill

Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as…

Workforce Element:
IT (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
40

Knowledge of organization’s evaluation and validation requirements.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
169

Skill in conducting test events.

Skill
176

Skill in designing a data analysis structure (i.e., the types of data your test must generate and how to analyze those data).

Skill
182

Skill in determining an appropriate level of test rigor for a given system.

Skill
190

Skill in developing operations-based testing scenarios.

Skill
220

Skill in systems integration testing.

Skill
239

Skill in writing test plans.

Skill
412A

Analyze the results of software, hardware, or interoperability testing.

Task
508

Determine level of assurance of developed capabilities based on test results.

Task
550

Develop test plans to address specifications and requirements.

Task
694

Make recommendations based on test results.

Task
748A

Perform developmental testing on systems under development.

Task
757A

Perform interoperability testing on systems exchanging electronic information with other systems.

Task
761A

Perform operational testing.

Task
858B

Record and manage test data.

Task
858A

Test, evaluate, and verify hardware and/or software to determine compliance with defined specifications and requirements.

Task
950

Skill in evaluating test plans for applicability and completeness.

Skill
951

Determine scope, infrastructure, resources, and data sample size to ensure system requirements are adequately demonstrated.

Task
1006

Create auditable evidence of security measures.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
5650

Validate specifications and requirements for testability.

Task
6020

Ability to analyze test data.

Ability
6060

Ability to collect, verify, and validate test data.

Ability
6170

Ability to translate data and test results into evaluative conclusions.

Ability
6430

Knowledge of Test & Evaluation processes.

Knowledge
6500

Skill in conducting Test Readiness Reviews.

Skill
6530

Skill in designing and documenting overall program Test & Evaluation strategies.

Skill
6580

Skill in identifying Test & Evaluation infrastructure (people, ranges, tools, instrumentation) requirements.

Skill
6600

Skill in managing test assets, test resources, and test personnel to ensure effective completion of test events.

Skill
6630

Skill in preparing Test & Evaluation reports.

Skill
6641

Skill in providing Test & Evaluation resource estimate.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1038B

Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability).

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1131

Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]).

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
1142

Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

Knowledge
127

Knowledge of systems administration concepts.

Knowledge
144

Knowledge of the systems engineering process.

Knowledge
238A

Skill in writing code in a currently supported programming language (e.g., Java, C++).

Skill
3307

Knowledge of cybersecurity-enabled software products.

Knowledge
38

Knowledge of organization’s enterprise information security architecture system.

Knowledge
417

Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews.

Task
53A

Knowledge of risk assessments and authorization per Risk Management Framework processes.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
826

Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing.

Task
83

Knowledge of network hardware devices and functions.

Knowledge
904

Knowledge of interpreted and compiled computer languages.

Knowledge

Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.

Workforce Element:
IT (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
38

Knowledge of organization’s enterprise information security architecture system.

Knowledge
64

Knowledge of information security systems engineering principles.

Knowledge
70

Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
109

Knowledge of secure configuration management techniques.

Knowledge
118

Knowledge of software development models (e.g., Waterfall Model, Spiral Model).

Knowledge
119

Knowledge of software engineering.

Knowledge
130

Knowledge of systems testing and evaluation methods.

Knowledge
144

Knowledge of the systems engineering process.

Knowledge
530A

Develop detailed design documentation for component and interface specifications to support system design and development.

Task
659A

Implement designs for new or existing system(s).

Task
1000A

Ensure design and development activities are properly documented (providing a functional description of implementation) and updated as necessary.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
3642

Knowledge of various types of computer architectures.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
100

Knowledge of Privacy Impact Assessments.

Knowledge
1002B

Skill in conducting reviews of technical systems.

Skill
101

Knowledge of process engineering concepts.

Knowledge
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1038

Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability.

Knowledge
1073A

Skill in network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Skill
1073B

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
110A

Knowledge of security management.

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
1142

Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

Knowledge
1152A

Implement and integrate systems engineering methodologies into development environment.

Task
121

Knowledge of structured analysis principles and methods.

Knowledge
124B

Knowledge of system design tools, methods, and techniques.

Knowledge
126

Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.

Knowledge
129A

Knowledge of system life cycle management principles.

Knowledge
133

Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).

Knowledge
173A

Skill in integrating and applying policies that meet system security objectives.

Skill
173B

Skill in creating policies that enable systems to meet performance objectives (e.g. traffic routing, SLA’s, CPU specifications).

Skill
177

Skill in designing countermeasures to identified security risks.

Skill
177A

Knowledge of countermeasure design for identified security risks.

Knowledge
179

Skill in designing security controls based on cybersecurity principles and tenets.

Skill
180

Skill in designing the integration of hardware and software solutions.

Skill
181A

Skill in detecting host and network based intrusions via intrusion detection technologies.

Skill
181B

Knowledge of how detection technologies are used to detect host and network-based intrusions.

Knowledge
191A

Knowledge of development and application of security system access controls.

Knowledge
197

Skill in discerning the protection needs (i.e., security controls) of information systems and networks.

Skill
199

Skill in evaluating the adequacy of security designs.

Skill
224A

Skill in the use of design modeling (e.g., unified modeling language).

Skill
2354

Employ configuration management processes.

Task
238A

Skill in writing code in a currently supported programming language (e.g., Java, C++).

Skill
25B

Knowledge of encryption algorithms.

Knowledge
27A

Knowledge of cryptology.

Knowledge
3153

Knowledge of circuit analysis.

Knowledge
3307

Knowledge of cybersecurity-enabled software products.

Knowledge
34

Knowledge of database systems.

Knowledge
3687

Skill in applying security controls.

Skill
416A

Analyze design constraints, analyze trade-offs and security design, and consider lifecycle support.

Task
42

Knowledge of electrical engineering as applied to computer architecture, including circuit boards, processors, chips, and associated computer hardware.

Knowledge
431A

Build, assess, and modify product prototypes using working models or theoretical models.

Task
43A

Knowledge of embedded systems.

Knowledge
46

Knowledge of fault tolerance.

Knowledge
494

Design and develop cybersecurity or cybersecurity-enabled products.

Task
500B

Design hardware, operating systems, or software applications to adequately address requirements.

Task
501

Design or integrate appropriate data backup capabilities into overall system designs, and ensure appropriate technical and procedural processes exist for secure system backups and protected storage of backup data.

