Conducts access collection, processing, and/or geolocation of wired or wireless computer and digital networks in…
KSAT ID | Description | KSAT |
---|---|---|
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
912 | Knowledge of collection management processes, capabilities, and limitations. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2020A | Analyze target operational architecture for ways to gain access. |
Task |
2105 | Conduct access enabling of wireless computer and digital networks. |
Task |
2106 | Conduct collection and processing of wireless computer and digital networks. |
Task |
2109 | Conduct exploitation of wireless computer and digital networks. |
Task |
2119 | Conduct network scouting and vulnerability analyses of systems within a network. |
Task |
2123 | Conduct on-net and off-net activities to control, and exfiltrate data from deployed, automated technologies. |
Task |
2124 | Conduct open source data collection via various online tools. |
Task |
2133 | Conduct survey of computer and digital networks. |
Task |
2205 | Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers). |
Task |
2408 | Exploit network devices, security devices, and/or terminals or environments using various methods or tools. |
Task |
2412 | Facilitate access enabling by physical and/or wireless means. |
Task |
2477 | Identify potential points of strength and vulnerability within a network. |
Task |
2612 | Operate and maintain automated systems for gaining and maintaining access to target systems. |
Task |
3059 | Ability to interpret and translate customer requirements into operational action. |
Ability |
3130 | Knowledge of auditing and logging procedures (including server-based logging). |
Knowledge |
3140 | Knowledge of basic programming concepts (e.g., levels, structures, compiled vs. interpreted languages). |
Knowledge |
3144 | Knowledge of basic wireless applications, including vulnerabilities in various types of wireless applications. |
Knowledge |
3206 | Knowledge of current software and methodologies for active defense and system hardening. |
Knowledge |
3253 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
Knowledge |
3254 | Knowledge of encryption algorithms and tools for WLANs. |
Knowledge |
3261 | Knowledge of evasion strategies and techniques. |
Knowledge |
3267 | Knowledge of deconfliction reporting to include external organization interaction. |
Knowledge |
3270 | Knowledge of forensic implications of operating system structure and operations. |
Knowledge |
3280 | Knowledge of Global Systems for Mobile Communications (GSM) architecture. |
Knowledge |
3286 | Knowledge of host-based security products and how they affect exploitation and vulnerability. |
Knowledge |
3317 | Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP. |
Knowledge |
3374 | Knowledge of malware. |
Knowledge |
3399 | Knowledge of network administration. |
Knowledge |
3402 | Knowledge of network construction and topology. |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3473 | Knowledge of satellite-based communication systems. |
Knowledge |
3479 | Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation. |
Knowledge |
3480 | Knowledge of security implications of software configurations. |
Knowledge |
3508 | Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network). |
Knowledge |
3513 | Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems. |
Knowledge |
3543 | Knowledge of the basic structure, architecture, and design of modern communication networks. |
Knowledge |
3561 | Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
Knowledge |
3579 | Knowledge of the fundamentals of digital forensics in order to extract actionable intelligence. |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3637 | Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications). |
Knowledge |
3644 | Knowledge of virtual machine technologies. |
Knowledge |
3658 | Knowledge of network collection procedures to include decryption capabilities/tools, techniques, and procedures. |
Knowledge |
3658B | Ability to perform network collection tactics, techniques, and procedures to include decryption capabilities/tools. |
Ability |
3658A | Ability to perform wireless collection procedures to include decryption capabilities/tools. |
Ability |
3670 | Skill in analyzing terminal or environment collection data. |
Skill |
3677 | Skill in analyzing target communications internals and externals collected from wireless LANs. |
Skill |
3690 | Skill in assessing current tools to identify needed improvements. |
Skill |
3740 | Skill in determining installed patches on various operating systems and identifying patch signatures. |
Skill |
3779 | Skill in extracting information from packet captures. |
Skill |
3801 | Skill in identifying the devices that work at each level of protocol models. |
Skill |
3815 | Skill in interpreting vulnerability scanner results to identify vulnerabilities. |
Skill |
3817 | Skill in knowledge management, including technical documentation techniques (e.g., Wiki page). |
Skill |
3848 | Skill in processing collected data for follow-on analysis. |
Skill |
3871 | Skill in remote command line and Graphic User Interface (GUI) tool usage. |
Skill |
3889 | Skill in survey, collection, and analysis of wireless LAN metadata. |
Skill |
3929A | Skill in using tools, techniques, and procedures to exploit a target. |
Skill |
3948 | Skill in verifying the integrity of all files. |
Skill |
3949 | Skill in wireless network target analysis, templating, and geolocation. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
2088 | Collaborate with development organizations to create and deploy the tools needed to achieve objectives. |
Task |
2294 | Develop new techniques for gaining and keeping access to target systems. |
Task |
2708 | Process exfiltrated data for analysis and/or dissemination to customers. |
Task |
2762 | Provide real-time actionable geolocation information. |
Task |
2846 | Test and evaluate locally developed tools for operational use. |
Task |
3141 | Knowledge of basic software applications (e.g., data storage and backup, database applications) and their vulnerabilities. |
Knowledge |
3155 | Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3883 | Skill in server administration. |
Skill |
3899 | Skill in testing and evaluating tools for implementation. |
Skill |
3931 | Skill in using various open source data collection tools (online trade, DNS, mail, etc.). |
Skill |
Facilitates AI adoption by supporting the users of AI-enabled solutions.
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
466A | Consult with customers and key stakeholders to evaluate functional requirements for AI and data applications. |
Task |
479A | Correlates training and learning to business or mission requirements. |
Task |
538 | Develop new or identify existing awareness and training materials that are appropriate for intended audiences. |
Task |
918 | Ability to prepare and deliver education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures. |
Ability |
1000B | Ensure that AI design and development activities are properly documented and updated. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
5380 | Gather feedback on customer satisfaction and internal service performance to foster continual improvement. |
Task |
5430 | Present technical information to technical and non-technical audiences. |
Task |
5843 | Analyze national security/DoD mission priorities and gaps suitable for the application of AI solutions. |
Task |
5861 | Coordinate with change management employees to plan, foster, and track change. |
Task |
5891 | Identify viable AI projects based on organizational needs. |
Task |
5892 | Identify ways to lead and motivate people to adopt AI solutions through cultural, organizational, or other types of change. |
Task |
5896 | Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI. |
Task |
5909 | Promote awareness of AI limitations and benefits. |
Task |
5918 | Support an AI adoption strategy that aligns with the organization’s vision, mission, and goals. |
Task |
5921 | Test how users interact with AI solutions. |
Task |
6311 | Knowledge of machine learning theory and principles. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6915A | Skill in communicating with all levels of the organization, including senior/mid-level executives, and operational-level personnel (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience). |
Skill |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7001 | Ability to inspire and lead a culture of innovation. |
Ability |
7003 | Knowledge of AI security risks, threats, and vulnerabilities and potential risk mitigation solutions. |
Knowledge |
7008 | Knowledge of change models and frameworks. |
Knowledge |
7020 | Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable). |
Knowledge |
7021 | Knowledge of emerging trends and future use cases of AI. |
Knowledge |
7024 | Knowledge of how AI is developed and operated. |
Knowledge |
7027 | Knowledge of how humans interact with and/or are impacted by AI solutions within the DoD context. |
Knowledge |
7031 | Knowledge of how to structure and display data. |
Knowledge |
7032 | Knowledge of how to use data to tell a story. |
Knowledge |
7033 | Knowledge of human factor engineering. |
Knowledge |
7037 | Knowledge of machine learning operations (MLOps) processes and best practices. |
Knowledge |
7045 | Knowledge of the AI lifecycle. |
Knowledge |
7046 | Knowledge of the basic requirements for the successful delivery of AI solutions. |
Knowledge |
7047 | Knowledge of the basics of customer experience, customer design, psychology of customer decision-making, and human-computer interaction. |
Knowledge |
7048 | Knowledge of the benefits and limitations of AI capabilities. |
Knowledge |
7051 | Knowledge of the possible impacts of machine learning blind spots and edge cases. |
Knowledge |
7053 | Knowledge of the user experience (e.g., decision making, user design, and human-computer interaction) as it relates to AI systems. |
Knowledge |
7058 | Skill in communicating AI and/or machine learning solutions to a wide range of audiences. |
Skill |
7065 | Skill in explaining AI concepts and terminology. |
Skill |
7072 | Skill in leading AI adoption efforts. |
Skill |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
5861 | Coordinate with change management employees to plan, foster, and track change. |
Task |
5880 | Engage and collaborate with allies and partners to advance shared strategic AI objectives. |
Task |
5925 | Use knowledge of business processes to create or recommend AI solutions. |
Task |
6380 | Knowledge of principles and processes for conducting training and education needs assessment. |
Knowledge |
7013 | Knowledge of customer mission priorities and capabilities, as related to the integration and adoption of AI solutions. |
Knowledge |
7033 | Knowledge of human factor engineering. |
Knowledge |
7036 | Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government. |
Knowledge |
7041 | Knowledge of remedies against unintended bias in AI solutions. |
Knowledge |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Builds the organization’s AI vision and plan and leads policy and doctrine formation including how…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
391A | Acquire and manage the necessary resources, including leadership support, financial resources, infrastructure, and key personnel, to support AI innovation adoption goals and objectives. |
Task |
395A | Advise senior management on risk levels, security posture, and necessary changes to existing AI policies. |
Task |
492B | Design and integrate an AI adoption strategy that supports the organization’s vision, mission, and goals. |
Task |
524 | Develop and maintain strategic plans. |
Task |
629B | Identify and address AI workforce planning and management issues (e.g., recruitment, retention, and training). |
Task |
680B | Oversee AI budget, staffing, and contracting decisions. |
Task |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2416 | Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives. |
Task |
2558 | Maintain relationships with internal and external partners involved in cyber planning or related areas. |
Task |
2624A | Conduct long-range, strategic planning efforts with internal and external partners to support AI capability development and use. |
Task |
3591 | Knowledge of organization objectives, leadership priorities, and decision-making risks. |
Knowledge |
5843 | Analyze national security/DoD mission priorities and gaps suitable for the application of AI solutions. |
Task |
5845 | Appoint and guide a multidisciplinary team of AI experts to identify and assess risk throughout the AI development lifecycle. |
Task |
5849 | Assess value of implemented AI projects based on organizational metrics. |
Task |
5862 | Create and/or maintain governance structure for oversight and accountability of AI solutions. |
Task |
5879 | Direct and/or support organizational and project-level AI risk management activities. |
Task |
5880 | Engage and collaborate with allies and partners to advance shared strategic AI objectives. |
Task |
5882 | Establish and/or maintain processes to ensure Responsible AI practices are reflected in an organization’s approach to AI acquisition, development, and deployment. |
Task |
5883 | Evaluate and develop AI workforce structure resources and requirements. |
Task |
5887 | Identify and address key roadblocks to AI implementation. |
Task |
5891 | Identify viable AI projects based on organizational needs. |
Task |
5892 | Identify ways to lead and motivate people to adopt AI solutions through cultural, organizational, or other types of change. |
Task |
5896 | Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI. |
Task |
5909 | Promote awareness of AI limitations and benefits. |
Task |
5913 | Remove barriers to data acquisition, collection, and curation efforts required for AI solutions. |
Task |
6040 | Ability to assess and forecast manpower requirements to meet organizational objectives. |
Ability |
6250 | Knowledge of Workforce Framework, work roles, and associated tasks, knowledge, skills, and abilities. |
Knowledge |
6311 | Knowledge of machine learning theory and principles. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6915A | Skill in communicating with all levels of the organization, including senior/mid-level executives, and operational-level personnel (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience). |
Skill |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7000 | Ability to identify, connect, and influence key stakeholders to speed AI adoption. |
Ability |
7001 | Ability to inspire and lead a culture of innovation. |
Ability |
7003 | Knowledge of AI security risks, threats, and vulnerabilities and potential risk mitigation solutions. |
Knowledge |
7007 | Knowledge of best practices in organizational conflict management. |
Knowledge |
7014 | Knowledge of data acquisition, collection, and curation best practices required for AI solutions. |
Knowledge |
7020 | Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable). |
Knowledge |
7021 | Knowledge of emerging trends and future use cases of AI. |
Knowledge |
7024 | Knowledge of how AI is developed and operated. |
Knowledge |
7034 | Knowledge of interactions and integration of DataOps, MLOps, and DevSecOps in AI. |
Knowledge |
7042 | Knowledge of resources and capabilities required to complete AI projects. |
Knowledge |
7043 | Knowledge of staffing, contracting, and budgetary requirements to run an AI-enabled organization. |
Knowledge |
7045 | Knowledge of the AI lifecycle. |
Knowledge |
7046 | Knowledge of the basic requirements for the successful delivery of AI solutions. |
Knowledge |
7048 | Knowledge of the benefits and limitations of AI capabilities. |
Knowledge |
7050 | Knowledge of the nature and function of technology platforms and tools used to create and employ AI. |
Knowledge |
7058 | Skill in communicating AI and/or machine learning solutions to a wide range of audiences. |
Skill |
7061 | Skill in developing and influencing policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational AI activities. |
Skill |
7065 | Skill in explaining AI concepts and terminology. |
Skill |
7068 | Skill in identifying organizational and project-level AI risks, including AI security risks and requirements. |
Skill |
7072 | Skill in leading AI adoption efforts. |
Skill |
7073 | Skill in leveraging and optimizing resources required to complete AI projects and programs. |
Skill |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
3146 | Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3356 | Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations. |
Knowledge |
5330A | Establish and collect metrics to monitor and validate AI workforce readiness. |
Task |
5868 | Define and/or implement policies and procedures to enable an AI risk assessment process and assess risk mitigation efforts. |
Task |
5902 | Monitor and evaluate the organization’s use of AI to ensure capabilities are performing as intended and to reduce the likelihood and severity of unintended consequences. |
Task |
5912 | Recommend updates to military strategy and doctrine with respect to advances in AI technology, legal obligations, Responsible AI, and DoD AI Ethical Principles. |
Task |
6290 | Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems. |
Knowledge |
7005 | Knowledge of AI-specific acquisition models (e.g., pay per use or per data element). |
Knowledge |
7036 | Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government. |
Knowledge |
7038 | Knowledge of metrics to evaluate the effectiveness of machine learning models. |
Knowledge |
7039 | Knowledge of organization’s structure, training requirements, and existing operational hardware/software related to the AI solution to be adopted. |
Knowledge |
7041 | Knowledge of remedies against unintended bias in AI solutions. |
Knowledge |
7051 | Knowledge of the possible impacts of machine learning blind spots and edge cases. |
Knowledge |
Educates those involved in the development of AI and conducts assessments on the technical and…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
537A | Develop methods to monitor and measure risk and assurance efforts on a continuous basis. |
Task |
765B | Perform AI architecture security reviews, identify gaps, and develop a risk management plan to address issues. |
Task |
952 | Knowledge of emerging security issues, risks, and vulnerabilities. |
Knowledge |
963A | Ensure risk mitigation plans of action and milestones are in place. |
Task |
1000B | Ensure that AI design and development activities are properly documented and updated. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5854 | Collaborate with appropriate personnel to address Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data resusability concerns for AI solutions. |
Task |
5856 | Communicate the results of AI risk assessments to relevant stakeholders. |
Task |
5860 | Coordinate with appropriate personnel to identify methods for users and developers to report concerns about the implementation of DoD AI Ethical Principles. |
Task |
5863 | Create and/or maintain processes to ensure data management efforts comply with AI ethical principles. |
Task |
5873 | Determine methods and metrics for quantitative and qualitative measurement of AI risks so that sensitivity, specificity, likelihood, confidence levels, and other metrics are identified, documented, and applied. |
Task |
5878 | Develop risk mitigation strategies to ensure enumerated risks are prioritized, mitigated, shared, transferred, and/or accepted. |
TAsk |
5879 | Direct and/or support organizational and project-level AI risk management activities. |
Task |
5881 | Ensure risk management responsibilities are clearly defined, assigned, and communicated to relevant stakeholders. |
Task |
5889 | Identify and submit exemplary AI use cases, best practices, failure modes, and risk mitigation strategies, including after-action reports. |
Task |
5893 | Implement Responsible AI best practices and standards within AI solutions according to the DoD AI Ethical Principles, Responsible AI Guidelines, and/or any other pertinent laws. |
Task |
5896 | Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI. |
Task |
5900 | Measure the compliance of AI tools with DoD AI Ethical Principles. |
Task |
5904 | Perform risk assessment on AI applications to identify technical, societal, organizational, and mission risks. |
Task |
6311 | Knowledge of machine learning theory and principles. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7003 | Knowledge of AI security risks, threats, and vulnerabilities and potential risk mitigation solutions. |
Knowledge |
7020 | Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable). |
Knowledge |
7021 | Knowledge of emerging trends and future use cases of AI. |
Knowledge |
7024 | Knowledge of how AI is developed and operated. |
Knowledge |
7034 | Knowledge of interactions and integration of DataOps, MLOps, and DevSecOps in AI. |
Knowledge |
7036 | Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government. |
Knowledge |
7038 | Knowledge of metrics to evaluate the effectiveness of machine learning models. |
Knowledge |
7040 | Knowledge of Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data reusability considerations for AI solutions. |
Knowledge |
7041 | Knowledge of remedies against unintended bias in AI solutions. |
Knowledge |
7045 | Knowledge of the AI lifecycle. |
Knowledge |
7048 | Knowledge of the benefits and limitations of AI capabilities. |
Knowledge |
7051 | Knowledge of the possible impacts of machine learning blind spots and edge cases. |
Knowledge |
7052 | Knowledge of the principles, methods, and tools used for risk and bias assessment and mitigation, including assessment of failures and their consequences. |
Knowledge |
7056 | Skill in assessing AI capabilities for bias or ethical concerns. |
Skill |
7064 | Skill in developing solutions and/or recommendations to minimize negative impacts of machine learning, especially for edge cases. |
Skill |
7065 | Skill in explaining AI concepts and terminology. |
Skill |
7067 | Skill in identifying low-probability, high-impact risks in machine learning training data sets. |
Skill |
7068 | Skill in identifying organizational and project-level AI risks, including AI security risks and requirements. |
Skill |
7069 | Skill in identifying risk over the lifespan of an AI solution. |
Skill |
7075 | Skill in testing and evaluating machine learning algorithms or AI solutions. |
Skill |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
5905 | Perform risk assessment whenever an AI application or AI-enabled system undergoes a major change, when emergent behaviors are detected, and/or unintended consequences are reported. |
Task |
7044 | Knowledge of testing, evaluation, validation, and verification (T&E V&V) tools and procedures to ensure systems are working as intended. |
Knowledge |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Performs testing, evaluation, verification, and validation on AI solutions to ensure they are developed to…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
182 | Skill in determining an appropriate level of test rigor for a given system. |
Skill |
508 | Determine level of assurance of developed capabilities based on test results. |
Task |
550 | Develop test plans to address specifications and requirements. |
Task |
694 | Make recommendations based on test results. |
Task |
858A | Test, evaluate, and verify hardware and/or software to determine compliance with defined specifications and requirements. |
Task |
858B | Record and manage test data. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5120 | Conduct hypothesis testing using statistical processes. |
Task |
5848 | Assess technical risks and limitations of planned tests on AI systems. |
Task |
5851 | Build assurance cases for AI systems that support the needs of different stakeholders (e.g., acquisition community, commanders, and operators). |
Task |
5858 | Conduct AI risk assessments to ensure models and/or other solutions are performing as designed. |
Task |
5866 | Create or customize existing Test and Evaluation Master Plans (TEMPs) for AI systems. |
Task |
5873 | Determine methods and metrics for quantitative and qualitative measurement of AI risks so that sensitivity, specificity, likelihood, confidence levels, and other metrics are identified, documented, and applied. |
Task |
5876 | Develop machine learning code testing and validation procedures. |
Task |
5877 | Develop possible solutions for technical risks and limitations of planned tests on AI solutions. |
Task |
5896 | Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI. |
Task |
5901 | Measure the effectiveness, security, robustness, and trustworthiness of AI tools. |
Task |
5910 | Provide quality assurance of AI products throughout their lifecycle. |
Task |
5914 | Report test and evaluation deficiencies and possible solutions to appropriate personnel. |
Task |
5916 | Select and use the appropriate models and prediction methods for evaluating AI performance. |
Task |
5919 | Test AI tools against adversarial attacks in operationally realistic environments. |
Task |
5920 | Test components to ensure they work as intended in a variety of scenarios for all aspects of the AI application. |
Task |
5921 | Test how users interact with AI solutions. |
Task |
5922 | Test the reliability, functionality, security, and compatibility of AI tools within systems. |
Task |
5923 | Test the trustworthiness of AI solutions. |
Task |
5926 | Use models and other methods for evaluating AI performance. |
Task |
6060 | Ability to collect, verify, and validate test data. |
Ability |
6170 | Ability to translate data and test results into evaluative conclusions. |
Ability |
6311 | Knowledge of machine learning theory and principles. |
Knowledge |
6490 | Skill in assessing the predictive power and subsequent generalizability of a model. |
Skill |
6630 | Skill in preparing Test & Evaluation reports. |
Skill |
6641 | Skill in providing Test & Evaluation resource estimate. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7003 | Knowledge of AI security risks, threats, and vulnerabilities and potential risk mitigation solutions. |
Knowledge |
7004 | Knowledge of AI Test & Evaluation frameworks. |
Knowledge |
7006 | Knowledge of best practices from industry and academia in test design activities for verification and validation of AI and machine learning systems. |
Knowledge |
7009 | Knowledge of coding and scripting in languages that support AI development and use. |
Knowledge |
7020 | Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable). |
Knowledge |
7024 | Knowledge of how AI is developed and operated. |
Knowledge |
7025 | Knowledge of how AI solutions integrate with cloud or other IT infrastructure. |
Knowledge |
7028 | Knowledge of how to automate development, testing, security, and deployment of AI/machine learning-enabled software to the DoD. |
Knowledge |
7029 | Knowledge of how to collect, store, and monitor data. |
Knowledge |
7030 | Knowledge of how to deploy test infrastructures with AI systems. |
Knowledge |
7034 | Knowledge of interactions and integration of DataOps, MLOps, and DevSecOps in AI. |
Knowledge |
7036 | Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government. |
Knowledge |
7037 | Knowledge of machine learning operations (MLOps) processes and best practices. |
Knowledge |
7038 | Knowledge of metrics to evaluate the effectiveness of machine learning models. |
Knowledge |
7041 | Knowledge of remedies against unintended bias in AI solutions. |
Knowledge |
7044 | Knowledge of testing, evaluation, validation, and verification (T&E V&V) tools and procedures to ensure systems are working as intended. |
Knowledge |
7045 | Knowledge of the AI lifecycle. |
Knowledge |
7048 | Knowledge of the benefits and limitations of AI capabilities. |
Knowledge |
7051 | Knowledge of the possible impacts of machine learning blind spots and edge cases. |
Knowledge |
7053 | Knowledge of the user experience (e.g., decision making, user design, and human-computer interaction) as it relates to AI systems. |
Knowledge |
7054 | Knowledge of tools for testing the robustness and resilience of AI products and solutions. |
Knowledge |
7065 | Skill in explaining AI concepts and terminology. |
Skill |
7067 | Skill in identifying low-probability, high-impact risks in machine learning training data sets. |
Skill |
7069 | Skill in identifying risk over the lifespan of an AI solution. |
Skill |
7070 | Skill in integrating AI Test & Evaluation frameworks into test strategies for specific projects. |
Skill |
7075 | Skill in testing and evaluating machine learning algorithms or AI solutions. |
Skill |
7076 | Skill in testing for bias in data sets and AI system outputs as well as determining historically or often underrepresented and marginalized groups are properly represented in the training, testing, and validation data sets and AI system outputs. |
Skill |
7077 | Skill in translating operation requirements for AI systems into testing requirements. |
Skill |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
5850 | Assist integrated project teams to identify, curate, and manage data. |
Task |
5889 | Identify and submit exemplary AI use cases, best practices, failure modes, and risk mitigation strategies, including after-action reports. |
Task |
7012 | Knowledge of current test standards and safety standards that are applicable to AI (e.g. MIL-STD 882E, DO-178C, ISO26262). |
Knowledge |
7040 | Knowledge of Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data reusability considerations for AI solutions. |
Knowledge |
765B | Perform AI architecture security reviews, identify gaps, and develop a risk management plan to address issues. |
Task |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Designs, develops, and modifies AI applications, tools, and/or other solutions to enable successful accomplishment of…
KSAT ID | Description | KSAT |
---|---|---|
21 | Knowledge of computer algorithms. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
75A | Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis. |
Knowledge |
102 | Knowledge of programming language structures and logic. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
166 | Skill in conducting queries and developing algorithms to analyze data structures. |
Skill |
477 | Correct errors by making appropriate changes and rechecking the program to ensure desired results are produced. |
Task |
506 | Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design. |
Task |
543 | Develop secure code and error handling. |
Task |
764 | Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities. |
Task |
1000B | Ensure that AI design and development activities are properly documented and updated. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5120 | Conduct hypothesis testing using statistical processes. |
Task |
5847 | Assess and address the limitations of methods to deliver machine learning models. |
Task |
5858 | Conduct AI risk assessments to ensure models and/or other solutions are performing as designed. |
Task |
5871 | Design and develop machine learning models to achieve organizational objectives. |
Task |
5872 | Design, develop, and implement AI tools and techniques to achieve organizational objectives. |
Task |
5873 | Determine methods and metrics for quantitative and qualitative measurement of AI risks so that sensitivity, specificity, likelihood, confidence levels, and other metrics are identified, documented, and applied. |
Task |
5896 | Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI. |
Task |
5915 | Research the latest machine learning and AI tools, techniques, and best practices. |
Task |
5926 | Use models and other methods for evaluating AI performance. |
Task |
5927 | Write and document reproducible code. |
Task |
6060 | Ability to collect, verify, and validate test data. |
Ability |
6311 | Knowledge of machine learning theory and principles. |
Knowledge |
6760 | Skill in writing scripts using R, Python, PIG, HIVE, SQL, etc. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7009 | Knowledge of coding and scripting in languages that support AI development and use. |
Knowledge |
7011 | Knowledge of current AI and machine learning systems design and performance analysis models, algorithms, and tools. |
Knowledge |
7020 | Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable). |
Knowledge |
7024 | Knowledge of how AI is developed and operated. |
Knowledge |
7028 | Knowledge of how to automate development, testing, security, and deployment of AI/machine learning-enabled software to the DoD. |
Knowledge |
7029 | Knowledge of how to collect, store, and monitor data. |
Knowledge |
7031 | Knowledge of how to structure and display data. |
Knowledge |
7032 | Knowledge of how to use data to tell a story. |
Knowledge |
7037 | Knowledge of machine learning operations (MLOps) processes and best practices. |
Knowledge |
7038 | Knowledge of metrics to evaluate the effectiveness of machine learning models. |
Knowledge |
7045 | Knowledge of the AI lifecycle. |
Knowledge |
7046 | Knowledge of the basic requirements for the successful delivery of AI solutions. |
Knowledge |
7048 | Knowledge of the benefits and limitations of AI capabilities. |
Knowledge |
7049 | Knowledge of the latest machine learning and AI tools, techniques, and best practices. |
Knowledge |
7050 | Knowledge of the nature and function of technology platforms and tools used to create and employ AI. |
Knowledge |
7051 | Knowledge of the possible impacts of machine learning blind spots and edge cases. |
Knowledge |
7055 | Skill in analyzing the output from machine learning models. |
Skill |
7057 | Skill in building and deploying machine learning models. |
Skill |
7059 | Skill in creating machine learning models. |
Skill |
7065 | Skill in explaining AI concepts and terminology. |
Skill |
7067 | Skill in identifying low-probability, high-impact risks in machine learning training data sets. |
Skill |
7075 | Skill in testing and evaluating machine learning algorithms or AI solutions. |
Skill |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
5854 | Collaborate with appropriate personnel to address Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data resusability concerns for AI solutions. |
Task |
5859 | Consider energy implications (graphical processing unit, tensor processing unit, etc.) when designing AI solutions. |
Task |
5870 | Design and develop continuous integration/continuous delivery (CI/CD) in a containerized or other reproducible computing environment to support the machine learning life cycle. |
Task |
5889 | Identify and submit exemplary AI use cases, best practices, failure modes, and risk mitigation strategies, including after-action reports. |
Task |
5893 | Implement Responsible AI best practices and standards within AI solutions according to the DoD AI Ethical Principles, Responsible AI Guidelines, and/or any other pertinent laws. |
Task |
5925 | Use knowledge of business processes to create or recommend AI solutions. |
Task |
6290 | Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems. |
Knowledge |
7003 | Knowledge of AI security risks, threats, and vulnerabilities and potential risk mitigation solutions. |
Knowledge |
7021 | Knowledge of emerging trends and future use cases of AI. |
Knowledge |
7022 | Knowledge of how AI adoption can assist developers with service-oriented design. |
Knowledge |
7025 | Knowledge of how AI solutions integrate with cloud or other IT infrastructure. |
Knowledge |
7026 | Knowledge of how commercial and federal solutions solve Defense-related data environment and platform challenges. |
Knowledge |
7036 | Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government. |
Knowledge |
7040 | Knowledge of Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data reusability considerations for AI solutions. |
Knowledge |
7041 | Knowledge of remedies against unintended bias in AI solutions. |
Knowledge |
7044 | Knowledge of testing, evaluation, validation, and verification (T&E V&V) tools and procedures to ensure systems are working as intended. |
Knowledge |
7069 | Skill in identifying risk over the lifespan of an AI solution. |
Skill |
7071 | Skill in labeling data to make it more discoverable and understandable. |
Skill |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
87 | Knowledge of network traffic analysis methods. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2028 | Answer requests for information. |
Task |
2060A | Maintain a common intelligence picture. |
Task |
2075 | Brief threat and/or target current situations. |
Task |
2115 | Conduct in-depth research and analysis. |
Task |
2429 | Generate requests for information. |
Task |
2434 | Identify threat tactics, and methodologies. |
Task |
2603 | Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements. |
Task |
2771 | Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3002 | Ability to focus research efforts to meet the customer’s decision-making needs. |
Ability |
3019 | Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3041 | Ability to effectively collaborate via virtual teams. |
Ability |
3042 | Ability to evaluate information for reliability, validity, and relevance. |
Ability |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3047 | Ability to function effectively in a dynamic, fast-paced environment. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3052 | Ability to identify intelligence gaps. |
Ability |
3073 | Ability to recognize and mitigate cognitive biases which may affect analysis. |
Ability |
3077 | Ability to think critically. |
Ability |
3081 | Ability to utilize multiple intelligence sources across all intelligence disciplines. |
Ability |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3107 | Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.). |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3177 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3274 | Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects. |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3335 | Knowledge of intelligence disciplines. |
Knowledge |
3342 | Knowledge of intelligence support to planning, execution, and assessment. |
Knowledge |
3374 | Knowledge of malware. |
Knowledge |
3431 | Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3539 | Knowledge of telecommunications fundamentals. |
Knowledge |
3543 | Knowledge of the basic structure, architecture, and design of modern communication networks. |
Knowledge |
3545 | Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3561 | Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
Knowledge |
3582 | Knowledge of the intelligence frameworks, processes, and related systems. |
Knowledge |
3584 | Knowledge of intelligence preparation of the environment and similar processes. |
Knowledge |
3630 | Knowledge of the ways in which targets or threats use the Internet. |
Knowledge |
3651 | Knowledge of what constitutes a “threat” to a network. |
Knowledge |
3659 | Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3794 | Skill in identifying cyber threats which may jeopardize organization and/or partner interests. |
Skill |
3844 | Skill in preparing and presenting briefings. |
Skill |
3851 | Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships. |
Skill |
3876 | Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources. |
Skill |
3910 | Skill in using Boolean operators to construct simple and complex queries. |
Skill |
3920 | Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.). |
Skill |
3921 | Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches. |
Skill |
3938 | Skill in utilizing feedback in order to improve processes, products, and services. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
2059 | Provide expertise to course of action development. |
Task |
2060 | Provide subject matter expertise to the development of a common operational picture. |
Task |
2061 | Provide subject matter expertise to the development of cyber operations specific indicators. |
Task |
2063 | Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. |
Task |
2068 | Assist in the identification of intelligence collection shortfalls. |
Task |
2087 | Collaborate with intelligence analysts/targeting organizations involved in related areas. |
Task |
2121 | Conduct nodal analysis. |
Task |
2195 | Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology. |
Task |
2288 | Develop information requirements necessary for answering priority information requests. |
Task |
2356 | Engage customers to understand customers’ intelligence needs and wants. |
Task |
2379 | Evaluate threat decision-making processes. |
Task |
2379A | Identify threat vulnerabilities. |
Task |
2379B | Identify threats to Blue Force vulnerabilities. |
Task |
2441 | Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
2446 | Identify and submit intelligence requirements for the purposes of designating priority information requirements. |
Task |
2459 | Identify intelligence gaps and shortfalls. |
Task |
2593 | Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets. |
Task |
2594 | Monitor and report on validated threat activities. |
Task |
2602 | Monitor open source websites for hostile content directed towards organizational or partner interests. |
Task |
2617 | Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). |
Task |
2621 | Provide SME and support to planning/developmental forums and working groups as appropriate. |
Task |
2685A | Provide subject matter expertise to website characterizations. |
Task |
2730 | Provide analyses and support for effectiveness assessment. |
Task |
2735 | Provide current intelligence support to critical internal/external stakeholders as appropriate. |
Task |
2738 | Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations. |
Task |
2745 | Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations. |
Task |
2747 | Provide input and assist in post-action effectiveness assessments. |
Task |
2748 | Provide input and assist in the development of plans and guidance. |
Task |
2754 | Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations. |
Task |
2767 | Provide target recommendations which meet leadership objectives. |
Task |
2789 | Report intelligence-derived significant network events and intrusions. |
Task |
2881 | Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date. |
Task |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3074 | Ability to recognize and mitigate deception in reporting and analysis. |
Ability |
3078A | Ability to think like threat actors. |
Ability |
3079 | Ability to understand objectives and effects. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3098 | Knowledge of virtualization products (Vmware, Virtual PC). |
Knowledge |
3205 | Knowledge of current computer-based intrusion sets. |
Knowledge |
3210 | Knowledge of cyber laws and their effect on Cyber planning. |
Knowledge |
3253 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
Knowledge |
3271 | Knowledge of internal and external partner cyber operations capabilities and tools. |
Knowledge |
3277 | Knowledge of general SCADA system components. |
Knowledge |
3286 | Knowledge of host-based security products and how they affect exploitation and vulnerability. |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3334 | Knowledge of intelligence confidence levels. |
Knowledge |
3343 | Knowledge of cyber intelligence/information collection capabilities and repositories. |
Knowledge |
3358 | Knowledge of organizational hierarchy and cyber decision making processes. |
Knowledge |
3419 | Knowledge of organization or partner exploitation of digital networks. |
Knowledge |
3446 | Knowledge of analytical constructs and their use in assessing the operational environment. |
Knowledge |
3460 | Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions. |
Knowledge |
3504 | Knowledge of threat and/or target systems. |
Knowledge |
3527 | Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.). |
Knowledge |
3528 | Knowledge of specific target identifiers, and their usage. |
Knowledge |
3533 | Knowledge of target vetting and validation procedures. |
Knowledge |
3587 | Knowledge of targeting cycles. |
Knowledge |
3615 | Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
Knowledge |
3691 | Skill in assessing and/or estimating effects generated during and after cyber operations. |
Skill |
3704 | Skill in conducting non-attributable research. |
Skill |
3724 | Skill in defining and characterizing all pertinent aspects of the operational environment. |
Skill |
3756 | Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Skill |
3788 | Skill in identifying alternative analytical interpretations in order to minimize unanticipated outcomes. |
Skill |
3893 | Skill in tailoring analysis to the necessary levels (e.g., classification and organizational). |
Skill |
3946 | Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). |
Skill |
3953A | Skill in providing analysis to aid writing phased after action reports. |
Skill |
52 | Knowledge of human-computer interaction principles. |
Knowledge |
Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2005 | Adjust collection operations or collection plan to address identified issues/challenges and to synchronize collections with overall operational requirements. |
Task |
2015 | Analyze feedback to determine extent to which collection products and services are meeting requirements. |
Task |
2021 | Analyze plans, directives, guidance and policy for factors that would influence collection management’s operational structure and requirement s (e.g., duration, scope, communication requirements, interagency/international agreements). |
Task |
2035 | Assess and apply operational environment factors and risks to collection management process. |
Task |
2096A | Compare allocated and available assets to collection demand as expressed through requirements. |
Task |
2165 | Coordinate resource allocation of collection assets against prioritized collection requirements with collection discipline leads. |
Task |
2235 | Determine how identified factors affect the tasking, collection, processing, exploitation and dissemination architecture’s form and function. |
Task |
2245 | Develop a method for comparing collection reports to outstanding requirements to identify information gaps. |
Task |
2290 | Allocate collection assets based on leadership’s guidance, priorities, and/or operational emphasis. |
Task |
2376 | Establish processing, exploitation and dissemination management activity using approved guidance and/or procedures. |
Task |
2421 | Formulate collection strategies based on knowledge of available intelligence discipline capabilities and gathering methods that align multi-discipline collection capabilities and accesses with targets and their observables. |
Task |
2451 | Identify collaboration forums that can serve as mechanisms for coordinating processes, functions, and outputs with specified organizations and functional groups. |
Task |
2613 | Optimize mix of collection assets and resources to increase effectiveness and efficiency against essential information associated with priority intelligence requirements. |
Task |
2705 | Prioritize collection requirements for collection platforms based on platform capabilities. |
Task |
3010 | Ability to apply collaborative skills and strategies. |
Ability |
3011 | Ability to apply critical reading/thinking skills. |
Ability |
3102 | Knowledge of operational planning processes. |
Knowledge |
3127 | Knowledge of asset availability, capabilities and limitations. |
Knowledge |
3128 | Knowledge of tasking mechanisms. |
Knowledge |
3148 | Knowledge of collection capabilities and limitations. |
Knowledge |
3160 | Knowledge of collaborative tools and environments. |
Knowledge |
3195 | Knowledge of criteria for evaluating collection products. |
Knowledge |
3204 | Knowledge of current collection requirements. |
Knowledge |
3297 | Knowledge of how to establish priorities for resources. |
Knowledge |
3380 | Knowledge of methods for ascertaining collection asset posture and availability. |
Knowledge |
3436 | Knowledge of production exploitation and dissemination needs and architectures. |
Knowledge |
3464 | Knowledge of research strategies and knowledge management. |
Knowledge |
3575 | Knowledge of the factors of threat that could impact collection operations. |
Knowledge |
3619 | Knowledge of the systems/architecture/communications used for coordination. |
Knowledge |
3663 | Knowledge of tasking, collection, processing, exploitation and dissemination. |
Knowledge |
3974 | Skill to apply the capabilities, limitations and tasking methodologies of available platforms, sensors, architectures and apparatus as they apply to organization objectives. |
Skill |
3991 | Ability to coordinate and collaborate with analysts regarding surveillance requirements and essential information development. |
Ability |
3994 | Ability to coordinate, collaborate and disseminate information to subordinate, lateral and higher-level organizations. |
Ability |
4002 | Skill to determine feasibility of collection. |
Skill |
4004 | Skill to develop a collection plan that clearly shows the discipline that can be used to collect the information needed. |
Skill |
4012 | Skill to ensure that the collection strategy leverages all available resources. |
Skill |
4014 | Skill to evaluate factors of the operational environment to objectives, and information requirements. |
Skill |
4019 | Skill to extract information from available tools and applications associated with collection requirements and collection operations management. |
Skill |
4024 | Skill to identify and apply tasking, collection, processing, exploitation and dissemination to associated collection disciplines. |
Skill |
4026 | Skill in information prioritization as it relates to operations. |
Skill |
4033 | Skill to interpret readiness reporting, its operational relevance and intelligence collection impact. |
Skill |
4049 | Skill to prepare and deliver reports, presentations and briefings, to include using visual aids or presentation technology. |
Skill |
4056 | Skill to review performance specifications and historical information about collection assets. |
Skill |
4066 | Skill to use collaborative tools and environments. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
2051 | Assess performance of collection assets against prescribed specifications. |
Task |
2098 | Compile lessons learned from collection management activity’s execution of organization collection objectives. |
Task |
2147 | Consider efficiency and effectiveness of collection assets and resources if/when applied against priority information requirements. |
Task |
2153 | Construct collection plans and matrixes using established guidance and procedures. |
Task |
2167 | Coordinate inclusion of collection plan in appropriate documentation. |
Task |
2172 | Re-task or re-direct collection assets and resources. |
Task |
2232 | Determine course of action for addressing changes to objectives, guidance, and operational environment. |
Task |
2233 | Determine existing collection management webpage databases, libraries and storehouses. |
Task |
2239 | Determine organizations and/or echelons with collection authority over all accessible collection assets. |
Task |
2271 | Develop coordinating instructions by collection discipline for each phase of an operation. |
Task |
2342 | Disseminate tasking messages and collection plans. |
Task |
2373 | Establish alternative processing, exploitation and dissemination pathways to address identified issues or problems. |
Task |
2414 | Facilitate continuously updated intelligence, surveillance, and visualization input to common operational picture managers. |
Task |
2456 | Identify coordination requirements and procedures with designated collection authorities. |
Task |
2464 | Identify issues or problems that can disrupt and/or degrade processing, exploitation and dissemination architecture effectiveness. |
Task |
2475 | Identify potential collection disciplines for application against priority information requirements. |
Task |
2479 | Identify and mitigate risks to collection management ability to support the plan, operations and target cycle. |
Task |
2529 | Issue requests for information. |
Task |
2538 | Link priority collection requirements to optimal assets and resources. |
Task |
2597 | Monitor completion of reallocated collection efforts. |
Task |
2604 | Monitor operational status and effectiveness of the processing, exploitation and dissemination architecture. |
Task |
2609 | Monitor the operational environment for potential factors and risks to the collection operation management process. |
Task |
2726 | Provide advice/assistance to operations and intelligence decision makers with reassignment of collection assets and resources in response to dynamic operational situations. |
Task |
2793 | Request discipline-specific processing, exploitation, and disseminate information collected using discipline’s collection assets and resources in accordance with approved guidance and/or procedures. |
Task |
2807 | Review capabilities of allocated collection assets. |
Task |
2809 | Review intelligence collection guidance for accuracy/applicability. |
Task |
2810 | Review list of prioritized collection requirements and essential information. |
Task |
2812 | Review and update overarching collection plan, as required. |
Task |
2817 | Revise collection matrix based on availability of optimal assets and resources. |
Task |
2828 | Specify changes to collection plan and/or operational environment that necessitate re-tasking or re-directing of collection assets and resources. |
Task |
2829 | Specify discipline-specific collections and/or taskings that must be executed in the near term. |
Task |
2845 | Synchronize the integrated employment of all available organic and partner intelligence collection assets using available collaboration capabilities and techniques. |
Task |
3092 | Knowledge of database administration and maintenance. |
Knowledge |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3098 | Knowledge of virtualization products (Vmware, Virtual PC). |
Knowledge |
3116 | Knowledge of all possible circumstances that would result in changing collection management authorities. |
Knowledge |
3131 | Knowledge of available databases and tools necessary to assess appropriate collection tasking. |
Knowledge |
3135 | Knowledge of basic computer components and architectures, including the functions of various peripherals. |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3156 | Knowledge of collection management tools. |
Knowledge |
3162 | Knowledge of collection capabilities, accesses, performance specifications, and constraints utilized to satisfy collection plan. |
Knowledge |
3165 | Knowledge of collection planning process and collection plan. |
Knowledge |
3175 | Knowledge of leadership’s Intent and objectives. |
Knowledge |
3177 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3205 | Knowledge of current computer-based intrusion sets. |
Knowledge |
3217 | Knowledge of cyber lexicon/terminology |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3253 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
Knowledge |
3275 | Knowledge of fundamental cyber concepts, principles, limitations, and effects. |
Knowledge |
3286 | Knowledge of host-based security products and how they affect exploitation and vulnerability. |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3322 | Knowledge of indications and warning. |
Knowledge |
3325 | Knowledge of information needs. |
Knowledge |
3332 | Knowledge of tasking processes for organic and subordinate collection assets. |
Knowledge |
3361 | Knowledge of key cyber threat actors and their equities. |
Knowledge |
3362A | Knowledge of key factors of the operational environment and related threats and vulnerabilities. |
Knowledge |
3374 | Knowledge of malware. |
Knowledge |
3389 | Knowledge of organization objectives and associated demand on collection management. |
Knowledge |
3417 | Knowledge of non-traditional collection methodologies. |
Knowledge |
3420 | Knowledge of ongoing and future operations. |
Knowledge |
3424 | Knowledge of operational asset constraints. |
Knowledge |
3428 | Knowledge of organization formats of resource and asset readiness reporting, its operational relevance and intelligence collection impact. |
Knowledge |
3430 | Knowledge of organizational priorities, legal authorities and requirements submission processes. |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3470 | Knowledge of risk management and mitigation strategies. |
Knowledge |
3541 | Knowledge of the available tools and applications associated with collection requirements and collection management. |
Knowledge |
3543 | Knowledge of the basic structure, architecture, and design of modern communication networks. |
Knowledge |
3545 | Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3549 | Knowledge of the capabilities and limitations of new and emerging collection capabilities, accesses and/or processes. |
Knowledge |
3552 | Knowledge of the capabilities, limitations and tasking methodologies of internal and external collections as they apply to planned cyber activities. |
Knowledge |
3557 | Knowledge of collection strategies. |
Knowledge |
3558 | Knowledge of the priority information requirements from subordinate, lateral and higher levels of the organization. |
Knowledge |
3561 | Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
Knowledge |
3574 | Knowledge of the existent tasking, collection, processing, exploitation and dissemination architecture. |
Knowledge |
3595 | Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements. |
Knowledge |
3598 | Knowledge of the organizational plans/directives/guidance that describe objectives. |
Knowledge |
3599 | Knowledge of the organizational policies/procedures for temporary transfer of collection authority. |
Knowledge |
3602 | Knowledge of the POC’s, databases, tools and applications necessary to establish environment preparation and surveillance products. |
Knowledge |
3624 | Knowledge of different organization objectives at all levels, including subordinate, lateral and higher. |
Knowledge |
3625 | Knowledge of the organization’s established format for collection plan. |
Knowledge |
3626 | Knowledge of the organization’s planning, operations and targeting cycles. |
Knowledge |
3631 | Knowledge of internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities). |
Knowledge |
3633 | Knowledge of tipping, cueing, mixing, and redundancy. |
Knowledge |
3650 | Knowledge of priority information, how it is derived, where it is published, how to access, etc. |
Knowledge |
3651 | Knowledge of what constitutes a “threat” to a network. |
Knowledge |
3654 | Knowledge of who the organization’s operational planners are, how and where they can be contacted, and what are their expectations. |
Knowledge |
3957 | Skill to access information on current assets available, usage. |
Skill |
3960 | Skill to access the databases where plans/directives/guidance are maintained. |
Skill |
3977 | Skill to articulate a needs statement/requirement and integrate new and emerging collection capabilities, accesses and/or processes into collection operations. |
Skill |
3985 | Skill to associate Intelligence gaps to priority information requirements and observables. |
Skill |
3986 | Skill to compare and contrast indicators/observables with requirements. |
Skill |
3995 | Ability to correctly employ each organization or element into the collection plan and matrix. |
Ability |
4016 | Skill to evaluate the capabilities, limitations and tasking methodologies of organic, theater, national, coalition and other collection capabilities. |
Skill |