Task
503A

Design to security requirements to ensure requirements are met for all systems and/or applications.

Task
51

Knowledge of how system components are installed, integrated, and optimized.

Knowledge
5110

Conduct a market analysis to identify, assess, and recommend commercial, GOTS, and open source products for use within a system and ensure recommended products are in compliance with organization’s evaluation and validation requirements.

Task
516A

Develop testing and validation procedures and documentation.

Task
5190

Design and develop system administration and management functionality for privileged access users.

Task
52

Knowledge of human-computer interaction principles.

Knowledge
5200A

Design, implement, assess, and evaluate secure interfaces between information systems, physical systems, and/or embedded technologies.

Task
527

Develop architectures or system components consistent with technical specifications.

Task
531

Develop Disaster Recovery and Continuity of Operations plans for systems under development and ensure testing prior to systems entering a production environment.

Task
5400

Incorporates risk-driven systems maintenance updates process to address system deficiencies (periodically and out of cycle).

Task
542A

Develop risk mitigation strategies and cybersecurity countermeasures to address cost, performance, and security risks and to resolve vulnerabilities and recommend security changes to system or system components as needed.

Task
542A

Develop mitigation strategies to address cost, schedule, performance, and security risks.

Task
602

Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.

Task
626A

Identify components or elements, allocate comprehensive functional components to include security functions, and describe the relationships between the elements.

Task
630

Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find work-arounds for communication protocols that are not interoperable).

Task
632

Identify and prioritize essential system functions or sub-systems required to support essential capabilities or business functions for restoration or recovery after a system failure or during a system recovery event based on overall system requirements for continuity and availability.

Task
63A

Knowledge of information systems and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
648

Identify, assess, and recommend cybersecurity or cybersecurity-enabled products for use within a system and ensure recommended products are in compliance with organization’s evaluation and validation requirements.

Task
65A

Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).

Knowledge
6945

Skill in migrating workloads to, from, and among the different cloud computing service models.

Skill
72

Knowledge of local area and wide area networking principles and concepts including bandwidth management.

Knowledge
75

Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, and statistics.

Knowledge
766A

Perform security reviews and identify security gaps in architecture.

Task
770

Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.

Task
78

Knowledge of microprocessors.

Knowledge
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
803

Provide guidelines for implementing developed systems to customers or installation teams.

Task
808B

Provide input to implementation plans, standard operating procedures, maintenance documentation, and maintenance training materials

Task
809

Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).

Task
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
82A

Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs.

Knowledge
850

Store, retrieve, and manipulate data for analysis of system capabilities and requirements.

Task
856A

Provide support to test and evaluation activities.

Task
860A

Trace system requirements to design components and perform gap analysis.

Task
874

Utilize models and simulations to analyze or predict system performance under different operating conditions.

Task
877A

Verify stability, interoperability, portability, and/or scalability of system architecture.

Task
8A

Knowledge of access authentication methods.

Knowledge
90

Knowledge of operating systems.

Knowledge
904A

Knowledge of interpreted and compiled computer languages.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
94

Knowledge of parallel and distributed computing concepts.

Knowledge
98

Knowledge of policy-based and risk adaptive access controls.

Knowledge
998A

Analyze user needs and requirements to plan and conduct system development.

Task
999A

Develop designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations.

Task
999C

Collaborate with cybersecurity professionals to implement cybersecurity into designs to meet specific operational needs and environmental factors (e.g., access controls, automate d applications, networked operations, high integrity and availability requirements, multilevel security/processing of multiple classification levels, and processing Sensitive Compartmented Information).

Task

Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.

Workforce Element:
IT (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
9

Knowledge of applicable business processes and operations of customer organizations.

Knowledge
16

Knowledge of capabilities and requirements analysis.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
64

Knowledge of information security systems engineering principles.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
129

Knowledge of system life cycle management principles, including software security and usability.

Knowledge
143

Knowledge of the organization’s enterprise information technology (IT) goals and objectives.

Knowledge
162

Skill in conducting capabilities and requirements analysis.

Skill
458

Conduct risk analysis, feasibility study, and/or trade-off analysis to develop, document, and refine functional requirements and specifications.

Task
466

Consult with customers to evaluate functional requirements.

Task
487

Define project scope and objectives based on customer requirements.

Task
863

Translate functional requirements into technical solutions.

Task
911A

Ability to interpret and translate customer requirements into operational capabilities.

Ability
1144

Develop and document User Experience (UX) requirements including information architecture and user interface requirements.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
100

Knowledge of Privacy Impact Assessments.

Knowledge
1002A

Skill in conducting reviews of systems.

Skill
1003

Develop and document supply chain risks for critical system elements, as appropriate.

Task
1004

Knowledge of critical information technology (IT) procurement requirements.

Knowledge
1005

Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes).

Knowledge
101

Knowledge of process engineering concepts.

Knowledge
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1038B

Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability).

Knowledge
1040A

Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure.

Knowledge
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
109

Knowledge of secure configuration management techniques.

Knowledge
110

Knowledge of key concepts in security management (e.g., Release Management, Patch Management).

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
124

Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools.

Knowledge
126

Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.

Knowledge
130

Knowledge of systems testing and evaluation methods.

Knowledge
133

Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).

Knowledge
144

Knowledge of the systems engineering process.

Knowledge
155

Skill in applying and incorporating information technologies into proposed solutions.

Skill
156

Skill in applying confidentiality, integrity, and availability principles.

Skill
158

Skill in applying organization-specific systems analysis principles and techniques.

Skill
2214

Design and document quality standards.

Task
224

Skill in design modeling and building use cases (e.g., unified modeling language).

Skill
2343

Document a system’s purpose and preliminary system security concept of operations.

Task
25

Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]).

Knowledge
2692

Ensure that all systems components can be integrated and aligned (e.g., procedures, databases, policies, software, and hardware).

Task
27

Knowledge of cryptography and cryptographic key management concepts.

Knowledge
46

Knowledge of fault tolerance.

Knowledge
476

Coordinate with systems architects and developers, as needed, to provide oversight in the development of design solutions.

Task
51

Knowledge of how system components are installed, integrated, and optimized.

Knowledge
511B

Define baseline security requirements in accordance with applicable guidelines.

Task
517

Develop and document requirements, capabilities, and constraints for design procedures and processes.

Task
528A

Develop cost estimates for new or modified system(s).

Task
55

Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data.

Knowledge
602

Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.

Task
62

Knowledge of industry-standard and organizationally accepted analysis principles and methods.

Knowledge
65A

Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).

Knowledge
669

Integrate and align information security and/or cybersecurity policies to ensure system analysis meets security requirements.

Task
68

Knowledge of information technology (IT) architectural concepts and frameworks.

Knowledge
700A

Manage the information technology (IT) planning process to ensure that developed solutions meet customer requirements.

Task
726

Oversee and make recommendations regarding configuration management.

Task
760

Perform needs analysis to determine opportunities for new and improved business process solutions.

Task
78

Knowledge of microprocessors.

Knowledge
789

Prepare use cases to justify the need for specific information technology (IT) solutions.

Task
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
82A

Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs.

Knowledge
88A

Knowledge of current and emerging cyber technologies.

Knowledge
90

Knowledge of operating systems.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
94

Knowledge of parallel and distributed computing concepts.

Knowledge

Responsible for analysis and development of systems/software security through the product lifecycle to include integration,…

Workforce Element:
Software Engineering

Core KSATs:
KSAT ID Description KSAT
3C

Skill in recognizing vulnerabilities in information and/or data systems.

Skill
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
25

Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]).

Knowledge
27A

Knowledge of cryptology.

Knowledge
34

Knowledge of database systems.

Knowledge
51

Knowledge of how system components are installed, integrated, and optimized.

Knowledge
58

Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
70

Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).

Knowledge
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
82A

Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs.

Knowledge
90

Knowledge of operating systems.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
109A

Knowledge of configuration management techniques.

Knowledge
110A

Knowledge of security management.

Knowledge
111

Knowledge of security system design tools, methods, and techniques.

Knowledge
130A

Knowledge of systems security testing and evaluation methods.

Knowledge
144

Knowledge of the systems engineering process.

Knowledge
177B

Knowledge of countermeasures for identified security risks.

Knowledge
179A

Skill in assessing security controls based on cybersecurity principles and tenets.

Skill
183

Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.

Skill
191

Skill in developing and applying security system access controls.

Skill
199

Skill in evaluating the adequacy of security designs.

Skill
420

Apply security policies to meet security objectives of the system.

Task
421

Apply service oriented security architecture principles to meet organization’s confidentiality, integrity, and availability requirements.

Task
559A

Analyze and report organizational security posture trends.

Task
559B

Analyze and report system security posture trends.

Task
571

Ensure all systems security operations and maintenance activities are properly documented and updated as necessary.

Task
572

Ensure application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment.

Task
576

Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.

Task
593A

Assess adequate access controls based on principles of least privilege and need-to-know.

Task
653B

Implement security measures to mitigate or remediate vulnerabilities and security deficiencies, and provide justification for acceptance of residual risk.

Task
660

Implement specific cybersecurity countermeasures for systems and/or applications.

Task
661A

Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation.

Task
671

Integrate automated capabilities for updating or patching system software where practical and develop processes and procedures for manual updating and patching of system software based on current and projected patch timeline requirements for the operational environment of the system.

Task
710

Monitor and evaluate a system’s compliance with information technology (IT) security, resilience, and dependability requirements.

Task
717A

Assess and monitor cybersecurity related to system implementation and testing practices.

Task
729A

Verify minimum security requirements are in place for all applications.

Task
754

Perform cybersecurity testing of developed applications and/or systems.

Task
765

Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.

Task
806A

Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities.

Task
806

Provide cybersecurity guidance to leadership.

Task
809

Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).

Task
876

Verify and update security documentation reflecting the application/system security design features.

Task
880A

Work with stakeholders to resolve computer security incidents and vulnerability compliance.

Task
922A

Knowledge of how to use network analysis tools to identify vulnerabilities.

Knowledge
936

Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).

Task
938A

Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans.

Task
1006

Create auditable evidence of security measures.

Task
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1037A

Knowledge of information technology (IT) risk management policies, requirements, and procedures.

Knowledge
1039B

Knowledge of how to evaluate the trustworthiness of the supplier and/or product.

Knowledge
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
1135

Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing).

Knowledge
1138A

Knowledge of developing and applying user credential management system.

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2054

Assess the effectiveness of security controls.

Task
3642

Knowledge of various types of computer architectures.

Knowledge
5050

Assess all the configuration management (change configuration/release management) processes.

Task
5928

Identify, define, and document system security requirements and recommend solutions to management.

Task
5929

Install software that monitors systems and networks for security breaches and intrusions.

Task
5930

Educate and train staff on information system security best practices.

Task
5931

Select and use appropriate security testing tools.

Task
5932

Select and use appropriate secure coding standards and analyze code for common weaknesses, vulnerabilities, and hardening against common attack patterns.

Task
6140

Ability to leverage best practices and lessons learned of external organizations and academic institutions dealing with cyber issues.

Ability
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
6240

Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE).

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge
7079

Knowledge of security systems including anti-virus applications, content filtering, firewalls, authentication systems, and intrusion detection and notification systems.

Knowledge
7080

Knowledge of database security.

Knowledge
7081

Knowledge of vulnerabilities of various encryption systems.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
1040A

Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure.

Knowledge
1132A

Knowledge of information technology (IT) service catalogues.

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1139A

Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption.

Knowledge
1142

Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

Knowledge
119

Knowledge of software engineering.

Knowledge
133

Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).

Knowledge
160A

Skill in assessing security systems designs.

Skill
180

Skill in designing the integration of hardware and software solutions.

Skill
21

Knowledge of computer algorithms.

Knowledge
238A

Skill in writing code in a currently supported programming language (e.g., Java, C++).

Skill
417

Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews.

Task
419

Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications.

Task
43A

Knowledge of embedded systems.

Knowledge
52

Knowledge of human-computer interaction principles.

Knowledge
525A

Develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements.

Task
602

Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.

Task
670A

Ensure the integration and implementation of Cross-Domain Solutions (CDS) in a secure environment.

Task
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
7082

Ability to implement Zero Trust security in DoD Systems/Software.

Ability
782

Plan and recommend modifications or adjustments based on exercise results or system environment.

Task
795

Properly document all systems security implementation, operations and maintenance activities and update as necessary.

Task
94

Knowledge of parallel and distributed computing concepts.