4025 | Skill to identify Intelligence gaps. |
Skill |
4027 | Skill to identify when priority information requirements are satisfied. |
Skill |
4029 | Skill to translate the capabilities, limitations and tasking methodologies of organic, theater, national, coalition and other collection capabilities. |
Skill |
4044 | Skill to optimize collection system performance through repeated adjustment, testing, and re-adjustment. |
Skill |
4113 | Knowledge of the request for information process. |
Knowledge |
52 | Knowledge of human-computer interaction principles. |
Knowledge |
87 | Knowledge of network traffic analysis methods. |
Knowledge |
Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2015 | Analyze feedback to determine extent to which collection products and services are meeting requirements. |
Task |
2017 | Analyze incoming collection requests. |
Task |
2021 | Analyze plans, directives, guidance and policy for factors that would influence collection management’s operational structure and requirement s (e.g., duration, scope, communication requirements, interagency/international agreements). |
Task |
2053 | Assess the effectiveness of collections in satisfying priority information gaps, using available capabilities and methods, and then adjust collection strategies and collection requirements accordingly. |
Task |
2093 | Collaborate with customer to define information requirements. |
Task |
2245 | Develop a method for comparing collection reports to outstanding requirements to identify information gaps. |
Task |
2375 | Validate the link between collection requests and critical information requirements and priority intelligence requirements of leadership. |
Task |
2398 | Evaluate the effectiveness of collection operations against the collection plan. |
Task |
2857 | Translate collection requests into applicable discipline-specific collection requirements. |
Task |
3010 | Ability to apply collaborative skills and strategies. |
Ability |
3011 | Ability to apply critical reading/thinking skills. |
Ability |
3102 | Knowledge of operational planning processes. |
Knowledge |
3380 | Knowledge of methods for ascertaining collection asset posture and availability. |
Knowledge |
3557 | Knowledge of collection strategies. |
Knowledge |
4024 | Skill to identify and apply tasking, collection, processing, exploitation and dissemination to associated collection disciplines. |
Skill |
4066 | Skill to use collaborative tools and environments. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
2046 | Assess efficiency of existing information exchange and management systems. |
Task |
2051 | Assess performance of collection assets against prescribed specifications. |
Task |
2082 | Close requests for information once satisfied. |
Task |
2098 | Compile lessons learned from collection management activity’s execution of organization collection objectives. |
Task |
2111 | Conduct formal and informal coordination of collection requirements in accordance with established guidelines and procedures. |
Task |
2311 | Develop procedures for providing feedback to collection managers, asset managers, and processing, exploitation and dissemination centers. |
Task |
2341 | Disseminate reports to inform decision makers on collection issues. |
Task |
2347 | Conduct and document an assessment of the collection results using established procedures. |
Task |
2384 | Evaluate extent to which collected information and/or produced intelligence satisfy information requests. |
Task |
2397 | Evaluate extent to which collection operations are synchronized with operational requirements. |
Task |
2451 | Identify collaboration forums that can serve as mechanisms for coordinating processes, functions, and outputs with specified organizations and functional groups. |
Task |
2479 | Identify and mitigate risks to collection management ability to support the plan, operations and target cycle. |
Task |
2514 | Inform stakeholders (e.g., collection managers, asset managers, processing, exploitation and dissemination centers) of evaluation results using established procedures. |
Task |
2529 | Issue requests for information. |
Task |
2587 | Modify collection requirements as necessary. |
Task |
2727 | Provide advisory and advocacy support to promote collection planning as an integrated component of the strategic campaign plans and other adaptive plans. |
Task |
2807 | Review capabilities of allocated collection assets. |
Task |
2809 | Review intelligence collection guidance for accuracy/applicability. |
Task |
2810 | Review list of prioritized collection requirements and essential information. |
Task |
2827 | Solicit and manage to completion feedback from requestors on quality, timeliness, and effectiveness of collection against collection requirements. |
Task |
2835 | Submit information requests to collection requirement management section for processing as collection requests. |
Task |
2856 | Track status of information requests, including those processed as collection requests and production requirements, using established procedures. |
Task |
2867 | Use feedback results (e.g., lesson learned) to identify opportunities to improve collection management efficiency and effectiveness. |
Task |
2875 | Validate requests for information according to established criteria. |
Task |
3092 | Knowledge of database administration and maintenance. |
Knowledge |
3098 | Knowledge of virtualization products (Vmware, Virtual PC). |
Knowledge |
3116 | Knowledge of all possible circumstances that would result in changing collection management authorities. |
Knowledge |
3127 | Knowledge of asset availability, capabilities and limitations. |
Knowledge |
3128 | Knowledge of tasking mechanisms. |
Knowledge |
3131 | Knowledge of available databases and tools necessary to assess appropriate collection tasking. |
Knowledge |
3135 | Knowledge of basic computer components and architectures, including the functions of various peripherals. |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3148 | Knowledge of collection capabilities and limitations. |
Knowledge |
3156 | Knowledge of collection management tools. |
Knowledge |
3160 | Knowledge of collaborative tools and environments. |
Knowledge |
3162 | Knowledge of collection capabilities, accesses, performance specifications, and constraints utilized to satisfy collection plan. |
Knowledge |
3165 | Knowledge of collection planning process and collection plan. |
Knowledge |
3175 | Knowledge of leadership’s Intent and objectives. |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3195 | Knowledge of criteria for evaluating collection products. |
Knowledge |
3204 | Knowledge of current collection requirements. |
Knowledge |
3217 | Knowledge of cyber lexicon/terminology |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3234 | Knowledge of databases, portals and associated dissemination vehicles. |
Knowledge |
3253 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3275 | Knowledge of fundamental cyber concepts, principles, limitations, and effects. |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3297 | Knowledge of how to establish priorities for resources. |
Knowledge |
3322 | Knowledge of indications and warning. |
Knowledge |
3325 | Knowledge of information needs. |
Knowledge |
3361 | Knowledge of key cyber threat actors and their equities. |
Knowledge |
3362A | Knowledge of key factors of the operational environment and related threats and vulnerabilities. |
Knowledge |
3374 | Knowledge of malware. |
Knowledge |
3389 | Knowledge of organization objectives and associated demand on collection management. |
Knowledge |
3417 | Knowledge of non-traditional collection methodologies. |
Knowledge |
3420 | Knowledge of ongoing and future operations. |
Knowledge |
3424 | Knowledge of operational asset constraints. |
Knowledge |
3430 | Knowledge of organizational priorities, legal authorities and requirements submission processes. |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3464 | Knowledge of research strategies and knowledge management. |
Knowledge |
3470 | Knowledge of risk management and mitigation strategies. |
Knowledge |
3541 | Knowledge of the available tools and applications associated with collection requirements and collection management. |
Knowledge |
3543 | Knowledge of the basic structure, architecture, and design of modern communication networks. |
Knowledge |
3545 | Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3549 | Knowledge of the capabilities and limitations of new and emerging collection capabilities, accesses and/or processes. |
Knowledge |
3552 | Knowledge of the capabilities, limitations and tasking methodologies of internal and external collections as they apply to planned cyber activities. |
Knowledge |
3556 | Knowledge of collection management functionality (e.g., positions, functions, responsibilities, products, reporting requirements). |
Knowledge |
3558 | Knowledge of the priority information requirements from subordinate, lateral and higher levels of the organization. |
Knowledge |
3561 | Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
Knowledge |
3568 | Knowledge of the definition of collection management and collection management authority. |
Knowledge |
3574 | Knowledge of the existent tasking, collection, processing, exploitation and dissemination architecture. |
Knowledge |
3575 | Knowledge of the factors of threat that could impact collection operations. |
Knowledge |
3595 | Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements. |
Knowledge |
3599 | Knowledge of the organizational policies/procedures for temporary transfer of collection authority. |
Knowledge |
3602 | Knowledge of the POC’s, databases, tools and applications necessary to establish environment preparation and surveillance products. |
Knowledge |
3624 | Knowledge of different organization objectives at all levels, including subordinate, lateral and higher. |
Knowledge |
3625 | Knowledge of the organization’s established format for collection plan. |
Knowledge |
3626 | Knowledge of the organization’s planning, operations and targeting cycles. |
Knowledge |
3631 | Knowledge of internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities). |
Knowledge |
3633 | Knowledge of tipping, cueing, mixing, and redundancy. |
Knowledge |
3650 | Knowledge of priority information, how it is derived, where it is published, how to access, etc. |
Knowledge |
3651 | Knowledge of what constitutes a “threat” to a network. |
Knowledge |
3663 | Knowledge of tasking, collection, processing, exploitation and dissemination. |
Knowledge |
3957 | Skill to access information on current assets available, usage. |
Skill |
3960 | Skill to access the databases where plans/directives/guidance are maintained. |
Skill |
3985 | Skill to associate Intelligence gaps to priority information requirements and observables. |
Skill |
3986 | Skill to compare and contrast indicators/observables with requirements. |
Skill |
3994 | Ability to coordinate, collaborate and disseminate information to subordinate, lateral and higher-level organizations. |
Ability |
4012 | Skill to ensure that the collection strategy leverages all available resources. |
Skill |
4016 | Skill to evaluate the capabilities, limitations and tasking methodologies of organic, theater, national, coalition and other collection capabilities. |
Skill |
4025 | Skill to identify Intelligence gaps. |
Skill |
4027 | Skill to identify when priority information requirements are satisfied. |
Skill |
4028 | Skill to implement established procedures for evaluating collection management and operations activities. |
Skill |
4033 | Skill to interpret readiness reporting, its operational relevance and intelligence collection impact. |
Skill |
4049 | Skill to prepare and deliver reports, presentations and briefings, to include using visual aids or presentation technology. |
Skill |
4055 | Skill to resolve conflicting collection requirements. |
Skill |
4056 | Skill to review performance specifications and historical information about collection assets. |
Skill |
4057 | Skill to specify collections and/or taskings that must be conducted in the near term. |
Skill |
4063 | Skill to evaluate requests for information to determine if response information exists. |
Skill |
4065 | Skill to use systems and/or tools to track collection requirements and determine whether or not they are satisfied. |
Skill |
4113 | Knowledge of the request for information process. |
Knowledge |
52 | Knowledge of human-computer interaction principles. |
Knowledge |
87 | Knowledge of network traffic analysis methods. |
Knowledge |
Senior official or executive with the authority to formally assume responsibility for operating an information…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
38 | Knowledge of organization’s enterprise information security architecture system. |
Knowledge |
53 | Knowledge of the Security Assessment and Authorization process. |
Knowledge |
55 | Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
69 | Knowledge of Risk Management Framework (RMF) requirements. |
Knowledge |
77 | Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities. |
Knowledge |
88 | Knowledge of new and emerging information technology (IT) and cybersecurity technologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
121 | Knowledge of structured analysis principles and methods. |
Knowledge |
156A | Knowledge of confidentiality, integrity, and availability principles. |
Knowledge |
197 | Skill in discerning the protection needs (i.e., security controls) of information systems and networks. |
Skill |
801B | Knowledge of threat and risk assessment. |
Knowledge |
979 | Knowledge of supply chain risk management standards, processes, and practices. |
Knowledge |
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
1037A | Knowledge of information technology (IT) risk management policies, requirements, and procedures. |
Knowledge |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1040A | Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure. |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5320 | Establish acceptable limits for the software application, network, or system. |
Task |
5824 | Authorizing Official only: Approve security and privacy assessment plans for systems and environments of operation. |
Task |
5838 | Review and approve security categorization results for systems. |
Task |
5839 | Review security and privacy assessment plans for systems and environments of operation. |
Task |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6936 | Knowledge of types of authorizations. |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
5827 | Determine the authorization boundaries of systems. |
Task |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1038 | Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability. |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
1131 | Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]). |
Knowledge |
1142 | Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Knowledge |
1146 | Develop and Implement cybersecurity independent audit processes for application software/networks/systems and oversee ongoing independent audits to ensure that operational and Research and Design (R&D) processes and procedures are in compliance with organizational and mandatory cybersecurity requirements and accurately followed by Systems Administrators and other cybersecurity staff when performing their day-to-day activities. |
Task |
1157A | Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity and AI. |
Knowledge |
128 | Knowledge of systems diagnostic tools and fault identification techniques. |
Knowledge |
143 | Knowledge of the organization’s enterprise information technology (IT) goals and objectives. |
Knowledge |
177B | Knowledge of countermeasures for identified security risks. |
Knowledge |
179 | Skill in designing security controls based on cybersecurity principles and tenets. |
Skill |
19 | Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities. |
Knowledge |
27 | Knowledge of cryptography and cryptographic key management concepts. |
Knowledge |
325 | Knowledge of secure acquisitions (e.g., relevant Contracting Officer’s Technical Representative [COTR] duties, secure procurement, supply chain risk management). |
Knowledge |
3591 | Knowledge of organization objectives, leadership priorities, and decision-making risks. |
Knowledge |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
43A | Knowledge of embedded systems. |
Knowledge |
58 | Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. |
Knowledge |
5837 | Respond to threats and vulnerabilities based on the results of ongoing/continuous monitoring activities and risk assessments and decide if risk remains acceptable. |
Task |
600 | Evaluate cost benefit, economic, and risk analysis in decision making process. |
Task |
6931 | Knowledge of methods and techniques for analyzing risk. |
Knowledge |
696B | Authorizing Official only: Approve authorization packages. |
Task |
696C | Manage authorization packages. |
Task |
70 | Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
Knowledge |
710 | Monitor and evaluate a system’s compliance with information technology (IT) security, resilience, and dependability requirements. |
Task |
836A | Authorizing Official only: Determine if the security and privacy risk from operating a system or using a system, service, or application from an external provider is acceptable. |
Task |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
952 | Knowledge of emerging security issues, risks, and vulnerabilities. |
Knowledge |
95A | Knowledge of penetration testing principles, tools, and techniques. |
Knowledge |
965 | Knowledge of organization’s risk tolerance and/or risk management approach. |
Knowledge |
98 | Knowledge of policy-based and risk adaptive access controls. |
Knowledge |
Manages the Communications Security (COMSEC) resources of an organization (CNSSI No. 4009).
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
25 | Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]). |
Knowledge |
37 | Knowledge of disaster recovery continuity of operations plans. |
Knowledge |
55 | Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data. |
Knowledge |
61 | Knowledge of incident response and handling methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
395 | Advise senior management (e.g., CIO) on risk levels and security posture. |
Task |
578 | Ensure security improvement actions are evaluated, validated, and implemented as required. |
Task |
824 | Recognize a possible security violation and take appropriate action to report the incident, as required. |
Task |
852 | Supervise or manage protective or corrective measures when an cybersecurity incident or vulnerability is discovered. |
Task |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1004 | Knowledge of critical information technology (IT) procurement requirements. |
Knowledge |
1040A | Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure. |
Knowledge |
129 | Knowledge of system life cycle management principles, including software security and usability. |
Knowledge |
143 | Knowledge of the organization’s enterprise information technology (IT) goals and objectives. |
Knowledge |
183 | Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
Skill |
299 | Knowledge of information security program management and project management principles and techniques. |
Knowledge |
325 | Knowledge of secure acquisitions (e.g., relevant Contracting Officer’s Technical Representative [COTR] duties, secure procurement, supply chain risk management). |
Knowledge |
396 | Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, and systems, and elements. |
Task |
445 | Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders. |
Task |
475 | Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance. |
Task |
596 | Establish overall enterprise information security architecture (EISA) with the organization’s overall security strategy. |
Task |
600 | Evaluate cost benefit, economic, and risk analysis in decision making process. |
Task |
Responsible for device, equipment, and system-level cybersecurity configuration and day-to-day security operations of control systems,…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
106 | Knowledge of remote access technology concepts. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
708A | Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance for the appropriate senior leader or authorized representative. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
3277 | Knowledge of general SCADA system components. |
Knowledge |
3740 | Skill in determining installed patches on various operating systems and identifying patch signatures. |
Skill |
5823 | Apply updates, patches, and security technical implementation while maintaining control system performance and availability requirements. |
Task |
5829 | Establish and maintain security configuration baseline for the control system(s), including field devices, IT components, interconnections, and interfaces. |
Task |
5830 | Implement Risk Management Framework (RMF) Assessment requirements for control systems, and document/maintain records for them. |
Task |
5831 | Maintain knowledge of the function and security of control system and IT technologies with which the control systems interface. |
Task |
5832 | Maintain network segmentation to isolate control systems from business networks and other external connections as directed. |
Task |
5836 | Perform asset management and maintain inventory of control system devices and components through physical inspection or logical scans. |
Task |
5840 | Support risk assessments by reviewing and documenting the implementation status of security requirements of control systems. |
Task |
6929 | Knowledge of control system technologies, such as Programmable Logic Controllers (PLCs), Supervisory Control and Data Acquisition (SCADA) software, Distributed Control Systems (DCS) and Operational Technology (OT). |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6927 | Knowledge of control system environment risks, threats and vulnerabilities. |
Knowledge |
6933 | Knowledge of risk management processes specific to control systems. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
6940 | Skill in applying security and managing risk in resource-constrained systems and networks. |
Skill |
6941 | Skill in architecting compensating security controls to reduce risk for control systems and control system components that do not have adequate or compliant security capabilities. |
Skill |
6946 | Skill in securing control system communication protocols (e.g., IP/TCP, SSL/TLS, MODBUS/DNP3/PROFINET SCADA, GOOSE) and media used for field device control. |
Skill |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
3353 | Knowledge of the Risk Management Framework Assessment Methodology. |
Knowledge |
342A | Knowledge of operating system command line/prompt. |
Knowledge |
3A | Skill in recognizing vulnerabilities in security systems. |
Skill |
43A | Knowledge of embedded systems. |
Knowledge |
5821 | Act as a liaison between facility operations/engineer teams and IT or network security teams to coordinate security activities. |
Task |
5822 | Apply tailored organizational security policies and procedures for control system environments to maintain security, but also to ensure system availability. |
Task |
5826 | Consult on control system security matters (e.g., risk assessment, configuration management) as needed. |
Task |
5828 | Ensure configuration and collection of control system audit logs for monitoring and forensic analysis as appropriate. |
Task |
5833 | Off-load and review control system audit logs and review for anomalies. |
Task |
5834 | Participate in control system change management in conjunction with IT personnel and control system experts (e.g., system supplier). |
Task |
5835 | Participate in control system incident and disaster response, including secure system recovery. |
Task |
6928 | Knowledge of control system performance and availability requirements. |
Knowledge |
6934 | Knowledge of RMF assessment types (e.g., Assess & Authorize (A&A), Assess Only) and authorization boundaries (e.g., Closed Restricted Network (CRN), Stand-alone Information System (SIS)). |
Knowledge |
6937 | Knowledge of what “normal” control system operations for specific mission/business functions look like. |
Knowledge |
6939 | Skill in active and passive methods to safely gather information and conduct vulnerability and network analysis scans in control system environments. |
Skill |
6943 | Skill in identifying and investigating “abnormal” control system operations based on what specific mission/business functions look like. |
Skill |
69A | Knowledge of risk management processes and requirements per the Risk Management Framework (RMF). |
Knowledge |
809 | Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). |
Task |
88A | Knowledge of current and emerging cyber technologies. |
Knowledge |
Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques.
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
217 | Skill in preserving evidence integrity according to standard operating procedures or national standards. |
Skill |
281 | Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, electronic organizers, hard drives, memory cards, modems, network components, printers, removable storage devices, scanners, telephones, copiers, credit card skimmers, facsimile machines, global positioning systems [GPSs]). |
Knowledge |
290 | Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody). |
Knowledge |
340 | Knowledge of types and collection of persistent data. |
Knowledge |
369 | Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data. |
Skill |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
3155 | Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3159 | Knowledge of cyber operations support or enabling processes. |
Knowledge |
3211 | Knowledge of cyber laws and legal considerations and their effect on cyber planning. |
Knowledge |
3235 | Knowledge of deconfliction processes and procedures. |
Knowledge |
3257 | Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities. |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3264 | Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization. |
Knowledge |
3356 | Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations. |
Knowledge |
3419 | Knowledge of organization or partner exploitation of digital networks. |
Knowledge |
3585 | Knowledge of accepted organization planning systems. |
Knowledge |
3591 | Knowledge of organization objectives, leadership priorities, and decision-making risks. |
Knowledge |
3615 | Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3638 | Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations. |
Knowledge |
3639 | Knowledge of organization cyber operations programs, strategies, and resources. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1039 | Skill in evaluating the trustworthiness of the supplier and/or product. |
Skill |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
310 | Knowledge of legal governance related to admissibility (e.g., Federal Rules of Evidence). |
Knowledge |
3480 | Knowledge of security implications of software configurations. |
Knowledge |
383 | Skill in using scientific rules and methods to solve problems. |
Skill |
454 | Conduct interviews of victims and witnesses and conduct interviews or interrogations of suspects. |
Task |
5040 | Analyze the crisis situation to ensure public, personal, and resource protection. |
Task |
5070 | Assess the behavior of the individual victim, witness, or suspect as it relates to the investigation. |
Task |
507A | Determine and develop leads and identify sources of information in order to identify and/or prosecute the responsible parties to an intrusion or other crimes. |
Task |
512 | Develop a plan to investigate alleged crime, violation, or suspicious activity utilizing computers and the internet. |
Task |
5210 | Determine the extent of threats and recommend courses of action and countermeasures to mitigate risks. |
Task |
5580 | Provide criminal investigative support to trial counsel during the judicial process. |
Task |
564A | Document original condition of digital and/or associated evidence (e.g., via digital photographs, written reports, hash function checking). |
Task |
597 | Establish relationships, if applicable, between the incident response team and other groups, both internal (e.g., legal department) and external (e.g., law enforcement agencies, vendors, and public relations professionals). |
Task |
620A | Employ information technology (IT) systems and digital storage media to solve, investigate, and/or prosecute cybercrimes and fraud committed against people and property. |
Task |
623 | Fuse computer network attack analyses with criminal and counterintelligence investigations and operations. |
Task |
6230 | Knowledge of crisis management protocols, processes, and techniques. |
Knowledge |
633 | Identify and/or determine whether a security incident is indicative of a violation of law that requires specific legal action. |
Task |
636 | Identify digital evidence for examination and analysis in such a way as to avoid unintentional alteration. |
Task |
6370 | Knowledge of physical and physiological behaviors that may indicate suspicious or abnormal activity. |
Knowledge |
6440 | Knowledge of the judicial process, including the presentation of facts and evidence. |
Knowledge |
649 | Identify, collect, and seize documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents, investigations, and operations. |
Task |
788A | Prepare reports to document the investigation following legal standards and requirements. |
Task |
843 | Secure the electronic device or information source. |
Task |
917 | Knowledge of social dynamics of computer attackers in a global context. |
Knowledge |
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network…
KSAT ID | Description | KSAT |
---|---|---|
19 | Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
59A | Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications. |
Knowledge |
66 | Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies. |
Knowledge |
70 | Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
Knowledge |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
87 | Knowledge of network traffic analysis methods. |
Knowledge |
92 | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
150 | Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities. |
Knowledge |
214A | Skill in performing packet-level analysis. |
Skill |
353 | Skill in collecting data from a variety of cyber defense resources. |
Skill |
433 | Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. |
Task |
472 | Coordinate with enterprise-wide cyber defense staff to validate network alerts. |
Task |
723 | Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. |
Task |
745 | Perform cyber defense trend analysis and reporting. |
Task |
750 | Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack. |
Task |
767 | Perform security reviews and identify security gaps in security architecture resulting in recommendations for the inclusion into the risk mitigation strategy. |
Task |
800 | Provide daily summary reports of network events and activity relevant to cyber defense practices. |
Task |
823 | Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. |
Task |
895 | Skill in recognizing and categorizing types of vulnerabilities and associated attacks. |
Skill |
922B | Skill in using network analysis tools, including specialized tools for non-traditional systems and networks (e.g., control systems), to identify vulnerabilities. |
Skill |
956 | Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. |
Task |
958 | Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity. |
Task |
959 | Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. |
Task |
984 | Knowledge of cyber defense policies, procedures, and regulations. |
Knowledge |
990 | Knowledge of the common attack vectors on the network layer. |
Knowledge |
991 | Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution). |
Knowledge |
1069A | Knowledge of general kill chain (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). |
Knowledge |
1107 | Identify and analyze anomalies in network traffic using metadata (e.g., CENTAUR). |
Task |
1108 | Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). |
Task |
1111 | Identify applications and operating systems of a network device based on network traffic. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1033 | Knowledge of basic system administration, network, and operating system hardening techniques. |
Knowledge |
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1073 | Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Knowledge |
110 | Knowledge of key concepts in security management (e.g., Release Management, Patch Management). |
Knowledge |
1103 | Determine tactics, techniques, and procedures (TTPs) for intrusion sets. |
Task |
1104 | Examine network topologies to understand data flows through the network. |
Task |
1105 | Recommend computing environment vulnerability corrections. |
Task |
1109 | Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools. |
Task |
111 | Knowledge of security system design tools, methods, and techniques. |
Knowledge |
1110 | Isolate and remove malware. |
Task |
1111 | Identify applications and operating systems of a network device based on network traffic. |
Task |
1112 | Reconstruct a malicious attack or activity based off network traffic. |
Task |
1113 | Identify network mapping and operating system (OS) fingerprinting activities. |
Task |
1114 | Knowledge of encryption methodologies. |
Knowledge |
1118 | Skill in reading and interpreting signatures (e.g., snort). |
Skill |
1119 | Knowledge of signature implementation impact. |
Knowledge |
1120 | Ability to interpret and incorporate data from multiple tool sources. |
Ability |
1121 | Knowledge of Windows/Unix ports and services. |
Knowledge |
1142 | Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Knowledge |
130A | Knowledge of systems security testing and evaluation methods. |
Knowledge |
133 | Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers). |
Knowledge |
138 | Knowledge of the cyber defense Service Provider reporting structure and processes within one’s own organization. |
Knowledge |
139 | Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications. |
Knowledge |
148 | Knowledge of Virtual Private Network (VPN) security. |
Knowledge |
175 | Skill in developing and deploying signatures. |
Skill |
177B | Knowledge of countermeasures for identified security risks. |
Knowledge |
179A | Skill in assessing security controls based on cybersecurity principles and tenets. |
Skill |
181A | Skill in detecting host and network based intrusions via intrusion detection technologies. |
Skill |
183 | Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
Skill |
199 | Skill in evaluating the adequacy of security designs. |
Skill |
2062 | Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the NE or enclave. |
Task |
21 | Knowledge of computer algorithms. |
Knowledge |
212A | Knowledge of network mapping and recreating network topologies. |
Knowledge |
229 | Skill in using incident handling methodologies. |
Skill |
233 | Skill in using protocol analyzers. |
Skill |
234B | Knowledge of the use of sub-netting tools. |
Knowledge |
25 | Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]). |
Knowledge |
2611 | Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan. |
Task |
27 | Knowledge of cryptography and cryptographic key management concepts. |
Knowledge |
270 | Knowledge of common adversary tactics, techniques, and procedures in assigned area of responsibility (i.e., historical country-specific tactics, techniques, and procedures; emerging capabilities). |
Knowledge |
271 | Knowledge of common network tools (e.g., ping, traceroute, nslookup). |
Knowledge |
277 | Knowledge of defense-in-depth principles and network security architecture. |
Knowledge |
278 | Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN). |
Knowledge |
286 | Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip). |
Knowledge |
3007 | Ability to analyze malware. |
Ability |
34 | Knowledge of database systems. |
Knowledge |
342A | Knowledge of operating system command line/prompt. |
Knowledge |
3431 | Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). |
Knowledge |
3461 | Knowledge of relevant laws, legal authorities, restrictions, and regulations pertaining to cyber defense activities. |
Knowledge |
3C | Skill in recognizing vulnerabilities in information and/or data systems. |
Skill |
427 | Develop content for cyber defense tools. |
Task |
43A | Knowledge of embedded systems. |
Knowledge |
49 | Knowledge of host/network access control mechanisms (e.g., access control list). |
Knowledge |
559A | Analyze and report organizational security posture trends. |
Task |
559B | Analyze and report system security posture trends. |
Task |
576 | Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level. |
Task |
58 | Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. |
Knowledge |
593A | Assess adequate access controls based on principles of least privilege and need-to-know. |
Task |
61 | Knowledge of incident response and handling methodologies. |
Knowledge |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
716A | Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise. |
Task |
717A | Assess and monitor cybersecurity related to system implementation and testing practices. |
Task |
75C | Skill in conducting trend analysis. |
Skill |
782 | Plan and recommend modifications or adjustments based on exercise results or system environment. |
Task |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
8 | Knowledge of authentication, authorization, and access control methods. |
Knowledge |
806A | Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities. |
Task |
880A | Work with stakeholders to resolve computer security incidents and vulnerability compliance. |
Task |
88B | Knowledge of new and emerging control systems technologies. |
Knowledge |
90 | Knowledge of operating systems. |
Knowledge |
904 | Knowledge of interpreted and compiled computer languages. |
Knowledge |
912 | Knowledge of collection management processes, capabilities, and limitations. |
Knowledge |
915 | Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
Knowledge |
938A | Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans. |
Task |
95A | Knowledge of penetration testing principles, tools, and techniques. |
Knowledge |
98 | Knowledge of policy-based and risk adaptive access controls. |
Knowledge |
992C | Knowledge of threat environments (e.g., first generation threat actors, threat activities). |
Knowledge |
Analyzes digital evidence and investigates computer security incidents to derive useful information in support of…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
24A | Knowledge of basic concepts and practices of processing digital forensic data. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
217 | Skill in preserving evidence integrity according to standard operating procedures or national standards. |
Skill |
302 | Knowledge of investigative implications of hardware, Operating Systems, and network technologies. |
Knowledge |
350 | Skill in analyzing memory dumps to extract information. |
Skill |
381 | Skill in using forensic tool suites (e.g., EnCase, Sleuthkit, FTK). |
Skill |
438A | Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise. |
Task |
447 | Conduct analysis of log files, evidence, and other information in order to determine best methods for identifying the perpetrator(s) of a network intrusion. |
Task |
463 | Confirm what is known about an intrusion and discover new information, if possible, after identifying intrusion via dynamic analysis. |
Task |
541 | Provide technical summary of findings in accordance with established reporting procedures. |
Task |
613 | Examine recovered data for information of relevance to the issue at hand. |
Task |
752 | Perform file signature analysis. |
Task |
890 | Skill in conducting forensic analyses in multiple operating system environments (e.g., mobile device systems). |
Skill |
1082 | Perform file system forensic analysis. |
Task |
1086 | Knowledge of data carving tools and techniques (e.g., Foremost). |
Knowledge |
1087 | Skill in deep analysis of captured malicious code (e.g., malware forensics). |
Skill |
1088 | Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump). |
Skill |
1089 | Knowledge of reverse engineering concepts. |
Knowledge |
1092 | Knowledge of anti-forensics tactics, techniques, and procedures. |
Knowledge |
1096 | Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro). |
Knowledge |
1098 | Skill in analyzing anomalous code as malicious or benign. |
Skill |
1099 | Skill in analyzing volatile data. |
Skill |
1100 | Skill in identifying obfuscation techniques. |
Skill |
1101 | Skill in interpreting results of debugger to ascertain tactics, techniques, and procedures. |
Skill |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6810 | Knowledge of binary analysis. |
Knowledge |
6850 | Skill in analyzing malware. |
Skill |
6860 | Skill in conducting bit-level analysis. |
Skill |
6870 | Skill in processing digital evidence, to include protecting and making legally sound copies of evidence. |
Skill |
6890 | Ability to conduct forensic analyses in and for both Windows and Unix/Linux environments. |
Ability |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1031 | Serve as technical expert and liaison to law enforcement personnel and explain incident details as required. |
Task |
1033 | Knowledge of basic system administration, network, and operating system hardening techniques. |
Knowledge |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1081 | Perform virus scanning on digital media. |
Task |
1083 | Perform static analysis to mount an “image” of a drive (without necessarily having the original drive). |
Task |
1084 | Perform static malware analysis. |
Task |
1085 | Utilize deployable forensics tool kit to support operations as necessary. |
Task |
1091 | Skill in one way hash functions (e.g., Secure Hash Algorithm [SHA], Message Digest Algorithm [MD5]). |
Skill |
1093 | Knowledge of common forensics tool configuration and support applications (e.g., VMWare, WIRESHARK). |
Knowledge |
1094 | Knowledge of debugging procedures and tools. |
Knowledge |
1095 | Knowledge of how different file types can be used for anomalous behavior. |
Knowledge |
1097 | Knowledge of virtual machine aware malware, debugger aware malware, and packing. |
Knowledge |
113 | Knowledge of server and client operating systems. |
Knowledge |
114 | Knowledge of server diagnostic tools and fault identification techniques. |
Knowledge |
139 | Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications. |
Knowledge |
193 | Skill in developing, testing, and implementing network infrastructure contingency and recovery plans. |
Skill |
214A | Skill in performing packet-level analysis. |
Skill |
2179 | Coordinate with intelligence analysts to correlate threat assessment data. |
Task |
25 | Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]). |
Knowledge |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
287 | Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). |
Knowledge |
29 | Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools. |
Knowledge |
290 | Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody). |
Knowledge |
294 | Knowledge of hacking methodologies in Windows or Unix/Linux environment. |
Knowledge |
310 | Knowledge of legal governance related to admissibility (e.g., Federal Rules of Evidence). |
Knowledge |
316 | Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data. |
Knowledge |
340 | Knowledge of types and collection of persistent data. |
Knowledge |
345 | Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies. |
Knowledge |
346 | Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files. |
Knowledge |
3461 | Knowledge of relevant laws, legal authorities, restrictions, and regulations pertaining to cyber defense activities. |
Knowledge |
3513 | Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems. |
Knowledge |
360 | Skill in identifying and extracting data of forensic interest in diverse media (i.e., media forensics). |
Skill |
364 | Skill in identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files). |
Skill |
369 | Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data. |
Skill |
374 | Skill in setting up a forensic workstation. |
Skill |
386 | Skill in using virtual machines. |
Skill |
389 | Skill in physically disassembling PCs. |
Skill |
480 | Create a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes. This includes, but is not limited to, hard drives, floppy diskettes, CD, PDA, mobile phones, GPS, and all tape formats. |
Task |
482 | Decrypt seized data using technical means. |
Task |
5690 | Process image with appropriate tools depending on analyst’s goals. |
Task |
5700 | Perform Windows registry analysis. |
Task |
5720 | Perform file and registry monitoring on the running system after identifying intrusion via dynamic analysis. |
Task |
573 | Ensure chain of custody is followed for all digital media acquired in accordance with the Federal Rules of Evidence. |
Task |
5730 | Enter media information into tracking database (e.g. Product Tracker Tool) for digital media that has been acquired. |
Task |
5740 | Correlate incident data and perform cyber defense reporting. |
Task |
5760 | Maintain deployable cyber defense toolkit (e.g. specialized cyber defense software/hardware) to support IRT mission. |
Task |
61 | Knowledge of incident response and handling methodologies. |
Knowledge |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
636 | Identify digital evidence for examination and analysis in such a way as to avoid unintentional alteration. |
Task |
6820 | Knowledge of network architecture concepts including topology, protocols, and components. |
Knowledge |
749 | Perform dynamic analysis to boot an “image” of a drive (without necessarily having the original drive) to see the intrusion as the user may have seen it, in a native environment. |
Task |
753 | Perform hash comparison against established database. |
Task |
758 | Perform real-time forensic analysis (e.g., using Helix in conjunction with LiveView). |
Task |
759 | Perform timeline analysis. |
Task |
762 | Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs). |
Task |
768 | Perform static media analysis. |
Task |
771 | Perform tier 1, 2, and 3 malware analysis. |
Task |
786 | Prepare digital media for imaging by ensuring data integrity (e.g., write blockers in accordance with standard operating procedures). |
Task |
817 | Provide technical assistance on digital evidence matters to appropriate personnel. |
Task |
825 | Recognize and accurately report forensic artifacts indicative of a particular operating system. |
Task |
839A | Review forensic images and other data sources (e.g., volatile data) for recovery of potentially relevant information. |
Task |
868A | Use data carving techniques (e.g., FTK-Foremost) to extract data for further analysis. |
Task |
870 | Capture and analyze network traffic associated with malicious activities using network monitoring tools. |
Task |
871 | Use specialized equipment and techniques to catalog, document, extract, collect, package, and preserve digital evidence. |
Task |
882A | Write and publish cyber defense recommendations, reports, and white papers on incident findings to appropriate constituencies. |
Task |
888 | Knowledge of types of digital forensics data and how to recognize them. |
Knowledge |
889 | Knowledge of deployable forensics. |
Knowledge |
90 | Knowledge of operating systems. |
Knowledge |
908 | Ability to decrypt digital data collections. |
Ability |
923 | Knowledge of security event correlation tools. |
Knowledge |
944 | Conduct cursory binary analysis. |
Task |
983 | Knowledge of legal rules of evidence and court procedure. |
Knowledge |
Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
37 | Knowledge of disaster recovery continuity of operations plans. |
Knowledge |
50 | Knowledge of how network services and protocols interact to provide network communications. |
Knowledge |
60 | Knowledge of incident categories, incident responses, and timelines for responses. |
Knowledge |
61 | Knowledge of incident response and handling methodologies. |
Knowledge |
66 | Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies. |
Knowledge |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
150 | Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities. |
Knowledge |
153 | Skill of identifying, capturing, containing, and reporting malware. |
Skill |
217 | Skill in preserving evidence integrity according to standard operating procedures or national standards. |
Skill |
470 | Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents. |
Task |
716A | Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise. |
Task |
741A | Coordinate incident response functions. |
Task |
745 | Perform cyber defense trend analysis and reporting. |
Task |
755 | Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems. |
Task |
823 | Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. |
Task |
882 | Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies. |
Task |
893 | Skill in securing network communications. |
Skill |
895 | Skill in recognizing and categorizing types of vulnerabilities and associated attacks. |
Skill |
896 | Skill in protecting a network against malware. |
Skill |
897 | Skill in performing damage assessments. |
Skill |
923A | Skill in using security event correlation tools. |
Skill |
984 | Knowledge of cyber defense policies, procedures, and regulations. |
Knowledge |
991 | Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution). |
Knowledge |
1029A | Knowledge of malware analysis concepts and methodologies. |
Knowledge |
1030 | Collect intrusion artifacts (e.g., source code, malware, trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise. |
Task |
1033 | Knowledge of basic system administration, network, and operating system hardening techniques. |
Knowledge |
1069 | Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation or privileges, maintaining access, network exploitation, covering tracks). |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
3431 | Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). |
Knowledge |
5670 | Write and publish after action reviews. |
Task |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1031 | Serve as technical expert and liaison to law enforcement personnel and explain incident details as required. |
Task |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
2179 | Coordinate with intelligence analysts to correlate threat assessment data. |
Task |
29 | Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools. |
Knowledge |
3362A | Knowledge of key factors of the operational environment and related threats and vulnerabilities. |
Knowledge |
3561 | Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
Knowledge |
478 | Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation. |
Task |
49 | Knowledge of host/network access control mechanisms (e.g., access control list). |
Knowledge |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
738 | Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security. |
Task |
743 | Perform cyber defense incident triage, to include determining scope, urgency, and potential impact; identifying the specific vulnerability; and making recommendations that enable expeditious remediation. |
Task |
762 | Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs). |
Task |
861 | Track and document cyber defense incidents from initial detection through final resolution. |
Task |
87 | Knowledge of network traffic analysis methods. |
Knowledge |
93 | Knowledge of packet-level analysis. |
Knowledge |
961 | Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness). |
Task |
992C | Knowledge of threat environments (e.g., first generation threat actors, threat activities). |
Knowledge |
Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
49 | Knowledge of host/network access control mechanisms (e.g., access control list). |
Knowledge |
59A | Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications. |
Knowledge |
61 | Knowledge of incident response and handling methodologies. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
87A | Knowledge of network traffic analysis (tools, methodologies, processes). |
Knowledge |
92B | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol (TCP), Internet Protocol (IP), Open System Interconnection Model (OSI)). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
148 | Knowledge of Virtual Private Network (VPN) security. |
Knowledge |
150 | Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities. |
Knowledge |
643A | Identify potential conflicts with implementation of any cyber defense tools(e.g., tool and signature testing and optimization). |
Task |
960 | Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources. |
Task |
984 | Knowledge of cyber defense policies, procedures, and regulations. |
Knowledge |
1012A | Knowledge of test procedures, principles, and methodologies (e.g., Capabilities and Maturity Model Integration (CMMI)). |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2772 | Build, install, configure, and test dedicated cyber defense hardware. |
Task |
5090 | Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure. |
Task |
6700 | Skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1074A | Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly. |
Knowledge |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
157 | Skill in applying host/network access controls (e.g., access control list). |
Skill |
227 | Skill in tuning sensors. |
Skill |
229 | Skill in using incident handling methodologies. |
Skill |
237 | Skill in using Virtual Private Network (VPN) devices and encryption. |
Skill |
29 | Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools. |
Knowledge |
3143 | Knowledge of basic system, network, and OS hardening techniques. |
Knowledge |
393B | Coordinate with system administrators to create cyber defense tools, test bed(s), and test and evaluate applications, hardware infrastructure, rules/signatures, access controls, and configurations of platforms managed by service provider(s). |
Task |
471 | Coordinate with Cyber Defense Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, anti-virus, and content blacklists) for specialized cyber defense applications. |
Task |
481A | Create, edit, and manage network access control lists on specialized cyber defense systems (e.g., firewalls and intrusion prevention systems). |
Task |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
654B | Implement risk assessment and authorization requirements per the Risk Management Framework (RMF) process for dedicated cyber defense systems within the enterprise, and document and maintain records for them. |
Task |
6670 | Skill in system, network, and OS hardening techniques. |
Skill |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
6919 | Ability to determine the best cloud deployment model for the appropriate operating environment. |
Ability |
6942 | Skill in designing or implementing cloud computing deployment models. |
Skill |
6945 | Skill in migrating workloads to, from, and among the different cloud computing service models. |
Skill |
769 | Perform system administration on specialized cyber defense applications and systems (e.g., anti-virus, audit and remediation) or Virtual Private Network (VPN) devices, to include installation, configuration, maintenance, backup and restoration. |
Task |
893 | Skill in securing network communications. |
Skill |
896 | Skill in protecting a network against malware. |
Skill |
900 | Knowledge of web filtering technologies. |
Knowledge |
93 | Knowledge of packet-level analysis. |
Knowledge |
Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
332 | Ability to develop curriculum that speaks to the topic at the appropriate level for the target audience. |
Ability |
504A | Design training curriculum and course content based on requirements. |
Task |
841A | Conduct periodic reviews/revisions of course content for accuracy, completeness alignment, and currency (e.g., course content documents, lesson plans, student texts, examinations, schedules of instruction, and course descriptions). |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5260 | Develop or assist in the development of training policies and protocols for cyber training. |
Task |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1136A | Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud). |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
246A | Ability to apply the Instructional System Design (ISD) methodology. |
Ability |
314 | Knowledge of multiple cognitive domains and appropriate tools and methods for learning in each domain. |
Knowledge |
359 | Skill in developing and executing technical training programs and curricula. |
Skill |
363 | Skill in identifying gaps in technical capabilities. |
Skill |
363A | Skill in identifying gaps in technical delivery capabilities. |
Skill |
376 | Skill in talking to others to convey information effectively. |
Skill |
479A | Correlates training and learning to business or mission requirements. |
Task |
490A | Create training courses tailored to the audience and physical environment. |
Task |
5060 | Assess effectiveness and efficiency of instruction according to ease of instructional technology use and student learning, knowledge transfer, and satisfaction. |
Task |
5130 | Conduct learning needs assessments and identify requirements. |
Task |
5180 | Create interactive learning exercises to create an effective learning environment. |
Task |
5280 | Develop the goals and objectives for cyber curriculum. |
Task |
5420 | Plan instructional strategies such as lectures, demonstrations, interactive exercises, multimedia presentations, video courses, web-based courses for most effective learning environment In conjunction with educators and trainers. |
Task |
6090 | Ability to develop curriculum for use within a virtual environment. |
Ability |
6320 | Knowledge of media production, communication, and dissemination techniques and methods, including alternative ways to inform via written, oral, and visual media. |
Knowledge |
6380 | Knowledge of principles and processes for conducting training and education needs assessment. |
Knowledge |
6390 | Knowledge of relevant concepts, procedures, software, equipment, and technology applications. |
Knowledge |
6450 | Knowledge of training and education principles and methods for curriculum design, teaching and instruction for individuals and groups, and the measurement of training and education effects. |
Knowledge |
6480 | Skill in applying technical delivery capabilities. |
Skill |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
6919 | Ability to determine the best cloud deployment model for the appropriate operating environment. |
Ability |
845A | Serve as an internal consultant and advisor in own area of expertise (e.g., technical, copyright, print media, electronic media). |
Task |
855 | Support the design and execution of exercise scenarios. |
Task |
885 | Write instructional materials (e.g., standard operating procedures, production manual) to provide detailed guidance to relevant portion of the workforce. |
Task |
88A | Knowledge of current and emerging cyber technologies. |
Knowledge |
905 | Knowledge of secure coding techniques. |
Knowledge |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
952 | Knowledge of emerging security issues, risks, and vulnerabilities. |
Knowledge |
Develops and conducts training or education of personnel within cyber domain.
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
282 | Knowledge of emerging computer-based technology that has potential for exploitation by adversaries. |
Knowledge |
359 | Skill in developing and executing technical training programs and curricula. |
Skill |
551A | Ensure training meets the goals and objectives for cybersecurity training, education, or awareness. |
Task |
952 | Knowledge of emerging security issues, risks, and vulnerabilities. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1136A | Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud). |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
2295 | Develop or assist in the development of computer based training modules or classes. |
Task |
2296 | Develop or assist in the development of course assignments. |
Task |
2299 | Develop or assist in the development of course evaluations. |
Task |
2300 | Develop or assist in the development of grading and proficiency standards. |
Task |
2301 | Assist in the development of individual/collective development, training, and/or remediation plans. |
Task |
2303 | Develop or assist in the development of learning objectives and goals. |
Task |
2304 | Develop or assist in the development of on-the-job training materials or programs. |
Task |
2306 | Develop or assist in the development of written tests for measuring and assessing learner proficiency. |
Task |
3009 | Ability to answer questions in a clear and concise manner. |
Ability |
3016 | Ability to ask clarifying questions. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3024 | Ability to communicate effectively when writing. |
Ability |
3046 | Ability to facilitate small group discussions. |
Ability |
3049 | Ability to gauge learner understanding and knowledge level. |
Ability |
3070 | Ability to provide effective feedback to students for improving learning. |
Ability |
3126 | Knowledge of assessment techniques (rubrics, evaluation plans, tests, quizzes). |
Knowledge |
314 | Knowledge of multiple cognitive domains and appropriate tools and methods for learning in each domain. |
Knowledge |
3186 | Knowledge of computer based training and e-learning services. |
Knowledge |
332A | Ability to tailor curriculum that speaks to the topic at the appropriate level for the target audience. |
Ability |
3330 | Knowledge of instructional design and evaluation models (e.g., ADDIE, Smith/Ragan model, Gagne’s Events of Instruction, Kirkpatrick’s model of evaluation). |
Knowledge |
3360 | Knowledge of organizational training policies. |
Knowledge |
3364 | Knowledge of learning levels (i.e., Bloom’s Taxonomy of learning). |
Knowledge |
3365 | Knowledge of Learning Management Systems and their use in managing learning. |
Knowledge |
3366 | Knowledge of learning styles (e.g., assimilator, auditory, kinesthetic). |
Knowledge |
3395 | Knowledge of modes of learning (e.g., rote learning, observation). |
Knowledge |
344 | Knowledge of virtualization technologies and virtual machine development and maintenance. |
Knowledge |
3588 | Knowledge of organizational training systems. |
Knowledge |
3604 | Ability to apply principles of adult learning. |
Ability |
363B | Knowledge of technical delivery capabilities and their limitations. |
Knowledge |
3734 | Ability to design valid and reliable assessments. |
Ability |
3749 | Ability to develop clear directions and instructional materials. |
Ability |
376 | Skill in talking to others to convey information effectively. |
Skill |
3942 | Skill in utilizing or developing learning activities (e.g., scenarios, instructional games, interactive exercises). |
Skill |
3944 | Skill in utilizing technologies (e.g., SmartBoards, websites, computers, projectors) for instructional purposes. |
Skill |
453 | Conduct interactive training exercises to create an effective learning environment. |
Task |
490B | Deliver training courses tailored to the audience and physical/virtual environments. |
Task |
491A | Apply concepts, procedures, software, equipment, and/or technology applications to students. |
Task |
504B | Participate in development of training curriculum and course content. |
Task |
538 | Develop new or identify existing awareness and training materials that are appropriate for intended audiences. |
Task |
606 | Evaluate the effectiveness and comprehensiveness of existing training programs. |
Task |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
6919 | Ability to determine the best cloud deployment model for the appropriate operating environment. |
Ability |
778A | Plan and coordinate the delivery of classroom techniques and formats (e.g., lectures, demonstrations, interactive exercises, multimedia presentations) for most effective learning environment. |
Task |
779A | Plan non-classroom educational techniques and formats (e.g., video courses, mentoring, web-based courses). |
Task |
841 | Review training documentation (e.g., Course Content Documents [CCD], lesson plans, student texts, examinations, Schedules of Instruction [SOI], and course descriptions). |
Task |
842A | Recommend revisions to curriculum end course content based on feedback from previous training sessions. |
Task |
845A | Serve as an internal consultant and advisor in own area of expertise (e.g., technical, copyright, print media, electronic media). |
Task |
855 | Support the design and execution of exercise scenarios. |
Task |
885 | Write instructional materials (e.g., standard operating procedures, production manual) to provide detailed guidance to relevant portion of the workforce. |
Task |
88A | Knowledge of current and emerging cyber technologies. |
Knowledge |
905A | Skill in applying secure coding techniques. |
Skill |
918 | Ability to prepare and deliver education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures. |
Ability |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
1056 | Knowledge of operations security. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2009 | Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives. |
Task |
2043 | Coordinate for intelligence support to operational planning activities. |
Task |
2045 | Assess all-source intelligence and recommend targets to support cyber operation objectives. |
Task |
2052 | Assess target vulnerabilities and/or operational capabilities to determine course of action. |
Task |
2064 | Assist in the development and refinement of priority information requirements. |
Task |
2070 | Enable synchronization of intelligence support plans across partner organizations as required. |
Task |
2159 | Contribute to crisis action planning for cyber operations. |
Task |
2163 | Incorporate intelligence equities into the overall design of cyber operations plans. |
Task |
2181 | Coordinate with intelligence planners to ensure collection managers receive information requirements. |
Task |
2185 | Coordinate with the intelligence planning team to assess capability to satisfy assigned intelligence tasks. |
Task |
2186 | Coordinate, produce and track intelligence requirements. |
Task |
2187 | Coordinate, synchronize and draft applicable intelligence sections of cyber operations plans. |
Task |
2237 | Determine indicators (e.g., measures of effectiveness) that are best suited to specific cyber operation objectives. |
Task |
2267 | Develop and review intelligence guidance for integration into supporting cyber operations planning and execution. |
Task |
2276 | Develop detailed intelligence support to cyber operations requirements. |
Task |
2352 | Draft cyber intelligence collection and production requirements. |
Task |
2368 | Ensure that intelligence planning activities are integrated and synchronized with operational planning timelines. |
Task |
2386 | Evaluate intelligence estimates to support the planning cycle. |
Task |
2425 | Incorporate intelligence and counterintelligence to support plan development. |
Task |
2442 | Identify, draft, evaluate, and prioritize relevant intelligence or information requirements. |
Task |
2459A | Identify cyber intelligence gaps and shortfalls. |
Task |
2484 | Identify the need, scope, and timeframe for applicable intelligence environment preparation derived production. |
Task |
2509 | Provide input to or develop courses of action based on threat factors. |
Task |
2529 | Issue requests for information. |
Task |
2530 | Knowledge and understanding of operational design. |
Knowledge |
2531 | Knowledge of organizational planning concepts. |
Knowledge |
2532 | Lead and coordinate intelligence support to operational planning. |
Task |
2558 | Maintain relationships with internal and external partners involved in cyber planning or related areas. |
Task |
2619 | Provide subject matter expertise to planning teams, coordination groups, and task forces as necessary. |
Task |
2624 | Conduct long-range, strategic planning efforts with internal and external partners in cyber activities. |
Task |
2736 | Provide cyber focused guidance and advice on intelligence support plan inputs. |
Task |
2778 | Recommend refinement, adaption, termination, and execution of operational plans as appropriate. |
Task |
2806 | Review and comprehend organizational leadership objectives and guidance for planning. |
Task |
2819 | Scope the cyber intelligence planning effort. |
Task |
2888 | Document lessons learned that convey the results of events and/or exercises. |
Task |
3003 | Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment. |
Ability |
3011 | Ability to apply critical reading/thinking skills. |
Ability |
3015 | Ability to apply approved planning development and staffing processes. |
Ability |
3021 | Ability to collaborate effectively with others. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3033 | Ability to coordinate cyber operations with other organization functions or support activities. |
Ability |
3040 | Ability to develop or recommend planning solutions to problems and situations for which no precedent exists. |
Ability |
3041 | Ability to effectively collaborate via virtual teams. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3060 | Ability to interpret and understand complex and rapidly evolving concepts. |
Ability |
3066 | Ability to participate as a member of planning teams, coordination groups, and task forces as necessary. |
Ability |
3076 | Ability to tailor technical and planning information to a customer’s level of understanding. |
Ability |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3107 | Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.). |
Knowledge |
3114 | Knowledge of all forms of intelligence support needs, topics, and focus areas. |
Knowledge |
3117 | Knowledge of all-source reporting and dissemination procedures. |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3155 | Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3159 | Knowledge of cyber operations support or enabling processes. |
Knowledge |
3174 | Knowledge of the intelligence requirements development and request for information processes. |
Knowledge |
3177 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3194 | Knowledge of crisis action planning and time sensitive planning procedures. |
Knowledge |
3215 | Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber attack) principles, capabilities, limitations, and effects. |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3257 | Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities. |
Knowledge |
3264 | Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization. |
Knowledge |
3274 | Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects. |
Knowledge |
3275 | Knowledge of fundamental cyber concepts, principles, limitations, and effects. |
Knowledge |
3287 | Knowledge of how collection requirements and information needs are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
3311 | Knowledge of analytical standards and the purpose of intelligence confidence levels. |
Knowledge |
3336 | Knowledge of intelligence employment requirements (i.e., logistical, communications support, maneuverability, legal restrictions, etc.). |
Knowledge |
3340 | Knowledge of intelligence requirements tasking systems. |
Knowledge |
3342 | Knowledge of intelligence support to planning, execution, and assessment. |
Knowledge |
3388 | Knowledge of crisis action planning for cyber operations. |
Knowledge |
3397 | Knowledge of intelligence capabilities and limitations. |
Knowledge |
3443 | Knowledge of PIR approval process. |
Knowledge |
3444 | Knowledge of planning activity initiation. |
Knowledge |
3445 | Knowledge of planning timelines adaptive, crisis action, and time-sensitive planning. |
Knowledge |
3463 | Knowledge of required intelligence planning products associated with cyber operational planning. |
Knowledge |
3489 | Knowledge of organizational structures and associated intelligence capabilities. |
Knowledge |
3554 | Knowledge of the critical information requirements and how they’re used in planning. |
Knowledge |
3560 | Knowledge of the production responsibilities and organic analysis and production capabilities. |
Knowledge |
3561 | Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
Knowledge |
3582 | Knowledge of the intelligence frameworks, processes, and related systems. |
Knowledge |
3584 | Knowledge of intelligence preparation of the environment and similar processes. |
Knowledge |
3585 | Knowledge of accepted organization planning systems. |
Knowledge |
3606 | Knowledge of the process used to assess the performance and impact of operations. |
Knowledge |
3609 | Knowledge of the range of cyber operations and their underlying intelligence support needs, topics, and focus areas. |
Knowledge |
3610 | Knowledge of the relationships between end states, objectives, effects, lines of operation, etc. |
Knowledge |
3611 | Knowledge of the relationships of operational objectives, intelligence requirements, and intelligence production tasks. |
Knowledge |
3629 | Knowledge of the various collection disciplines and capabilities. |
Knowledge |
3651 | Knowledge of what constitutes a “threat” to a network. |
Knowledge |
3659 | Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3665 | Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures. |
Skill |
3681 | Skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action. |
Skill |
3685 | Skill in applying crisis planning procedures. |
Skill |
3742 | Skill in determining the physical location of network devices. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3844 | Skill in preparing and presenting briefings. |
Skill |
3845 | Skill in preparing plans and related correspondence. |
Skill |
3879 | Skill in reviewing and editing plans. |
Skill |
3938 | Skill in utilizing feedback in order to improve processes, products, and services. |
Skill |
3965 | Skill to analyze strategic guidance for issues requiring clarification and/or additional guidance. |
Skill |
3966 | Skill to anticipate intelligence capability employment requirements. |
Skill |
3967 | Skill to anticipate key target or threat activities which are likely to prompt a leadership decision. |
Skill |
3971 | Skill to apply analytical standards to evaluate intelligence products. |
Skill |
3976 | Skill to apply the process used to assess the performance and impact of cyber operations. |
Skill |
3978 | Skill to articulate the needs of joint planners to all-source analysts. |
Skill |
3979 | Skill to articulate intelligence capabilities available to support execution of the plan. |
Skill |
3987 | Skill to conceptualize the entirety of the intelligence process in the multiple domains and dimensions. |
Skill |
3990 | Skill to convert intelligence requirements into intelligence production tasks. |
Skill |
3992 | Skill to coordinate the development of tailored intelligence products. |
Skill |
3996 | Skill to correlate intelligence priorities to the allocation of intelligence resources/assets. |
Skill |
3998 | Skill to craft indicators of operational progress/success. |
Skill |
4000 | Skill to create and maintain up-to-date planning documents and tracking of services/production. |
Skill |
4018 | Skill to express orally and in writing the relationship between intelligence capability limitations and decision making risk and impacts on the overall operation. |
Skill |
4032 | Skill to interpret planning guidance to discern level of analytical support required. |
Skill |
4045 | Skill to orchestrate intelligence planning teams, coordinate collection and production support, and monitor status. |
Skill |
4053 | Skill to relate intelligence resources/assets to anticipated intelligence requirements. |
Skill |
4059 | Skill to synchronize planning activities and required intelligence support. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
2058 | Assist and advise inter-agency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives. |
Task |
2073 | Provide input to the identification of cyber-related success criteria. |
Task |
2091 | Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials). |
Task |
2160 | Contribute to the development of the organization’s decision support tools if necessary. |
Task |
2192 | Use intelligence estimates to counter potential target actions. |
Task |
2310 | Develop potential courses of action. |
Task |
2327 | Develop, implement, and recommend changes to appropriate planning procedures and policies. |
Task |
2392 | Evaluate the conditions that affect employment of available cyber intelligence capabilities. |
Task |
2435 | Identify all available partner intelligence capabilities and limitations supporting cyber operations. |
Task |
2528 | Interpret environment preparations assessments to determine a course of action. |
Task |
2564 | Maintain situational awareness to determine if changes to the operating environment require review of the plan. |
Task |
2702 | Prepare for and provide subject matter expertise to exercises. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3054 | Ability to identify external partners with common cyber operations interests. |
Ability |
3057 | Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3098 | Knowledge of virtualization products (Vmware, Virtual PC). |
Knowledge |
3205 | Knowledge of current computer-based intrusion sets. |
Knowledge |
3211 | Knowledge of cyber laws and legal considerations and their effect on cyber planning. |
Knowledge |
3235 | Knowledge of deconfliction processes and procedures. |
Knowledge |
3253 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3271 | Knowledge of internal and external partner cyber operations capabilities and tools. |
Knowledge |
3286 | Knowledge of host-based security products and how they affect exploitation and vulnerability. |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3326 | Knowledge of information security concepts, facilitating technologies and methods. |
Knowledge |
3356 | Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations. |
Knowledge |
3358 | Knowledge of organizational hierarchy and cyber decision making processes. |
Knowledge |
3374 | Knowledge of malware. |
Knowledge |
3391 | Knowledge of objectives, situation, operational environment, and the status and disposition of internal and external partner collection capabilities available to support planning. |
Knowledge |
3419 | Knowledge of organization or partner exploitation of digital networks. |
Knowledge |
3459 | Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization. |
Knowledge |
3539 | Knowledge of telecommunications fundamentals. |
Knowledge |
3543 | Knowledge of the basic structure, architecture, and design of modern communication networks. |
Knowledge |
3545 | Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3570 | Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements. |
Knowledge |
3571 | Knowledge of the organizational planning and staffing process. |
Knowledge |
3572 | Knowledge of organization decision support tools and/or methods. |
Knowledge |
3578 | Knowledge of the impacts of internal and external partner staffing estimates. |
Knowledge |
3591 | Knowledge of organization objectives, leadership priorities, and decision-making risks. |
Knowledge |
3601 | Knowledge of the outputs of course of action and exercise analysis. |
Knowledge |
3607 | Knowledge of the processes to synchronize operational assessment procedures with the critical information requirement process. |
Knowledge |
3615 | Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
Knowledge |
3616 | Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3630 | Knowledge of the ways in which targets or threats use the Internet. |
Knowledge |
3638 | Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations. |
Knowledge |
3639 | Knowledge of organization cyber operations programs, strategies, and resources. |
Knowledge |
3766 | Skill in documenting and communicating complex technical and programmatic information. |
Skill |
3877 | Skill in reviewing and editing intelligence products from various sources for cyber operations. |
Skill |
3893 | Skill in tailoring analysis to the necessary levels (e.g., classification and organizational). |
Skill |
3946 | Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). |
Skill |
3964 | Skill to analyze target or threat sources of strength and morale. |
Skill |
4023 | Skill to graphically depict decision support materials containing intelligence and partner capability estimates. |
Skill |
4041 | Skill to monitor threat effects to partner capabilities and maintain a running estimate. |
Skill |
4042 | Skill to monitor target or threat situation and environmental factors. |
Skill |
52 | Knowledge of human-computer interaction principles. |
Knowledge |
Provides legal advice and recommendations on relevant topics related to cyber law.
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
390A | Acquire and maintain a working knowledge of constitutional issues relevant laws, regulations, policies, agreements, standards, procedures, or other issuances. |
Task |
574A | Provide legal analysis and decisions to inspector generals, privacy officers, oversight and compliance personnel with regard to compliance with cybersecurity policies and relevant legal and regulatory requirements. |
Task |
984 | Knowledge of cyber defense policies, procedures, and regulations. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1070A | Ability to monitor and assess the potential impact of emerging technologies on laws, regulations, and/or policies. |
Ability |
24 | Knowledge of concepts and practices of processing digital forensic data. |
Knowledge |
252 | Knowledge of and experience in Insider Threat investigations, reporting, investigative tools and laws/regulations. |
Knowledge |
300A | Knowledge of intelligence principles, policies, and procedures including legal authorities and restrictions. |
Knowledge |
398 | Advocate organization’s official position in legal and legislative proceedings. |
Task |
451A | Conduct framing of pleadings to properly identify alleged violations of law, regulations, or policy/guidance. |
Task |
539A | Develop guidelines for implementation. |
Task |
599 | Evaluate contracts to ensure compliance with funding, legal, and program requirements. |
Task |
607 | Evaluate the effectiveness of laws, regulations, policies, standards, or procedures. |
Task |
612A | Evaluate the impact of changes to laws, regulations, policies, standards, or procedures. |
Task |
618A | Provide guidance on laws, regulations, policies, standards, or procedures to management, personnel, or clients. |
Task |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
655A | Facilitate implementation of new or revised laws, regulations, executive orders, policies, standards, or procedures. |
Task |
675 | Interpret and apply laws, regulations, policies, standards, or procedures to specific issues. |
Task |
787A | Prepare legal and other relevant documents (e.g., depositions, briefs, affidavits, declarations, appeals, pleadings, discovery). |
Task |
834 | Resolve conflicts in laws, regulations, policies, standards, or procedures. |
Task |
88A | Knowledge of current and emerging cyber technologies. |
Knowledge |
954A | Knowledge of foreign disclosure policies and import/export control regulations as related to cybersecurity. |
Knowledge |
Develops detailed plans for the conduct or support of the applicable range of cyber operations…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
KSA |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
2009 | Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives. |
Task |
2052 | Assess target vulnerabilities and/or operational capabilities to determine course of action. |
Task |
2058 | Assist and advise inter-agency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives. |
Task |
2073 | Provide input to the identification of cyber-related success criteria. |
Task |
2130 | Develop, review and implement all levels of planning guidance in support of cyber operations. |
Task |
2159 | Contribute to crisis action planning for cyber operations. |
Task |
2160 | Contribute to the development of the organization’s decision support tools if necessary. |
Task |
2186 | Coordinate, produce and track intelligence requirements. |
Task |
2237 | Determine indicators (e.g., measures of effectiveness) that are best suited to specific cyber operation objectives. |
Task |
2265 | Develop and maintain deliberate and/or crisis plans. |
Task |
2266 | Develop and review specific cyber operations guidance for integration into broader planning activities. |
Task |
2272 | Develop cyber operations plans and guidance to ensure that execution and resource allocation decisions align with organization objectives. |
Task |
2327 | Develop, implement, and recommend changes to appropriate planning procedures and policies. |
Task |
2365 | Ensure operational planning efforts are effectively transitioned to current operations. |
Task |
2368 | Ensure that intelligence planning activities are integrated and synchronized with operational planning timelines. |
Task |
2386 | Evaluate intelligence estimates to support the planning cycle. |
Task |
2417 | Facilitate the sharing of “best practices” and “lessons learned” throughout the cyber operations community. |
Task |
2424 | Incorporate cyber operations and communications security support plans into organization objectives. |
Task |
2425 | Incorporate intelligence and counterintelligence to support plan development. |
Task |
2446 | Identify and submit intelligence requirements for the purposes of designating priority information requirements. |
Task |
2459 | Identify intelligence gaps and shortfalls. |
Task |
2459A | Identify cyber intelligence gaps and shortfalls. |
Task |
2509 | Provide input to or develop courses of action based on threat factors. |
Task |
2524 | Integrate cyber planning/targeting efforts with other organizations. |
Task |
2528 | Interpret environment preparations assessments to determine a course of action. |
Task |
2529 | Issue requests for information. |
Task |
2531 | Knowledge of organizational planning concepts. |
Knowledge |
2558 | Maintain relationships with internal and external partners involved in cyber planning or related areas. |
Task |
2561 | Maintain situational awareness of cyber-related intelligence requirements and associated tasking. |
Task |
2562 | Maintain situational awareness of partner capabilities and activities. |
Task |
2590 | Monitor and evaluate integrated cyber operations to identify opportunities to meet organization objectives. |
Task |
2621 | Provide SME and support to planning/developmental forums and working groups as appropriate. |
Task |
2624 | Conduct long-range, strategic planning efforts with internal and external partners in cyber activities. |
Task |
2626 | Provide subject matter expertise to planning efforts with internal and external cyber operations partners. |
Task |
2628 | Participate in exercises. |
Task |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
270 | Knowledge of common adversary tactics, techniques, and procedures in assigned area of responsibility (i.e., historical country-specific tactics, techniques, and procedures; emerging capabilities). |
Knowledge |
2752 | Provide input to the administrative and logistical elements of an operational support plan. |
Task |
2770 | Provide time sensitive targeting support. |
Task |
2806 | Review and comprehend organizational leadership objectives and guidance for planning. |
Task |
2837 | Submit or respond to requests for deconfliction of cyber operations. |
Task |
2888 | Document lessons learned that convey the results of events and/or exercises. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3011 | Ability to apply critical reading/thinking skills. |
Ability |
3021 | Ability to collaborate effectively with others. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3033 | Ability to coordinate cyber operations with other organization functions or support activities. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3054 | Ability to identify external partners with common cyber operations interests. |
Ability |
3076 | Ability to tailor technical and planning information to a customer’s level of understanding. |
Ability |
3098 | Knowledge of virtualization products (Vmware, Virtual PC). |
Knowledge |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3114 | Knowledge of all forms of intelligence support needs, topics, and focus areas. |
Knowledge |
3146 | Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3159 | Knowledge of cyber operations support or enabling processes. |
Knowledge |
3194 | Knowledge of crisis action planning and time sensitive planning procedures. |
Knowledge |
3211 | Knowledge of cyber laws and legal considerations and their effect on cyber planning. |
Knowledge |
3218 | Knowledge of cyber operations terminology/lexicon. |
Knowledge |
3219 | Knowledge of cyber operations. |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3235 | Knowledge of deconfliction processes and procedures. |
Knowledge |
3257 | Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities. |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3264 | Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization. |
Knowledge |
3268 | Knowledge of staff management, assignment, and allocation processes. |
Knowledge |
3271 | Knowledge of internal and external partner cyber operations capabilities and tools. |
Knowledge |
3287 | Knowledge of how collection requirements and information needs are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3338 | Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions. |
Knowledge |
3342 | Knowledge of intelligence support to planning, execution, and assessment. |
Knowledge |
3356 | Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations. |
Knowledge |
3358 | Knowledge of organizational hierarchy and cyber decision making processes. |
Knowledge |
3374 | Knowledge of malware. |
Knowledge |
3391 | Knowledge of objectives, situation, operational environment, and the status and disposition of internal and external partner collection capabilities available to support planning. |
Knowledge |
3419 | Knowledge of organization or partner exploitation of digital networks. |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3463 | Knowledge of required intelligence planning products associated with cyber operational planning. |
Knowledge |
3489 | Knowledge of organizational structures and associated intelligence capabilities. |
Knowledge |
3571 | Knowledge of the organizational planning and staffing process. |
Knowledge |
3572 | Knowledge of organization decision support tools and/or methods. |
Knowledge |
3582 | Knowledge of the intelligence frameworks, processes, and related systems. |
Knowledge |
3585 | Knowledge of accepted organization planning systems. |
Knowledge |
3605 | Knowledge of the information environment. |
Knowledge |
3607 | Knowledge of the processes to synchronize operational assessment procedures with the critical information requirement process. |
Knowledge |
3610 | Knowledge of the relationships between end states, objectives, effects, lines of operation, etc. |
Knowledge |
3615 | Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
Knowledge |
3616 | Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
Knowledge |
3638 | Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations. |
Knowledge |
3665 | Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures. |
Skill |
3766 | Skill in documenting and communicating complex technical and programmatic information. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3844 | Skill in preparing and presenting briefings. |
Skill |
3976 | Skill to apply the process used to assess the performance and impact of cyber operations. |
Skill |
3998 | Skill to craft indicators of operational progress/success. |
Skill |
4008 | Skill to distinguish between notional and actual resources and their applicability to the plan under development. |
Skill |
4058 | Skill to synchronize operational assessment procedures with the critical information requirement process. |
Skill |
4106 | Knowledge of analytic tools and techniques. |
Knowledge |
4451 | Knowledge of the full-spectrum of cyberspace operational missions (e.g., DODIN Operations, DCO, OCO), principles, capabilities, limitations, and effects. |
KSA |
4471 | Knowledge of intelligence/SIGINT reporting and dissemination procedures. |
KSA |
8069 | Develop cyberspace operations TTPs for integration into operational and tactical levels of planning. |
Task |
Develops cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
88A | Knowledge of current and emerging cyber technologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
282A | Knowledge of emerging technologies that have potential for exploitation by adversaries. |
Knowledge |
320A | Knowledge of external organizations and academic institutions with cyber focus (e.g., cyber curriculum/training and Research & Development). |
Knowledge |
410A | Analyze organizational cyber policy. |
Task |
424B | Assess policy needs and collaborate with stakeholders to develop policies to govern cyber activities. |
Task |
492A | Design/integrate a cyber strategy that outlines the vision, mission, and goals that align with the organization’s strategic plan. |
Task |
565A | Draft, staff, and publish cyber policy. |
Task |
720A | Monitor the rigorous application of cyber policies, principles, and practices in the delivery of planning and management services. |
Task |
812A | Provide policy guidance to cyber management, staff, and users. |
Task |
840A | Review, conduct, or participate in audits of cyber programs and projects. |
Task |
854A | Support the CIO in the formulation of cyber-related policies. |
Task |
1027A | Interpret and apply applicable laws, statutes, and regulatory documents and integrate into policy. |
Task |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5020 | Advocate for adequate funding for cyber training resources, to include both internal and industry-provided courses, instructors, and related materials. |
Task |
5560 | Promote awareness of cyber policy and strategy as appropriate among management and ensure sound principles are reflected in the organization’s mission, vision, and goals. |
Task |
6100 | Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities. |
Ability |
6140 | Ability to leverage best practices and lessons learned of external organizations and academic institutions dealing with cyber issues. |
Ability |
6270 | Knowledge of full spectrum cyber capabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
244 | Ability to determine the validity of technology trend data. |
Ability |
297A | Knowledge of industry indicators useful for identifying technology trends. |
Knowledge |
336 | Knowledge of the nature and function of the relevant information structure (e.g., National Information Infrastructure). |
Knowledge |
485A | Define and integrate current and future mission environments. |
Task |
5300 | Ensure cyber workforce management policies and processes comply with legal and organizational requirements regarding equal opportunity, diversity, and fair hiring/employment practices. |
Task |
539 | Develop policy, programs, and guidelines for implementation. |
Task |
5620 | Review/Assess cyber workforce effectiveness to adjust skill and/or qualification standards. |
Task |
594 | Establish and maintain communication channels with stakeholders. |
Task |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
6410 | Knowledge of strategic theory and practice. |
Knowledge |
724A | Seek consensus on proposed policy changes from stakeholders. |
Task |
838 | Review existing and proposed policies with stakeholders. |
Task |
847 | Serve on agency and interagency policy boards. |
Task |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Develop cyberspace workforce plans, strategies and guidance to support cyberspace workforce manpower, personnel, training and…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
320A | Knowledge of external organizations and academic institutions with cyber focus (e.g., cyber curriculum/training and Research & Development). |
Knowledge |
492A | Design/integrate a cyber strategy that outlines the vision, mission, and goals that align with the organization’s strategic plan. |
Task |
629A | Identify and address cyber workforce planning and management issues (e.g. recruitment, retention, and training). |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5020 | Advocate for adequate funding for cyber training resources, to include both internal and industry-provided courses, instructors, and related materials. |
Task |
5160 | Coordinate with internal and external subject matter experts to ensure existing qualification standards reflect organizational functional requirements and meet industry standards. |
Task |
5230 | Develop and implement standardized position descriptions based on established cyber work roles. |
Task |
5250 | Develop cyber career field classification structure to include establishing career field entry requirements and other nomenclature such as codes and identifiers. |
Task |
5290 | Ensure cyber career fields are managed in accordance with organizational Human Resource (HR) policies and directives. |
Task |
5300 | Ensure cyber workforce management policies and processes comply with legal and organizational requirements regarding equal opportunity, diversity, and fair hiring/employment practices. |
Task |
5330 | Establish and collect metrics to monitor and validate cyber workforce readiness including analysis of cyber workforce data to assess the status of positions identified, filled, and filled with qualified personnel. |
Task |
5350 | Establish cyber career paths to allow career progression, deliberate development, and growth within and between cyber career fields. |
Task |
5360 | Establish manpower, personnel, and qualification data element standards to support cyber workforce management and reporting requirements. |
Task |
5370 | Establish, resource, implement, and assess cyber workforce management programs in accordance with organizational requirements. |
Task |
5590 | Review and apply cyber career field qualification standards. |
Task |
5600 | Review and apply organizational policies related to or having an effect on the cyber workforce. |
Task |
5620 | Review/Assess cyber workforce effectiveness to adjust skill and/or qualification standards. |
Task |
5630 | Support integration of qualified cyber workforce personnel into information systems lifecycle development processes. |
Task |
6040 | Ability to assess and forecast manpower requirements to meet organizational objectives. |
Ability |
6100 | Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities. |
Ability |
6140 | Ability to leverage best practices and lessons learned of external organizations and academic institutions dealing with cyber issues. |
Ability |
6250 | Knowledge of Workforce Framework, work roles, and associated tasks, knowledge, skills, and abilities. |
Knowledge |
6560 | Skill in developing workforce and position qualification standards. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1027A | Interpret and apply applicable laws, statutes, and regulatory documents and integrate into policy. |
Task |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
244A | Ability to determine the validity of workforce trend data. |
Ability |
282A | Knowledge of emerging technologies that have potential for exploitation by adversaries. |
Knowledge |
297A | Knowledge of industry indicators useful for identifying technology trends. |
Knowledge |
336 | Knowledge of the nature and function of the relevant information structure (e.g., National Information Infrastructure). |
Knowledge |
410A | Analyze organizational cyber policy. |
Task |
424B | Assess policy needs and collaborate with stakeholders to develop policies to govern cyber activities. |
Task |
485A | Define and integrate current and future mission environments. |
Task |
5170 | Coordinate with organizational manpower stakeholders to ensure appropriate allocation and distribution of human capital assets. |
Task |
5240 | Develop and review recruiting, hiring, and retention procedures in accordance with current Human Resource (HR) policies. |
Task |
5340 | Establish and oversee waiver processes for cyber career field entry and training qualification requirements. |
Task |
539 | Develop policy, programs, and guidelines for implementation. |
Task |
5560 | Promote awareness of cyber policy and strategy as appropriate among management and ensure sound principles are reflected in the organization’s mission, vision, and goals. |
Task |
565A | Draft, staff, and publish cyber policy. |
Task |
594 | Establish and maintain communication channels with stakeholders. |
Task |
6270 | Knowledge of full spectrum cyber capabilities. |
Knowledge |
6340 | Knowledge of organizational human resource policies, processes, and procedures. |
Knowledge |
6360 | Knowledge of organizational training and education policies, processes, and procedures. |
Knowledge |
641 | Identify organizational policy stakeholders. |
Task |
6740 | Skill in using manpower and personnel IT systems. |
Skill |
6800 | Ability to develop career path opportunities. |
Ability |
720A | Monitor the rigorous application of cyber policies, principles, and practices in the delivery of planning and management services. |
Task |
724A | Seek consensus on proposed policy changes from stakeholders. |
Task |
812A | Provide policy guidance to cyber management, staff, and users. |
Task |
838 | Review existing and proposed policies with stakeholders. |
Task |
840A | Review, conduct, or participate in audits of cyber programs and projects. |
Task |
847 | Serve on agency and interagency policy boards. |
Task |
854A | Support the CIO in the formulation of cyber-related policies. |
Task |
88A | Knowledge of current and emerging cyber technologies. |
Knowledge |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
955B | Review and approve a supply chain security/risk management policy. |
Task |
Provides software and hardware capabilities that produce cyberspace effects in and throughout cyberspace operations through…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
102 | Knowledge of programming language structures and logic. |
Knowledge |
1020A | Skill in secure test plan design (e. g. unit, integration, system, acceptance). |
Skill |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
1056 | Knowledge of operations security. |
Knowledge |
1062 | Knowledge of software reverse engineering techniques. |
Knowledge |
1071A | Ability to develop secure software according to secure software deployment methodologies, tools, and practices. |
Ability |