Knowledge

The Target Analyst Reporter (TAR) provides synthesized products to customers by researching, analyzing, and reporting…

Workforce Element:
Cyberspace Effects

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
1056

Knowledge of operations security.

Knowledge
2001

Accurately characterize targets.

Task
2081

Classify documents in accordance with classification guidelines.

Task
2087

Collaborate with intelligence analysts/targeting organizations involved in related areas.

Task
2089

Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.

Task
2101

Identify and conduct analysis of target communications to identify information essential to support operations.

Task
2134

Conduct target research and analysis.

Task
2183

Coordinate with other organizations to deconflict reporting.

Task
2195

Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology.

Task
2236

Determine if information meets reporting requirements.

Task
2243

Determine what technologies are used by a given target.

Task
2356

Engage customers to understand customers’ intelligence needs and wants.

Task
2400

Examine intercept-related metadata and content with an understanding of targeting significance.

Task
2427

Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.)

Task
2429

Generate requests for information.

Task
2434

Identify threat tactics, and methodologies.

Task
244

Ability to determine the validity of technology trend data.

Ability
2441

Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.

Task
2459A

Identify cyber intelligence gaps and shortfalls.

Task
2515

Initiate requests to guide tasking and assist with collection management.

Task
2542

Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications.

Task
2568

Make recommendations to guide collection in support of customer requirements.

Task
2608

Monitor target networks to provide indications and warning of target communications changes or processing failures.

Task
2621

Provide SME and support to planning/developmental forums and working groups as appropriate.

Task
2628A

Provide subject matter expertise to development of exercises.

Task
2715

Produce reports based on intelligence information using appropriate formats for dissemination.

Task
2719

Profile targets and their activities.

Task
2770

Provide time sensitive targeting support.

Task
2779

Review appropriate information sources to determine validity and relevance of information gathered.

Task
2781

Reconstruct networks in diagram or report format.

Task
2798

Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources.

Task
2818

Sanitize and minimize information to protect sources and methods.

Task
2840

Support identification and documentation of collateral effects.

Task
2893

Assess, document, and apply a target’s motivation and/or frame of reference to facilitate analysis, targeting and collection opportunities.

Task
2894

Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination.

Task
2897

Conduct analysis of target communications to identify essential information in support of organization objectives.

Task
2902

Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing.

Task
2904

Identify cyber threat tactics and methodologies.

Task
2905

Identify target communications within the global network.

Task
2906

Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis.

Task
2912

Perform or support technical network analysis and mapping.

Task
2919

Perform social network analysis and document as appropriate.

Task
2922

Tip critical or time-sensitive information to appropriate customers.

Task
296

Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.

Knowledge
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3002

Ability to focus research efforts to meet the customer’s decision-making needs.

Ability
3020

Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information.

Ability
3021

Ability to collaborate effectively with others.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3039

Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Ability
3043

Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3047

Ability to function effectively in a dynamic, fast-paced environment.

Ability
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3052

Ability to identify intelligence gaps.

Ability
3073

Ability to recognize and mitigate cognitive biases which may affect analysis.

Ability
3074

Ability to recognize and mitigate deception in reporting and analysis.

Ability
3077

Ability to think critically.

Ability
3078

Knowledge of target methods and procedures.

Knowledge
3081

Ability to utilize multiple intelligence sources across all intelligence disciplines.

Ability
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3113

Knowledge of target intelligence gathering and operational preparation techniques and life cycles.

Knowledge
3117

Knowledge of all-source reporting and dissemination procedures.

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3146

Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3158

Knowledge of cyber operation objectives, policies, and legalities.

Knowledge
3166

Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.

Knowledge
3172

Knowledge of collection sources including conventional and non-conventional sources.

Knowledge
3174

Knowledge of the intelligence requirements development and request for information processes.

Knowledge
3179

Knowledge of common networking devices and their configurations.

Knowledge
3181

Knowledge of common reporting databases and tools.

Knowledge
3219

Knowledge of cyber operations.

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3237

Knowledge of denial and deception techniques.

Knowledge
3242

Knowledge of document classification procedures, policy, resources, and personnel.

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3288

Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless).

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3296

Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).

Knowledge
3298

Knowledge of how to extract, analyze, and use metadata.

Knowledge
3324

Knowledge of information and collateral intelligence sources.

Knowledge
3338

Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions.

Knowledge
3346

Knowledge of Internet and routing protocols.

Knowledge
3382

Knowledge of methods to integrate and summarize information from any potential sources.

Knowledge
3386

Knowledge of midpoint collection (process, objectives, organization, targets, etc.).

Knowledge
3407

Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3418

Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors).

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3450

Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure.

Knowledge
3505

Knowledge of strategies and tools for target research.

Knowledge
3534

Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference.

Knowledge
3542

Knowledge of the basic structure, architecture, and design of converged applications.

Knowledge
3564

Knowledge of the data flow from collection origin to repositories and tools.

Knowledge
3582

Knowledge of the intelligence frameworks, processes, and related systems.

Knowledge
3595

Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements.

Knowledge
3603

Knowledge of the principal methods, procedures, and techniques of gathering information and producing intelligence.

Knowledge
3608

Knowledge of the purpose and contribution of target templates.

Knowledge
3616

Knowledge of the structure, architecture, and design of modern digital and telephony networks.

Knowledge
3617

Knowledge of the structure, architecture, and design of modern wireless communications systems.

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3664

Skill in identifying how a target communicates.

Skill
3667

Skill in analyzing a target’s communication networks.

Skill
3678

Skill in analyzing traffic to identify network devices.

Skill
3689

Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses).

Skill
3692

Skill in assessing the applicability of available analytical tools to various situations.

Skill
3708

Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis.

Skill
3765

Skill in disseminating items of highest intelligence value in a timely manner.

Skill
3771

Skill in evaluating data sources for relevance, reliability, and objectivity.

Skill
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3773

Skill in evaluating information to recognize relevance, priority, etc.

Skill
3774

Skill in evaluating accesses for intelligence value.

Skill
3778

Skill in exploiting/querying organizational and/or partner collection databases.

Skill
3787

Skill in identifying a target’s communications networks.

Skill
3797

Skill in identifying leads for target development.

Skill
3803

Skill in identifying, locating, and tracking targets via geospatial analysis techniques

Skill
3812

Skill in interpreting metadata and content as applied by collection systems.

Skill
3822

Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results.

Skill
3828

Skill in navigating network visualization software.