1076 | Collaborate with stakeholders to identify and/or develop appropriate solutions technology. |
Task |
1140A | Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic). |
Skill |
1149A | Enable applications with public keying by leveraging existing public key infrastructure (PKI) libraries and incorporating certificate management and encryption functionalities when appropriate. |
Task |
1151 | Identify and leverage the enterprise-wide version control system while designing and developing secure applications. |
Task |
116 | Knowledge of software debugging principles. |
Knowledge |
118 | Knowledge of software development models (e.g., Waterfall Model, Spiral Model). |
Knowledge |
119 | Knowledge of software engineering. |
Knowledge |
168 | Skill in conducting software debugging. |
Skill |
185A | Skill in developing applications that can log and handle errors, exceptions, and application faults and logging. |
Skill |
23 | Knowledge of computer programming principles such as object-oriented design. |
Knowledge |
2335 | Direct software programming and development of documentation. |
Task |
2417 | Facilitate the sharing of “best practices” and “lessons learned” throughout the cyber operations community. |
Task |
2561 | Maintain situational awareness of cyber-related intelligence requirements and associated tasking. |
Task |
27 | Knowledge of cryptography and cryptographic key management concepts. |
Knowledge |
278 | Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN). |
Knowledge |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3140 | Knowledge of basic programming concepts (e.g., levels, structures, compiled vs. interpreted languages). |
Knowledge |
3146 | Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
320A | Knowledge of external organizations and academic institutions with cyber focus (e.g., cyber curriculum/training and Research & Development). |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3622 | Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives. |
Knowledge |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
408 | Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application. |
Task |
414 | Analyze user needs and software requirements to determine feasibility of design within time and cost constraints. |
Task |
417 | Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews. |
Task |
4333 | Ability to program in at least one assembly languages. |
Ability |
4366 | Ability to use common networking protocols. |
Ability |
4368 | Ability to use data structures. |
Ability |
4372 | Ability to use reference documentation for C, Python, assembly, and other international technical standards and specifications (IEEE, ISO, IETF, etc.). |
Ability |
4382 | Ability to analyze, modify, develop, debug and document software and applications in C programming language. |
Ability |
4383 | Ability to analyze, modify, develop, debug and document software and applications in Python programming language. |
Ability |
4384 | Ability to analyze, modify, develop, debug and document software and applications utilizing standard, non-standard, specialized, serialization and/or unique network communication protocols. |
Ability |
4385 | Ability to interpret customer requirements and evaluate resource and system constraints to create solution design specifications. |
Ability |
4424 | Knowledge of cyber adversary threat tier taxonomy (2014 National Intelligence Estimate [NIE]), DIA/NSA Standard Cyber Threat Model, etc.). |
Knowledge |
4426 | Knowledge of cyber mission force equipment taxonomy (Platform-Access-Payloads/Toolset), capability development process and repository. |
Knowledge |
4433 | Knowledge of data serialization formats (e.g. XML, JSON, etc.). |
Knowledge |
4441 | Knowledge of embedded systems |
Knowledge |
4497 | Knowledge of modern software development methodologies (e.g. Continuous Integration (CI), Continuous Delivery (CD), Test Driven Development (TDD), etc.). |
Knowledge |
4517 | Knowledge of principles, methodologies, and tools used to improve quality of software (e.g. regression testing, test coverage, code review, pair programming, etc.). |
Knowledge |
4527 | Knowledge of relevant mission processes including version control processes, release processes, documentation requirements, and testing requirements. |
Knowledge |
4534 | Knowledge of sources and locations (public and classified) of capability development TTPs and tradecraft information/intelligence used by the US Gov and others. |
Knowledge |
4535 | Knowledge of sources and locations of cyber capability registries and repositories (e.g. Joint Cyber Tactics Manual (JCTM), Cyber Capability Registry (CCR), Agency and service repositories, etc.). |
Knowledge |
4546 | Knowledge of task and project management tools used for software development (e.g. Jira, Confluence, Trac, MediaWiki, etc.). |
Knowledge |
4548 | Knowledge of terms and concepts of operating system fundamentals (e.g. virtualization, paging, file systems, I/O, memory management, process abstraction, etc.). |
Knowledge |
4554 | Knowledge of the concepts and terminology of datastructures and associated algorithms (e.g., search, sort, traverse, insert, delete). |
Knowledge |
4580 | Knowledge of the supported organization’s approval process for operational use of a capability. |
Knowledge |
4584 | Knowledge of the use and application of static and dynamic program analysis. |
Knowledge |
4598 | Knowledge of your organizations project management, timeline estimation, and software engineering philosophy (e.g. CI/CD, TDD, etc.). |
Knowledge |
4611 | Skill in conducting “open source” research. |
Skill |
4684 | Knowledge of techniques to harden capabilities to prevent attacks and forensics. |
KSA |
506 | Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design. |
Task |
515A | Develop software system testing and validation procedures, programming, and documentation. |
Task |
538 | Develop new or identify existing awareness and training materials that are appropriate for intended audiences. |
Task |
543 | Develop secure code and error handling. |
Task |
56 | Knowledge of cybersecurity principles and methods that apply to software development. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
630 | Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find work-arounds for communication protocols that are not interoperable). |
Task |
645 | Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life. |
Task |
6780 | Utilize different programming languages to write code, open files, read files, and write output to different files. |
Task |
709A | Modify and maintain existing software to correct errors, to adapt it to new hardware, or to upgrade interfaces and improve performance. |
Task |
74 | Knowledge of low-level computer languages (e.g., assembly languages). |
Knowledge |
756 | Perform integrated quality assurance testing for security functionality and resiliency attack. |
Task |
764 | Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities. |
Task |
770 | Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change. |
Task |
785 | Prepare detailed workflow charts and diagrams that describe input, output, and logical operation, and convert them into a series of instructions coded in a computer language. |
Task |
8002 | Analyze and document applications using assembly languages. |
Task |
8003 | Analyze countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements. |
Task |
8006 | Analyze, modify, develop, debug, and document software and applications using assembly languages. |
Task |
8007 | Analyze, modify, develop, debug, and document software and applications utilizing standard, non-standard, specialized, and/or unique communication protocols. |
Task |
8008 | Analyze, modify, develop, debug, and document software and applications which run in kernel space. |
Task |
8009 | Analyze, modify, develop, debug, and document software and applications which run in user space. |
Task |
8012 | Apply cryptography primitives to protect the confidentiality and integrity of sensitive data. |
Task |
8014 | Apply software engineering best practices to enable sustainability and extensibility (Agile, TDD, CI/CD, etc.) to include containerization and virtualization technologies. |
Task |
8016 | Architect design documents that describe input, output, and logical operation. |
Task |
8032 | Conduct hardware and/or software static and dynamic analysis to reverse engineer malicious or benign systems. |
Task |
8049 | Create or enhance cyberspace capabilities to compromise, deny, degrade, disrupt, destroy, or manipulate automated information systems. |
Task |
8050 | Create or enhance cyberspace solutions to enable surveillance and reconnaissance of automated information systems. |
Task |
8054 | Describe the most likely cause of an error and recommend a list of possible solutions given the description of error or system crash. |
Task |
8055 | Design and develop data storage requirements, database structure, process flow, systematic procedures, algorithms, data analysis, and file structures. |
Task |
8056 | Design and develop user interfaces (e.g. web pages, GUIs, CLIs, Console Interfaces) |
Task |
8057 | Design and direct software development efforts to detect and disrupt nation-state cyber threat actors. |
Task |
8068 | Develop content for cyber capabilities. |
Task |
8076 | Develop, modify, and utilize automation technologies to enable employment of capabilities as efficiently as possible (e.g. TDD, CI/CD, etc.) |
Task |
8080 | Document and communicate tradecraft, best practices, TTPs, training, briefings, presentations, papers, studies, lessons learned, etc. to both technical and non-technical audiences. |
Task |
8092 | Enhance capability design strategies and tactics by synthesizing information, processes, and techniques in the areas of malicious software, vulnerabilities, reverse engineering, secure software engineering, and exploitation. |
Task |
8095 | Enter work into Task and project management tools used for software development (e.g. Jira, Confluence, Trac, MediaWiki, etc.) |
Task |
8106 | Generate proper supporting documentation of cyber capability. |
Task |
8118 | Implement project management, software engineering philosophies, modern capability development methodologies (Agile, TDD, CI/CD, etc), at the team level. |
Task |
8129 | Locate and utilize technical specifications and industry standards (e.g. Internet Engineering Task Force (IETF), IEEE, IEC, International Standards Organization (ISO)). |
Task |
8135 | Make use of compiler attributes and platform-specific features. |
Task |
8144 | Perform code review and analysis to inform OPSEC analysis and application (attribution, sanitization, etc.) |
Task |
8150 | Perform requirements analysis to identify workable tasks needed to organize collaborative software and documentation development. |
Task |
8152 | Perform static and dynamic analysis in order to find errors and flaws. |
Task |
8156 | Produce artifacts to inform risk analysis, acceptance testing, and legal review. |
Task |
8186 | Reference capability repositories and other sources to identify existing capabilities which fully/partially meet customer requirements (with or without modification). |
Task |
8207 | Utilize data structures to organize, sort, and manipulate elements of information |
Task |
8210 | Utilize secure coding techniques during development of software and applications |
Task |
8211 | Utilize tools to decompile, disassembe, analzye, and reverse engineer compiled binaries. |
Task |
826 | Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing. |
Task |
865 | Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria. |
Task |
904 | Knowledge of interpreted and compiled computer languages. |
Knowledge |
905 | Knowledge of secure coding techniques. |
Knowledge |
95A | Knowledge of penetration testing principles, tools, and techniques. |
Knowledge |
970A | Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities. |
Task |
971 | Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements. |
Task |
973A | Skill in using code analysis tools. |
Skill |
978A | Knowledge of root cause analysis techniques. |
Knowledge |
979 | Knowledge of supply chain risk management standards, processes, and practices. |
Knowledge |
980A | Skill in performing root cause analysis. |
Skill |
Cyberspace Operators use a wide range of software applications for network navigation, tactical forensic analysis,…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1033 | Knowledge of basic system administration, network, and operating system hardening techniques. |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
1063A | Knowledge of operating system structures and internals (e.g., process management, directory structure, installed applications). |
Knowledge |
1064 | Knowledge of Extensible Markup Language (XML) schemas. |
Knowledge |
1094 | Knowledge of debugging procedures and tools. |
Knowledge |
1128A | Knowledge of database access application programming interfaces (APIs) (e.g., Java Database Connectivity [JDBC]). |
Knowledge |
2020 | Analyze internal operational architecture, tools, and procedures for ways to improve performance. |
Task |
2020A | Analyze target operational architecture for ways to gain access. |
Task |
2088 | Collaborate with development organizations to create and deploy the tools needed to achieve objectives. |
Task |
2119 | Conduct network scouting and vulnerability analyses of systems within a network. |
Task |
2123 | Conduct on-net and off-net activities to control, and exfiltrate data from deployed, automated technologies. |
Task |
2124 | Conduct open source data collection via various online tools. |
Task |
2133 | Conduct survey of computer and digital networks. |
Task |
2205 | Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers). |
Task |
2226 | Detect exploits against targeted networks and hosts and react accordingly. |
Task |
2353 | Edit or execute simple scripts (e.g., PERL, VBS) on Windows and UNIX systems. |
Task |
2477 | Identify potential points of strength and vulnerability within a network. |
Task |
2559 | Maintain situational awareness and functionality of organic operational infrastructure. |
Task |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
2660 | Conduct cyber activities to degrade/remove information resident in computers and computer networks. |
Task |
2708 | Process exfiltrated data for analysis and/or dissemination to customers. |
Task |
286 | Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip). |
Knowledge |
287 | Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). |
Knowledge |
3003 | Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment. |
Ability |
3007 | Ability to analyze malware. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3059 | Ability to interpret and translate customer requirements into operational action. |
Ability |
3063 | Ability to monitor system operations and react to events in response to triggers and/or observation of trends or unusual activity. |
Ability |
3069 | Ability to produce technical documentation. |
Ability |
3103A | Ability to identify/describe target vulnerability. |
Ability |
3125 | Knowledge of assembly code. |
Knowledge |
3130 | Knowledge of auditing and logging procedures (including server-based logging). |
Knowledge |
3133 | Knowledge of basic back-up and recovery procedures including different types of backups (e.g., full, incremental). |
Knowledge |
3140 | Knowledge of basic programming concepts (e.g., levels, structures, compiled vs. interpreted languages). |
Knowledge |
3141 | Knowledge of basic software applications (e.g., data storage and backup, database applications) and their vulnerabilities. |
Knowledge |
3144 | Knowledge of basic wireless applications, including vulnerabilities in various types of wireless applications. |
Knowledge |
3206 | Knowledge of current software and methodologies for active defense and system hardening. |
Knowledge |
3235 | Knowledge of deconfliction processes and procedures. |
Knowledge |
3253 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
Knowledge |
3259 | Knowledge of enterprise-wide information management. |
Knowledge |
3261 | Knowledge of evasion strategies and techniques. |
Knowledge |
3267 | Knowledge of deconfliction reporting to include external organization interaction. |
Knowledge |
3267A | Knowledge of internal and external partner reporting. |
Knowledge |
3270 | Knowledge of forensic implications of operating system structure and operations. |
Knowledge |
3286 | Knowledge of host-based security products and how they affect exploitation and vulnerability. |
Knowledge |
3317 | Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP. |
Knowledge |
3346 | Knowledge of Internet and routing protocols. |
Knowledge |
3374 | Knowledge of malware. |
Knowledge |
3378 | Knowledge of methods and techniques used to detect various exploitation activities. |
Knowledge |
3399 | Knowledge of network administration. |
Knowledge |
3402 | Knowledge of network construction and topology. |
Knowledge |
344 | Knowledge of virtualization technologies and virtual machine development and maintenance. |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3454 | Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, Panda, Kaspersky) and how differences affect exploitation/vulnerabilities. |
Knowledge |
3473 | Knowledge of satellite-based communication systems. |
Knowledge |
3479 | Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation. |
Knowledge |
3480 | Knowledge of security implications of software configurations. |
Knowledge |
350 | Skill in analyzing memory dumps to extract information. |
Skill |
3508 | Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network). |
Knowledge |
3513 | Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems. |
Knowledge |
3525 | Knowledge of organizational and partner policies, tools, capabilities, and procedures. |
Knowledge |
3534 | Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference. |
Knowledge |
3543 | Knowledge of the basic structure, architecture, and design of modern communication networks. |
Knowledge |
3561 | Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
Knowledge |
3579 | Knowledge of the fundamentals of digital forensics in order to extract actionable intelligence. |
Knowledge |
3587 | Knowledge of targeting cycles. |
Knowledge |
3631 | Knowledge of internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities). |
Knowledge |
3637 | Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications). |
Knowledge |
3642 | Knowledge of various types of computer architectures. |
Knowledge |
3644 | Knowledge of virtual machine technologies. |
Knowledge |
3658 | Knowledge of network collection procedures to include decryption capabilities/tools, techniques, and procedures. |
Knowledge |
3658B | Ability to perform network collection tactics, techniques, and procedures to include decryption capabilities/tools. |
Ability |
3670 | Skill in analyzing terminal or environment collection data. |
Skill |
3690 | Skill in assessing current tools to identify needed improvements. |
Skill |
3695 | Skill in auditing firewalls, perimeters, routers, and intrusion detection systems. |
Skill |
3722 | Skill in data mining techniques (e.g., searching file systems) and analysis. |
Skill |
3740 | Skill in determining installed patches on various operating systems and identifying patch signatures. |
Skill |
3777 | Skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools. |
Skill |
3779 | Skill in extracting information from packet captures. |
Skill |
3801 | Skill in identifying the devices that work at each level of protocol models. |
Skill |
3815 | Skill in interpreting vulnerability scanner results to identify vulnerabilities. |
Skill |
3817 | Skill in knowledge management, including technical documentation techniques (e.g., Wiki page). |
Skill |
3859 | Skill in reading, interpreting, writing, modifying, and executing simple scripts (e.g., PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data). |
Skill |
3859A | Ability to read, interpret, write, modify, and execute simple scripts (e.g. PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data). |
Ability |
3871 | Skill in remote command line and Graphic User Interface (GUI) tool usage. |
Skill |
3883 | Skill in server administration. |
Skill |
3897 | Skill in technical writing. |
Skill |
3899 | Skill in testing and evaluating tools for implementation. |
Skill |
3929 | Skill in using tools, techniques, and procedures to remotely exploit and establish persistence on a target. |
Skill |
3929A | Skill in using tools, techniques, and procedures to exploit a target. |
Skill |
3948 | Skill in verifying the integrity of all files. |
Skill |
4086 | Knowledge of relevant laws, regulations, and policies. |
Knowledge |
4191 | Ability to apply tradecraft to minimize risk of detection, mitigate risk, and minimize creation of behavioral signature |
Ability |
4199 | Ability to characterize a target admin/user’s technical abilities, habits, and skills. |
Ability |
4204 | Ability to communicate operational plans and actions and provide feedback regarding OPSEC and tradecraft during mission pre-brief |
Ability |
4213 | Ability to conduct open source research. |
Ability |
4219 | Ability to construct a COA using available tools and techniques. |
Ability |
4222 | Ability to continually research and develop new tools/techniques |
Ability |
4229 | Ability to create rules and filters (e.g., Berkeley Packet Filter, Regular Expression). |
Ability |
4243 | Ability to ensure collected data is transferred to the appropriate storage locations. |
Ability |
4244 | Ability to enumerate a network. |
Ability |
4248 | Ability to enumerate user permissions and privileges. |
Ability |
4249 | Ability to evade or counter security products or host based defenses. |
Ability |
4261 | Ability to exploit vulnerabilities to gain additional access. |
Ability |
4263 | Ability to extract credentials from hosts |
Ability |
4271 | Ability to identify capability gaps (e.g., insufficient tools, training, or infrastructure) |
Ability |
4276 | Ability to identify files containing information critical to operational objectives. |
Ability |
4278 | Ability to identify legal, policy, and technical limitations when conducting cyberspace operations. |
Ability |
4279 | Ability to identify logging capabilities on host |
Ability |
4285 | Ability to identify what tools or Tactics, Techniques, and Procedures (TTPs) are applicable to a given situation |
Ability |
4292 | Ability to improve the performance of cyberspace operators by providing constructive (positive and negative) feedback. |
Ability |
4293 | Ability to install/modify/uninstall tools on target systems in accordance with current policies and procedures. |
Ability |
4296 | Ability to interpret device configurations. |
Ability |
4297 | Ability to interpret cyberspace technical materials and documentation (e.g. CVEs, API). |
Ability |
4298 | Ability to maintain situational awareness of target environment. |
Ability |
4305 | Ability to model a simulated environment to conduct mission rehearsal and mitigate risk of actions taken during operations. |
Ability |
4308 | Ability to operate automated systems to interact with target environment. |
Ability |
4324 | Ability to perform masquerade operations. |
Ability |
4325 | Ability to perform privilege escalation. |
Ability |
4327 | Ability to persist access to a target. |
Ability |
4330 | Ability to plan, brief, execute, and debrief a mission. |
Ability |
4334 | Ability to promote and enable organizational change. |
Ability |
4335 | Ability to provide advice and guidance to various stakeholders regarding technical issues, capabilities, and approaches. |
Ability |
4336 | Ability to provide feedback to developers if a tool requires continued development. |
Ability |
4340 | Ability to provide technical leadership within an organization. |
Ability |
4341 | Ability to read, write, modify, and execute compiled languages (e.g., C). |
Ability |
4342 | Ability to extract specific information from large data set (e.g., grep, regex critical). |
Ability |
4343 | Ability to recognize and report mistakes or poor tradecraft to appropriate leadership in accordance with Standard Operating Procedures (SOPs). |
Ability |
4344 | Ability to recognize and respond appropriately to Non-Standard Events. |
Ability |
4345 | Ability to redirect and tunnel through target systems. |
Ability |
4346 | Ability to remediate indicators of compromise. |
Ability |
4347 | Ability to research non-standards within a project. |
Ability |
4350 | Ability to retrieve historical operational data. |
Ability |
4359 | Ability to train other cyberspace operators. |
Ability |
4361 | Ability to troubleshoot technical problems. |
Ability |
4367 | Ability to use core toolset (e.g., implants, remote access tools). |
Ability |
4369 | Ability to use dynamic analysis tools (e.g. process monitor, process explorer, and registry analysis) |
Ability |
4370 | Ability to use enterprise tools to enumerate target information. |
Ability |
4378 | Ability to verify file integrity for both uploads and downloads. |
Ability |
4379 | Ability to weaken a target to facilitate/enable future access. |
Ability |
4380 | Ability to write and modify markup languages (e.g., HTML, XML). |
Ability |
4381 | Ability to write and modify source code (e.g., C). |
Ability |
4388 | Knowledge of access control models (Role Based Access Control, Attribute Based Access Control). |
Knowledge |
4391 | Knowledge of advanced redirection techniques. |
Knowledge |
4393 | Knowledge of appropriate/inappropriate information to include in operational documentation (e.g., OPNOTES, technical summaries, action maps, etc.). |
Knowledge |
4395 | Knowledge of basic client software applications and their attack surfaces. |
Knowledge |
4396 | Knowledge of basic cloud-based technologies and concepts. |
Knowledge |
4399 | Knowledge of basic Embedded Systems concepts. |
Knowledge |
4402 | Knowledge of basic redirection techniques (e.g. IP Tables, SSH Tunneling, netsh) |
Knowledge |
4403 | Knowledge of basic server software applications and their attack surfaces. |
Knowledge |
4404 | Knowledge of code injection and its employment in cyberspace operations. |
Knowledge |
4414 | Knowledge of common network administration best practices and the impact to operations. |
Knowledge |
4419 | Knowledge of credential sources and restrictions related to credential usage. |
Knowledge |
4437 | Knowledge of device reboots, including when they occur and their impact on tool functionality. |
Knowledge |
4444 | Knowledge of evolving technologies. |
Knowledge |
4447 | Knowledge of factors that would suspend or abort an operation. |
Knowledge |
4458 | Knowledge of historical data relating to particular targets and projects, prior to an operation to include reviewing TECHSUMs, previous OPNOTEs, etc. |
Knowledge |
4463 | Knowledge of how computer programs are executed |
Knowledge |
4464 | Knowledge of how host-based security products, logging, and malware may affect tool functionality |
Knowledge |
4465 | Knowledge of how other actors may affect operations |
Knowledge |
4466 | Knowledge of how race conditions occur and can be employed to compromise shared resources |
Knowledge |
4482 | Knowledge of malware triage. |
Knowledge |
4485 | Knowledge of methods and procedures for sending a payload via an existing implant |
Knowledge |
4486 | Knowledge of methods, strategies, and techniques of evading detection while conducting operations, such as noise, stealth, situational awareness, etc. |
Knowledge |
4487 | Knowledge of methods, tools, and procedures for collecting information, including accessing databases and file systems |
Knowledge |
4488 | Knowledge of methods, tools, and procedures for exploiting target systems |
Knowledge |
4489 | Knowledge of methods, tools, and techniques used to determine the path to a target host/network (e.g., identify satellite hops). |
Knowledge |
4496 | Knowledge of models for examining cyber threats (e.g. cyber kill chain, MITRE ATT&CK). |
Knowledge |
4498 | Knowledge of modes of communication used by a target, such as cable, fiber optic, satellite, microwave, VSAT, or combinations of these. |
Knowledge |
4502 | Knowledge of open source tactics that enable initial access (e.g. social engineering, phishing) |
Knowledge |
4503 | Knowledge of operating system command shells, configuration data. |
Knowledge |
4505 | Knowledge of operational infrastructure |
Knowledge |
4508 | Knowledge of operational security, logging, admin concepts, and troubleshooting. |
Knowledge |
4510 | Knowledge of password cracking techniques. |
Knowledge |
4519 | Knowledge of process migration |
Knowledge |
4540 | Knowledge of system administration concepts for distributed or managed operating environments. |
Knowledge |
4541 | Knowledge of system administration concepts for stand alone operating systems. |
Knowledge |
4542 | Knowledge of system calls |
Knowledge |
4552 | Knowledge of the components of an authentication system. |
Knowledge |
4553 | Knowledge of the concept of an advanced persistent threat (APT) |
Knowledge |
4563 | Knowledge of the location and use of tool documentation. |
Knowledge |
4564 | Knowledge of the methods and procedures for communicating with tools/modules, including the use of listening posts. |
Knowledge |
4565 | Knowledge of the methods of persistence. |
Knowledge |
4567 | Knowledge of the Mission Improvement Process |
Knowledge |
4571 | Knowledge of the Plan, Brief, Execute, and Debrief process |
Knowledge |
4581 | Knowledge of the tactics development process |
Knowledge |
4586 | Knowledge of threats to OPSEC when installing, using, modifying, and uninstalling tools. |
Knowledge |
4587 | Knowledge of tool release/testing process |
Knowledge |
4593 | Knowledge of VPNs, their purpose, and how they can be leveraged. |
Knowledge |
4628 | Skill in enumerating a host (e.g. file systems, host meta data host characteristics). |
Skill |
4641 | Skill in manipulating firewall/host based security configuration and rulesets. |
Skill |
4663 | Skill in retrieving memory resident data. |
Skill |
4670 | Skill in transferring files to target devices (e.g., scp, tftp, http, ftp). |
Skill |
4674 | Skill in using network enumeration and analysis tools, both active and passive. |
Skill |
49 | Knowledge of host/network access control mechanisms (e.g., access control list). |
Knowledge |
6100 | Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities. |
Ability |
8001 | Advise leadership on operational tradecraft, emerging technology, and technical health of the force. |
Task |
8015 | Approve remediation actions. |
Task |
8017 | As authorized, train cyberspace operators at one’s certification level or below. |
Task |
8020 | Assess the technical health of the cyberspace operator work role. |
Task |
8021 | Assess, recommend, and evaluate remediation actions. |
Task |
8030 | Conduct cyber activities to deny, degrade, disrupt, destroy, manipulate, (D4M). |
Task |
8037 | Conduct post-mission actions. |
Task |
8039 | Conduct pre-mission actions |
Task |
8040 | Conduct pre-operation research and prep. |
Task |
8052 | Create/normalize/document/evaluate TTPs in cyberspace operations. |
Task |
8067 | Develop and/or inform risk assessments. |
Task |
8071 | Develop Operational Training Solultions. |
Task |
8073 | Develop remediation actions. |
Task |
8074 | Develop risk assessments for non-standard events and ad hoc tradecraft. |
Task |
8083 | Employ collection TTPs in cyberspace operations. |
Task |
8084 | Employ credential access TTPs in cyberspace operations. |
Task |
8086 | Employ discovery TTPs in cyberspace operations. |
Task |
8087 | Employ exfiltration TTPs in cyberspace operations. |
Task |
8088 | Employ lateral movement TTPs in cyberspace operations. |
Task |
8089 | Employ TTPs in categories at one’s certification level or below. |
Task |
8097 | Evaluate cyberspace operator performance at one’s certification level or below. |
Task |
8112 | Identify targets of opportunity in order to influence operational planning. |
Task |
8113 | Identify the appropriate operating authorities and guidance |
Task |
8130 | Maintain operational and technical situational awareness during operations |
Task |
8158 | Produce strategy to inform commander’s decision making process. |
Task |
8167 | Provide input to mission debrief. |
Task |
8168 | Provide input to operational policy. |
Task |
8169 | Provide input to post mission planning. |
Task |
8170 | Provide input to pre-mission planning. |
Task |
8181 | Recognize and respond to indicators of compromise (IOC). |
Task |
8183 | Recognize and respond to events that change risk. |
Task |
8184 | Record and document activities during cyberspace operations. |
Task |
8192 | Steward the cyberspace operator work role. |
Task |
8197 | Train cyberspace operators at their certified level or below. |
Task |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
Analyzes and interprets data from multiple disparate sources and builds visualizations and dashboards to report…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
31 | Knowledge of data mining and data warehousing principles. |
Knowledge |
104 | Knowledge of query languages such as SQL (structured query language). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
166 | Skill in conducting queries and developing algorithms to analyze data structures. |
Skill |
201 | Skill in generating queries and reports. |
Skill |
1120 | Ability to interpret and incorporate data from multiple tool sources. |
Ability |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
5030 | Analyze data sources to provide actionable recommendations. |
Task |
5100 | Collect metrics and trending data. |
Task |
5270 | Develop strategic insights from large data sets. |
Task |
5430 | Present technical information to technical and non-technical audiences. |
Task |
5899 | Manipulate and clean large, disparate datasets for bulk analysis to identify connections. |
Task |
6130 | Ability to identify basic common coding flaws at a high level. |
Ability |
6180 | Ability to use data visualization tools (e.g., Flare, HighCharts, AmCharts, D3.js, Processing, Google Visualization API, Tableau, Raphael.js). |
Ability |
6300 | Knowledge of how to utilize Hadoop, Java, Python, SQL, Hive, and PIG to explore data. |
Knowledge |
6470A | Read, interpret, write, modify, and execute scripts, macros, and functions. |
Task |
6570 | Skill in identifying hidden patterns or relationships. |
Skill |
6710 | Skill in using basic descriptive statistics and techniques (e.g., normality, model distribution, scatter plots). |
Skill |
6720 | Skill in using data analysis tools (e.g., Excel, STATA SAS, SPSS). |
Skill |
6780 | Utilize different programming languages to write code, open files, read files, and write output to different files. |
Task |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7029 | Knowledge of how to collect, store, and monitor data. |
Knowledge |
7031 | Knowledge of how to structure and display data. |
Knowledge |
7032 | Knowledge of how to use data to tell a story. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
5030 | Analyze data sources to provide actionable recommendations. |
Task |
5440 | Present data in creative formats. |
Task |
5570 | Provide actionable recommendations to critical stakeholders based on data analysis and findings. |
Task |
5896 | Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI. |
Task |
6915A | Skill in communicating with all levels of the organization, including senior/mid-level executives, and operational-level personnel (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience). |
Skill |
7020 | Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable). |
Knowledge |
7036 | Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government. |
Knowledge |
796 | Provide a managed flow of relevant information (via web-based portals or other means) based on a mission requirements. |
Task |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Designs a system’s data models, data flow, interfaces, and infrastructure to meet the information requirements…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
28 | Knowledge of data administration and data standardization policies and standards. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
135 | Knowledge of the capabilities and functionality associated with various technologies for organizing and managing information (e.g., databases, bookmarking engines). |
Knowledge |
137 | Knowledge of the characteristics of physical and virtual data storage media. |
Knowledge |
187 | Skill in developing data models. |
Skill |
401 | Analyze and plan for anticipated changes in data capacity requirements. |
Task |
408 | Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application. |
Task |
466A | Consult with customers and key stakeholders to evaluate functional requirements for AI and data applications. |
Task |
815 | Provide recommendations on new database technologies and architectures. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5140 | Confer with systems analysts, engineers, programmers and others to design application. |
Task |
5841 | Advise higher level leadership on critical data management issues. |
Task |
5854 | Collaborate with appropriate personnel to address Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data resusability concerns for AI solutions. |
Task |
5885 | Examine and identify database structural necessities by evaluating operations, applications, and programming. |
Task |
5908 | Prepare database design and architecture reports. |
Task |
6190 | Effectively allocate storage capacity in the design of data management systems. |
Task |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7017 | Knowledge of data operations (DataOps) processes and best practices. |
Knowledge |
7029 | Knowledge of how to collect, store, and monitor data. |
Knowledge |
7060 | Skill in designing the best approach and architecture for automated data labeling and data lifecycle. |
Skill |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
28 | Knowledge of data administration and data standardization policies and standards. |
Knowledge |
296 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
5896 | Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI. |
Task |
6650 | Skill in developing machine understandable semantic ontologies. |
Skill |
7010 | Knowledge of container orchestration and resource management platforms. |
Knowledge |
7020 | Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable). |
Knowledge |
7025 | Knowledge of how AI solutions integrate with cloud or other IT infrastructure. |
Knowledge |
7026 | Knowledge of how commercial and federal solutions solve Defense-related data environment and platform challenges. |
Knowledge |
7028 | Knowledge of how to automate development, testing, security, and deployment of AI/machine learning-enabled software to the DoD. |
Knowledge |
7036 | Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government. |
Knowledge |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
952 | Knowledge of emerging security issues, risks, and vulnerabilities. |
Knowledge |
Holds responsibility for developing, promoting, and overseeing implementation of data as an asset and the…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
120 | Knowledge of sources, characteristics, and uses of the organization’s data assets. |
Knowledge |
296 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
524 | Develop and maintain strategic plans. |
Task |
529 | Develop data standards, policies, and procedures. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2416 | Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives. |
Task |
3591 | Knowledge of organization objectives, leadership priorities, and decision-making risks. |
Knowledge |
5841 | Advise higher level leadership on critical data management issues. |
Task |
5842 | Analyze existing and planned data investments to ensure they address key business problems, are compatible with the organization’s mission, and align with the target data architecture. |
Task |
5867 | Create policies for effective data management (e.g., data sharing agreements and security policies). |
Task |
5869 | Demonstrate to executive stakeholders how data and analytics initiatives address agency challenges. |
Task |
5874 | Develop a data management strategy that helps to prioritize investments and resource allocations (e.g., data analytics, data infrastructure). |
Task |
5875 | Develop an organizational change management plan to support a data management strategy. |
Task |
5886 | Facilitate cross-sharing of best practices for data usage. |
Task |
5894 | Lead the development and documentation of solutions for assigned data analytical objectives and projects. |
Task |
5895 | Lead the improvement of data system design processes that affect the success and continuation of key programs. |
Task |
5896 | Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI. |
Task |
5898 | Manage risk to the data program. |
Task |
5903 | Oversee the management of data classification and handling requirements. |
Task |
5913 | Remove barriers to data acquisition, collection, and curation efforts required for AI solutions. |
Task |
5917 | Set strategic priorities by leveraging data insights. |
Task |
6040 | Ability to assess and forecast manpower requirements to meet organizational objectives. |
Ability |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6915A | Skill in communicating with all levels of the organization, including senior/mid-level executives, and operational-level personnel (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience). |
Skill |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7001 | Ability to inspire and lead a culture of innovation. |
Ability |
7014 | Knowledge of data acquisition, collection, and curation best practices required for AI solutions. |
Knowledge |
7015 | Knowledge of data architecture and data services implementation. |
Knowledge |
7016 | Knowledge of data model development (e.g., conceptual, logical, and physical). |
Knowledge |
7019 | Knowledge of data security roles and responsibilities. |
Knowledge |
7020 | Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable). |
Knowledge |
7029 | Knowledge of how to collect, store, and monitor data. |
Knowledge |
7036 | Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government. |
Knowledge |
7063 | Skill in developing enterprise-level/Agency-level policies. |
Skill |
7074 | Skill in performing strategic-level analysis to develop Enterprise Data Management (EDM) strategies. |
Skill |
7083 | Ability to measure human systems interaction (usability, workload, system trust). |
Ability |
7110 | Ability to understand technology, management, and leadership issues related to organization processes and problem solving. |
Ability |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1018 | Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals. |
Task |
2558 | Maintain relationships with internal and external partners involved in cyber planning or related areas. |
Task |
3146 | Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3356 | Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations. |
Knowledge |
559C | Oversee the evaluation of contracts to ensure compliance with funding, legal, and program requirements. |
Task |
6250 | Knowledge of Workforce Framework, work roles, and associated tasks, knowledge, skills, and abilities. |
Knowledge |
6290 | Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems. |
Knowledge |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Builds, manages, and operationalizes data pipelines.
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
28 | Knowledge of data administration and data standardization policies and standards. |
Knowledge |
31 | Knowledge of data mining and data warehousing principles. |
Knowledge |
32 | Knowledge of database management systems, query languages, table relationships, and views. |
Knowledge |
104 | Knowledge of query languages such as SQL (structured query language). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
179B | Skill in establishing data security controls. |
Skill |
186 | Skill in developing data dictionaries. |
Skill |
400A | Implement data management standards, requirements, and specifications. |
Task |
520B | Develop and implement data mining and data warehousing programs. |
Task |
543 | Develop secure code and error handling. |
Task |
702 | Manage the compilation, cataloging, caching, distribution, and retrieval of data. |
Task |
764 | Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities. |
Task |
858B | Record and manage test data. |
Task |
1128 | Knowledge of Java-based database access application programming interface (API) (e.g., Java Database Connectivity [JDBC]). |
Knowledge |
1128A | Knowledge of database access application programming interfaces (APIs) (e.g., Java Database Connectivity [JDBC]). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
3722 | Skill in data mining techniques (e.g., searching file systems) and analysis. |
Skill |
5550 | Program custom algorithms. |
Task |
5841 | Advise higher level leadership on critical data management issues. |
Task |
5844 | Apply data acquisition, cleaning, transformation, and ingestion best practices for machine learning data conduits. |
Task |
5846 | Assess and address the limitations of methods to deliver data. |
Task |
5850 | Assist integrated project teams to identify, curate, and manage data. |
Task |
5852 | Build automated data management conduits. |
Task |
5857 | Comply with data classification and handling requirements through access control and security best practices. |
Task |
5899 | Manipulate and clean large, disparate datasets for bulk analysis to identify connections. |
Task |
6060 | Ability to collect, verify, and validate test data. |
Ability |
6300 | Knowledge of how to utilize Hadoop, Java, Python, SQL, Hive, and PIG to explore data. |
Knowledge |
6470 | Read, interpret, write, modify, and execute simple scripts (e.g., PERL, VBS) on Windows and UNIX systems (e.g., those that perform tasks such as: parsing large data files, automating manual tasks, and fetching/processing remote data). |
Task |
6520 | Skill in data pre-processing (e.g., imputation, dimensionality reduction, normalization, transformation, extraction, filtering, smoothing). |
Skill |
6610 | Skill in performing format conversions to create a standard representation of the data. |
Skill |
6690 | Skill in transformation analytics (e.g., aggregation, enrichment, processing). |
Skill |
6730 | Skill in using data mapping tools. |
Skill |
6760 | Skill in writing scripts using R, Python, PIG, HIVE, SQL, etc. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7017 | Knowledge of data operations (DataOps) processes and best practices. |
Knowledge |
7019 | Knowledge of data security roles and responsibilities. |
Knowledge |
7029 | Knowledge of how to collect, store, and monitor data. |
Knowledge |
7062 | Skill in developing and maintaining automation scripts. |
Skill |
7066 | Skill in identifying data acquisition, collection, and curation risks. |
Skill |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
520A | Implement data mining and data warehousing applications. |
Task |
5854 | Collaborate with appropriate personnel to address Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data resusability concerns for AI solutions. |
Task |
5896 | Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI. |
Task |
7010 | Knowledge of container orchestration and resource management platforms. |
Knowledge |
7020 | Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable). |
Knowledge |
7025 | Knowledge of how AI solutions integrate with cloud or other IT infrastructure. |
Knowledge |
7028 | Knowledge of how to automate development, testing, security, and deployment of AI/machine learning-enabled software to the DoD. |
Knowledge |
7036 | Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government. |
Knowledge |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Uncovers and explains actionable insights from data by combining scientific method, math and statistics, specialized…
KSAT ID | Description | KSAT |
---|---|---|
21A | Knowledge of statistical/machine learning algorithms. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
75A | Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis. |
Knowledge |
102 | Knowledge of programming language structures and logic. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
166 | Skill in conducting queries and developing algorithms to analyze data structures. |
Skill |
172 | Skill in creating and utilizing mathematical or statistical models. |
Skill |
1120 | Ability to interpret and incorporate data from multiple tool sources. |
Ability |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
3080 | Ability to use and understand complex mathematical concepts (e.g., discrete math). |
Ability |
3756 | Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Skill |
5030 | Analyze data sources to provide actionable recommendations. |
Task |
5120 | Conduct hypothesis testing using statistical processes. |
Task |
5550 | Program custom algorithms. |
Task |
5640 | Utilize technical documentation or resources to implement a new mathematical, data science, or computer science method. |
Task |
5853 | Build predictive, prescriptive, or descriptive models in collaboration with stakeholders. |
Task |
5906 | Plan and conduct complex analytical, mathematical, and statistical research that informs operational requirements. |
Task |
5907 | Plan, coordinate, and execute complex studies using advanced data modeling techniques and procedures, data trend analysis, and data algorithms. |
Task |
5924 | Train and evaluate machine learning models. |
Task |
5927 | Write and document reproducible code. |
Task |
6050 | Ability to build complex data structures and high-level programming languages. |
Ability |
6060 | Ability to collect, verify, and validate test data. |
Ability |
6120 | Ability to dissect a problem and examine the interrelationships between data that may appear unrelated. |
Ability |
6490 | Skill in assessing the predictive power and subsequent generalizability of a model. |
Skill |
6570 | Skill in identifying hidden patterns or relationships. |
Skill |
6651 | Skill in Regression Analysis (e.g., Hierarchical Stepwise, Generalized Linear Model, Ordinary Least Squares, Tree-Based Methods, Logistic). |
Skill |
6750 | Skill in using outlier identification and removal techniques. |
Skill |
6760 | Skill in writing scripts using R, Python, PIG, HIVE, SQL, etc. |
Skill |
6790A | Utilize open source languages, as appropriate, and apply quantitative techniques (e.g., descriptive and inferential statistics, sampling, experimental design, parametric and non-parametric tests of difference, ordinary least squares regression, general line). |
Task |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7002 | Assist integrated project teams identify, curate, and manage test data. |
Task |
7029 | Knowledge of how to collect, store, and monitor data. |
Knowledge |
7071 | Skill in labeling data to make it more discoverable and understandable. |
Skill |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
35 | Knowledge of digital rights management. |
Knowledge |
506 | Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design. |
Task |
5854 | Collaborate with appropriate personnel to address Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data resusability concerns for AI solutions. |
Task |
5884 | Evaluate energy implications (graphical processing unit, tensor processing unit, etc.) when designing AI solutions. |
Task |
5896 | Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI. |
Task |
5907 | Plan, coordinate, and execute complex studies using advanced data modeling techniques and procedures, data trend analysis, and data algorithms. |
Task |
6290 | Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems. |
Knowledge |
6651 | Skill in Regression Analysis (e.g., Hierarchical Stepwise, Generalized Linear Model, Ordinary Least Squares, Tree-Based Methods, Logistic). |
Skill |
7020 | Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable). |
Knowledge |
7036 | Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government. |
Knowledge |
7078 | Skill in using deep learning approaches to build machine learning models. |
Skill |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Develops and maintains plans, policies, and processes for data management, data governance, security, quality, accessibility,…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
28 | Knowledge of data administration and data standardization policies and standards. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
186 | Skill in developing data dictionaries. |
Skill |
400A | Implement data management standards, requirements, and specifications. |
Task |
400 | Analyze and define data requirements and specifications. |
Task |
702 | Manage the compilation, cataloging, caching, distribution, and retrieval of data. |
Task |
918 | Ability to prepare and deliver education and awareness briefings to ensure that systems, network, and data users are aware of and adhere to systems security policies and procedures. |
Ability |
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5080 | Assess the validity of source data and subsequent findings. |
Task |
5380A | Review feedback on customer satisfaction and internal service performance to foster continual improvement. |
Task |
5850 | Assist integrated project teams to identify, curate, and manage data. |
Task |
5854 | Collaborate with appropriate personnel to address Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data resusability concerns for AI solutions. |
Task |
5855 | Collaborate with data owners to establish data quality rules and definitions. |
Task |
5864 | Create data catalogs and dictionaries. |
Task |
5865 | Create metrics that characterize the usability, timeliness, completeness, and accuracy of data for multiple users to reference and use. |
Task |
5888 | Identify and document customer requirements when on-boarding new data assets. |
Task |
5897 | Manage compliance with data classification and handling requirements. |
Task |
5911 | Recommend data collection, integration, and retention requirements. |
Task |
6060 | Ability to collect, verify, and validate test data. |
Ability |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6915A | Skill in communicating with all levels of the organization, including senior/mid-level executives, and operational-level personnel (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience). |
Skill |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7018 | Knowledge of data protection standards and frameworks to prevent unauthorized access to data, and safeguard against unauthorized disclosure of data. |
Knowledge |
7019 | Knowledge of data security roles and responsibilities. |
Knowledge |
7029 | Knowledge of how to collect, store, and monitor data. |
Knowledge |
7036 | Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government. |
Knowledge |
7040 | Knowledge of Personal Health Information (PHI), Personally Identifiable Information (PII), and other data privacy and data reusability considerations for AI solutions. |
Knowledge |
7071 | Skill in labeling data to make it more discoverable and understandable. |
Skill |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
296 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
466A | Consult with customers and key stakeholders to evaluate functional requirements for AI and data applications. |
Task |
5896 | Maintain current knowledge of advancements in DoD AI Ethical Principles and Responsible AI. |
Task |
6650 | Skill in developing machine understandable semantic ontologies. |
Skill |
7020 | Knowledge of DoD AI Ethical Principles (e.g., responsible, equitable, traceable, reliable, and governable). |
Knowledge |
7035 | Knowledge of key decision-support needs and questions to drive prioritization of data efforts. |
Knowledge |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Administers databases and/or data management systems that allow for the storage, query, and utilization of…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
28 | Knowledge of data administration and data standardization policies and standards. |
Knowledge |
29 | Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools. |
Knowledge |
32 | Knowledge of database management systems, query languages, table relationships, and views. |
Knowledge |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
98 | Knowledge of policy-based and risk adaptive access controls. |
Knowledge |
104 | Knowledge of query languages such as SQL (structured query language). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
137 | Knowledge of the characteristics of physical and virtual data storage media. |
Knowledge |
179B | Skill in establishing data security controls. |
Skill |
208 | Skill in maintaining databases. |
Skill |
213 | Skill in optimizing database performance. |
Skill |
401 | Analyze and plan for anticipated changes in data capacity requirements. |
Task |
664A | Install and configure database management systems and software. |
Task |
684 | Maintain database management systems software. |
Task |
712 | Monitor and maintain databases to ensure optimal performance. |
Task |
740 | Perform backup and recovery of databases to ensure data integrity. |
Task |
815 | Provide recommendations on new database technologies and architectures. |
Task |
910 | Knowledge of database theory. |
Knowledge |
952 | Knowledge of emerging security issues, risks, and vulnerabilities. |
Knowledge |
1123A | Knowledge of current and emerging data encryption (e.g., Column and Tablespace Encryption, file and disk encryption) security features in databases, including built-in cryptographic key management features. |
Knowledge |
1128A | Knowledge of database access application programming interfaces (APIs) (e.g., Java Database Connectivity [JDBC]). |
Knowledge |
1154 | Performs configuration management, problem management, capacity management, and financial management for databases and data management systems. |
Task |
1155 | Supports incident management, service level management, change management, release management, continuity management, and availability management for databases and data management systems. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5890 | Identify data consolidation opportunities across database systems, including data sharing and access between business lines. |
Task |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7029 | Knowledge of how to collect, store, and monitor data. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1124A | Knowledge of current and emerging data remediation security features in databases. |
Knowledge |
31 | Knowledge of data mining and data warehousing principles. |
Knowledge |
520A | Implement data mining and data warehousing applications. |
Task |
6945 | Skill in migrating workloads to, from, and among the different cloud computing service models. |
Skill |
7036 | Knowledge of laws, regulations, and policies related to AI, data security/privacy, and use of publicly procured data for government. |
Knowledge |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Selects/Deploys/Maintains the set of Continuous Integration/Continuous Deployment (CI/CD) tools and processes used by the development…
KSAT ID | Description | KSAT |
---|---|---|
3C | Skill in recognizing vulnerabilities in information and/or data systems. |
Skill |
3B | Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks. |
Skill |
4 | Ability to identify systemic security issues based on the analysis of vulnerability and configuration data. |
Ability |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
34 | Knowledge of database systems. |
Knowledge |
58 | Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
130 | Knowledge of systems testing and evaluation methods. |
Knowledge |
130A | Knowledge of systems security testing and evaluation methods. |
Knowledge |
142A | Knowledge of the operations and processes for incident, problem, and event management. |
Knowledge |
144 | Knowledge of the systems engineering process. |
Knowledge |
190 | Skill in developing operations-based testing scenarios. |
Skill |
238A | Skill in writing code in a currently supported programming language (e.g., Java, C++). |
Skill |
412A | Analyze the results of software, hardware, or interoperability testing. |
Task |
420 | Apply security policies to meet security objectives of the system. |
Task |
421a | Apply security architecture principles to meet organization’s confidentiality, integrity, and availability requirements. |
Task |
452 | Conduct functional and connectivity testing to ensure continuing operability. |
Task |
559B | Analyze and report system security posture trends. |
Task |
568 | Employ secure configuration management processes. |
Task |
572 | Ensure application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment. |
Task |
576 | Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level. |
Task |
653B | Implement security measures to mitigate or remediate vulnerabilities and security deficiencies, and provide justification for acceptance of residual risk. |
Task |
661A | Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation. |
Task |
708A | Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance for the appropriate senior leader or authorized representative. |
Task |
726 | Oversee and make recommendations regarding configuration management. |
Task |
729A | Verify minimum security requirements are in place for all applications. |
Task |
754 | Perform cybersecurity testing of developed applications and/or systems. |
Task |
880A | Work with stakeholders to resolve computer security incidents and vulnerability compliance. |
Task |
1037A | Knowledge of information technology (IT) risk management policies, requirements, and procedures. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2054 | Assess the effectiveness of security controls. |
Task |
3030 | Ability to conduct vulnerability scans and recognize vulnerabilities in security systems. |
Ability |
3822 | Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results. |
Skill |
5940 | Work with designers and developers throughout the design, development and testing process. |
Task |
5939 | Choose and deploy the appropriate automated application security testing tools. |
Task |
5941 | Utilize tools and techniques like risk assessment, threat modeling, and cybersecurity to detect and analyze the threats. |
Task |
5942 | Work with Security Engineers to ensure that all security threats are dealt with during the development phase. |
Task |
5943 | Work with Automation tools are used to identify the vulnerabilities. |
Task |
5944 | Identify and implement tooling for controlling the steps in a continuous integration (CI) and continuous deployment (CD) pipeline. |
Task |
5945 | Develop and implement automatic test tools in a CI/CD pipeline, which could include Static Application Security Test (SAST) tools, Dynamic Application Security Test (DAST) tools, Unit Test tools, Static Code Analysis (SCA) tools, etc. |
Task |
5946 | Develop code within a CI/CD Pipeline. |
Task |
5947 | Select appropriate language and coding standards for software application for appropriate Continuous Integration/Continuous Deployment (CI/CD) framework. |
Task |
5948 | Apply testing activities, understands fault vs. failures, conduct basic test planning, develop test selection or adequacy criteria, crafts test documentation, ensures test coverages, and conducts automated testing. |
Task |
5950 | Develop and deploy software using continuous integration methods, processes, and tools, including test case writing against completion criteria (for each release, capability, micro-service, or component), build automation, and build processes. |
Task |
5953 | Provide DevSecOps guidance to leadership. |
Task |
5955 | Work closely with development teams to provide and support the environment needed to deliver an organization’s services. |
Task |
6090 | Ability to develop curriculum for use within a virtual environment. |
Ability |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7087 | Knowledge of programming languages. |
Knowledge |
7088 | Knowledge of continuous integration/continuous deployment (CI/CD) processes and pipeline tools. |
Knowledge |
7089 | Knowledge of portable, extensible, open source platform for managing containerized workloads and services. |
Knowledge |
7090 | Knowledge of cloud hosting providers. |
Knowledge |
7091 | Knowledge of threat modeling, risk assessment techniques, code reviews, current best practices and the latest cybersecurity threats. |
Knowledge |
7092 | Knowledge of how security impacts each development phase and the services. |
Knowledge |
7093 | Knowledge of a Continuous Integration/Continuous Deployment (CI/CD) environment and processes. |
Knowledge |
7094 | Knowledge of the steps for release to higher levels of integration testing, certification activities, and/or operations using testbeds, modeling and simulation to synchronize software releases with the development of an operations environment(s) to ensure compatibility. |
Knowledge |
7095 | Knowledge of every stage in the software project lifecycle, from initial design and build to rollout and maintenance. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1040A | Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure. |
Knowledge |
1139A | Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption. |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
21 | Knowledge of computer algorithms. |
Knowledge |
220 | Skill in systems integration testing. |
Skill |
225A | Skill in the use of penetration testing tools and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems). |
Skill |
25B | Knowledge of encryption algorithms. |
Knowledge |
27A | Knowledge of cryptology. |
Knowledge |
3642 | Knowledge of various types of computer architectures. |
Knowledge |
5050 | Assess all the configuration management (change configuration/release management) processes. |
Task |
571 | Ensure all systems security operations and maintenance activities are properly documented and updated as necessary. |
Task |
5949 | Transition embedded and non-embedded software developed and sustained using traditional software methods into a DevSecOps environment. |
Task |
5951 | Select and implement telemetry within the CI/CD pipeline and Ops software to support metrics and problem discovery and resolution. |
Task |
5954 | Build test interfaces and perform complex integration. |
Task |
6240 | Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE). |
Knowledge |
717A | Assess and monitor cybersecurity related to system implementation and testing practices. |
Task |
75B | Knowledge of statistics. |
Knowledge |
765 | Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. |
Task |
795 | Properly document all systems security implementation, operations and maintenance activities and update as necessary. |
Task |
806A | Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities. |
Task |
809 | Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). |
Task |
876 | Verify and update security documentation reflecting the application/system security design features. |
Task |
938A | Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans. |
Task |
94 | Knowledge of parallel and distributed computing concepts. |
Knowledge |
The DNEA analyzes intercepted intelligence information for metadata and content. They use this data to…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1056 | Knowledge of operations security. |
Knowledge |
1107 | Identify and analyze anomalies in network traffic using metadata (e.g., CENTAUR). |
Task |
1112 | Reconstruct a malicious attack or activity based off network traffic. |
Task |
2001 | Accurately characterize targets. |
Task |
2059 | Provide expertise to course of action development. |
Task |
2066 | Provide expertise to the development of measures of effectiveness and measures of performance. |
Task |
2072 | Perform analysis for target infrastructure exploitation activities. |
Task |
2081 | Classify documents in accordance with classification guidelines. |
Task |
2087 | Collaborate with intelligence analysts/targeting organizations involved in related areas. |
Task |
2099 | Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets. |
Task |
2101 | Identify and conduct analysis of target communications to identify information essential to support operations. |
Task |
2102 | Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access. |
Task |
2127 | Conduct quality control in order to determine validity and relevance of information gathered about networks. |
Task |
2134 | Conduct target research and analysis. |
Task |
2194 | Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities. |
Task |
2195 | Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology. |
Task |
2235 | Determine how identified factors affect the tasking, collection, processing, exploitation and dissemination architecture’s form and function. |
Task |
2236 | Determine if information meets reporting requirements. |
Task |
2243 | Determine what technologies are used by a given target. |
Task |
2251 | Apply analytic techniques to gain more target information. |
Task |
2289 | Develop measures of effectiveness and measures of performance. |
Task |
2356 | Engage customers to understand customers’ intelligence needs and wants. |
Task |
2373 | Establish alternative processing, exploitation and dissemination pathways to address identified issues or problems. |
Task |
2393 | Generate and evaluate the effectiveness of network analysis strategies. |
Task |
2400 | Examine intercept-related metadata and content with an understanding of targeting significance. |
Task |
2427 | Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.) |
Task |
2429 | Generate requests for information. |
Task |
2434 | Identify threat tactics, and methodologies. |
Task |
244 | Ability to determine the validity of technology trend data. |
Ability |
2441 | Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
2453 | Identify collection gaps and potential collection strategies against targets. |
Task |
2458 | Identify critical target elements. |
Task |
2459 | Identify intelligence gaps and shortfalls. |
Task |
2469 | Identify network components and their functionality to enable analysis and target development. |
Task |
2515 | Initiate requests to guide tasking and assist with collection management. |
Task |
2542 | Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications. |
Task |
2568 | Make recommendations to guide collection in support of customer requirements. |
Task |
2608 | Monitor target networks to provide indications and warning of target communications changes or processing failures. |
Task |
2621 | Provide SME and support to planning/developmental forums and working groups as appropriate. |
Task |
2628 | Participate in exercises. |
Task |
2628A | Provide subject matter expertise to development of exercises. |
Task |
2639 | Perform content and/or metadata analysis to meet organization objectives. |
Task |
2714 | Produce network reconstructions. |
Task |
2719 | Profile targets and their activities. |
Task |
2770 | Provide time sensitive targeting support. |
Task |
2779 | Review appropriate information sources to determine validity and relevance of information gathered. |
Task |
2781 | Reconstruct networks in diagram or report format. |
Task |
2798 | Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources. |
Task |
2818 | Sanitize and minimize information to protect sources and methods. |
Task |
282 | Knowledge of emerging computer-based technology that has potential for exploitation by adversaries. |
Knowledge |
2840 | Support identification and documentation of collateral effects. |
Task |
2894 | Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination. |
Task |
2897 | Conduct analysis of target communications to identify essential information in support of organization objectives. |
Task |
2902 | Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing. |
Task |
2905 | Identify target communications within the global network. |
Task |
2906 | Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis. |
Task |
2909 | Provide feedback to collection managers to enhance future collection and analysis. |
Task |
2912 | Perform or support technical network analysis and mapping. |
Task |
2919 | Perform social network analysis and document as appropriate. |
Task |
2922 | Tip critical or time-sensitive information to appropriate customers. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3002 | Ability to focus research efforts to meet the customer’s decision-making needs. |
Ability |
3020 | Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information. |
Ability |
3021 | Ability to collaborate effectively with others. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3047 | Ability to function effectively in a dynamic, fast-paced environment. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3052 | Ability to identify intelligence gaps. |
Ability |
3073 | Ability to recognize and mitigate cognitive biases which may affect analysis. |
Ability |
3074 | Ability to recognize and mitigate deception in reporting and analysis. |
Ability |
3077 | Ability to think critically. |
Ability |
3078 | Knowledge of target methods and procedures. |
Knowledge |
3081 | Ability to utilize multiple intelligence sources across all intelligence disciplines. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3113 | Knowledge of target intelligence gathering and operational preparation techniques and life cycles. |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3146 | Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3158 | Knowledge of cyber operation objectives, policies, and legalities. |
Knowledge |
3166 | Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies. |
Knowledge |
3172 | Knowledge of collection sources including conventional and non-conventional sources. |
Knowledge |
3174 | Knowledge of the intelligence requirements development and request for information processes. |
Knowledge |
3179 | Knowledge of common networking devices and their configurations. |
Knowledge |
3181 | Knowledge of common reporting databases and tools. |
Knowledge |
3219 | Knowledge of cyber operations. |
Knowledge |
321A | Knowledge of industry technologies and how differences affect exploitation/vulnerabilities. |
Knowledge |
3237 | Knowledge of denial and deception techniques. |
Knowledge |
3242 | Knowledge of document classification procedures, policy, resources, and personnel. |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3277 | Knowledge of general SCADA system components. |
Knowledge |
3288 | Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless). |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3296 | Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http). |
Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3324 | Knowledge of information and collateral intelligence sources. |
Knowledge |
3338 | Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions. |
Knowledge |
3346 | Knowledge of Internet and routing protocols. |
Knowledge |
3348 | Knowledge of intrusion detection systems and signature development. |
Knowledge |
3372 | Knowledge of malware analysis and characteristics. |
Knowledge |
3382 | Knowledge of methods to integrate and summarize information from any potential sources. |
Knowledge |
3386 | Knowledge of midpoint collection (process, objectives, organization, targets, etc.). |
Knowledge |
3407 | Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3418 | Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors). |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3450 | Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure. |
Knowledge |
3505 | Knowledge of strategies and tools for target research. |
Knowledge |
3534 | Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference. |
Knowledge |
3542 | Knowledge of the basic structure, architecture, and design of converged applications. |
Knowledge |
3564 | Knowledge of the data flow from collection origin to repositories and tools. |
Knowledge |
3582 | Knowledge of the intelligence frameworks, processes, and related systems. |
Knowledge |
3595 | Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements. |
Knowledge |
3603 | Knowledge of the principal methods, procedures, and techniques of gathering information and producing intelligence. |
Knowledge |
3608 | Knowledge of the purpose and contribution of target templates. |
Knowledge |
3616 | Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
Knowledge |
3617 | Knowledge of the structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3637 | Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications). |
Knowledge |
3664 | Skill in identifying how a target communicates. |
Skill |
3667 | Skill in analyzing a target’s communication networks. |
Skill |
3671 | Skill in analyzing essential network data (e.g., router configuration files, routing protocols). |
Skill |
3678 | Skill in analyzing traffic to identify network devices. |
Skill |
3689 | Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses). |
Skill |
3692 | Skill in assessing the applicability of available analytical tools to various situations. |
Skill |
3708 | Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis. |
Skill |
3726 | Skill in depicting source or collateral data on a network map. |
Skill |
3742 | Skill in determining the physical location of network devices. |
Skill |
3765 | Skill in disseminating items of highest intelligence value in a timely manner. |
Skill |
3771 | Skill in evaluating data sources for relevance, reliability, and objectivity. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3773 | Skill in evaluating information to recognize relevance, priority, etc. |
Skill |
3774 | Skill in evaluating accesses for intelligence value. |
Skill |
3778 | Skill in exploiting/querying organizational and/or partner collection databases. |
Skill |
3787 | Skill in identifying a target’s communications networks. |
Skill |
3797 | Skill in identifying leads for target development. |
Skill |
3803 | Skill in identifying, locating, and tracking targets via geospatial analysis techniques |
Skill |
3810 | Skill in interpreting compiled and interpretive programming languages. |
Skill |
3812 | Skill in interpreting metadata and content as applied by collection systems. |
Skill |
3814 | Skill in using trace route tools and interpreting the results as they apply to network analysis and reconstruction. |
Skill |
3822 | Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results. |
Skill |
3828 | Skill in navigating network visualization software. |
Skill |
3860 | Skill in recognizing and interpreting malicious network activity in traffic. |
Skill |
3864 | Skill in recognizing relevance of information. |
Skill |
3865 | Skill in recognizing significant changes in a target’s communication patterns. |
Skill |
3866 | Skill in recognizing technical information that may be used for leads for metadata analysis. |
Skill |
3867A | Skill in recognizing technical information that may be used for target development including intelligence development. |
Skill |
3873 | Skill in researching essential information. |
Skill |
3874 | Skill in researching vulnerabilities and exploits utilized in traffic. |
Skill |
3885 | Skill in fusion analysis |
Skill |
3889 | Skill in survey, collection, and analysis of wireless LAN metadata. |
Skill |
3890 | Skill in synthesizing, analyzing, and prioritizing meaning across data sets. |
Skill |
3895 | Skill in target network anomaly identification (e.g., intrusions, dataflow or processing, target implementation of new technologies). |
Skill |
3908 | Skill in using research methods including multiple, different sources to reconstruct a target network. |
Skill |
3915 | Skill in using geospatial data and applying geospatial resources. |
Skill |
3923 | Skill in using non-attributable networks. |
Skill |
3951 | Skill in writing about facts and ideas in a clear, convincing, and organized manner. |
Skill |
4072 | Knowledge of collection systems, capabilities, and processes. |
Knowledge |
4073 | Knowledge of the feedback cycle in collection processes. |
Knowledge |
4078 | Knowledge of target or threat cyber actors and procedures. |
Knowledge |
4079 | Knowledge of basic cyber operations activity concepts (e.g., foot printing, scanning and enumeration, penetration testing, white/black listing). |
Knowledge |
4085 | Knowledge of approved intelligence dissemination processes. |
Knowledge |
4086 | Knowledge of relevant laws, regulations, and policies. |
Knowledge |
4088 | Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure). |
Knowledge |
4089 | Knowledge of target communication tools and techniques. |
Knowledge |
4090 | Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes). |
Knowledge |
4094 | Knowledge of networking and internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.). |
Knowledge |
4095 | Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML). |
Knowledge |
4097 | Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network. |
Knowledge |
4099 | Knowledge of customer information needs. |
Knowledge |
4106 | Knowledge of analytic tools and techniques. |
Knowledge |
4118 | Skill in identifying a target’s network characteristics. |
Skill |
4121 | Skill in assessing a target’s frame of reference (e.g., motivation, technical capability, organizational structure, sensitivities). |
Skill |
4123 | Skill in conducting research using all available sources. |
Skill |
4125 | Skill in complying with the legal restrictions for targeted information. |
Skill |
4128 | Skill in developing intelligence reports. |
Skill |
4129 | Skill in evaluating and interpreting metadata. |
Skill |
4134 | Skill in identifying intelligence gaps and limitations. |
Skill |
4141 | Skill in providing analysis on target-related matters (e.g., language, cultural, communications). |
Skill |
4160 | Skill in interpreting traceroute results, as they apply to network analysis and reconstruction. |
Skill |
4165 | Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption). |
Knowledge |
4166 | Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types. |
Knowledge |
4396 | Knowledge of basic cloud-based technologies and concepts. |
Knowledge |
4399 | Knowledge of basic Embedded Systems concepts. |
Knowledge |
4401 | Knowledge of basic reconnaissance activity concepts and techniques (foot printing, scanning and enumeration). |
Knowledge |
4420 | Knowledge of Critical Intelligence Communication (CRITIC) identification and reporting process. |
Knowledge |
4423 | Knowledge of cryptologic and SIGINT reporting and dissemination procedures. |
Knowledge |
4428 | Knowledge of cybersecurity concepts and principles. |
Knowledge |
4431 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
4460 | Knowledge of how and when to request assistance from the Cryptanalysis and Signals Analysis and/or CNO. |
Knowledge |
4470 | Knowledge of intelligence sources and their characteristics. |
Knowledge |
4490 | Knowledge of methods, tools, sources, and techniques used to research, integrate and summarize all-source information pertaining to target. |
Knowledge |
4523 | Knowledge of quality review process and procedures. |
Knowledge |
4533 | Knowledge of SIGINT laws and directives. |
Knowledge |
4539 | Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model). |
Knowledge |
4570 | Knowledge of the overall mission of the Cyber Mission Forces (CMF). |
Knowledge |
4578 | Knowledge of the specific missions for CMF (i.e., Cyber Mission Teams (CMT), National Mission Teams (NMT), Combat Support Team (CST), National Support Team (NST), Cyber Protection Team (CPT). |
Knowledge |
4582 | Knowledge of the U.S. SIGNIT System (USSS) authorities, responsibilities, and contributions to the cyberspace operations mission. |
Knowledge |
4601 | Skill in analyzing endpoint collection data. |
Skill |
4620 | Skill in developing and maintaining target profiles. |
Skill |
4631 | Skill in geolocating targets. |
Skill |
4643 | Skill in operational use of raw collection databases. |
Skill |
4645 | Skill in performing data fusion from all-source intelligence for geospatial analysis. |
Skill |
4646 | Skill in performing data fusion from all-source intelligence for network analysis and reconstruction (e.g., Single Table Inheritance (STIs), network maps). |
Skill |
4647 | Skill in performing data fusion from all-source intelligence. |
Skill |
4651 | Skill in providing feedback to enhance future collection and analysis. |
Skill |
4656 | Skill in recognizing exploitation opportunities. |
Skill |
4659 | Skill in recognizing the value of survey data. |
Skill |
4667 | Skill in selector normalization. |
Skill |
4669 | Skill in targeting (e.g., selectors). |
Skill |
8011 | Apply and/or develop analytic techniques to provide better intelligence. |
Task |
8013 | Apply customer requirements to the analysis process. |
Task |
8023 | Assist planners in the development of courses of action |
Task |
8063 | Develop analytical techniques to gain more target information. |
Task |
8064 | Develop and lead exercises |
Task |
8065 | Develop and maintain target profiles using appropriate corporate tools and databases (e.g. Target associations, activities, communication infrastructures, etc.). |
Task |
8081 | Document and disseminate analytic findings. |
Task |
8090 | Enable targeting offices to find new sources of collection. |
Task |
8100 | Evaluate the strengths and weaknesses of the intelligence source. |
Task |
8101 | Evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
8102 | Facilitate collaboration with customers, Intelligence and targeting organizations involved in related cyber areas. |
Task |
8108 | Identify and facilitate partner relationships to enhance mission capabilities |
Task |
8128 | Lead work role working groups/planning and development forums |
Task |
8137 | Manipulate information in mission relevant databases (e.g., converting data, generating reports). |
Task |
8138 | Mitigate collection gaps |
Task |
8145 | Perform network analysis to support new or continued collection. |
Task |
8157 | Produce digital network intelligence against specific named target sets. |
Task |
8164 | Provide expertise in support of operational effects generated through cyber activities. |
Task |
8173 | Provide intel target recommendations which meet leadership objectives. |
Task |
8191 | Select, build, and develop query strategies against appropriate collection databases. |
Task |
8205 | Understand technologies used by a given target |
Task |
8206 | Understand TTPs and methodologies to enable access ops or access vector opportunities. |
Task |
912 | Knowledge of collection management processes, capabilities, and limitations. |
Knowledge |
915 | Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
Knowledge |
959 | Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. |
Task |
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
38 | Knowledge of organization’s enterprise information security architecture system. |
Knowledge |
68A | Ability to build architectures and frameworks. |
Ability |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
82A | Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
141A | Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures. |
Knowledge |
143A | Knowledge of integrating the organization’s goals and objectives into the architecture. |
Knowledge |
144 | Knowledge of the systems engineering process. |
Knowledge |
413A | Analyze user needs and requirements to plan architecture. |
Task |
569A | Document and update as necessary all definition and architecture activities. |
Task |
579 | Ensure acquired or developed system(s) and architecture(s) are consistent with organization’s cybersecurity architecture guidelines. |
Task |
780A | Plan implementation strategy to ensure enterprise components can be integrated and aligned. |
Task |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1037B | Knowledge of program protection planning to include information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements. |
Knowledge |
1038B | Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability). |
Knowledge |
1073 | Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Knowledge |
108A | Knowledge of the DoD implementation of the Risk Management Framework (RMF) to include processes. |
Knowledge |
109A | Knowledge of configuration management techniques. |
Knowledge |
110 | Knowledge of key concepts in security management (e.g., Release Management, Patch Management). |
Knowledge |
111 | Knowledge of security system design tools, methods, and techniques. |
Knowledge |
1130 | Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions). |
Knowledge |
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1136A | Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud). |
Knowledge |
113A | Knowledge of N-tiered typologies including server and client operating systems. |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
1142 | Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Knowledge |
1147A | Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce. |
Task |
119 | Knowledge of software engineering. |
Knowledge |
130 | Knowledge of systems testing and evaluation methods. |
Knowledge |
132A | Ability to execute technology integration processes. |
Ability |
133 | Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers). |
Knowledge |
155 | Skill in applying and incorporating information technologies into proposed solutions. |
Skill |
180 | Skill in designing the integration of hardware and software solutions. |
Skill |
183 | Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
Skill |
183A | Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
Knowledge |
2014 | Analyze candidate architectures, allocate security services, and select security mechanisms. |
Task |
224 | Skill in design modeling and building use cases (e.g., unified modeling language). |
Skill |
2390 | Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents. |
Task |
2887 | Write detailed functional specifications that document the architecture development process. |
Task |
3153 | Knowledge of circuit analysis. |
Knowledge |
3246 | Knowledge of confidentiality, integrity, and availability requirements. |
Knowledge |
3307 | Knowledge of cybersecurity-enabled software products. |
Knowledge |
34 | Knowledge of database systems. |
Knowledge |
3642 | Knowledge of various types of computer architectures. |
Knowledge |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
42 | Knowledge of electrical engineering as applied to computer architecture, including circuit boards, processors, chips, and associated computer hardware. |
Knowledge |
43A | Knowledge of embedded systems. |
Knowledge |
46A | Knowledge of system fault tolerance methodologies. |
Knowledge |
483A | Captures and integrates essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event. |
Task |
484 | Define appropriate levels of system availability based on critical system functions and ensure system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration. |
Task |
502B | Develop enterprise architecture required to meet user needs. |
Task |
51 | Knowledge of how system components are installed, integrated, and optimized. |
Knowledge |
53A | Knowledge of risk assessments and authorization per Risk Management Framework processes. |
Knowledge |
602 | Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration. |
Task |
6030 | Ability to apply an organization’s goals and objectives to develop and maintain architecture. |
Ability |
6150 | Ability to optimize systems to meet enterprise performance requirements. |
Ability |
62 | Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
631 | Identify and prioritize critical business functions in collaboration with organizational stakeholders. |
Task |
6330 | Knowledge of multi-level/security cross domain solutions. |
Knowledge |
65A | Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression). |
Knowledge |
6680 | Skill in the use of design methods. |
Skill |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
6942 | Skill in designing or implementing cloud computing deployment models. |
Skill |
6945 | Skill in migrating workloads to, from, and among the different cloud computing service models. |
Skill |
69A | Knowledge of risk management processes and requirements per the Risk Management Framework (RMF). |
Knowledge |
70A | Knowledge of cybersecurity methods, such as firewalls, demilitarized zones, and encryption. |
Knowledge |
765A | Integrate results regarding the identification of gaps in security architecture. |
Task |
797 | Provide advice on project costs, design concepts, or design changes. |
Task |
809 | Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). |
Task |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
864A | Translate proposed capabilities into technical requirements. |
Task |
90 | Knowledge of operating systems. |
Knowledge |
92 | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
94 | Knowledge of parallel and distributed computing concepts. |
Knowledge |
993A | Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization’s enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]). |
Ability |
994A | Document how the implementation of a new system or new interface between systems impacts the current and target environment including but not limited to security posture. |
Task |
996B | Integrate key management functions as related to cyberspace. |
Task |
Executes decision-making authorities and establishes vision and direction for an organization’s cyber and cyber-related policies,…
KSAT ID | Description | KSAT |
---|---|---|
10 | Knowledge of application vulnerabilities. |
Knowledge |
15A | Knowledge of capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
150 | Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities. |
Knowledge |
173 | Skill in creating policies that reflect system security objectives. |
Skill |
321A | Knowledge of industry technologies and how differences affect exploitation/vulnerabilities. |
Knowledge |
391 | Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk. |
Task |
392 | Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program. |
Task |
395 | Advise senior management (e.g., CIO) on risk levels and security posture. |
Task |
396 | Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, and systems, and elements. |
Task |
424B | Assess policy needs and collaborate with stakeholders to develop policies to govern cyber activities. |
Task |
445 | Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders. |
Task |
475 | Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance. |
Task |
492A | Design/integrate a cyber strategy that outlines the vision, mission, and goals that align with the organization’s strategic plan. |
Task |
524 | Develop and maintain strategic plans. |
Task |
542A | Develop mitigation strategies to address cost, schedule, performance, and security risks. |
Task |
599 | Evaluate contracts to ensure compliance with funding, legal, and program requirements. |
Task |
600 | Evaluate cost benefit, economic, and risk analysis in decision making process. |
Task |
674 | Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information. |
Task |
679 | Lead and align information technology (IT) security priorities with the security strategy. |
Task |
680A | Lead and oversee budget, staffing, and contracting. |
Task |
680 | Lead and oversee information security budget, staffing, and contracting. |
Task |
711 | Monitor and evaluate the effectiveness of the enterprise’s cybersecurity safeguards to ensure they provide the intended level of protection. |
Task |
737B | Perform an information security risk assessment. |
Task |
797 | Provide advice on project costs, design concepts, or design changes. |
Task |
801 | Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans. |
Task |
801A | Provide enterprise cybersecurity and supply chain risk management guidance. |
Task |
807 | Provide input on security requirements to be included in statements of work and other appropriate procurement documents. |
Task |
810 | Provide leadership and direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities. |
Task |
848 | Recommend policy and coordinate review and approval. |
Task |
852 | Supervise or manage protective or corrective measures when an cybersecurity incident or vulnerability is discovered. |
Task |
919 | Promote awareness of security issues among management and ensure sound security principles are reflected in the organization’s vision and goals. |
Task |
947 | Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies. |
Task |
952 | Knowledge of emerging security issues, risks, and vulnerabilities. |
Knowledge |
962 | Identify security requirements specific to an information technology (IT) system in all phases of the System Life Cycle. |
Task |
963 | Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc. |
Task |
979 | Knowledge of supply chain risk management standards, processes, and practices. |
Knowledge |
1004A | Knowledge of information technology (IT) acquisition/procurement requirements. |
Knowledge |
1018 | Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals. |
Task |
1041 | Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate. |
Task |
1061A | Knowledge of the acquisition/procurement life cycle process. |
Knowledge |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1148B | Ensure supply chain, system, network, performance, and cyber security requirements are included in contract language and delivered. |
Task |
1148 | Develop contract language to ensure supply chain, system, network, and operational security are met. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2090 | Collaborate with other internal and external partner organizations on target access and operational issues. |
Task |
2091 | Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials). |
Task |
2416 | Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives. |
Task |
2558 | Maintain relationships with internal and external partners involved in cyber planning or related areas. |
Task |