Skill
3863

Skill in recognizing midpoint opportunities and essential information.

Skill
3864

Skill in recognizing relevance of information.

Skill
3865

Skill in recognizing significant changes in a target’s communication patterns.

Skill
3867

Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information).

Skill
3867A

Skill in recognizing technical information that may be used for target development including intelligence development.

Skill
3873

Skill in researching essential information.

Skill
3885

Skill in fusion analysis

Skill
3890

Skill in synthesizing, analyzing, and prioritizing meaning across data sets.

Skill
3908

Skill in using research methods including multiple, different sources to reconstruct a target network.

Skill
3915

Skill in using geospatial data and applying geospatial resources.

Skill
3923

Skill in using non-attributable networks.

Skill
3951

Skill in writing about facts and ideas in a clear, convincing, and organized manner.

Skill
4072

Knowledge of collection systems, capabilities, and processes.

Knowledge
4073

Knowledge of the feedback cycle in collection processes.

Knowledge
4078

Knowledge of target or threat cyber actors and procedures.

Knowledge
4079

Knowledge of basic cyber operations activity concepts (e.g., foot printing, scanning and enumeration, penetration testing, white/black listing).

Knowledge
4085

Knowledge of approved intelligence dissemination processes.

Knowledge
4086

Knowledge of relevant laws, regulations, and policies.

Knowledge
4088

Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure).

Knowledge
4089

Knowledge of target communication tools and techniques.

Knowledge
4090

Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes).

Knowledge
4094

Knowledge of networking and internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.).

Knowledge
4095

Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML).

Knowledge
4097

Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network.

Knowledge
4099

Knowledge of customer information needs.

Knowledge
4106

Knowledge of analytic tools and techniques.

Knowledge
4113

Knowledge of the request for information process.

Knowledge
4118

Skill in identifying a target’s network characteristics.

Skill
4121

Skill in assessing a target’s frame of reference (e.g., motivation, technical capability, organizational structure, sensitivities).

Skill
4123

Skill in conducting research using all available sources.

Skill
4125

Skill in complying with the legal restrictions for targeted information.

Skill
4128

Skill in developing intelligence reports.

Skill
4129

Skill in evaluating and interpreting metadata.

Skill
4134

Skill in identifying intelligence gaps and limitations.

Skill
4141

Skill in providing analysis on target-related matters (e.g., language, cultural, communications).

Skill
4148

Ability to review processed target language materials for accuracy and completeness.

Ability
4160

Skill in interpreting traceroute results, as they apply to network analysis and reconstruction.

Skill
4165

Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption).

Knowledge
4166

Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types.

Knowledge
4396

Knowledge of basic cloud-based technologies and concepts.

Knowledge
4421

Knowledge of Critical Intelligence Communication (CRITIC) identification and reporting process.

Knowledge
4423

Knowledge of cryptologic and SIGINT reporting and dissemination procedures.

Knowledge
4460

Knowledge of how and when to request assistance from the Cryptanalysis and Signals Analysis and/or CNO.

Knowledge
4470

Knowledge of intelligence sources and their characteristics.

Knowledge
4491

Knowledge of methods, tools, sources, and techniques used to research, integrate and summarize information pertaining to target.

Knowledge
4523

Knowledge of quality review process and procedures.

Knowledge
4570

Knowledge of the overall mission of the Cyber Mission Forces (CMF).

Knowledge
4578

Knowledge of the specific missions for CMF (i.e., Cyber Mission Teams (CMT), National Mission Teams (NMT), Combat Support Team (CST), National Support Team (NST), Cyber Protection Team (CPT).

Knowledge
4582

Knowledge of the U.S. SIGNIT System (USSS) authorities, responsibilities, and contributions to the cyberspace operations mission.

Knowledge
4612

Skill in conducting derivative classification IAW organization standards/Policy

Skill
4613

Skill in conducting quality review of serialized reports and reporting for time-sensitive USCYBERCOM operations.

Skill
4619

Skill in developing and maintaining target profiles.

Skill
4625

Skill in drafting serialized reports to support time-sensitive USCYBERCOM operations.

Skill
4626

Skill in drafting serialized reports to the quality level meeting release standards.

Skill
4629

Skill in executing post publication processes IAW organization standards/Policy

Skill
4651

Skill in providing feedback to enhance future collection and analysis.

Skill
4656

Skill in recognizing exploitation opportunities.

Skill
4657

Skill in recognizing targeting opportunities and essential information.

Skill
4662

Skill in releasing serialized and time-sensitive reports.

Skill
8010

Apply analytic techniques to validate information or data in reporting.

Task
8011

Apply and/or develop analytic techniques to provide better intelligence.

Task
8013

Apply customer requirements to the analysis process.

Task
8022

Assist in the mitigation of collection gaps.

Task
8023

Assist planners in the development of courses of action

Task
8038

Conduct pre and post publication actions

Task
8063

Develop analytical techniques to gain more target information.

Task
8065

Develop and maintain target profiles using appropriate corporate tools and databases (e.g. Target associations, activities, communication infrastructures, etc.).

Task
8081

Document and disseminate analytic findings.

Task
8090

Enable targeting offices to find new sources of collection.

Task
8100

Evaluate the strengths and weaknesses of the intelligence source.

Task
8101

Evaluate threat critical capabilities, requirements, and vulnerabilities.

Task
8108

Identify and facilitate partner relationships to enhance mission capabilities

Task
8128

Lead work role working groups/planning and development forums

Task
8137

Manipulate information in mission relevant databases (e.g., converting data, generating reports).

Task
8138

Mitigate collection gaps

Task
8145

Perform network analysis to support new or continued collection.

Task
8149

Perform quality review and provide feedback on the materials delivered on which analysis and reporting is conducted.

Task
8155

Prioritize reporting based on SIGINT reporting instructions or other mission reporting priorities.

Task
8157

Produce digital network intelligence against specific named target sets.

Task
8173

Provide intel target recommendations which meet leadership objectives.

Task
8176

Provide SME support for the development and implementation of exercises.

Task
8191

Select, build, and develop query strategies against appropriate collection databases.

Task
8203

Understand hacker TTPs and methodologies.

Task
8204

Understand network components and their functionality to enable analysis and target development.

Task
8205

Understand technologies used by a given target

Task
8213

Verify and validate that network graphics are accurate and comply with reporting policy.