2624 | Conduct long-range, strategic planning efforts with internal and external partners in cyber activities. |
Task |
2823 | Serve as a liaison with external partners. |
Task |
2839 | Supervise and assign work to programmers, designers, technologists and technicians and other engineering and scientific personnel. |
Task |
2894 | Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination. |
Task |
3011 | Ability to apply critical reading/thinking skills. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3057 | Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives. |
Ability |
3076 | Ability to tailor technical and planning information to a customer’s level of understanding. |
Ability |
3077 | Ability to think critically. |
Ability |
3994 | Ability to coordinate, collaborate and disseminate information to subordinate, lateral and higher-level organizations. |
Ability |
5170 | Coordinate with organizational manpower stakeholders to ensure appropriate allocation and distribution of human capital assets. |
Task |
5560 | Promote awareness of cyber policy and strategy as appropriate among management and ensure sound principles are reflected in the organization’s mission, vision, and goals. |
Task |
5767 | Collaborate on cyber privacy and security policies and procedures. |
Task |
5768 | Collaborate with cyber security personnel on the security risk assessment process to address privacy compliance and risk mitigation. |
Task |
5820 | Appoint and guide a team of IT security experts. |
Task |
5825 | Collaborate with key stakeholders to establish a cybersecurity risk management program |
Task |
6100 | Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities. |
Ability |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6915 | Skill in communicating with all levels of management including Board members (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience). |
Skill |
6920 | Ability to ensure information security management processes are integrated with strategic and operational planning processes. |
Ability |
6921 | Ability to ensure that senior officials within the organization provide information security for the information and systems that support the operations and assets under their control. |
Ability |
6922 | Ability to prioritize and allocate cybersecurity resources correctly and efficiently. |
Ability |
6923 | Ability to relate strategy, business, and technology in the context of organizational dynamics. |
Ability |
6925 | Ability to understand the basic concepts and issues related to cyber and its organizational impact. |
Ability |
6926 | Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list). |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
6947 | Skill to anticipate new security threats. |
Skill |
6948 | Skill to remain aware of evolving technical infrastructures. |
Skill |
6949 | Skill to use critical thinking to analyze organizational patterns and relationships. |
Skill |
7110 | Ability to understand technology, management, and leadership issues related to organization processes and problem solving. |
Ability |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1004 | Knowledge of critical information technology (IT) procurement requirements. |
Knowledge |
2058 | Assist and advise inter-agency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives. |
Task |
2328 | Develop, maintain, and assess cyber cooperation security agreements with external partners. |
Task |
2443 | Identify and manage security cooperation priorities with external partners. |
Task |
325 | Knowledge of secure acquisitions (e.g., relevant Contracting Officer’s Technical Representative [COTR] duties, secure procurement, supply chain risk management). |
Knowledge |
398 | Advocate organization’s official position in legal and legislative proceedings. |
Task |
5763 | Act as, or work with, counsel relating to business partner contracts. |
Task |
6160 | Ability to oversee the development and update of the lifecycle cost estimate. |
Ability |
6930 | Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations. |
Knowledge |
706 | Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency. |
Task |
949 | Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements. |
Task |
954 | Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk. |
Knowledge |
955B | Review and approve a supply chain security/risk management policy. |
Task |
965 | Knowledge of organization’s risk tolerance and/or risk management approach. |
Knowledge |
Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
102 | Knowledge of programming language structures and logic. |
Knowledge |
1032 | Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance. |
Task |
2029A | Apply and utilize authorized cyber capabilities to enable access to targeted networks. |
Task |
2033 | Apply cyber collection, environment preparation and engagement expertise to enable new exploitation and/or continued collection operations, or in support of customer requirements. |
Task |
2040 | Apply and obey applicable statutes, laws, regulations and policies. |
Task |
2063 | Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. |
Task |
2072 | Perform analysis for target infrastructure exploitation activities. |
Task |
2087 | Collaborate with intelligence analysts/targeting organizations involved in related areas. |
Task |
2090 | Collaborate with other internal and external partner organizations on target access and operational issues. |
Task |
2095 | Communicate new developments, breakthroughs, challenges and lessons learned to leadership, and internal and external customers. |
Task |
2102 | Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access. |
Task |
2114 | Conduct independent in-depth target and technical analysis including target-specific information (e.g., cultural, organizational, political) that results in access. |
Task |
2134 | Conduct target research and analysis. |
Task |
2194 | Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities. |
Task |
230 | Skill in using knowledge management technologies. |
Skill |
2400 | Examine intercept-related metadata and content with an understanding of targeting significance. |
Task |
2419 | Collaborate with developers, conveying target and technical knowledge in tool requirements submissions, to enhance tool development. |
Task |
2441 | Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
2461 | Identify gaps in our understanding of target technology and developing innovative collection approaches. |
Task |
2490 | Identify, locate, and track targets via geospatial analysis techniques. |
Task |
2534 | Lead or enable exploitation operations in support of organization objectives and target requirements. |
Task |
2542 | Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications. |
Task |
2608 | Monitor target networks to provide indications and warning of target communications changes or processing failures. |
Task |
2714 | Produce network reconstructions. |
Task |
2718 | Profile network or system administrators and their activities. |
Task |
2922 | Tip critical or time-sensitive information to appropriate customers. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3021 | Ability to collaborate effectively with others. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3024 | Ability to communicate effectively when writing. |
Ability |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3047 | Ability to function effectively in a dynamic, fast-paced environment. |
Ability |
3055A | Ability to select the appropriate implant to achieve operational goals. |
Ability |
3055B | Knowledge of basic implants. |
Knowledge |
3059 | Ability to interpret and translate customer requirements into operational action. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3101 | Ability to expand network access by conducting target analysis and collection in order to identify targets of interest. |
Ability |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3107 | Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.). |
Knowledge |
3113 | Knowledge of target intelligence gathering and operational preparation techniques and life cycles. |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3139 | Knowledge of basic principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis). |
Knowledge |
3146 | Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3155 | Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3166 | Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies. |
Knowledge |
3179 | Knowledge of common networking devices and their configurations. |
Knowledge |
3181 | Knowledge of common reporting databases and tools. |
Knowledge |
3191 | Knowledge of concepts for operating systems (e.g., Linux, Unix). |
Knowledge |
3201 | Knowledge of all relevant reporting and dissemination procedures. |
Knowledge |
3206 | Knowledge of current software and methodologies for active defense and system hardening. |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3226 | Knowledge of data flow process for terminal or environment collection. |
Knowledge |
3235 | Knowledge of deconfliction processes and procedures. |
Knowledge |
3253 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
Knowledge |
3256 | Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.). |
Knowledge |
3261 | Knowledge of evasion strategies and techniques. |
Knowledge |
3289 | Knowledge of how hubs, switches, routers work together in the design of a network. |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3296 | Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http). |
Knowledge |
3297 | Knowledge of how to establish priorities for resources. |
Knowledge |
3317 | Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP. |
Knowledge |
3346 | Knowledge of Internet and routing protocols. |
Knowledge |
3349 | Knowledge of intrusion sets. |
Knowledge |
3367 | Knowledge of all applicable statutes, laws, regulations and policies governing cyber targeting and exploitation. |
Knowledge |
3378 | Knowledge of methods and techniques used to detect various exploitation activities. |
Knowledge |
3386 | Knowledge of midpoint collection (process, objectives, organization, targets, etc.). |
Knowledge |
3407 | Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3410 | Knowledge of network topology. |
Knowledge |
3432 | Knowledge of identification and reporting processes. |
Knowledge |
345 | Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies. |
Knowledge |
3454 | Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, Panda, Kaspersky) and how differences affect exploitation/vulnerabilities. |
Knowledge |
3474 | Knowledge of scripting |
Knowledge |
3479 | Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation. |
Knowledge |
3480 | Knowledge of security implications of software configurations. |
Knowledge |
3505 | Knowledge of strategies and tools for target research. |
Knowledge |
3513 | Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems. |
Knowledge |
3525 | Knowledge of organizational and partner policies, tools, capabilities, and procedures. |
Knowledge |
3542 | Knowledge of the basic structure, architecture, and design of converged applications. |
Knowledge |
3564 | Knowledge of the data flow from collection origin to repositories and tools. |
Knowledge |
3587 | Knowledge of targeting cycles. |
Knowledge |
3622 | Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives. |
Knowledge |
363 | Skill in identifying gaps in technical capabilities. |
Skill |
3637 | Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications). |
Knowledge |
3658 | Knowledge of network collection procedures to include decryption capabilities/tools, techniques, and procedures. |
Knowledge |
3678 | Skill in analyzing traffic to identify network devices. |
Skill |
3715 | Skill in creating and extracting important information from packet captures. |
Skill |
3718 | Skill in creating plans in support of remote operations. |
Skill |
3718A | Skill in creating collection requirements in support of data acquisition activities. |
Skill |
3722 | Skill in data mining techniques (e.g., searching file systems) and analysis. |
Skill |
3726 | Skill in depicting source or collateral data on a network map. |
Skill |
3740 | Skill in determining installed patches on various operating systems and identifying patch signatures. |
Skill |
3741 | Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments. |
Skill |
3774 | Skill in evaluating accesses for intelligence value. |
Skill |
3778 | Skill in exploiting/querying organizational and/or partner collection databases. |
Skill |
3801 | Skill in identifying the devices that work at each level of protocol models. |
Skill |
3803 | Skill in identifying, locating, and tracking targets via geospatial analysis techniques |
Skill |
3810 | Skill in interpreting compiled and interpretive programming languages. |
Skill |
3812 | Skill in interpreting metadata and content as applied by collection systems. |
Skill |
3814 | Skill in using trace route tools and interpreting the results as they apply to network analysis and reconstruction. |
Skill |
3815 | Skill in interpreting vulnerability scanner results to identify vulnerabilities. |
Skill |
3818 | Skill in generating operation plans in support of mission and target requirements. |
Skill |
3828 | Skill in navigating network visualization software. |
Skill |
3837 | Skill in performing data fusion from existing intelligence for enabling new and continued collection. |
Skill |
3859 | Skill in reading, interpreting, writing, modifying, and executing simple scripts (e.g., PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data). |
Skill |
3860 | Skill in recognizing and interpreting malicious network activity in traffic. |
Skill |
3863 | Skill in recognizing midpoint opportunities and essential information. |
Skill |
3867 | Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information). |
Skill |
3874 | Skill in researching vulnerabilities and exploits utilized in traffic. |
Skill |
3894 | Skill in target development in direct support of collection operations. |
Skill |
3913 | Skill in using databases to identify target-relevant information. |
Skill |
3923 | Skill in using non-attributable networks. |
Skill |
3948 | Skill in verifying the integrity of all files. |
Skill |
3950 | Skill in writing (and submitting) requirements to meet gaps in technical capabilities. |
Skill |
5210 | Determine the extent of threats and recommend courses of action and countermeasures to mitigate risks. |
Task |
912 | Knowledge of collection management processes, capabilities, and limitations. |
Knowledge |
915 | Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
Knowledge |
Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
24 | Knowledge of concepts and practices of processing digital forensic data. |
Knowledge |
25A | Knowledge of encryption algorithms, stenography, and other forms of data concealment. |
Knowledge |
61 | Knowledge of incident response and handling methodologies. |
Knowledge |
90 | Knowledge of operating systems. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
217 | Skill in preserving evidence integrity according to standard operating procedures or national standards. |
Skill |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
287 | Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). |
Knowledge |
302 | Knowledge of investigative implications of hardware, Operating Systems, and network technologies. |
Knowledge |
310 | Knowledge of legal governance related to admissibility (e.g., Federal Rules of Evidence). |
Knowledge |
316 | Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data. |
Knowledge |
350 | Skill in analyzing memory dumps to extract information. |
Skill |
381 | Skill in using forensic tool suites (e.g., EnCase, Sleuthkit, FTK). |
Skill |
389 | Skill in physically disassembling PCs. |
Skill |
447 | Conduct analysis of log files, evidence, and other information in order to determine best methods for identifying the perpetrator(s) of a network intrusion. |
Task |
480 | Create a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes. This includes, but is not limited to, hard drives, floppy diskettes, CD, PDA, mobile phones, GPS, and all tape formats. |
Task |
482A | Detect and analyze encrypted data, stenography, alternate data streams and other forms of concealed data. |
Task |
541 | Provide technical summary of findings in accordance with established reporting procedures. |
Task |
564A | Document original condition of digital and/or associated evidence (e.g., via digital photographs, written reports, hash function checking). |
Task |
573 | Ensure chain of custody is followed for all digital media acquired in accordance with the Federal Rules of Evidence. |
Task |
613 | Examine recovered data for information of relevance to the issue at hand. |
Task |
636 | Identify digital evidence for examination and analysis in such a way as to avoid unintentional alteration. |
Task |
749 | Perform dynamic analysis to boot an “image” of a drive (without necessarily having the original drive) to see the intrusion as the user may have seen it, in a native environment. |
Task |
752 | Perform file signature analysis. |
Task |
753 | Perform hash comparison against established database. |
Task |
768 | Perform static media analysis. |
Task |
786 | Prepare digital media for imaging by ensuring data integrity (e.g., write blockers in accordance with standard operating procedures). |
Task |
817 | Provide technical assistance on digital evidence matters to appropriate personnel. |
Task |
839A | Review forensic images and other data sources (e.g., volatile data) for recovery of potentially relevant information. |
Task |
871 | Use specialized equipment and techniques to catalog, document, extract, collect, package, and preserve digital evidence. |
Task |
888 | Knowledge of types of digital forensics data and how to recognize them. |
Knowledge |
890 | Skill in conducting forensic analyses in multiple operating system environments (e.g., mobile device systems). |
Skill |
982 | Knowledge of electronic evidence law. |
Knowledge |
1081 | Perform virus scanning on digital media. |
Task |
1082 | Perform file system forensic analysis. |
Task |
1083 | Perform static analysis to mount an “image” of a drive (without necessarily having the original drive). |
Task |
1085 | Utilize deployable forensics tool kit to support operations as necessary. |
Task |
1086 | Knowledge of data carving tools and techniques (e.g., Foremost). |
Knowledge |
1092 | Knowledge of anti-forensics tactics, techniques, and procedures. |
Knowledge |
1093 | Knowledge of common forensics tool configuration and support applications (e.g., VMWare, WIRESHARK). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1033 | Knowledge of basic system administration, network, and operating system hardening techniques. |
Knowledge |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1084 | Perform static malware analysis. |
Task |
1087 | Skill in deep analysis of captured malicious code (e.g., malware forensics). |
Skill |
1088 | Skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump). |
Skill |
1089 | Knowledge of reverse engineering concepts. |
Knowledge |
1091 | Skill in one way hash functions (e.g., Secure Hash Algorithm [SHA], Message Digest Algorithm [MD5]). |
Skill |
1094 | Knowledge of debugging procedures and tools. |
Knowledge |
1095 | Knowledge of how different file types can be used for anomalous behavior. |
Knowledge |
1096 | Knowledge of malware analysis tools (e.g., Oily Debug, Ida Pro). |
Knowledge |
1097 | Knowledge of virtual machine aware malware, debugger aware malware, and packing. |
Knowledge |
1098 | Skill in analyzing anomalous code as malicious or benign. |
Skill |
1099 | Skill in analyzing volatile data. |
Skill |
1100 | Skill in identifying obfuscation techniques. |
Skill |
1101 | Skill in interpreting results of debugger to ascertain tactics, techniques, and procedures. |
Skill |
113 | Knowledge of server and client operating systems. |
Knowledge |
114 | Knowledge of server diagnostic tools and fault identification techniques. |
Knowledge |
139 | Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications. |
Knowledge |
193 | Skill in developing, testing, and implementing network infrastructure contingency and recovery plans. |
Skill |
214 | Skill in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). |
Skill |
29 | Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools. |
Knowledge |
290 | Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody). |
Knowledge |
294 | Knowledge of hacking methodologies in Windows or Unix/Linux environment. |
Knowledge |
340 | Knowledge of types and collection of persistent data. |
Knowledge |
345 | Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies. |
Knowledge |
346 | Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files. |
Knowledge |
360 | Skill in identifying and extracting data of forensic interest in diverse media (i.e., media forensics). |
Skill |
364 | Skill in identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files). |
Skill |
369 | Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data. |
Skill |
374 | Skill in setting up a forensic workstation. |
Skill |
386 | Skill in using virtual machines. |
Skill |
438A | Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise. |
Task |
463 | Confirm what is known about an intrusion and discover new information, if possible, after identifying intrusion via dynamic analysis. |
Task |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
649 | Identify, collect, and seize documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents, investigations, and operations. |
Task |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
758 | Perform real-time forensic analysis (e.g., using Helix in conjunction with LiveView). |
Task |
759 | Perform timeline analysis. |
Task |
771 | Perform tier 1, 2, and 3 malware analysis. |
Task |
792 | Process crime scenes. |
Task |
825 | Recognize and accurately report forensic artifacts indicative of a particular operating system. |
Task |
868 | Extract data using data carving techniques (e.g., Forensic Tool Kit [FTK], Foremost). |
Task |
870 | Capture and analyze network traffic associated with malicious activities using network monitoring tools. |
Task |
882 | Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies. |
Task |
889 | Knowledge of deployable forensics. |
Knowledge |
908 | Ability to decrypt digital data collections. |
Ability |
923 | Knowledge of security event correlation tools. |
Knowledge |
944 | Conduct cursory binary analysis. |
Task |
983 | Knowledge of legal rules of evidence and court procedure. |
Knowledge |
A Host Analyst (HA) will have knowledge of various system configurations encountered. This work role…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1033 | Knowledge of basic system administration, network, and operating system hardening techniques. |
Knowledge |
1037B | Knowledge of program protection planning to include information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements. |
Knowledge |
1038 | Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability. |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
1072A | Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Ability |
1073 | Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Knowledge |
109 | Knowledge of secure configuration management techniques. |
Knowledge |
109A | Knowledge of configuration management techniques. |
Knowledge |
110 | Knowledge of key concepts in security management (e.g., Release Management, Patch Management). |
Knowledge |
110A | Knowledge of security management. |
Knowledge |
111 | Knowledge of security system design tools, methods, and techniques. |
Knowledge |
1110 | Isolate and remove malware. |
Task |
1111 | Identify applications and operating systems of a network device based on network traffic. |
Task |
1113 | Identify network mapping and operating system (OS) fingerprinting activities. |
Task |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
117 | Knowledge of software design tools, methods, and techniques. |
Knowledge |
124 | Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools. |
Knowledge |
130 | Knowledge of systems testing and evaluation methods. |
Knowledge |
139 | Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications. |
Knowledge |
141A | Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures. |
Knowledge |
143A | Knowledge of integrating the organization’s goals and objectives into the architecture. |
Knowledge |
148 | Knowledge of Virtual Private Network (VPN) security. |
Knowledge |
15 | Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware. |
Knowledge |
150 | Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities. |
Knowledge |
155 | Skill in applying and incorporating information technologies into proposed solutions. |
Skill |
156 | Skill in applying confidentiality, integrity, and availability principles. |
Skill |
183A | Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
Knowledge |
202A | Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems. |
Skill |
205 | Skill in implementing, maintaining, and improving established network security practices. |
Skill |
2062 | Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the NE or enclave. |
Task |
2063 | Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. |
Task |
2119 | Conduct network scouting and vulnerability analyses of systems within a network. |
Task |
2205 | Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers). |
Task |
2226 | Detect exploits against targeted networks and hosts and react accordingly. |
Task |
2232 | Determine course of action for addressing changes to objectives, guidance, and operational environment. |
Task |
233 | Skill in using protocol analyzers. |
Skill |
2353 | Edit or execute simple scripts (e.g., PERL, VBS) on Windows and UNIX systems. |
Task |
2379B | Identify threats to Blue Force vulnerabilities. |
Task |
2429 | Generate requests for information. |
Task |
2603 | Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements. |
Task |
2611 | Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan. |
Task |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
270 | Knowledge of common adversary tactics, techniques, and procedures in assigned area of responsibility (i.e., historical country-specific tactics, techniques, and procedures; emerging capabilities). |
Knowledge |
27A | Knowledge of cryptology. |
Knowledge |
3002 | Ability to focus research efforts to meet the customer’s decision-making needs. |
Ability |
3063 | Ability to monitor system operations and react to events in response to triggers and/or observation of trends or unusual activity. |
Ability |
3130 | Knowledge of auditing and logging procedures (including server-based logging). |
Knowledge |
3140 | Knowledge of basic programming concepts (e.g., levels, structures, compiled vs. interpreted languages). |
Knowledge |
3141 | Knowledge of basic software applications (e.g., data storage and backup, database applications) and their vulnerabilities. |
Knowledge |
3153 | Knowledge of circuit analysis. |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3201 | Knowledge of all relevant reporting and dissemination procedures. |
Knowledge |
3206 | Knowledge of current software and methodologies for active defense and system hardening. |
Knowledge |
3222 | Knowledge of data backup and restoration concepts. |
Knowledge |
3253 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
Knowledge |
3261 | Knowledge of evasion strategies and techniques. |
Knowledge |
3270 | Knowledge of forensic implications of operating system structure and operations. |
Knowledge |
3317 | Knowledge of implementing Unix and Windows systems that provide radius authentication and logging, DNS, mail, web service, FTP server, DHCP, firewall, and SNMP. |
Knowledge |
3348 | Knowledge of intrusion detection systems and signature development. |
Knowledge |
3353 | Knowledge of the Risk Management Framework Assessment Methodology. |
Knowledge |
3378 | Knowledge of methods and techniques used to detect various exploitation activities. |
Knowledge |
34 | Knowledge of database systems. |
Knowledge |
3431 | Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). |
Knowledge |
3454 | Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, Panda, Kaspersky) and how differences affect exploitation/vulnerabilities. |
Knowledge |
3459 | Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization. |
Knowledge |
3479 | Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation. |
Knowledge |
3480 | Knowledge of security implications of software configurations. |
Knowledge |
350 | Skill in analyzing memory dumps to extract information. |
Skill |
3508 | Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network). |
Knowledge |
3513 | Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems. |
Knowledge |
3539 | Knowledge of telecommunications fundamentals. |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3637 | Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications). |
Knowledge |
3642 | Knowledge of various types of computer architectures. |
Knowledge |
3740 | Skill in determining installed patches on various operating systems and identifying patch signatures. |
Skill |
3777 | Skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools. |
Skill |
3801 | Skill in identifying the devices that work at each level of protocol models. |
Skill |
3815 | Skill in interpreting vulnerability scanner results to identify vulnerabilities. |
Skill |
3859 | Skill in reading, interpreting, writing, modifying, and executing simple scripts (e.g., PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data). |
Skill |
3859A | Ability to read, interpret, write, modify, and execute simple scripts (e.g. PERL, VBS) on Windows and Unix systems (e.g., those that perform tasks like parsing large data files, automating manual tasks, and fetching/processing remote data). |
Ability |
3871 | Skill in remote command line and Graphic User Interface (GUI) tool usage. |
Skill |
3948 | Skill in verifying the integrity of all files. |
Skill |
4095 | Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML). |
Knowledge |
4171 | Ability to analyze a finding of a compromise and develop a custom signature(s) and/or rule(s) to identify it throughout the network |
Ability |
4172 | Ability to analyze adversarial avenues of approach on a mission-critical system |
Ability |
4174 | Ability to analyze Data at Rest and Data in Transit encryption methodologies and assess Data at Rest and Data in Transit policies in support of identifying outliers to delineate possible avenues of approach. |
Ability |
4176 | Ability to analyze how the tools operate to enumerate the system |
Ability |
4179 | Ability to analyze multiple memory captures, determine anomalous behavior and developed a detailed report that includes timeline of compromise |
Ability |
4182 | Ability to analyze organizational policies and documentation for appropriate use and user privileges to determine current user access rights policies |
Ability |
4184 | Ability to analyze potentially malicious processes, libraries and modules on a system |
Ability |
4185 | Ability to analyze process lists within Windows, Unix, or Linux operating systems |
Ability |
4186 | Ability to analyze software installed and in use on a system, and on a host machine and compare it to the authorized software list provided by the network owner |
Ability |
4187 | Ability to analyze tools/hardware used to extract/analyze/capture memory and disk images |
Ability |
4188 | Ability to analyze user-mode/kernel mode rootkits and how they function and differ |
Ability |
4189 | Ability to analyze vulnerabilities and misconfiguration without Information Assurance artifacts. |
Ability |
4195 | Ability to build a baseline of configuration/state for host machines |
Ability |
4197 | Ability to capture a memory image from a host workstation |
Ability |
4198 | Ability to capture forensically sound memory and disk images with regard to timeline analysis |
Ability |
4206 | Ability to compare active user accounts on a network to appropriate Standard Operating Procedure (SOP), gather active user accounts on a network and compare to authorized user list |
Ability |
4207 | Ability to compare current state against baselines |
Ability |
4209 | Ability to compile group policies and access control lists from mission partner networks. |
Ability |
4210 | Ability to compile host-based firewall configurations and host intrusion prevention system through group policy modifications from mission partner networks. |
Ability |
4211 | Ability to conduct disk forensics on multiple images |
Ability |
4216 | Ability to configure log aggregation |
Ability |
4217 | Ability to configure, forward and statistically analyze logs |
Ability |
4225 | Ability to correlate indicators of compromise |
Ability |
4232 | Ability to de-obfuscate (e.g. command line execution, string substitution, clandestine side channel, Base64). |
Ability |
4234 | Ability to develop a risk defense plan (e.g. behavioral development, etc.) and put active measures in place in defense of a network, endpoint, and/or host. |
Ability |
4237 | Ability to develop dashboards to better visualize data |
Ability |
4238 | Ability to develop host-based IDS/IPS signatures and settings |
Ability |
4239 | Ability to develop the reporting and recording of discovered potentially malicious processes, libraries, and modules on a compromised system |
Ability |
4245 | Ability to enumerate domain security groups. |
Ability |
4246 | Ability to enumerate knowledge management applications (e.g. SharePoint) and their service accounts/security groups. |
Ability |
4247 | Ability to enumerate network shares and identify ACLs/security permissions and analyze for vulnerabilities/misconfigurations (e.g. SMB, NFS, ISCSI). |
Ability |
4250 | Ability to evaluate common Tactics, Techniques and Procedures (TTP) used in malware and open-source and Intelligence Community (IC) resources available to identify emerging TTPs |
Ability |
4251 | Ability to evaluate compliance with Security Technical Implementation Guides (STIGs) on host machines by utilizing a compliance scanner in support of identifying outliers in order to delineate possible avenues of approach |
Ability |
4252 | Ability to evaluate if patches are up to date for all hosts, determine current process for updating patches and determine current patch level for all hosts on a network according to NIST Special Publications 800-40 in support of identifying outliers in order to delineate possible avenues of approach. |
Ability |
4256 | Ability to evaluate rogue/unauthorized systems on a network |
Ability |
4257 | Ability to evaluate security posture shortcomings in group policy |
Ability |
4258 | Ability to evaluate steps taken after host-based IDS/IPS alerts, verify the finding and ensure its volatility |
Ability |
4259 | Ability to evaluate systems resiliency in adverse conditions |
Ability |
4262 | Ability to export/enumerate information (e.g., users, groups) from a Domain Controller. |
Ability |
4266 | Ability to identify activity context in log entries to correlate indicators of compromise. |
Ability |
4269 | Ability to identify anomalous network traffic on a host machine. |
Ability |
4273 | Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations. |
Ability |
4281 | Ability to identify new indicators of compromise through anomalous behavior in log entries. |
Ability |
4283 | Ability to identify security posture shortcomings |
Ability |
4284 | Ability to identify tools and techniques available for analyzing binary applications and interpreted scripts. |
Ability |
4287 | Ability to identify/select the most appropriate tools and solutions for the specific environment (e.g. disk/memory forensics/capture, host enumeration, application whitelisting, log aggregation and analysis, HIPS/HIDS solutions, etc.). |
Ability |
4288 | Ability to implement and configure host-based firewalls and host intrusion prevention systems |
Ability |
4289 | Ability to implement Data at Rest and Data in Transit encryption methodologies, Assess Data at Rest and Data in Transit polices. |
Ability |
4302 | Ability to measure known vulnerabilities against known vectors of approach. |
Ability |
4306 | Ability to monitor Active Directory (AD) for creation of unauthorized/potentially malicious accounts. |
Ability |
4309 | Ability to operate specified tools to enumerate a system. |
Ability |
4312 | Ability to organize Active Directories (AD) hierarchy structure. |
Ability |
4313 | Ability to organize logging and auditing procedures including server-based logging. |
Ability |
4315 | Ability to organize order of the volatility when capturing artifacts. |
Ability |
4318 | Ability to perform and analyze situational awareness commands within Windows, Unix, and Linux operating systems (e.g. system info, net stat, ipconfig, task list, ls, ifconfig, etc…) |
Ability |
4319 | Ability to perform and analyze vulnerability scans on host machines in support of identifying outliers in order to delineate possible avenues of approach. |
Ability |
4320 | Ability to perform complex root-cause analysis and recommend mitigations to determine root cause of an intrusion. |
Ability |
4323 | Ability to perform dynamic analysis. |
Ability |
4326 | Ability to perform static analysis. |
Ability |
4331 | Ability to prioritize how Operating System (OS) and application patches are distributed in different systems. |
Ability |
4332 | Ability to prioritize Operating Systems (OS) default processes, library, and modules based on boot order, dependencies, or key operations. |
Ability |
4337 | Ability to provide host analysis for Risk Mitigation Plan (RMP) to improve customer security overall posture. |
Ability |
4339 | Ability to provide mitigations to recover from a full network compromise. |
Ability |
4351 | Ability to select the best tools to enumerate a given set of host machines in order to validate whether they match known baselines. |
Ability |
4363 | Ability to use and integrate a Security Information and Event Management (SIEM) platform. |
Ability |
4371 | Ability to use host volatile data to compare active processes, libraries and modules against databases of known good/bad. |
Ability |
4375 | Ability to utilize Defense Information Systems Agency (DISA)/ Department of Defense (DoD) system configuration guidelines. |
Ability |
4390 | Knowledge of active directory federated services. |
Knowledge |
43A | Knowledge of embedded systems. |
Knowledge |
4413 | Knowledge of common information network malware (e.g., viruses, trojans, etc.) and vectors of attack (e.g., ports, attachments, etc.). |
Knowledge |
4415 | Knowledge of common obfuscation techniques (e.g. command line execution, string substitution, clandestine side channel, Base64). |
Knowledge |
4416 | Knowledge of common persistence locations within Windows, Unix, or Linux operating systems. |
Knowledge |
4427 | Knowledge of cybersecurity and cybersecurity-enabled software products. |
Knowledge |
4429 | Knowledge of cybersecurity controls and design principles and methods (e.g., firewalls, DMZ, and encryption). |
Knowledge |
4430 | Knowledge of cybersecurity Risk Management Framework (RMF) process. |
Knowledge |
4434 | Knowledge of DCO capabilities, including open-source tools, and their capabilities. |
Knowledge |
4435 | Knowledge of Defense-In-Depth principles. |
Knowledge |
4438 | Knowledge of different types of log subscriptions (e.g. push vs pull, MS Windows event forwarding, winlogbeat, syslog). |
Knowledge |
4443 | Knowledge of evasion strategies and TTPs (e.g., noise, stealth, situational awareness, bandwidth throttling). |
Knowledge |
4445 | Knowledge of existing cybersecurity principles, policies, and procedures |
Knowledge |
4452 | Knowledge of full-spectrum of cyberspace operations in an intelligence-driven DCO environment. |
Knowledge |
4501 | Knowledge of non-Active Directory domains (e.g. IDM, LDAP). |
Knowledge |
4522 | Knowledge of public key infrastructure (PKI) libraries, certificate authorities, certificate management, and encryption functionalities. |
Knowledge |
4537 | Knowledge of stream providers (e.g. KAFKA). |
Knowledge |
4539 | Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model). |
Knowledge |
4583 | Knowledge of the U.S. Security System authorities, responsibilities, and contributions to the cyberspace operations mission. |
Knowledge |
4585 | Knowledge of the Windows registry hive keys and the information contained within each one. |
Knowledge |
4589 | Knowledge of typical system processes within Windows, Unix, or Linux operating systems |
Knowledge |
4595 | Knowledge of web applications and their common attack vectors. |
Knowledge |
4599 | Skill in analyzing endpoint collection data. |
Skill |
46 | Knowledge of fault tolerance. |
Knowledge |
4655 | Skill in providing support to intelligence analysts to understand the operational environment and how it ties to intelligence reporting. |
Skill |
4660 | Skill in refining research (e.g., vulnerabilities, TTPs) to assist intelligence analysts’ preparation of products. |
Skill |
4665 | Skill in run level configurations in a Linux or UNIX environment |
Skill |
4679 | Skill in using various online tools for open-source research (e.g., online trade, DNS, mail, etc.). |
Skill |
49 | Knowledge of host/network access control mechanisms (e.g., access control list). |
Knowledge |
51 | Knowledge of how system components are installed, integrated, and optimized. |
Knowledge |
52 | Knowledge of human-computer interaction principles. |
Knowledge |
53 | Knowledge of the Security Assessment and Authorization process. |
Knowledge |
61 | Knowledge of incident response and handling methodologies. |
Knowledge |
62 | Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
Knowledge |
6240 | Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE). |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
6330 | Knowledge of multi-level/security cross domain solutions. |
Knowledge |
65A | Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression). |
Knowledge |
66 | Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies. |
Knowledge |
6820 | Knowledge of network architecture concepts including topology, protocols, and components. |
Knowledge |
68A | Ability to build architectures and frameworks. |
Ability |
69 | Knowledge of Risk Management Framework (RMF) requirements. |
Knowledge |
70A | Knowledge of cybersecurity methods, such as firewalls, demilitarized zones, and encryption. |
Knowledge |
78 | Knowledge of microprocessors. |
Knowledge |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
8036 | Conduct open source research via various online tools. |
Task |
8041 | Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces. |
Task |
8111 | Identify potential points of strength and vulnerability among segments of a network map. |
Task |
8115 | Identify tools/hardware used to extract/analyze/capture memory and disk images. |
Task |
8151 | Perform security reviews and identify gaps in security architecture that can be used in the development of a security risk management plan. |
Task |
8161 | Provide and maintain documentation for TTPs as inputs to training programs. |
Task |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
8212 | Validate intrusion detection system (IDS) alerts. |
Task |
82A | Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs. |
Knowledge |
868 | Extract data using data carving techniques (e.g., Forensic Tool Kit [FTK], Foremost). |
Task |
88 | Knowledge of new and emerging information technology (IT) and cybersecurity technologies. |
Knowledge |
880A | Work with stakeholders to resolve computer security incidents and vulnerability compliance. |
Task |
892 | Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, anti-virus software, anti-spyware). |
Skill |
90 | Knowledge of operating systems. |
Knowledge |
912 | Knowledge of collection management processes, capabilities, and limitations. |
Knowledge |
915 | Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
Knowledge |
92B | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol (TCP), Internet Protocol (IP), Open System Interconnection Model (OSI)). |
Knowledge |
958 | Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity. |
Task |
959 | Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. |
Task |
95A | Knowledge of penetration testing principles, tools, and techniques. |
Knowledge |
972A | Determine and document software patches or the extent of releases that would leave software vulnerable. |
Task |
973A | Skill in using code analysis tools. |
Skill |
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
KSAT ID | Description | KSAT |
---|---|---|
8A | Knowledge of access authentication methods. |
Knowledge |
21 | Knowledge of computer algorithms. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
25 | Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]). |
Knowledge |
27A | Knowledge of cryptology. |
Knowledge |
34 | Knowledge of database systems. |
Knowledge |
38 | Knowledge of organization’s enterprise information security architecture system. |
Knowledge |
43A | Knowledge of embedded systems. |
Knowledge |
46 | Knowledge of fault tolerance. |
Knowledge |
51 | Knowledge of how system components are installed, integrated, and optimized. |
Knowledge |
52 | Knowledge of human-computer interaction principles. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
64 | Knowledge of information security systems engineering principles. |
Knowledge |
70 | Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
Knowledge |
72 | Knowledge of local area and wide area networking principles and concepts including bandwidth management. |
Knowledge |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
82A | Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs. |
Knowledge |
90 | Knowledge of operating systems. |
Knowledge |
92 | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
94 | Knowledge of parallel and distributed computing concepts. |
Knowledge |
98 | Knowledge of policy-based and risk adaptive access controls. |
Knowledge |
101 | Knowledge of process engineering concepts. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
109 | Knowledge of secure configuration management techniques. |
Knowledge |
110A | Knowledge of security management. |
Knowledge |
118 | Knowledge of software development models (e.g., Waterfall Model, Spiral Model). |
Knowledge |
119 | Knowledge of software engineering. |
Knowledge |
121 | Knowledge of structured analysis principles and methods. |
Knowledge |
124 | Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools. |
Knowledge |
126 | Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design. |
Knowledge |
129 | Knowledge of system life cycle management principles, including software security and usability. |
Knowledge |
130 | Knowledge of systems testing and evaluation methods. |
Knowledge |
144 | Knowledge of the systems engineering process. |
Knowledge |
177 | Skill in designing countermeasures to identified security risks. |
Skill |
179 | Skill in designing security controls based on cybersecurity principles and tenets. |
Skill |
197 | Skill in discerning the protection needs (i.e., security controls) of information systems and networks. |
Skill |
199 | Skill in evaluating the adequacy of security designs. |
Skill |
416 | Analyze design constraints, analyze trade-offs and detailed system and security design, and consider lifecycle support. |
Task |
419 | Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications. |
Task |
425 | Assess the effectiveness of cybersecurity measures utilized by system(s). |
Task |
426 | Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile. |
Task |
431 | Build, test, and modify product prototypes using working models or theoretical models. |
Task |
457 | Conduct Privacy Impact Assessments (PIA) of the application’s security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII). |
Task |
494 | Design and develop cybersecurity or cybersecurity-enabled products. |
Task |
496A | Design, develop, integrate, and update system security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation. |
Task |
501 | Design or integrate appropriate data backup capabilities into overall system designs, and ensure appropriate technical and procedural processes exist for secure system backups and protected storage of backup data. |
Task |
503A | Design to security requirements to ensure requirements are met for all systems and/or applications. |
Task |
516 | Develop and direct system testing and validation procedures and documentation. |
Task |
530 | Develop detailed security design documentation for component and interface specifications to support system design and development. |
Task |
531 | Develop Disaster Recovery and Continuity of Operations plans for systems under development and ensure testing prior to systems entering a production environment. |
Task |
630 | Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find work-arounds for communication protocols that are not interoperable). |
Task |
659 | Implement security designs for new or existing system(s). |
Task |
662 | Incorporate cybersecurity vulnerability solutions into system designs (e.g., Cybersecurity Vulnerability Alerts). |
Task |
737B | Perform an information security risk assessment. |
Task |
766A | Perform security reviews and identify security gaps in architecture. |
Task |
770 | Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change. |
Task |
809 | Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). |
Task |
850 | Store, retrieve, and manipulate data for analysis of system capabilities and requirements. |
Task |
856 | Provide support to security/certification test and evaluation activities. |
Task |
997 | Design and develop key management functions (as related to cybersecurity). |
Task |
998 | Analyze user needs and requirements to plan and conduct system security development. |
Task |
1000 | Ensure security design and cybersecurity development activities are properly documented (providing a functional description of security implementation) and updated as necessary. |
Task |
1002 | Skill in conducting audits or reviews of technical systems. |
Skill |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1073 | Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Knowledge |
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1142 | Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Knowledge |
1152 | Implement and integrate system development life cycle (SDLC) methodologies (e.g., IBM Rational Unified Process) into development environment. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2354 | Employ configuration management processes. |
Task |
5200 | Design, implement, test, and evaluate secure interfaces between information systems, physical systems, and/or embedded technologies. |
Task |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
100 | Knowledge of Privacy Impact Assessments. |
Knowledge |
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1038B | Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability). |
Knowledge |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1135 | Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing). |
Knowledge |
1140A | Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic). |
Skill |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
133 | Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers). |
Knowledge |
173A | Skill in integrating and applying policies that meet system security objectives. |
Skill |
177A | Knowledge of countermeasure design for identified security risks. |
Knowledge |
180 | Skill in designing the integration of hardware and software solutions. |
Skill |
191 | Skill in developing and applying security system access controls. |
Skill |
224A | Skill in the use of design modeling (e.g., unified modeling language). |
Skill |
3B | Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks. |
Skill |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
42 | Knowledge of electrical engineering as applied to computer architecture, including circuit boards, processors, chips, and associated computer hardware. |
Knowledge |
542A | Develop mitigation strategies to address cost, schedule, performance, and security risks. |
Task |
542A | Develop risk mitigation strategies and cybersecurity countermeasures to address cost, performance, and security risks and to resolve vulnerabilities and recommend security changes to system or system components as needed. |
Task |
626 | Identify components or elements, allocate security functions to those elements, and describe the relationships between the elements. |
Task |
632 | Identify and prioritize essential system functions or sub-systems required to support essential capabilities or business functions for restoration or recovery after a system failure or during a system recovery event based on overall system requirements for continuity and availability. |
Task |
648 | Identify, assess, and recommend cybersecurity or cybersecurity-enabled products for use within a system and ensure recommended products are in compliance with organization’s evaluation and validation requirements. |
Task |
65A | Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression). |
Knowledge |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
6919 | Ability to determine the best cloud deployment model for the appropriate operating environment. |
Ability |
710 | Monitor and evaluate a system’s compliance with information technology (IT) security, resilience, and dependability requirements. |
Task |
75 | Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, and statistics. |
Knowledge |
78 | Knowledge of microprocessors. |
Knowledge |
803 | Provide guidelines for implementing developed systems to customers or installation teams. |
Task |
808A | Provide input to implementation plans and standard operating procedures as they relate to information systems security. |
Task |
860A | Trace system requirements to design components and perform gap analysis. |
Task |
874 | Utilize models and simulations to analyze or predict system performance under different operating conditions. |
Task |
877A | Verify stability, interoperability, portability, and/or scalability of system architecture. |
Task |
904 | Knowledge of interpreted and compiled computer languages. |
Knowledge |
936 | Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers). |
Task |
999 | Develop cybersecurity designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations, high integrity and availability requirements, multilevel security/processing of multiple classification levels, and processing Sensitive Compartmented Information). |
Task |
Responsible for the cybersecurity of a program, organization, system, or enclave.