Task
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
915

Knowledge of front-end collection systems, including traffic collection, filtering, and selection.

Knowledge

The TDNA conducts advanced analysis of collection and open-source data to ensure target continuity, profile…

Workforce Element:
Cyberspace Effects

Core KSATs:
KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1056

Knowledge of operations security.

Knowledge
2001

Accurately characterize targets.

Task
2059

Provide expertise to course of action development.

Task
2066

Provide expertise to the development of measures of effectiveness and measures of performance.

Task
2081

Classify documents in accordance with classification guidelines.

Task
2087

Collaborate with intelligence analysts/targeting organizations involved in related areas.

Task
2089

Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.

Task
2099

Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets.

Task
2101

Identify and conduct analysis of target communications to identify information essential to support operations.

Task
2134

Conduct target research and analysis.

Task
2195

Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology.

Task
2236

Determine if information meets reporting requirements.

Task
2243

Determine what technologies are used by a given target.

Task
2249

Develop all-source intelligence targeting materials.

Task
2251

Apply analytic techniques to gain more target information.

Task
2289

Develop measures of effectiveness and measures of performance.

Task
2356

Engage customers to understand customers’ intelligence needs and wants.

Task
2393

Generate and evaluate the effectiveness of network analysis strategies.

Task
2400

Examine intercept-related metadata and content with an understanding of targeting significance.

Task
2427

Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.)

Task
2429

Generate requests for information.

Task
2434

Identify threat tactics, and methodologies.

Task
244

Ability to determine the validity of technology trend data.

Ability
2441

Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.

Task
2453

Identify collection gaps and potential collection strategies against targets.

Task
2458

Identify critical target elements.

Task
2459

Identify intelligence gaps and shortfalls.

Task
2469

Identify network components and their functionality to enable analysis and target development.

Task
2515

Initiate requests to guide tasking and assist with collection management.

Task
2542

Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications.

Task
2568

Make recommendations to guide collection in support of customer requirements.

Task
2608

Monitor target networks to provide indications and warning of target communications changes or processing failures.

Task
2621

Provide SME and support to planning/developmental forums and working groups as appropriate.

Task
2628

Participate in exercises.

Task
2628A

Provide subject matter expertise to development of exercises.

Task
2639

Perform content and/or metadata analysis to meet organization objectives.

Task
2719

Profile targets and their activities.

Task
2749

Provide input for targeting effectiveness assessments for leadership acceptance.

Task
2770

Provide time sensitive targeting support.

Task
2779

Review appropriate information sources to determine validity and relevance of information gathered.

Task
2798

Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources.

Task
2818

Sanitize and minimize information to protect sources and methods.

Task
2840

Support identification and documentation of collateral effects.

Task
2893

Assess, document, and apply a target’s motivation and/or frame of reference to facilitate analysis, targeting and collection opportunities.

Task
2894

Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination.

Task
2897

Conduct analysis of target communications to identify essential information in support of organization objectives.

Task
2902

Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing.

Task
2905

Identify target communications within the global network.

Task
2906

Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis.

Task
2909

Provide feedback to collection managers to enhance future collection and analysis.

Task
2919

Perform social network analysis and document as appropriate.

Task
2922

Tip critical or time-sensitive information to appropriate customers.

Task
296

Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.

Knowledge
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3002

Ability to focus research efforts to meet the customer’s decision-making needs.

Ability
3020

Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information.

Ability
3021

Ability to collaborate effectively with others.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3039

Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Ability
3043

Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3047

Ability to function effectively in a dynamic, fast-paced environment.

Ability
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3052

Ability to identify intelligence gaps.

Ability
3073

Ability to recognize and mitigate cognitive biases which may affect analysis.

Ability
3074

Ability to recognize and mitigate deception in reporting and analysis.

Ability
3077

Ability to think critically.

Ability
3078

Knowledge of target methods and procedures.

Knowledge
3081

Ability to utilize multiple intelligence sources across all intelligence disciplines.

Ability
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3113

Knowledge of target intelligence gathering and operational preparation techniques and life cycles.

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3146

Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3158

Knowledge of cyber operation objectives, policies, and legalities.

Knowledge
3166

Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.

Knowledge
3172

Knowledge of collection sources including conventional and non-conventional sources.

Knowledge
3174

Knowledge of the intelligence requirements development and request for information processes.

Knowledge
3179

Knowledge of common networking devices and their configurations.

Knowledge
3181

Knowledge of common reporting databases and tools.

Knowledge
3219

Knowledge of cyber operations.

Knowledge
3237

Knowledge of denial and deception techniques.

Knowledge
3242

Knowledge of document classification procedures, policy, resources, and personnel.

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3281

Knowledge of governing authorities for targeting.

Knowledge
3288

Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless).

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3296

Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).

Knowledge
3298

Knowledge of how to extract, analyze, and use metadata.

Knowledge
3324

Knowledge of information and collateral intelligence sources.

Knowledge
3338

Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions.

Knowledge
3346

Knowledge of Internet and routing protocols.

Knowledge
3367

Knowledge of all applicable statutes, laws, regulations and policies governing cyber targeting and exploitation.

Knowledge
3368

Knowledge of legal considerations in targeting.

Knowledge
3382

Knowledge of methods to integrate and summarize information from any potential sources.

Knowledge
3386

Knowledge of midpoint collection (process, objectives, organization, targets, etc.).

Knowledge
3407

Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3418

Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors).

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3450

Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure.

Knowledge
3505

Knowledge of strategies and tools for target research.

Knowledge
3534

Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference.

Knowledge
3542

Knowledge of the basic structure, architecture, and design of converged applications.

Knowledge
3564

Knowledge of the data flow from collection origin to repositories and tools.

Knowledge
3582

Knowledge of the intelligence frameworks, processes, and related systems.

Knowledge
3587

Knowledge of targeting cycles.

Knowledge
3595

Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements.

Knowledge
3603

Knowledge of the principal methods, procedures, and techniques of gathering information and producing intelligence.

Knowledge
3608

Knowledge of the purpose and contribution of target templates.

Knowledge
3616

Knowledge of the structure, architecture, and design of modern digital and telephony networks.

Knowledge
3617

Knowledge of the structure, architecture, and design of modern wireless communications systems.

Knowledge
3626

Knowledge of the organization’s planning, operations and targeting cycles.

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3664

Skill in identifying how a target communicates.

Skill
3667

Skill in analyzing a target’s communication networks.

Skill
3678

Skill in analyzing traffic to identify network devices.

Skill
3689

Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses).

Skill
3692

Skill in assessing the applicability of available analytical tools to various situations.

Skill
3708

Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis.

Skill
3737

Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects.

Skill
3765

Skill in disseminating items of highest intelligence value in a timely manner.

Skill
3771

Skill in evaluating data sources for relevance, reliability, and objectivity.

Skill
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3773

Skill in evaluating information to recognize relevance, priority, etc.

Skill
3774

Skill in evaluating accesses for intelligence value.

Skill
3778

Skill in exploiting/querying organizational and/or partner collection databases.

Skill
3787

Skill in identifying a target’s communications networks.

Skill
3797

Skill in identifying leads for target development.

Skill
3803

Skill in identifying, locating, and tracking targets via geospatial analysis techniques

Skill
3812

Skill in interpreting metadata and content as applied by collection systems.

Skill
3822

Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results.

Skill
3828

Skill in navigating network visualization software.

Skill
3863

Skill in recognizing midpoint opportunities and essential information.

Skill
3864

Skill in recognizing relevance of information.

Skill
3865

Skill in recognizing significant changes in a target’s communication patterns.

Skill
3867A

Skill in recognizing technical information that may be used for target development including intelligence development.

Skill
3873

Skill in researching essential information.

Skill
3885

Skill in fusion analysis

Skill
3890

Skill in synthesizing, analyzing, and prioritizing meaning across data sets.

Skill
3908

Skill in using research methods including multiple, different sources to reconstruct a target network.

Skill
3915

Skill in using geospatial data and applying geospatial resources.

Skill
3923

Skill in using non-attributable networks.

Skill
3951

Skill in writing about facts and ideas in a clear, convincing, and organized manner.

Skill
4072

Knowledge of collection systems, capabilities, and processes.

Knowledge
4073

Knowledge of the feedback cycle in collection processes.

Knowledge
4078

Knowledge of target or threat cyber actors and procedures.

Knowledge
4079

Knowledge of basic cyber operations activity concepts (e.g., foot printing, scanning and enumeration, penetration testing, white/black listing).

Knowledge
4085

Knowledge of approved intelligence dissemination processes.

Knowledge
4086

Knowledge of relevant laws, regulations, and policies.

Knowledge
4088

Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure).

Knowledge
4089

Knowledge of target communication tools and techniques.

Knowledge
4090

Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes).

Knowledge
4094

Knowledge of networking and internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.).

Knowledge
4095

Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML).

Knowledge
4097

Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network.

Knowledge
4099

Knowledge of customer information needs.

Knowledge
4106

Knowledge of analytic tools and techniques.

Knowledge
4118

Skill in identifying a target’s network characteristics.

Skill
4121

Skill in assessing a target’s frame of reference (e.g., motivation, technical capability, organizational structure, sensitivities).

Skill
4123

Skill in conducting research using all available sources.

Skill
4125

Skill in complying with the legal restrictions for targeted information.

Skill
4128

Skill in developing intelligence reports.

Skill
4129

Skill in evaluating and interpreting metadata.

Skill
4134

Skill in identifying intelligence gaps and limitations.

Skill
4141

Skill in providing analysis on target-related matters (e.g., language, cultural, communications).

Skill
4160

Skill in interpreting traceroute results, as they apply to network analysis and reconstruction.

Skill
4165

Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption).

Knowledge
4166

Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types.

Knowledge
4223

Ability to contribute to the collection management process

Ability
4421

Knowledge of Critical Intelligence Communication (CRITIC) identification and reporting process.

Knowledge
4423

Knowledge of cryptologic and SIGINT reporting and dissemination procedures.

Knowledge
4428

Knowledge of cybersecurity concepts and principles.

Knowledge
4431

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
4460

Knowledge of how and when to request assistance from the Cryptanalysis and Signals Analysis and/or CNO.

Knowledge
4470

Knowledge of intelligence sources and their characteristics.

Knowledge
4490

Knowledge of methods, tools, sources, and techniques used to research, integrate and summarize all-source information pertaining to target.

Knowledge
4523

Knowledge of quality review process and procedures.

Knowledge
4533

Knowledge of SIGINT laws and directives.

Knowledge
4570

Knowledge of the overall mission of the Cyber Mission Forces (CMF).

Knowledge
4578

Knowledge of the specific missions for CMF (i.e., Cyber Mission Teams (CMT), National Mission Teams (NMT), Combat Support Team (CST), National Support Team (NST), Cyber Protection Team (CPT).

Knowledge
4582

Knowledge of the U.S. SIGNIT System (USSS) authorities, responsibilities, and contributions to the cyberspace operations mission.

Knowledge
4631

Skill in geolocating targets.

Skill
4643

Skill in operational use of raw collection databases.

Skill
4645

Skill in performing data fusion from all-source intelligence for geospatial analysis.

Skill
4651

Skill in providing feedback to enhance future collection and analysis.

Skill
4656

Skill in recognizing exploitation opportunities.

Skill
4659

Skill in recognizing the value of survey data.

Skill
4667

Skill in selector normalization.

Skill
4669

Skill in targeting (e.g., selectors).

Skill
8011

Apply and/or develop analytic techniques to provide better intelligence.

Task
8013

Apply customer requirements to the analysis process.

Task
8023

Assist planners in the development of courses of action

Task
8025

Be aware of hacker TTPs and methodologies.

Task
8063

Develop analytical techniques to gain more target information.

Task
8064

Develop and lead exercises

Task
8065

Develop and maintain target profiles using appropriate corporate tools and databases (e.g. Target associations, activities, communication infrastructures, etc.).

Task
8081

Document and disseminate analytic findings.

Task
8090

Enable targeting offices to find new sources of collection.

Task
8100

Evaluate the strengths and weaknesses of the intelligence source.

Task
8108

Identify and facilitate partner relationships to enhance mission capabilities

Task
8128

Lead work role working groups/planning and development forums

Task
8137

Manipulate information in mission relevant databases (e.g., converting data, generating reports).

Task
8138

Mitigate collection gaps

Task
8145

Perform network analysis to support new or continued collection.

Task
8157

Produce digital network intelligence against specific named target sets.

Task
8172

Provide input to training and mitigation plan based on advancements in hardware and software technologies (e.g. attend training or conferences, reading) and their potential implications.