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
29 | Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools. |
Knowledge |
37 | Knowledge of disaster recovery continuity of operations plans. |
Knowledge |
49 | Knowledge of host/network access control mechanisms (e.g., access control list). |
Knowledge |
55 | Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data. |
Knowledge |
58 | Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. |
Knowledge |
61 | Knowledge of incident response and handling methodologies. |
Knowledge |
66 | Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions via intrusion detection technologies. |
Knowledge |
77 | Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
112 | Knowledge of server administration and systems engineering theories, concepts, and methods. |
Knowledge |
126 | Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design. |
Knowledge |
129 | Knowledge of system life cycle management principles, including software security and usability. |
Knowledge |
143 | Knowledge of the organization’s enterprise information technology (IT) goals and objectives. |
Knowledge |
150 | Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities. |
Knowledge |
173 | Skill in creating policies that reflect system security objectives. |
Skill |
183 | Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
Skill |
299 | Knowledge of information security program management and project management principles and techniques. |
Knowledge |
391 | Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk. |
Task |
395 | Advise senior management (e.g., CIO) on risk levels and security posture. |
Task |
397 | Advise appropriate senior leadership or Authorizing Official of changes affecting the organization’s cybersecurity posture. |
Task |
440 | Collect and maintain data needed to meet system cybersecurity reporting. |
Task |
445 | Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders. |
Task |
578 | Ensure security improvement actions are evaluated, validated, and implemented as required. |
Task |
584 | Ensure that cybersecurity inspections, tests, and reviews are coordinated for the network environment. |
Task |
585 | Ensure that cybersecurity requirements are integrated into the continuity planning for that system and/or organization(s). |
Task |
628 | Identify alternative information security strategies to address organizational security objective. |
Task |
640 | Identify information technology (IT) security program implications of new technologies or technology upgrades. |
Task |
677 | Interpret patterns of non compliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise’s cybersecurity program. |
Task |
705 | Manage the monitoring of information security data sources to maintain organizational situational awareness. |
Task |
730 | Oversee the information security training and awareness program. |
Task |
733 | Participate in the development or modification of the computer environment cybersecurity program plans and requirements. |
Task |
790 | Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations. |
Task |
816 | Provide system related input on cybersecurity requirements to be included in statements of work and other appropriate procurement documents. |
Task |
824 | Recognize a possible security violation and take appropriate action to report the incident, as required. |
Task |
828 | Recommend resource allocations required to securely operate and maintain an organization’s cybersecurity requirements. |
Task |
852 | Supervise or manage protective or corrective measures when an cybersecurity incident or vulnerability is discovered. |
Task |
862 | Track audit findings and recommendations to ensure appropriate mitigation actions are taken. |
Task |
919 | Promote awareness of security issues among management and ensure sound security principles are reflected in the organization’s vision and goals. |
Task |
947 | Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies. |
Task |
962 | Identify security requirements specific to an information technology (IT) system in all phases of the System Life Cycle. |
Task |
963 | Ensure plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc. |
Task |
964 | Assure successful implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization’s mission and goals. |
Task |
965 | Knowledge of organization’s risk tolerance and/or risk management approach. |
Knowledge |
966 | Knowledge of enterprise incident response program, roles, and responsibilities. |
Knowledge |
967 | Knowledge of current and emerging threats/threat vectors. |
Knowledge |
1016 | Support necessary compliance activities (e.g., ensure system security configuration guidelines are followed, compliance monitoring occurs). |
Task |
1032 | Continuously validate the organization against policies/guidelines/procedures/regulations/laws to ensure compliance. |
Task |
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1004 | Knowledge of critical information technology (IT) procurement requirements. |
Knowledge |
1017 | Participate in the acquisition process as necessary, following appropriate supply chain risk management practices. |
Task |
1018 | Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals. |
Task |
1033 | Knowledge of basic system administration, network, and operating system hardening techniques. |
Knowledge |
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1035 | Forecast ongoing service demands and ensure security assumptions are reviewed as necessary. |
Task |
1038B | Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability). |
Knowledge |
1039 | Skill in evaluating the trustworthiness of the supplier and/or product. |
Skill |
1040A | Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure. |
Knowledge |
1041 | Define and/or implement policies and procedures to ensure protection of critical infrastructure as appropriate. |
Task |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
107 | Knowledge of resource management principles and techniques. |
Knowledge |
1073 | Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Knowledge |
113 | Knowledge of server and client operating systems. |
Knowledge |
1131 | Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]). |
Knowledge |
132 | Knowledge of technology integration processes. |
Knowledge |
25 | Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]). |
Knowledge |
325 | Knowledge of secure acquisitions (e.g., relevant Contracting Officer’s Technical Representative [COTR] duties, secure procurement, supply chain risk management). |
Knowledge |
392 | Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program. |
Task |
396 | Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, and systems, and elements. |
Task |
475 | Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance. |
Task |
572 | Ensure application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment. |
Task |
590 | Ensure that protection and detection capabilities are acquired or developed using the IS security engineering approach and are consistent with organization-level cybersecurity architecture. |
Task |
596 | Establish overall enterprise information security architecture (EISA) with the organization’s overall security strategy. |
Task |
598A | Evaluate and approve development efforts to ensure that baseline security safeguards controls/measures are appropriately installed. |
Task |
600 | Evaluate cost benefit, economic, and risk analysis in decision making process. |
Task |
62 | Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
Knowledge |
674 | Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information. |
Task |
676 | Interpret and/or approve security requirements relative to the capabilities of new information technologies. |
Task |
679 | Lead and align information technology (IT) security priorities with the security strategy. |
Task |
680 | Lead and oversee information security budget, staffing, and contracting. |
Task |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
69A | Knowledge of risk management processes and requirements per the Risk Management Framework (RMF). |
Knowledge |
706 | Manage the publishing of Computer Network Defense guidance (e.g., TCNOs, Concept of Operations, Net Analyst Reports, NTSM, MTOs) for the enterprise constituency. |
Task |
707 | Manage threat or target analysis of cyber defense information and production of threat information within the enterprise. |
Task |
711 | Monitor and evaluate the effectiveness of the enterprise’s cybersecurity safeguards to ensure they provide the intended level of protection. |
Task |
731A | Participate in risk assessment and authorization per Risk Management Framework processes. |
Task |
76 | Knowledge of measures or indicators of system performance and availability. |
Knowledge |
801 | Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans. |
Task |
810 | Provide leadership and direction to information technology (IT) personnel by ensuring that cybersecurity awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities. |
Task |
818 | Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to higher headquarters. |
Task |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
848 | Recommend policy and coordinate review and approval. |
Task |
869 | Use federal and organization-specific published documents to manage operations of their computing environment system(s). |
Task |
87 | Knowledge of network traffic analysis methods. |
Knowledge |
88B | Knowledge of new and emerging control systems technologies. |
Knowledge |
9 | Knowledge of applicable business processes and operations of customer organizations. |
Knowledge |
92 | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
948 | Participate in Risk Governance process to provide security risks, mitigations, and input on other technical risk. |
Task |
949 | Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements. |
Task |
95A | Knowledge of penetration testing principles, tools, and techniques. |
Knowledge |
Manages a portfolio of IT capabilities that align with the overall needs of mission and…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1004A | Knowledge of information technology (IT) acquisition/procurement requirements. |
Knowledge |
1018 | Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals. |
Task |
1148B | Ensure supply chain, system, network, performance, and cyber security requirements are included in contract language and delivered. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1021 | Knowledge of risk threat assessment. |
Knowledge |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1061A | Knowledge of the acquisition/procurement life cycle process. |
Knowledge |
107 | Knowledge of resource management principles and techniques. |
Knowledge |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1148 | Develop contract language to ensure supply chain, system, network, and operational security are met. |
Task |
296 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
325 | Knowledge of secure acquisitions (e.g., relevant Contracting Officer’s Technical Representative [COTR] duties, secure procurement, supply chain risk management). |
Knowledge |
5380 | Gather feedback on customer satisfaction and internal service performance to foster continual improvement. |
Task |
6160 | Ability to oversee the development and update of the lifecycle cost estimate. |
Ability |
6290 | Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems. |
Knowledge |
680A | Lead and oversee budget, staffing, and contracting. |
Task |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
6919 | Ability to determine the best cloud deployment model for the appropriate operating environment. |
Ability |
69A | Knowledge of risk management processes and requirements per the Risk Management Framework (RMF). |
Knowledge |
834 | Resolve conflicts in laws, regulations, policies, standards, or procedures. |
Task |
840B | Review or conduct audits of programs and projects. |
Task |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
955A | Draft and publish supply chain security and risk management documents. |
Task |
979 | Knowledge of supply chain risk management standards, processes, and practices. |
Knowledge |
Conducts evaluations of an IT program or its individual components, to determine compliance with published…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
203 | Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system. |
Skill |
537 | Develop methods to monitor and measure risk, compliance, and assurance efforts. |
Task |
1002 | Skill in conducting audits or reviews of technical systems. |
Skill |
1143A | Conduct import/export reviews for acquiring systems and software. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1004A | Knowledge of information technology (IT) acquisition/procurement requirements. |
Knowledge |
1021 | Knowledge of risk threat assessment. |
Knowledge |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1061A | Knowledge of the acquisition/procurement life cycle process. |
Knowledge |
107 | Knowledge of resource management principles and techniques. |
Knowledge |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1130 | Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions). |
Knowledge |
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1136A | Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud). |
Knowledge |
1147A | Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce. |
Task |
1148B | Ensure supply chain, system, network, performance, and cyber security requirements are included in contract language and delivered. |
Task |
129 | Knowledge of system life cycle management principles, including software security and usability. |
Knowledge |
296 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
325A | Ability to ensure security practices are followed throughout the acquisition process. |
Ability |
5610 | Review service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up. |
Task |
62 | Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
Knowledge |
6290 | Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems. |
Knowledge |
68 | Knowledge of information technology (IT) architectural concepts and frameworks. |
Knowledge |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
6919 | Ability to determine the best cloud deployment model for the appropriate operating environment. |
Ability |
6942 | Skill in designing or implementing cloud computing deployment models. |
Skill |
6945 | Skill in migrating workloads to, from, and among the different cloud computing service models. |
Skill |
69A | Knowledge of risk management processes and requirements per the Risk Management Framework (RMF). |
Knowledge |
811 | Provide ongoing optimization and problem solving support. |
Task |
813 | Provide recommendations for possible improvements and upgrades. |
Task |
840B | Review or conduct audits of programs and projects. |
Task |
936 | Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers). |
Task |
949 | Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements. |
Task |
954 | Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk. |
Knowledge |
979 | Knowledge of supply chain risk management standards, processes, and practices. |
Knowledge |
Work that involves directly managing information technology projects to provide a unique service or product.
KSAT ID | Description | KSAT |
---|---|---|
16 | Knowledge of capabilities and requirements analysis. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
68 | Knowledge of information technology (IT) architectural concepts and frameworks. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
129 | Knowledge of system life cycle management principles, including software security and usability. |
Knowledge |
143 | Knowledge of the organization’s enterprise information technology (IT) goals and objectives. |
Knowledge |
203 | Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system. |
Skill |
325A | Ability to ensure security practices are followed throughout the acquisition process. |
Ability |
537 | Develop methods to monitor and measure risk, compliance, and assurance efforts. |
Task |
949 | Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements. |
Task |
979 | Knowledge of supply chain risk management standards, processes, and practices. |
Knowledge |
1004A | Knowledge of information technology (IT) acquisition/procurement requirements. |
Knowledge |
1018 | Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals. |
Task |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1039A | Ability to evaluate/ensure the trustworthiness of the supplier and/or product. |
Ability |
1127 | Knowledge of Import/Export Regulations related to cryptography and other security technologies. |
Knowledge |
1130 | Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions). |
Knowledge |
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1148B | Ensure supply chain, system, network, performance, and cyber security requirements are included in contract language and delivered. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5010 | Act as a primary stakeholder in the underlying information technology (IT) operational processes and functions that support the service, provide direction and monitor all significant activities so the service is delivered successfully. |
Task |
5410 | Manage the internal relationship with information technology (IT) process owners supporting the service, assisting with the definition and agreement of operating level agreements (OLAs). |
Task |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1003 | Develop and document supply chain risks for critical system elements, as appropriate. |
Task |
1005 | Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes). |
Knowledge |
1017A | Participate in the acquisition process as necessary. |
Task |
1021 | Knowledge of risk threat assessment. |
Knowledge |
1061A | Knowledge of the acquisition/procurement life cycle process. |
Knowledge |
107 | Knowledge of resource management principles and techniques. |
Knowledge |
1122 | Ability to apply supply chain risk management standards. |
Ability |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1143A | Conduct import/export reviews for acquiring systems and software. |
Task |
1148A | Develop supply chain, system, network, performance, and cyber security requirements. |
Task |
296 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
5150 | Coordinate and manage the overall service provided to a customer end-to-end. |
Task |
5310 | Ensure that appropriate SLAs and underpinning contracts have been defined that clearly set out for the customer a description of the service and the measures for monitoring the service. |
Task |
5380 | Gather feedback on customer satisfaction and internal service performance to foster continual improvement. |
Task |
5610 | Review service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up. |
Task |
5660 | Work with other service managers and product owners to balance and prioritize services to meet overall customer requirements, constraints, and objectives. |
Task |
6160 | Ability to oversee the development and update of the lifecycle cost estimate. |
Ability |
62 | Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
Knowledge |
6290 | Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems. |
Knowledge |
629A | Identify and address cyber workforce planning and management issues (e.g. recruitment, retention, and training). |
Task |
680A | Lead and oversee budget, staffing, and contracting. |
Task |
69A | Knowledge of risk management processes and requirements per the Risk Management Framework (RMF). |
Knowledge |
760 | Perform needs analysis to determine opportunities for new and improved business process solutions. |
Task |
797 | Provide advice on project costs, design concepts, or design changes. |
Task |
801 | Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans. |
Task |
811 | Provide ongoing optimization and problem solving support. |
Task |
813 | Provide recommendations for possible improvements and upgrades. |
Task |
834 | Resolve conflicts in laws, regulations, policies, standards, or procedures. |
Task |
840B | Review or conduct audits of programs and projects. |
Task |
88A | Knowledge of current and emerging cyber technologies. |
Knowledge |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
954 | Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk. |
Knowledge |
955A | Draft and publish supply chain security and risk management documents. |
Task |
Conducts target development at the system, component and entity levels. Builds and maintains Electronic Target…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1056 | Knowledge of operations security. |
Knowledge |
2001 | Accurately characterize targets. |
Task |
2068 | Assist in the identification of intelligence collection shortfalls. |
Task |
2089 | Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas. |
Task |
2134 | Conduct target research and analysis. |
Task |
2170 | Coordinate target vetting with appropriate partners. |
Task |
2289 | Develop measures of effectiveness and measures of performance. |
Task |
2459 | Identify intelligence gaps and shortfalls. |
Task |
2524 | Integrate cyber planning/targeting efforts with other organizations. |
Task |
2628 | Participate in exercises. |
Task |
2716 | Produce target system analysis products. |
Task |
2882 | Work closely with planners, analysts, and collection managers to identify intelligence gaps and ensure intelligence requirements are accurate and up-to-date. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3040 | Ability to develop or recommend planning solutions to problems and situations for which no precedent exists. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3073 | Ability to recognize and mitigate cognitive biases which may affect analysis. |
Ability |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3197 | Knowledge of criticality and vulnerability factors (e.g., value, recuperation, cushion, countermeasures) for target selection and applicability to the cyber domain. |
Knowledge |
3218 | Knowledge of cyber operations terminology/lexicon. |
Knowledge |
3250 | Knowledge of dynamic and deliberate targeting. |
Knowledge |
3271 | Knowledge of internal and external partner cyber operations capabilities and tools. |
Knowledge |
3281 | Knowledge of governing authorities for targeting. |
Knowledge |
3334 | Knowledge of intelligence confidence levels. |
Knowledge |
3335 | Knowledge of intelligence disciplines. |
Knowledge |
3358 | Knowledge of organizational hierarchy and cyber decision making processes. |
Knowledge |
3446 | Knowledge of analytical constructs and their use in assessing the operational environment. |
Knowledge |
3527 | Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.). |
Knowledge |
3530 | Knowledge of target list development (i.e. RTL, JTL, CTL, etc.). |
Knowledge |
3533 | Knowledge of target vetting and validation procedures. |
Knowledge |
3539 | Knowledge of telecommunications fundamentals. |
Knowledge |
3541 | Knowledge of the available tools and applications associated with collection requirements and collection management. |
Knowledge |
3584 | Knowledge of intelligence preparation of the environment and similar processes. |
Knowledge |
3587 | Knowledge of targeting cycles. |
Knowledge |
3630 | Knowledge of the ways in which targets or threats use the Internet. |
Knowledge |
3651 | Knowledge of what constitutes a “threat” to a network. |
Knowledge |
3691 | Skill in assessing and/or estimating effects generated during and after cyber operations. |
Skill |
3724 | Skill in defining and characterizing all pertinent aspects of the operational environment. |
Skill |
3737 | Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects. |
Skill |
3844 | Skill in preparing and presenting briefings. |
Skill |
3851 | Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships. |
Skill |
3880 | Skill in reviewing and editing target materials. |
Skill |
3893 | Skill in tailoring analysis to the necessary levels (e.g., classification and organizational). |
Skill |
3920 | Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.). |
Skill |
3946 | Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). |
Skill |
4202 | Ability to collaborate with the IC to leverage analytical and technical expertise. |
Ability |
4203 | Ability to communicate effectively when writing and speaking. |
Ability |
4227 | Ability to create products to meet decision making needs. |
Ability |
4356 | Ability to support the joint targeting cycle in a dynamic environment. |
Ability |
4362 | Ability to understand US Code Titles as they apply to targeting in support of operations in cyberspace. |
Ability |
4373 | Ability to utilize analytical constructs. |
Ability |
4374 | Ability to utilize and synthesize multiple intelligence sources to create products. |
Ability |
4405 | Knowledge of Collateral Damage Estimate (CDE) methodology |
Knowledge |
4409 | Knowledge of combat assessment. |
Knowledge |
4412 | Knowledge of Command Structure. |
Knowledge |
4451 | Knowledge of the full-spectrum of cyberspace operational missions (e.g., DODIN Operations, DCO, OCO), principles, capabilities, limitations, and effects. |
KSA |
4468 | Knowledge of IC, to include members, structure, and associated missions. |
Knowledge |
4473 | Knowledge of ISR capabilities and repositories (e.g., Geospatial Intelligence Information Management Services (GIMS), National SIGINT Requirements Process (NSRP), etc.). |
Knowledge |
4484 | Knowledge of metadata. |
Knowledge |
4492 | Knowledge of Mission Packages. |
Knowledge |
4514 | Knowledge of Political, Military, Economic, Social, PMESII and Counter-Terrorism Analytical Framework analytical constructs and their use in assessing the operational environment. |
Knowledge |
4536 | Knowledge of state and non-state target systems. |
KSA |
4556 | Knowledge of the development of Intelligence Needs (INs), Intelligence Requirements (IRs), and Essential Elements of Information (EEI). |
Knowledge |
4559 | Knowledge of the target entity types. |
Knowledge |
4562 | Knowledge of the Joint Tactical Cyber Request (JTCR). |
Knowledge |
4569 | Knowledge of the National SIGINT system. |
Knowledge |
4572 | Knowledge of the Request for Support (RFS) process. |
Knowledge |
4574 | Knowledge of the review and approval process for cyberspace operations Review and Approval Process of Cyber Operations (RAP-CO) process. |
Knowledge |
4576 | Knowledge of the sensitive target and review (STAR) process. |
Knowledge |
4596 | Knowledge of what a Tasking Order is and the information contained in it (e.g., ATO, CTO, and MTO). |
Knowledge |
4617 | Skill in creating and maintaining target materials. |
Skill |
4622 | Skill in developing TSA products. |
Skill |
4634 | Skill in identifying intelligence gaps to generate RFIs. |
Skill |
4654 | Skill in providing input into Mission Packages. |
Skill |
4681 | Skill in utilizing Microsoft Office applications (e.g., Word, PowerPoint, Excel, etc.). |
Skill |
4683 | Skill in writing phased BDA reports. |
Skill |
8024 | Attend or provide input for targeting community meetings (e.g., Targeting Issues Working Group (TIWG), Military Targeting Committee (MTC), etc.). |
Task |
8027 | Build and maintain target materials. |
Task |
8077 | Develop, or assist in the development, of a Collateral Effects Estimation (CEE) methodology for cyberspace. |
Task |
8133 | Maintain situational awareness of the common intelligence picture and/or common operational picture as applicable |
Task |
8140 | Participate in Boards, Bureaus, Cells, Centers, and Working Groups (B2C2WGs). |
Task |
8143 | Participate in the Joint Planning Process and other commander and staff planning processes. |
Task |
8160 | Provide analysis and support for combat assessments. |
Task |
8177 | Provide targeting support to TST planning and operations. |
Task |
8195 | Support target list management (i.e. Restricted Target List (RTL), Joint Target List (JTL), Candidate Target List (CTL), etc.). |
Task |
8214 | Understand measures of effectiveness and measures of performance. |
Task |
Responsible for the management and administration of processes and tools that enable the organization to…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
134 | Knowledge of the capabilities and functionality associated with various content creation technologies (e.g., wikis, social networking, blogs). |
Knowledge |
135 | Knowledge of the capabilities and functionality associated with various technologies for organizing and managing information (e.g., databases, bookmarking engines). |
Knowledge |
136 | Knowledge of the capabilities and functionality of various collaborative technologies (e.g., groupware, SharePoint). |
Knowledge |
394A | Manage the indexing/cataloguing, storage, and access of explicit organizational knowledge (e.g., hard copy documents, digital files). |
Task |
464 | Construct access paths to suites of information (e.g., link pages) to facilitate access by end-users. |
Task |
910 | Knowledge of database theory. |
Knowledge |
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1126 | Knowledge of data classification standards and methodologies based on sensitivity and other risk factors. |
Knowledge |
1136A | Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud). |
Knowledge |
163 | Skill in conducting information searches. |
Skill |
164 | Skill in conducting knowledge mapping (e.g., map of knowledge repositories). |
Skill |
19 | Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities. |
Knowledge |
223 | Skill in the measuring and reporting of intellectual capital. |
Skill |
230 | Skill in using knowledge management technologies. |
Skill |
338A | Knowledge of the principal methods, procedures, and techniques of gathering information and producing, reporting, and sharing information. |
Knowledge |
5 | Ability to match the appropriate knowledge repository technology for a given application or environment. |
Ability |
5000 | Leads efforts to promote the organization’s use of knowledge management and information sharing. |
Task |
505A | Design, build, implement, and maintain a knowledge management framework that provides end-users access to the organization’s intellectual capital. |
Task |
513 | Develop an understanding of the needs and requirements of information end-users. |
Task |
6000 | Knowledge of taxonomy and semantic ontology theory. |
Knowledge |
721 | Monitor and report the usage of knowledge management assets and resources. |
Task |
777 | Plan and manage the delivery of knowledge management projects. |
Task |
794A | Promote knowledge sharing between information owners/users through an organization’s operational processes and systems. |
Task |
814 | Provide recommendations on data structures and databases that ensure correct and quality production of reports/management information. |
Task |
907A | Knowledge of data mining techniques. |
Knowledge |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1056 | Knowledge of operations security. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2099 | Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets. |
Task |
2890 | Advise managers and operators on language and cultural issues that impact organization objectives. |
Task |
2891 | Analyze and process information using language and/or cultural expertise. |
Task |
2897 | Conduct analysis of target communications to identify essential information in support of organization objectives. |
Task |
2902 | Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing. |
Task |
2905 | Identify target communications within the global network. |
Task |
2906 | Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis. |
Task |
2910 | Perform foreign language and dialect identification in initial source data. |
Task |
2912 | Perform or support technical network analysis and mapping. |
Task |
2921 | Scan, identify and prioritize target graphic (including machine-to-machine communications) and/or voice language material. |
Task |
2922 | Tip critical or time-sensitive information to appropriate customers. |
Task |
2923 | Transcribe target voice materials in the target language. |
Task |
2924 | Translate (e.g., verbatim, gists, and/or summaries) target graphic material. |
Task |
2925 | Translate (e.g., verbatim, gists, and/or summaries) target voice material. |
Task |
2927 | Identify foreign language terminology within computer programs (e.g., comments, variable names). |
Task |
2930 | Provide near-real time language analysis support (e.g., live operations). |
Task |
2931 | Identify cyber/technology-related terminology in the target language. |
Task |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3158 | Knowledge of cyber operation objectives, policies, and legalities. |
Knowledge |
3219 | Knowledge of cyber operations. |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3338 | Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions. |
Knowledge |
3407 | Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3450 | Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure. |
Knowledge |
3534 | Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference. |
Knowledge |
3616 | Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
Knowledge |
3617 | Knowledge of the structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3678 | Skill in analyzing traffic to identify network devices. |
Skill |
3689 | Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses). |
Skill |
3708A | Skill in conducting social network analysis. |
Skill |
3765 | Skill in disseminating items of highest intelligence value in a timely manner. |
Skill |
3867A | Skill in recognizing technical information that may be used for target development including intelligence development. |
Skill |
4086 | Knowledge of relevant laws, regulations, and policies. |
Knowledge |
4087 | Knowledge of target cultural references, dialects, expressions, idioms, and abbreviations. |
Knowledge |
4094 | Knowledge of networking and internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.). |
Knowledge |
4105 | Knowledge of language processing tools and techniques. |
Knowledge |
4106 | Knowledge of analytic tools and techniques. |
Knowledge |
4116 | Knowledge of transcript development processes and techniques (e.g., verbatim, gists, summaries). |
Knowledge |
4117 | Knowledge of translation processes and techniques. |
Knowledge |
4123 | Skill in conducting research using all available sources. |
Skill |
4124 | Skill in translating target graphic and/or voice language materials. |
Skill |
4125 | Skill in complying with the legal restrictions for targeted information. |
Skill |
4128 | Skill in developing intelligence reports. |
Skill |
4129 | Skill in evaluating and interpreting metadata. |
Skill |
4133 | Skill in gisting target communications. |
Skill |
4135 | Skill in identifying non-target regional languages and dialects |
Skill |
4140 | Skill in prioritizing target language material. |
Skill |
4141 | Skill in providing analysis on target-related matters (e.g., language, cultural, communications). |
Skill |
4148 | Ability to review processed target language materials for accuracy and completeness. |
Ability |
4149 | Skill in transcribing target language communications. |
Skill |
4152 | Knowledge of specialized target language (e.g., acronyms, jargon, technical terminology, codewords). |
Knowledge |
4165 | Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption). |
Knowledge |
4167 | Knowledge of target language(s). |
Knowledge |
4169 | Ability to apply language and cultural expertise to analysis. |
Ability |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
2243 | Determine what technologies are used by a given target. |
Task |
2434 | Identify threat tactics, and methodologies. |
Task |
2453 | Identify collection gaps and potential collection strategies against targets. |
Task |
2568 | Make recommendations to guide collection in support of customer requirements. |
Task |
2621 | Provide SME and support to planning/developmental forums and working groups as appropriate. |
Task |
2893 | Assess, document, and apply a target’s motivation and/or frame of reference to facilitate analysis, targeting and collection opportunities. |
Task |
2894 | Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination. |
Task |
2896 | Conduct all-source target research to include the use of open source materials in the target language. |
Task |
2901 | Perform quality review and provide feedback on transcribed or translated materials. |
Task |
2909 | Provide feedback to collection managers to enhance future collection and analysis. |
Task |
2916 | Provide requirements and feedback to optimize the development of language processing tools. |
Task |
2919 | Perform social network analysis and document as appropriate. |
Task |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3564 | Knowledge of the data flow from collection origin to repositories and tools. |
Knowledge |
3595 | Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements. |
Knowledge |
3771 | Skill in evaluating data sources for relevance, reliability, and objectivity. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3822 | Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results. |
Skill |
3861 | Skill in recognizing denial and deception techniques of the target. |
Skill |
3865 | Skill in recognizing significant changes in a target’s communication patterns. |
Skill |
3890 | Skill in synthesizing, analyzing, and prioritizing meaning across data sets. |
Skill |
3923 | Skill in using non-attributable networks. |
Skill |
4072 | Knowledge of collection systems, capabilities, and processes. |
Knowledge |
4073 | Knowledge of the feedback cycle in collection processes. |
Knowledge |
4078 | Knowledge of target or threat cyber actors and procedures. |
Knowledge |
4079 | Knowledge of basic cyber operations activity concepts (e.g., foot printing, scanning and enumeration, penetration testing, white/black listing). |
Knowledge |
4085 | Knowledge of approved intelligence dissemination processes. |
Knowledge |
4088 | Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure). |
Knowledge |
4089 | Knowledge of target communication tools and techniques. |
Knowledge |
4090 | Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes). |
Knowledge |
4095 | Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML). |
Knowledge |
4097 | Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network. |
Knowledge |
4099 | Knowledge of customer information needs. |
Knowledge |
4108 | Knowledge of the impact of language analysis on on-net operator functions. |
Knowledge |
4113 | Knowledge of the request for information process. |
Knowledge |
4118 | Skill in identifying a target’s network characteristics. |
Skill |
4119 | Skill in analyzing language processing tools to provide feedback to enhance tool development. |
Skill |
4121 | Skill in assessing a target’s frame of reference (e.g., motivation, technical capability, organizational structure, sensitivities). |
Skill |
4134 | Skill in identifying intelligence gaps and limitations. |
Skill |
4160 | Skill in interpreting traceroute results, as they apply to network analysis and reconstruction. |
Skill |
4164 | Skill in identifying language issues that may have an impact on organization objectives. |
Skill |
4166 | Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types. |
Knowledge |
915 | Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
Knowledge |
The Network Analyst will understand network traffic signatures and discover anomalies through network traffic and…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1020A | Skill in secure test plan design (e. g. unit, integration, system, acceptance). |
Skill |
1033 | Knowledge of basic system administration, network, and operating system hardening techniques. |
Knowledge |
1037A | Knowledge of information technology (IT) risk management policies, requirements, and procedures. |
Knowledge |
1037B | Knowledge of program protection planning to include information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements. |
Knowledge |
1038 | Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability. |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1073 | Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Knowledge |
1073A | Skill in network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Skill |
1074A | Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly. |
Knowledge |
109 | Knowledge of secure configuration management techniques. |
Knowledge |
1091 | Skill in one way hash functions (e.g., Secure Hash Algorithm [SHA], Message Digest Algorithm [MD5]). |
Skill |
110 | Knowledge of key concepts in security management (e.g., Release Management, Patch Management). |
Knowledge |
1107 | Identify and analyze anomalies in network traffic using metadata (e.g., CENTAUR). |
Task |
1109 | Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools. |
Task |
110A | Knowledge of security management. |
Knowledge |
1111 | Identify applications and operating systems of a network device based on network traffic. |
Task |
1113 | Identify network mapping and operating system (OS) fingerprinting activities. |
Task |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
12 | Knowledge of communication methods, principles, and concepts (e.g., crypto, dual hubs, time multiplexers) that support the network infrastructure. |
Knowledge |
132 | Knowledge of technology integration processes. |
Knowledge |
133 | Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers). |
Knowledge |
139 | Knowledge of the common networking protocols (e.g., TCP/IP), services (e.g., web, mail, Domain Name Server), and how they interact to provide network communications. |
Knowledge |
143A | Knowledge of integrating the organization’s goals and objectives into the architecture. |
Knowledge |
145 | Knowledge of the type and frequency of routine maintenance needed to keep equipment functioning properly. |
Knowledge |
148 | Knowledge of Virtual Private Network (VPN) security. |
Knowledge |
15 | Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware. |
Knowledge |
150 | Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities. |
Knowledge |
154 | Skill in analyzing network traffic capacity and performance characteristics. |
Skill |
155 | Skill in applying and incorporating information technologies into proposed solutions. |
Skill |
167A | Skill in conducting system/server planning, management, and maintenance. |
Skill |
171A | Skill in correcting physical and technical problems that impact system/server performance. |
Skill |
177 | Skill in designing countermeasures to identified security risks. |
Skill |
177A | Knowledge of countermeasure design for identified security risks. |
Knowledge |
183A | Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
Knowledge |
19 | Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities. |
Knowledge |
191 | Skill in developing and applying security system access controls. |
Skill |
193 | Skill in developing, testing, and implementing network infrastructure contingency and recovery plans. |
Skill |
194 | Skill in diagnosing connectivity problems. |
Skill |
197 | Skill in discerning the protection needs (i.e., security controls) of information systems and networks. |
Skill |
198 | Skill in establishing a routing schema. |
Skill |
202A | Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems. |
Skill |
2062 | Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the NE or enclave. |
Task |
206A | Skill in installing system and component upgrades. |
Skill |
207 | Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches. |
Skill |
2087 | Collaborate with intelligence analysts/targeting organizations involved in related areas. |
Task |
2102 | Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access. |
Task |
2119 | Conduct network scouting and vulnerability analyses of systems within a network. |
Task |
211A | Skill in monitoring and optimizing system/server performance. |
Skill |
2124 | Conduct open source data collection via various online tools. |
Task |
2226 | Detect exploits against targeted networks and hosts and react accordingly. |
Task |
231 | Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol). |
Skill |
2379B | Identify threats to Blue Force vulnerabilities. |
Task |
2429 | Generate requests for information. |
Task |
244 | Ability to determine the validity of technology trend data. |
Ability |
2477 | Identify potential points of strength and vulnerability within a network. |
Task |
2603 | Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements. |
Task |
2611 | Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan. |
Task |
270 | Knowledge of common adversary tactics, techniques, and procedures in assigned area of responsibility (i.e., historical country-specific tactics, techniques, and procedures; emerging capabilities). |
Knowledge |
27A | Knowledge of cryptology. |
Knowledge |
29 | Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools. |
Knowledge |
3030 | Ability to conduct vulnerability scans and recognize vulnerabilities in security systems. |
Ability |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3146 | Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3201 | Knowledge of all relevant reporting and dissemination procedures. |
Knowledge |
3206 | Knowledge of current software and methodologies for active defense and system hardening. |
Knowledge |
3261 | Knowledge of evasion strategies and techniques. |
Knowledge |
3277 | Knowledge of general SCADA system components. |
Knowledge |
3346 | Knowledge of Internet and routing protocols. |
Knowledge |
3349 | Knowledge of intrusion sets. |
Knowledge |
3353 | Knowledge of the Risk Management Framework Assessment Methodology. |
Knowledge |
3378 | Knowledge of methods and techniques used to detect various exploitation activities. |
Knowledge |
3399 | Knowledge of network administration. |
Knowledge |
3431 | Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). |
Knowledge |
3454 | Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, Panda, Kaspersky) and how differences affect exploitation/vulnerabilities. |
Knowledge |
3479 | Knowledge of security hardware and software options, including the network artifacts they induce and their effects on exploitation. |
Knowledge |
3508 | Knowledge of structure, approach, and strategy of exploitation tools (e.g., sniffers, keyloggers) and techniques (e.g., gaining backdoor access, collecting/exfiltrating data, conducting vulnerability analysis of other systems in the network). |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3695 | Skill in auditing firewalls, perimeters, routers, and intrusion detection systems. |
Skill |
3740 | Skill in determining installed patches on various operating systems and identifying patch signatures. |
Skill |
3779 | Skill in extracting information from packet captures. |
Skill |
38 | Knowledge of organization’s enterprise information security architecture system. |
Knowledge |
3801 | Skill in identifying the devices that work at each level of protocol models. |
Skill |
3815 | Skill in interpreting vulnerability scanner results to identify vulnerabilities. |
Skill |
3871 | Skill in remote command line and Graphic User Interface (GUI) tool usage. |
Skill |
3910 | Skill in using Boolean operators to construct simple and complex queries. |
Skill |
3931 | Skill in using various open source data collection tools (online trade, DNS, mail, etc.). |
Skill |
3948 | Skill in verifying the integrity of all files. |
Skill |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
408 | Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application. |
Task |
4170 | Ability to accurately document results |
Ability |
4171 | Ability to analyze a finding of a compromise and develop a custom signature(s) and/or rule(s) to identify it throughout the network |
Ability |
4173 | Ability to analyze Data at Rest and Data in Transit encryption methodologies and assess Data at Rest and Data in Transit polices |
Ability |
4175 | Ability to analyze device/protocol discovery tool output |
Ability |
4177 | Ability to analyze interior and exterior routing protocols (e.g. RIP, EIGRP, OSPF, IS-IS, etc…) |
Ability |
4178 | Ability to analyze mitigations to recover from a full network compromise |
Ability |
4180 | Ability to analyze network infrastructure to identify and recommend key terrain or critical infrastructure. |
Ability |
4181 | Ability to analyze organizational policies and documentation for appropriate use and user privileges as they apply to networking devices. |
Ability |
4183 | Ability to analyze potential adversarial attack vectors on a mission-critical system. |
Ability |
4193 | Ability to assess Data in Transit encryption policies. |
Ability |
4201 | Ability to characterize network traffic for trends and patterns. |
Ability |
4205 | Ability to communicate with Sr Leaders of an Org. to ensure shared responsibility for supporting Org. mission/business functions using external providers of systems, services and apps receives visibility and is elevated to the appropriate decisionmaking authorities. |
Ability |
4208 | Ability to compile access control lists and firewall configurations. |
Ability |
4212 | Ability to Conduct flow data analysis |
Ability |
4214 | Ability to conduct research on vulnerabilites found and correlate current versions to known vulnerable releases |
Ability |
4217 | Ability to configure, forward and statistically analyze logs |
Ability |
4218 | Ability to configure, place, and maintain a distributed sensor grid. |
Ability |
4220 | Ability to construct accurate maps of the network devices |
Ability |
4221 | Ability to construct log aggregation solutions and analysis platforms |
Ability |
4225 | Ability to correlate indicators of compromise |
Ability |
4226 | Ability to create baselines/PPS documents and to compare current state against documentation. |
Ability |
4230 | Ability to create rules/alerts for traffic validation. |
Ability |
4231 | Ability to define caching and analyze the information contained within |
Ability |
4233 | Ability to detect mismatched port-application traffic |
Ability |
4235 | Ability to develop a risk defense plan to put active measure in place in defense of a network |
Ability |
4237 | Ability to develop dashboards to better visualize data |
Ability |
4241 | Ability to dissect and analyze a packet header |
Ability |
4242 | Ability to document findings of any anomalous connections |
Ability |
4250 | Ability to evaluate common Tactics, Techniques and Procedures (TTP) used in malware and open-source and Intelligence Community (IC) resources available to identify emerging TTPs |
Ability |
4253 | Ability to evaluate information (e.g. trust relationships and security policies) from a domain to identify vulnerabilities/misconfiguration |
Ability |
4254 | Ability to evaluate mitigations to recover from a full-network compromise. |
Ability |
4255 | Ability to evaluate network diagram |
Ability |
4256 | Ability to evaluate rogue/unauthorized systems on a network |
Ability |
4259 | Ability to evaluate systems resiliency in adverse conditions |
Ability |
4267 | Ability to identify activity in log entries to correlate indicators of compromise. |
Ability |
4268 | Ability to identify anomalous activity based off of known trends and patterns. |
Ability |
427 | Develop content for cyber defense tools. |
Task |
4270 | Ability to identify C2 Beaconing in normal network traffic. |
Ability |
4272 | Ability to identify complex root-cause analysis and recommend mitigations |
Ability |
4274 | Ability to identify Data in Transit encryption methodologies. |
Ability |
4275 | Ability to identify exfiltration of data in normal network traffic |
Ability |
4277 | Ability to identify IPv6 and differentiate between Link Local, Multicast, Unicast, and Anycast. |
Ability |
4286 | Ability to identify wireless encryption and differentiate between WEP, WPA (all versions) and WAPI |
Ability |
4290 | Ability to implement network TAP configuration |
Ability |
4295 | Ability to integrate information security requirements into the acquisition process, using applicable baseline security controls as one of the sources for security requirements, and ensuring a robust software quality control process. |
Ability |
4301 | Ability to measure application whitelisting/blacklisting solutions. |
Ability |
4303 | Ability to measure principle of vulnerability exploitation. |
Ability |
4304 | Ability to measure the effectiveness of white/blacklisting solutions on network devices. |
Ability |
4307 | Ability to monitor network data and perform triage on triggered events. |
Ability |
4310 | Ability to operate the tools to enumerate a system. |
Ability |
4311 | Ability to organize a list of mission infrastructure to identify which dependent systems are key terrain. |
Ability |
4314 | Ability to organize Network System Architecture and the dependencies formed from relationships between systems. |
Ability |
4321 | Ability to perform conversation calculations across Hexadecimal, Octal, Decimal, and binary. |
Ability |
4322 | Ability to perform device discovery. |
Ability |
4348 | Ability to research protocol utilization and determine anomalous use. |
Ability |
4357 | Ability to test tools within sensor grid. |
Ability |
4364 | Ability to use and integrate Security Information and Event Management (SIEM) capabilities in the analysis process. |
Ability |
4375 | Ability to utilize Defense Information Systems Agency (DISA)/ Department of Defense (DoD) system configuration guidelines. |
Ability |
4392 | Knowledge of anomaly-based detection and threat hunting. |
Knowledge |
4394 | Knowledge of attack principles, tools, and techniques. |
Knowledge |
4396 | Knowledge of basic cloud-based technologies and concepts. |
Knowledge |
4398 | Knowledge of basic Cyber Threat Emulation concepts. |
Knowledge |
4399 | Knowledge of basic Embedded Systems concepts. |
Knowledge |
4427 | Knowledge of cybersecurity and cybersecurity-enabled software products. |
Knowledge |
4440 | Knowledge of DOD Component-level cybersecurity architecture. |
Knowledge |
4442 | Knowledge of encryption algorithms and their implementation. |
Knowledge |
4450 | Knowledge of Friendly Network Forces (FNF) reporting procedures (i.e. deconfliction) to include external organization interaction. |
Knowledge |
4455 | Knowledge of hardware components and architecture including functions and limitations. |
Knowledge |
4456 | Knowledge of hashing algorithms. |
Knowledge |
4457 | Knowledge of Hexadecimal, Octal, Decimal, and binary |
Knowledge |
4467 | Knowledge of HTML source code and the intelligence that can be derived from it. |
Knowledge |
4472 | Knowledge of IPv6 |
Knowledge |
4499 | Knowledge of Network OSs. |
Knowledge |
4531 | Knowledge of security implications of device and software configurations. |
Knowledge |
4539 | Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model). |
Knowledge |
4547 | Knowledge of TCP flags |
Knowledge |
4557 | Knowledge of the differences between distance vector and link-state routing protocols |
Knowledge |
4558 | Knowledge of the different DNS resource records |
Knowledge |
4583 | Knowledge of the U.S. Security System authorities, responsibilities, and contributions to the cyberspace operations mission. |
Knowledge |
4591 | Knowledge of User Agent Strings and the intelligence that can be derived from them |
Knowledge |
4603 | Skill in analyzing PCAP data |
Skill |
461 | Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces. |
Task |
4614 | Skill in conducting system planning, management, and maintenance. |
Skill |
4623 | Skill in discerning the protection requirements (i.e. security controls) of IS and networks. |
Skill |
4636 | Skill in implementing encryption algorithms. |
Skill |
4637 | Skill in intrusion detection methodologies and techniques for detecting host and network-based intrusions for utilizing intrusion detection systems and signature development. |
Skill |
4642 | Skill in network operating system administration. |
Skill |
4650 | Skill in providing an understanding of the adversary through the identification and link analysis of physical, functional, or behavioral relationships within an operational environment. |
Skill |
4661 | Skill in regular expressions |
Skill |
4671 | Skill in understanding cybersecurity architecture, its implementation, and its expected behaviors and how changes in conditions affect outcomes. |
Skill |
4672 | Skill in using Berkeley Packet filters. |
Skill |
4675 | Skill in using network mapping tools to analyze identify and enumerate a network. |
Skill |
4680 | Skill in utilizing a network traffic packet analyzer in order to detect anomalies in protocol utilization. |
Skill |
472 | Coordinate with enterprise-wide cyber defense staff to validate network alerts. |
Task |
49 | Knowledge of host/network access control mechanisms (e.g., access control list). |
Knowledge |
53 | Knowledge of the Security Assessment and Authorization process. |
Knowledge |
6030 | Ability to apply an organization’s goals and objectives to develop and maintain architecture. |
Ability |
61 | Knowledge of incident response and handling methodologies. |
Knowledge |
6150 | Ability to optimize systems to meet enterprise performance requirements. |
Ability |
62 | Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
6330 | Knowledge of multi-level/security cross domain solutions. |
Knowledge |
6590 | Skill in interfacing with customers. |
Skill |
70A | Knowledge of cybersecurity methods, such as firewalls, demilitarized zones, and encryption. |
Knowledge |
70B | Skill in applying cybersecurity methods, such as firewalls, demilitarized zones, and encryption. |
Skill |
718 | Monitor network capacity and performance. |
Task |
72 | Knowledge of local area and wide area networking principles and concepts including bandwidth management. |
Knowledge |
765 | Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. |
Task |
782 | Plan and recommend modifications or adjustments based on exercise results or system environment. |
Task |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
8000 | Adhere to DCO policies and procedures reflecting applicable laws, policies, procedures, and regulations (such as United States Code Titles 10 and 50). |
Task |
8019 | Assess exploited systems’ potential to provide additional access, target development information, intelligence and/or covert infrastructure. |
Task |
802 | Provide feedback on network requirements, including network architecture and infrastructure. |
Task |
8061 | Determine and document software patches or the extent of releases that would harden vulnerable software. |
Task |
8062 | Determine location of tool(s) deployment and utilize them once deployed (e.g., monitor agent, sensor). |
Task |
8066 | Develop and review cyberspace operations TTPs for integration into strategic, operational and tactical levels of planning. |
Task |
8099 | Evaluate security architecture and its design against cyberspace threats as identified in operational and acquisition documents. |
Task |
8136 | Manage threat or target analysis of DCO information and production of threat information for networks and enclave environments. |
Task |
8161 | Provide and maintain documentation for TTPs as inputs to training programs. |
Task |
8171 | Provide input to the analysis, design, development or acquisition of capabilities used for meeting mission objectives. |
Task |
8179 | Read, write, and interpret simple scripts to collect remote data and automation tasks. |
Task |
818 | Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to higher headquarters. |
Task |
8180 | Read, write, and interpret simple scripts to parse large data files. |
Task |
8182 | Recommend Patch network vulnerabilities to ensure information is safeguarded against outside parties via Risk Mitigation Plans. |
Task |
823 | Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. |
Task |
82A | Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs. |
Knowledge |
850 | Store, retrieve, and manipulate data for analysis of system capabilities and requirements. |
Task |
87 | Knowledge of network traffic analysis methods. |
Knowledge |
88 | Knowledge of new and emerging information technology (IT) and cybersecurity technologies. |
Knowledge |
880A | Work with stakeholders to resolve computer security incidents and vulnerability compliance. |
Task |
912 | Knowledge of collection management processes, capabilities, and limitations. |
Knowledge |
92 | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
958 | Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity. |
Task |
959 | Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. |
Task |
96 | Knowledge of performance tuning tools and techniques. |
Knowledge |
971 | Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements. |
Task |
978A | Knowledge of root cause analysis techniques. |
Knowledge |
986 | Knowledge of organizational information technology (IT) user security policies (e.g., account creation, password rules, access control). |
Knowledge |
993A | Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization’s enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]). |
Ability |
99A | Knowledge of principles and methods for integrating system components. |
Knowledge |
Plans, implements, and operates network services/systems, to include hardware and virtual environments.