Task
8173

Provide intel target recommendations which meet leadership objectives.

Task
8178

Provide time sensitive support to operations.

Task
8191

Select, build, and develop query strategies against appropriate collection databases.

Task
8205

Understand technologies used by a given target

Task
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
915

Knowledge of front-end collection systems, including traffic collection, filtering, and selection.

Knowledge

Provides technical support to customers who need assistance utilizing client level hardware and software in…

Workforce Element:
IT (Cyberspace)

Core KSATs:
KSAT ID Description KSAT
7A

Knowledge of successful capabilities to identify the solutions to less common and more complex system problems.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
33A

Knowledge of procedures used for documenting and querying reported incidents, problems, and events.

Knowledge
76

Knowledge of measures or indicators of system performance and availability.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
127

Knowledge of systems administration concepts.

Knowledge
142A

Knowledge of the operations and processes for incident, problem, and event management.

Knowledge
145A

Knowledge of IT system operation, maintenance, and security needed to keep equipment functioning properly.

Knowledge
165A

Skill in conducting research for troubleshooting novel client-level problems.

Skill
204

Skill in identifying possible causes of degradation of system performance or availability and initiating actions needed to mitigate this degradation.

Skill
221A

Skill in configuring and validating network workstations and peripherals in accordance with approved standards and/or specifications.

Skill
222B

Knowledge of the basic operation of computers.

Knowledge
235

Skill in using the appropriate tools for repairing software, hardware, and peripheral equipment of a system.

Skill
264A

Knowledge of basic physical computer components and architectures.

Knowledge
281

Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, electronic organizers, hard drives, memory cards, modems, network components, printers, removable storage devices, scanners, telephones, copiers, credit card skimmers, facsimile machines, global positioning systems [GPSs]).

Knowledge
554A

Diagnose and resolve customer reported system incidents, problems, and events.

Task
665A

Install and configure hardware, software, and peripheral equipment for system users in accordance with organizational standards.

Task
695A

Administer accounts, network rights, and access to systems and equipment.

Task
714A

Monitor and report client-level computer system performance.

Task
866

Troubleshoot system hardware and software.

Task
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6010

Ability to accurately define incidents, problems, and events in the trouble ticketing system.

Ability
6310

Knowledge of industry best practices for service desk.

Knowledge
6350

Knowledge of organizational security policies.

Knowledge
6400

Knowledge of remote access processes, tools, and capabilities related to customer support.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
1034A

Knowledge of Personally Identifiable Information (PII) data security standards.

Knowledge
1034B

Knowledge of Payment Card Industry (PCI) data security standards.

Knowledge
1034C

Knowledge of Personal Health Information (PHI) data security standards.

Knowledge
2016

Analyze incident data for emerging trends.

Task
2253

Develop and deliver technical training to educate others or meet customer needs.

Task
2549

Maintain incident tracking and solution database.

Task
6110

Ability to develop, update, and/or maintain standard operating procedures (SOPs).

Ability
639A

Make recommendations based on trend analysis for enhancements to software and hardware solutions to enhance customer experience.

Task
698A

Perform asset management/inventory of information technology (IT) resources.

Task
830A

Develop a trend analysis and impact report.

Task

Performs assessments of systems and networks within the NE or enclave and identifies where those…

Workforce Element:
Cybersecurity

Core KSATs:
KSAT ID Description KSAT
3B

Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks.

Skill
10A

Skill in conducting application vulnerability assessments.

Skill
10

Knowledge of application vulnerabilities.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
95B

Knowledge of penetration testing principles, tools, and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems).

Knowledge
105

Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
150

Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities.

Knowledge
225A

Skill in the use of penetration testing tools and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems).

Skill
411A

Analyze organization’s cybersecurity policies and configurations and evaluate compliance with regulations and organizational directives.

Task
685A

Maintain deployable cybersecurity audit toolkit (e.g., specialized cyber defense software and hardware) to support cybersecurity audit missions.

Task
692

Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.

Task
784

Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.

Task
922B

Skill in using network analysis tools, including specialized tools for non-traditional systems and networks (e.g., control systems), to identify vulnerabilities.​

Skill
940B

Perform technical (evaluation of technology) and non-technical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, control system and operational environments, enclave boundary, supporting infrastructure, and applications).

Task
1072

Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs:
KSAT ID Description KSAT
102

Knowledge of programming language structures and logic.

Knowledge
102A

Ability to apply programming language structures (e.g., source code review) and logic.

Ability
1033

Knowledge of basic system administration, network, and operating system hardening techniques.

Knowledge
1038A

Knowledge of infrastructure supporting information technology (IT) for safety, performance, and reliability.

Knowledge
1069

Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation or privileges, maintaining access, network exploitation, covering tracks).

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
1142

Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).

Knowledge
128

Knowledge of systems diagnostic tools and fault identification techniques.

Knowledge
160

Skill in assessing the robustness of security systems and designs.

Skill
181A

Skill in detecting host and network based intrusions via intrusion detection technologies.

Skill
210

Skill in mimicking threat behaviors.

Skill
214B

Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).

Knowledge
226

Skill in the use of social engineering techniques.

Skill
27

Knowledge of cryptography and cryptographic key management concepts.

Knowledge
27B

Skill in assessing the application of cryptographic standards.

Skill
29

Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools.

Knowledge
3150

Knowledge of ethical hacking principles and techniques.

Knowledge
3222

Knowledge of data backup and restoration concepts.

Knowledge
3513

Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems.

Knowledge
4

Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.

Ability
448

Conduct and/or support authorized penetration testing on enterprise network assets.

Task
49

Knowledge of host/network access control mechanisms (e.g., access control list).

Knowledge
6210

Knowledge of cloud service models and possible limitations for an incident response.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
6660

Skill in reviewing logs to identify evidence of past intrusions.

Skill
6918

Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.

Ability
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
801B

Knowledge of threat and risk assessment.

Knowledge
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
897A

Skill in performing impact/risk assessments.

Skill
904

Knowledge of interpreted and compiled computer languages.

Knowledge
939

Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews [TSCM], TEMPEST countermeasure reviews).

Task
941A

Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes).

Task
991

Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution).

Knowledge
992B

Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).

Knowledge
992C

Knowledge of threat environments (e.g., first generation threat actors, threat activities).

Knowledge