KSAT ID | Description | KSAT |
---|---|---|
12 | Knowledge of communication methods, principles, and concepts (e.g., crypto, dual hubs, time multiplexers) that support the network infrastructure. |
Knowledge |
15B | Ability to operate network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware. |
Ability |
15 | Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
41 | Knowledge of organization’s LAN/WAN pathways. |
Knowledge |
55 | Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data. |
Knowledge |
70 | Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
Knowledge |
72 | Knowledge of local area and wide area networking principles and concepts including bandwidth management. |
Knowledge |
76 | Knowledge of measures or indicators of system performance and availability. |
Knowledge |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
92 | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
106 | Knowledge of remote access technology concepts. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
112 | Knowledge of server administration and systems engineering theories, concepts, and methods. |
Knowledge |
133 | Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers). |
Knowledge |
148 | Knowledge of Virtual Private Network (VPN) security. |
Knowledge |
154 | Skill in analyzing network traffic capacity and performance characteristics. |
Skill |
193A | Skill in implementing and testing network infrastructure contingency and recovery plans. |
Skill |
198 | Skill in establishing a routing schema. |
Skill |
205 | Skill in implementing, maintaining, and improving established network security practices. |
Skill |
207 | Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches. |
Skill |
234A | Skill in sub-netting. |
Skill |
261 | Knowledge of basic concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). |
Knowledge |
271 | Knowledge of common network tools (e.g., ping, traceroute, nslookup). |
Knowledge |
271B | Ability to operate common network tools (e.g., ping, traceroute, nslookup). |
Ability |
278 | Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN). |
Knowledge |
347A | Ability to execute OS command line (e.g., ipconfig, netstat, dir, nbtstat). |
Ability |
462 | Configure and optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling). |
Task |
522 | Develop and implement network backup and recovery procedures. |
Task |
555 | Diagnose network connectivity problem. |
Task |
666 | Install and maintain network infrastructure device operating system software (e.g., IOS, firmware). |
Task |
667 | Install or replace network hubs, routers, and switches. |
Task |
718 | Monitor network capacity and performance. |
Task |
736 | Patch network vulnerabilities to ensure information is safeguarded against outside parties. |
Task |
857 | Test and maintain network infrastructure including software and hardware devices. |
Task |
891A | Skill in configuring and utilizing computer protection components (e.g., hardware firewalls, servers, routers, as appropriate). |
Skill |
893 | Skill in securing network communications. |
Skill |
896 | Skill in protecting a network against malware. |
Skill |
900 | Knowledge of web filtering technologies. |
Knowledge |
901 | Knowledge of the capabilities of different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts). |
Knowledge |
901A | Ability to operate different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts). |
Ability |
902 | Knowledge of the range of existing networks (e.g., PBX, LANs, WANs, WIFI, SCADA). |
Knowledge |
985 | Skill in configuring and utilizing network protection components (e.g., Firewalls, VPNs, network intrusion detection systems). |
Skill |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1073 | Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1074A | Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly. |
Knowledge |
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1134 | Knowledge of symmetric key rotation techniques and concepts. |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
1142 | Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Knowledge |
231A | Skill in using network management tools (e.g., simple network management protocol (SNMP), (GrassMarlin)) to analyze network traffic patterns (e.g., including control system network analysis). |
Skill |
41A | Ability to operate the organization’s LAN/WAN pathways. |
Ability |
572 | Ensure application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment. |
Task |
656 | Implement new system design procedures, test procedures, and quality standards. |
Task |
673 | Integrate new systems into existing network architecture. |
Task |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
6919 | Ability to determine the best cloud deployment model for the appropriate operating environment. |
Ability |
76A | Ability to monitor measures or indicators of system performance and availability. |
Ability |
802 | Provide feedback on network requirements, including network architecture and infrastructure. |
Task |
903 | Knowledge of Wi-Fi. |
Knowledge |
92A | Ability to monitor traffic flows across the network. |
Ability |
989 | Knowledge of Voice over IP (VoIP). |
Knowledge |
990 | Knowledge of the common attack vectors on the network layer. |
Knowledge |
The Network Technician provides enterprise and tactical infrastructure knowledge, experience, and integration to the Cyber…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1033 | Knowledge of basic system administration, network, and operating system hardening techniques. |
Knowledge |
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
106 | Knowledge of remote access technology concepts. |
Knowledge |
1063A | Knowledge of operating system structures and internals (e.g., process management, directory structure, installed applications). |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1072A | Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Ability |
1104 | Examine network topologies to understand data flows through the network. |
Task |
1109 | Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools. |
Task |
112A | Knowledge of systems engineering theories, concepts, and methods. |
Knowledge |
113 | Knowledge of server and client operating systems. |
Knowledge |
114A | Knowledge of system/server diagnostic tools and fault identification techniques. |
Knowledge |
1153A | Install, update, and troubleshoot systems/servers. |
Task |
12 | Knowledge of communication methods, principles, and concepts (e.g., crypto, dual hubs, time multiplexers) that support the network infrastructure. |
Knowledge |
127 | Knowledge of systems administration concepts. |
Knowledge |
141 | Knowledge of the enterprise information technology (IT) architecture. |
Knowledge |
141A | Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures. |
Knowledge |
145 | Knowledge of the type and frequency of routine maintenance needed to keep equipment functioning properly. |
Knowledge |
148 | Knowledge of Virtual Private Network (VPN) security. |
Knowledge |
15 | Knowledge of capabilities and applications of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware. |
Knowledge |
154 | Skill in analyzing network traffic capacity and performance characteristics. |
Skill |
167A | Skill in conducting system/server planning, management, and maintenance. |
Skill |
170 | Skill in configuring and optimizing software. |
Skill |
171A | Skill in correcting physical and technical problems that impact system/server performance. |
Skill |
180 | Skill in designing the integration of hardware and software solutions. |
Skill |
183 | Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
Skill |
191 | Skill in developing and applying security system access controls. |
Skill |
193 | Skill in developing, testing, and implementing network infrastructure contingency and recovery plans. |
Skill |
194 | Skill in diagnosing connectivity problems. |
Skill |
195A | Skill in troubleshooting failed system components (i.e., servers) |
Skill |
202A | Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems. |
Skill |
2062 | Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the NE or enclave. |
Task |
206A | Skill in installing system and component upgrades. |
Skill |
207 | Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches. |
Skill |
209 | Skill in maintaining directory services. |
Skill |
2102 | Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access. |
Task |
2119 | Conduct network scouting and vulnerability analyses of systems within a network. |
Task |
211A | Skill in monitoring and optimizing system/server performance. |
Skill |
212A | Knowledge of network mapping and recreating network topologies. |
Knowledge |
216A | Skill in recovering failed systems/servers. |
Skill |
219A | Skill in operating system administration. |
Skill |
2232 | Determine course of action for addressing changes to objectives, guidance, and operational environment. |
Task |
231 | Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol). |
Skill |
2379B | Identify threats to Blue Force vulnerabilities. |
Task |
2477 | Identify potential points of strength and vulnerability within a network. |
Task |
2611 | Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan. |
Task |
278 | Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN). |
Knowledge |
287 | Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). |
Knowledge |
3063 | Ability to monitor system operations and react to events in response to triggers and/or observation of trends or unusual activity. |
Ability |
3076 | Ability to tailor technical and planning information to a customer’s level of understanding. |
Ability |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3246 | Knowledge of confidentiality, integrity, and availability requirements. |
Knowledge |
3277 | Knowledge of general SCADA system components. |
Knowledge |
3353 | Knowledge of the Risk Management Framework Assessment Methodology. |
Knowledge |
3402 | Knowledge of network construction and topology. |
Knowledge |
342A | Knowledge of operating system command line/prompt. |
Knowledge |
3431 | Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). |
Knowledge |
344 | Knowledge of virtualization technologies and virtual machine development and maintenance. |
Knowledge |
3539 | Knowledge of telecommunications fundamentals. |
Knowledge |
3741 | Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments. |
Skill |
3871 | Skill in remote command line and Graphic User Interface (GUI) tool usage. |
Skill |
4196 | Ability to build, implement, and maintain distributed sensor grid. |
Ability |
41A | Ability to operate the organization’s LAN/WAN pathways. |
Ability |
4201 | Ability to characterize network traffic for trends and patterns. |
Ability |
4215 | Ability to configure and place distributed sensor grid |
Ability |
4224 | Ability to coordinate with Sr Leaders of an Org. to ensure shared responsibility for supporting Org. mission/business functions using external providers of systems, services and apps receives visibility and is elevated to the appropriate decision-making authorities |
Ability |
4228 | Ability to create rule sets within an Intrusion Detection System (IDS). |
Ability |
4230 | Ability to create rules/alerts for traffic validation. |
Ability |
4273 | Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations. |
Ability |
4290 | Ability to implement network TAP configuration |
Ability |
4291 | Ability to implement sensors according to sensor plan |
Ability |
4294 | Ability to integrate information security requirements into the acquisition process, using applicable baseline security controls as one of the sources for security requirements, ensuring a robust software quality control process and establishing multiple source |
Ability |
4316 | Ability to organize policy standards to insure procedures and guidelines comply with cybersecurity policies. |
Ability |
433 | Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. |
Task |
434A | Check system hardware availability, functionality, integrity, and efficiency. |
Task |
4352 | Ability to setup Serial and Ethernet interfaces. |
Ability |
4354 | Ability to share meaningful insights about the context of an organization’s threat environment that improve its risk management posture. |
Ability |
4357 | Ability to test tools within sensor grid. |
Ability |
4358 | Ability to track the location and configuration of networked devices and software across departments, locations, facilities and potentially supporting business functions. |
Ability |
4360 | Ability to troubleshoot computer software and hardware issues, make repairs, and schedule updates. |
Ability |
4365 | Ability to use and/or integrate a Security Information and Event Management (SIEM) platform. |
Ability |
4390 | Knowledge of active directory federated services. |
Knowledge |
4396 | Knowledge of basic cloud-based technologies and concepts. |
Knowledge |
4398 | Knowledge of basic Cyber Threat Emulation concepts. |
Knowledge |
4399 | Knowledge of basic Embedded Systems concepts. |
Knowledge |
4415 | Knowledge of common obfuscation techniques (e.g. command line execution, string substitution, clandestine side channel, Base64). |
Knowledge |
4429 | Knowledge of cybersecurity controls and design principles and methods (e.g., firewalls, DMZ, and encryption). |
Knowledge |
4438 | Knowledge of different types of log subscriptions (e.g. push vs pull, MS Windows event forwarding, winlogbeat, syslog). |
Knowledge |
4451 | Knowledge of the full-spectrum of cyberspace operational missions (e.g., DODIN Operations, DCO, OCO), principles, capabilities, limitations, and effects. |
KSA |
4481 | Knowledge of long haul circuits. |
Knowledge |
4499 | Knowledge of Network OSs. |
Knowledge |
4500 | Knowledge of network systems management methods including end-to-end systems performance monitoring. |
Knowledge |
4501 | Knowledge of non-Active Directory domains (e.g. IDM, LDAP). |
Knowledge |
4516 | Knowledge of principles and methods for integrating system and network components. |
Knowledge |
452 | Conduct functional and connectivity testing to ensure continuing operability. |
Task |
4522 | Knowledge of public key infrastructure (PKI) libraries, certificate authorities, certificate management, and encryption functionalities. |
Knowledge |
4529 | Knowledge of routing protocols such as RIPv1/v2, OSPF, IGRP, and EIGRP |
Knowledge |
4532 | Knowledge of Security Technical Implementation Guide (STIG) |
Knowledge |
4537 | Knowledge of stream providers (e.g. KAFKA). |
Knowledge |
4539 | Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model). |
Knowledge |
456A | Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing. |
Task |
4588 | Knowledge of transmission capabilities (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)). |
Knowledge |
4594 | Knowledge of WAN technologies such as PPP, Frame-relay, dedicated T1s, ISDN, and routing protocols |
Knowledge |
4595 | Knowledge of web applications and their common attack vectors. |
Knowledge |
4606 | Skill in applying STIG upgrades |
Skill |
4609 | Skill in cable management and organization |
Skill |
461 | Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces. |
Task |
4615 | Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, anti-virus software, anti-spyware). |
Skill |
462 | Configure and optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling). |
Task |
4635 | Skill in implementing DHCP and DNS |
Skill |
4664 | Skill in router IOS backup, recovery, and upgrade. |
Skill |
467 | Consult with engineering staff to evaluate interface between hardware and software. |
Task |
4671 | Skill in understanding cybersecurity architecture, its implementation, and its expected behaviors and how changes in conditions affect outcomes. |
Skill |
499 | Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs. |
Task |
51 | Knowledge of how system components are installed, integrated, and optimized. |
Knowledge |
518 | Develop and document systems administration standard operating procedures. |
Task |
518A | Comply with organization systems administration standard operating procedures. |
Task |
602 | Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration. |
Task |
6100 | Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities. |
Ability |
6240 | Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE). |
Knowledge |
6590 | Skill in interfacing with customers. |
Skill |
667 | Install or replace network hubs, routers, and switches. |
Task |
683 | Maintain baseline system security according to organizational policies. |
Task |
68A | Ability to build architectures and frameworks. |
Ability |
695 | Manage accounts, network rights, and access to systems and equipment. |
Task |
70 | Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
Knowledge |
701A | Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. |
Task |
72 | Knowledge of local area and wide area networking principles and concepts including bandwidth management. |
Knowledge |
728A | Oversee installation, implementation, configuration, and support of system components. |
Task |
736 | Patch network vulnerabilities to ensure information is safeguarded against outside parties. |
Task |
76 | Knowledge of measures or indicators of system performance and availability. |
Knowledge |
763A | Diagnose faulty system/server hardware. |
Task |
763B | Perform repairs on faulty system/server hardware. |
Task |
765 | Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. |
Task |
781 | Plan, execute, and verify data redundancy and system recovery procedures. |
Task |
782 | Plan and recommend modifications or adjustments based on exercise results or system environment. |
Task |
802 | Provide feedback on network requirements, including network architecture and infrastructure. |
Task |
8042 | Consult with customers about network system design and maintenance. |
Task |
8058 | Design countermeasures and mitigations against potential weaknesses and vulnerabilities in system and elements. |
Task |
8059 | Design, develop, and modify network systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design. |
Task |
8078 | Diagnose network connectivity problems. |
Task |
8091 | Engage customers to understand their expectations and wants. |
Task |
8099 | Evaluate security architecture and its design against cyberspace threats as identified in operational and acquisition documents. |
Task |
811 | Provide ongoing optimization and problem solving support. |
Task |
8110 | Identify optimal locations for network sensor placement to collect on targeted devices. |
Task |
8117 | Implement and enforce DCO policies and procedures reflecting applicable laws, policies, procedures, and regulations (such as United States Code Titles 10 and 50). |
Task |
8131 | Maintain Operational, technical, and authoritative situational awareness during effects-based operations |
Task |
8139 | Notify designated mission leadership or applicable team members of any suspected cyber incident. |
Task |
8161 | Provide and maintain documentation for TTPs as inputs to training programs. |
Task |
8165 | Provide feedback for RFI generation. |
Task |
8187 | Repair network connectivity problems. |
Task |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
835A | Troubleshoot hardware/software interface and interoperability problems. |
Task |
90 | Knowledge of operating systems. |
Knowledge |
902 | Knowledge of the range of existing networks (e.g., PBX, LANs, WANs, WIFI, SCADA). |
Knowledge |
96 | Knowledge of performance tuning tools and techniques. |
Knowledge |
986 | Knowledge of organizational information technology (IT) user security policies (e.g., account creation, password rules, access control). |
Knowledge |
990 | Knowledge of the common attack vectors on the network layer. |
Knowledge |
991 | Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution). |
Knowledge |
Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance needs of…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
100 | Knowledge of Privacy Impact Assessments. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
395 | Advise senior management (e.g., CIO) on risk levels and security posture. |
Task |
396 | Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, and systems, and elements. |
Task |
457 | Conduct Privacy Impact Assessments (PIA) of the application’s security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII). |
Task |
677 | Interpret patterns of non compliance to determine their impact on levels of risk and/or overall effectiveness of the enterprise’s cybersecurity program. |
Task |
784 | Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. |
Task |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
3076 | Ability to tailor technical and planning information to a customer’s level of understanding. |
Ability |
3651 | Knowledge of what constitutes a “threat” to a network. |
Knowledge |
5430 | Present technical information to technical and non-technical audiences. |
Task |
5560 | Promote awareness of cyber policy and strategy as appropriate among management and ensure sound principles are reflected in the organization’s mission, vision, and goals. |
Task |
5761 | Account for and administer individual requests for release or disclosure of personal and/or protected information. |
Task |
5762 | Act as a liaison to the information systems department. |
Task |
5763 | Act as, or work with, counsel relating to business partner contracts. |
Task |
5764 | Administer action on all complaints concerning the organization’s privacy policies and procedures in coordination and collaboration with other similar functions and, when necessary, legal counsel. |
Task |
5765 | Assist the Security Officer with the development and implementation of an information infrastructure. |
Task |
5766 | Assure that the use of technologies maintain, and do not erode, privacy protections on use, collection and disclosure of personal information. |
Task |
5767 | Collaborate on cyber privacy and security policies and procedures. |
Task |
5768 | Collaborate with cyber security personnel on the security risk assessment process to address privacy compliance and risk mitigation. |
Task |
5769 | Conduct on-going privacy training and awareness activities. |
Task |
5770 | Conduct periodic information privacy impact assessments and ongoing compliance monitoring activities in coordination with the organization’s other compliance and operational assessment functions. |
Task |
5771 | Conduct privacy impact assessments of proposed rules on the privacy of personal information, including the type of personal information collected and the number of people affected. |
Task |
5772 | Coordinate with the appropriate regulating bodies to ensure that programs, policies and procedures involving civil rights, civil liberties and privacy considerations are addressed in an integrated and comprehensive manner. |
Task |
5773 | Coordinate with the Chief Information Security Officer to ensure alignment between security and privacy practices. |
Task |
5774 | Coordinate with the Corporate Compliance Officer re: procedures for documenting and reporting self-disclosures of any evidence of privacy violations. |
Task |
5776 | Develop and coordinate a risk management and compliance framework for privacy. |
Task |
5777 | Develop and manage enterprise-wide procedures to ensure the development of new products and services is consistent with company privacy policies and legal obligations. |
Task |
5778 | Develop and manage procedures for vetting and auditing vendors for compliance with the privacy and data security policies and legal requirements. |
Task |
5779 | Develop privacy training materials and other communications to increase employee understanding of company privacy policies, data handling practices and procedures and legal obligations. |
Task |
5780 | Direct and oversee privacy specialists and coordinate privacy and data security programs with senior executives globally to ensure consistency across the organization. |
Task |
5781 | Ensure all processing and/or databases are registered with the local privacy/data protection authorities where required. |
Task |
5782 | Ensure compliance with privacy practices and consistent application of sanctions for failure to comply with privacy policies for all individuals in the organization’s workforce, extended workforce and for all business associates in cooperation with Human Resources, the information security officer, administration and legal counsel as applicable. |
Task |
5783 | Ensure that the company maintains appropriate privacy and confidentiality notices, consent and authorization forms, and materials. |
Task |
5784 | Establish a process for receiving, documenting, tracking, investigating and taking action on all complaints concerning the organization’s privacy policies and procedures. |
Task |
5785 | Establish an internal privacy audit program. |
Task |
5786 | Establish with management and operations a mechanism to track access to protected health information, within the purview of the organization and as required by law and to allow qualified individuals to review or receive a report on such activity. |
Task |
5787 | Establish, implement and maintains organization-wide policies and procedures to comply with privacy regulations. |
Task |
5788 | Identify and correct potential company compliance gaps and/or areas of risk to ensure full compliance with privacy regulations. |
Task |
5789 | Interface with Senior Management to develop strategic plans for the collection, use and sharing of information in a manner that maximizes its value while complying with applicable privacy regulations. |
Task |
5791 | Maintain current knowledge of applicable federal and state privacy laws and accreditation standards, and monitor advancements in information privacy technologies to ensure organizational adaptation and compliance. |
Task |
5792 | Manage privacy incidents and breaches in conjunction with the Privacy Officer, Chief Information Security Officer, legal counsel, and the business units. |
Task |
5793 | Mitigate effects of a use or disclosure of personal information by employees or business partners. |
Task |
5794 | Monitor systems development and operations for security and privacy compliance. |
Task |
5795 | Oversee, direct, deliver or ensure delivery of initial privacy training and orientation to all employees, volunteers, contractors, alliances, business associates and other appropriate third parties. |
Task |
5796 | Participate in the implementation and ongoing compliance monitoring of all trading partner and business associate agreements, to ensure all privacy concerns, requirements, and responsibilities are addressed. |
Task |
5797 | Periodically revise the privacy program in light of changes in laws, regulatory, or company policy. |
Task |
5798 | Provide development guidance and assist in the identification, implementation, and maintenance of organization information privacy policies and procedures in coordination with organization management and administration and legal counsel. |
Task |
5799 | Provide leadership for the organization’s privacy program. |
Task |
5800 | Provide leadership in the planning, design and evaluation of privacy and security related projects. |
Task |
5801 | Provide strategic guidance to corporate officers regarding information resources and technology. |
Task |
5802 | Report on a periodic basis regarding the status of the privacy program to the Board, CEO or other responsible individual or committee. |
Task |
5803 | Resolve allegations of non-compliance with the corporate privacy policies or notice of information practices. |
Task |
5804 | Review all system-related information security plans to ensure alignment between security and privacy practices. |
Task |
5805 | Serve as the information privacy liaison for users of technology systems. |
Task |
5806 | Serve in a leadership role for Privacy Oversight Committee activities. |
Task |
5807 | Support the organization’s privacy compliance program, working closely with the Privacy Officer, Chief Information Security Officer, and other business leaders to ensure compliance with federal and state privacy laws and regulations. |
Task |
5808 | Develop appropriate sanctions for failure to comply with the corporate privacy policies and procedures. |
Task |
5809 | Undertake a comprehensive review of the company’s data and privacy projects and ensure that they are consistent with corporate privacy and data security goals and policies. |
Task |
5810 | Work cooperatively with applicable organization units in overseeing consumer information access rights. |
Task |
5811 | Work with all organization personnel involved with any aspect of release of protected information to ensure coordination with the organization’s policies, procedures and legal requirements. |
Task |
5812 | Work with business teams and senior management to ensure awareness of “best practices” on privacy and data security issues. |
Task |
5813 | Work with external affairs to develop relationships with consumer organizations and other NGOs with an interest in privacy and data security issues—and to manage company participation in public events related to privacy and data security. |
Task |
5815 | Work with External Affairs to respond to press and other inquiries with regard to concern over consumer and employee data. |
Task |
5816 | Work with legal counsel and management, key departments and committees to ensure the organization has and maintains appropriate privacy and confidentiality consent, authorization forms and information notices and materials reflecting current organization and legal practices and requirements. |
Task |
5817 | Work with organization administration, legal counsel and other related parties to represent the organization’s information privacy interests with external parties, including government bodies, which undertake to adopt or amend privacy legislation, regulation or standard. |
Task |
5818 | Work with organization senior management to establish an organization-wide Privacy Oversight Committee. |
Task |
5819 | Work with the general counsel, external affairs and businesses to ensure both existing and new services comply with privacy and data security obligations. |
Task |
6100 | Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities. |
Ability |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6910 | Ability to determine whether a security incident violates a privacy principle or legal standard requiring specific legal action. |
Ability |
6912 | Ability to monitor advancements in information privacy laws to ensure organizational adaptation and compliance. |
Ability |
6913 | Ability to monitor advancements in information privacy technologies to ensure organizational adaptation and compliance. |
Ability |
6914 | Ability to work across departments and business units to implement organization’s privacy principles and programs, and align privacy objectives with security objectives. |
Ability |
6916 | Skill in creating policies that reflect the business’s core privacy objectives. |
Skill |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1136A | Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud). |
Knowledge |
3055A | Ability to select the appropriate implant to achieve operational goals. |
Ability |
3098 | Knowledge of virtualization products (Vmware, Virtual PC). |
Knowledge |
345 | Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies. |
Knowledge |
3637 | Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications). |
Knowledge |
3644 | Knowledge of virtual machine technologies. |
Knowledge |
3654 | Knowledge of who the organization’s operational planners are, how and where they can be contacted, and what are their expectations. |
Knowledge |
3659 | Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3749 | Ability to develop clear directions and instructional materials. |
Ability |
4116 | Knowledge of transcript development processes and techniques (e.g., verbatim, gists, summaries). |
Knowledge |
4117 | Knowledge of translation processes and techniques. |
Knowledge |
524 | Develop and maintain strategic plans. |
Task |
5775 | Develop and apply corrective action procedures. |
Task |
5790 | Liaise with regulatory and accrediting bodies. |
Task |
5814 | Work with external affairs to develop relationships with regulators and other government officials responsible for privacy and data security issues. |
Task |
599 | Evaluate contracts to ensure compliance with funding, legal, and program requirements. |
Task |
600 | Evaluate cost benefit, economic, and risk analysis in decision making process. |
Task |
6110 | Ability to develop, update, and/or maintain standard operating procedures (SOPs). |
Ability |
618A | Provide guidance on laws, regulations, policies, standards, or procedures to management, personnel, or clients. |
Task |
675 | Interpret and apply laws, regulations, policies, standards, or procedures to specific issues. |
Task |
6911 | Ability to develop or procure curriculum that speaks to the topic at the appropriate level for the target. |
Ability |
6915 | Skill in communicating with all levels of management including Board members (e.g., interpersonal skills, approachability, effective listening skills, appropriate use of style and language for the audience). |
Skill |
6917 | Skill in negotiating vendor agreements and evaluating vendor privacy practices. |
Skill |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
9 | Knowledge of applicable business processes and operations of customer organizations. |
Knowledge |
Manages the user interface design portion of the design process of a product.
KSAT ID | Description | KSAT |
---|---|---|
16 | Knowledge of capabilities and requirements analysis. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
102 | Knowledge of programming language structures and logic. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
155 | Skill in applying and incorporating information technologies into proposed solutions. |
Skill |
414 | Analyze user needs and software requirements to determine feasibility of design within time and cost constraints. |
Task |
927A | Research and evaluate available technologies and standards to meet customer requirements. |
Task |
968 | Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
3822A | Skill in managing user relationships, including determining user needs/requirements, managing user expectations, and demonstrating commitment to delivering quality results. |
Skill |
5965 | Design and prototype user interfaces. |
Task |
5966 | Create prototypes, wireframes, and storyboards based on customer requirements. |
Task |
5967 | Ensure proper integration of the user interface with back-end functionality. |
Task |
5969 | Create style guides and unified approach (libraries, visual languages, etc) to the product. |
Task |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7101 | Knowledge of end to end product development processes. |
Knowledge |
7102 | Skill in using industry-standard design and prototyping tools. |
Skill |
7103 | Knowledge of design thinking processes. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
132 | Knowledge of technology integration processes. |
Knowledge |
35 | Knowledge of digital rights management. |
Knowledge |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
467 | Consult with engineering staff to evaluate interface between hardware and software. |
Task |
5968 | Lead integrated design team to achieve a finished product. |
Task |
797 | Provide advice on project costs, design concepts, or design changes. |
Task |
90 | Knowledge of operating systems. |
Knowledge |
Manages the development of products including the resource management, product strategy (physical or digital), functional…
KSAT ID | Description | KSAT |
---|---|---|
16 | Knowledge of capabilities and requirements analysis. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
129 | Knowledge of system life cycle management principles, including software security and usability. |
Knowledge |
130 | Knowledge of systems testing and evaluation methods. |
Knowledge |
414 | Analyze user needs and software requirements to determine feasibility of design within time and cost constraints. |
Task |
461 | Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces. |
Task |
487 | Define project scope and objectives based on customer requirements. |
Task |
797 | Provide advice on project costs, design concepts, or design changes. |
Task |
811 | Provide ongoing optimization and problem solving support. |
Task |
863A | Manage the translation of functional requirements into technical solutions. |
Task |
911A | Ability to interpret and translate customer requirements into operational capabilities. |
Ability |
968 | Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2839 | Supervise and assign work to programmers, designers, technologists and technicians and other engineering and scientific personnel. |
Task |
3822 | Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results. |
Skill |
5150 | Coordinate and manage the overall service provided to a customer end-to-end. |
Task |
5961 | Orchestrate the various activities associated with ensuring that a product is delivered that meets users’ needs. |
Task |
5962 | Create integrated vision, roadmaps, and strategies to enable product delivery. |
Task |
5963 | Manage product releases. |
Task |
5964 | Manage dependencies and risks. |
Task |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7098 | Skill in conducting strategy development and implementation. |
Skill |
7100 | Skill in leading and managing multiple teams simultaneously. |
Skill |
7101 | Knowledge of end to end product development processes. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1017A | Participate in the acquisition process as necessary. |
Task |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
130A | Knowledge of systems security testing and evaluation methods. |
Knowledge |
182 | Skill in determining an appropriate level of test rigor for a given system. |
Skill |
190 | Skill in developing operations-based testing scenarios. |
Skill |
220 | Skill in systems integration testing. |
Skill |
225B | Knowledge of penetration testing tools and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems). |
Knowledge |
3268 | Knowledge of staff management, assignment, and allocation processes. |
Knowledge |
35 | Knowledge of digital rights management. |
Knowledge |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
524 | Develop and maintain strategic plans. |
Task |
528A | Develop cost estimates for new or modified system(s). |
Task |
5380 | Gather feedback on customer satisfaction and internal service performance to foster continual improvement. |
Task |
5660 | Work with other service managers and product owners to balance and prioritize services to meet overall customer requirements, constraints, and objectives. |
Task |
680A | Lead and oversee budget, staffing, and contracting. |
Task |
69A | Knowledge of risk management processes and requirements per the Risk Management Framework (RMF). |
Knowledge |
7099 | Skill in conducting market and user research. |
Skill |
760 | Perform needs analysis to determine opportunities for new and improved business process solutions. |
Task |
9 | Knowledge of applicable business processes and operations of customer organizations. |
Knowledge |
90 | Knowledge of operating systems. |
Knowledge |
965 | Knowledge of organization’s risk tolerance and/or risk management approach. |
Knowledge |
967 | Knowledge of current and emerging threats/threat vectors. |
Knowledge |
980A | Skill in performing root cause analysis. |
Skill |
Manages the package of support functions required to field and maintain the readiness and operational…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
203 | Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system. |
Skill |
760 | Perform needs analysis to determine opportunities for new and improved business process solutions. |
Task |
801A | Provide enterprise cybersecurity and supply chain risk management guidance. |
Task |
808 | Provide input to implementation plans and standard operating procedures. |
Task |
1005 | Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes). |
Knowledge |
1018 | Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals. |
Task |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1148 | Develop contract language to ensure supply chain, system, network, and operational security are met. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5310 | Ensure that appropriate SLAs and underpinning contracts have been defined that clearly set out for the customer a description of the service and the measures for monitoring the service. |
Task |
6420 | Knowledge of sustainment technologies, processes and strategies. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1003 | Develop and document supply chain risks for critical system elements, as appropriate. |
Task |
1004A | Knowledge of information technology (IT) acquisition/procurement requirements. |
Knowledge |
1021 | Knowledge of risk threat assessment. |
Knowledge |
1039A | Ability to evaluate/ensure the trustworthiness of the supplier and/or product. |
Ability |
1061A | Knowledge of the acquisition/procurement life cycle process. |
Knowledge |
107 | Knowledge of resource management principles and techniques. |
Knowledge |
1122 | Ability to apply supply chain risk management standards. |
Ability |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1127 | Knowledge of Import/Export Regulations related to cryptography and other security technologies. |
Knowledge |
1130 | Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions). |
Knowledge |
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1143A | Conduct import/export reviews for acquiring systems and software. |
Task |
1148A | Develop supply chain, system, network, performance, and cyber security requirements. |
Task |
129 | Knowledge of system life cycle management principles, including software security and usability. |
Knowledge |
296 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
325A | Ability to ensure security practices are followed throughout the acquisition process. |
Ability |
5010 | Act as a primary stakeholder in the underlying information technology (IT) operational processes and functions that support the service, provide direction and monitor all significant activities so the service is delivered successfully. |
Task |
5150 | Coordinate and manage the overall service provided to a customer end-to-end. |
Task |
537 | Develop methods to monitor and measure risk, compliance, and assurance efforts. |
Task |
5380 | Gather feedback on customer satisfaction and internal service performance to foster continual improvement. |
Task |
5610 | Review service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up. |
Task |
5660 | Work with other service managers and product owners to balance and prioritize services to meet overall customer requirements, constraints, and objectives. |
Task |
6070 | Ability to conduct and implement market research to understand government and industry capabilities and appropriate pricing. |
Ability |
6160 | Ability to oversee the development and update of the lifecycle cost estimate. |
Ability |
62 | Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
Knowledge |
6290 | Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems. |
Knowledge |
680A | Lead and oversee budget, staffing, and contracting. |
Task |
69A | Knowledge of risk management processes and requirements per the Risk Management Framework (RMF). |
Knowledge |
797 | Provide advice on project costs, design concepts, or design changes. |
Task |
811 | Provide ongoing optimization and problem solving support. |
Task |
813 | Provide recommendations for possible improvements and upgrades. |
Task |
834 | Resolve conflicts in laws, regulations, policies, standards, or procedures. |
Task |
840B | Review or conduct audits of programs and projects. |
Task |
88 | Knowledge of new and emerging information technology (IT) and cybersecurity technologies. |
Knowledge |
936 | Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers). |
Task |
949 | Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements. |
Task |
954 | Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk. |
Knowledge |
955A | Draft and publish supply chain security and risk management documents. |
Task |
966 | Knowledge of enterprise incident response program, roles, and responsibilities. |
Knowledge |
970A | Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities. |
Task |
979 | Knowledge of supply chain risk management standards, processes, and practices. |
Knowledge |
Leads, coordinates, communicates, integrates and is accountable for the overall success of the program, ensuring…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
143 | Knowledge of the organization’s enterprise information technology (IT) goals and objectives. |
Knowledge |
801 | Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans. |
Task |
1004A | Knowledge of information technology (IT) acquisition/procurement requirements. |
Knowledge |
1018 | Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals. |
Task |
1021 | Knowledge of risk threat assessment. |
Knowledge |
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5010 | Act as a primary stakeholder in the underlying information technology (IT) operational processes and functions that support the service, provide direction and monitor all significant activities so the service is delivered successfully. |
Task |
5410 | Manage the internal relationship with information technology (IT) process owners supporting the service, assisting with the definition and agreement of operating level agreements (OLAs). |
Task |
6290 | Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1003 | Develop and document supply chain risks for critical system elements, as appropriate. |
Task |
1005 | Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes). |
Knowledge |
1017A | Participate in the acquisition process as necessary. |
Task |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1039A | Ability to evaluate/ensure the trustworthiness of the supplier and/or product. |
Ability |
1061A | Knowledge of the acquisition/procurement life cycle process. |
Knowledge |
107 | Knowledge of resource management principles and techniques. |
Knowledge |
1122 | Ability to apply supply chain risk management standards. |
Ability |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1127 | Knowledge of Import/Export Regulations related to cryptography and other security technologies. |
Knowledge |
1130 | Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions). |
Knowledge |
1143A | Conduct import/export reviews for acquiring systems and software. |
Task |
1148 | Develop contract language to ensure supply chain, system, network, and operational security are met. |
Task |
1148A | Develop supply chain, system, network, performance, and cyber security requirements. |
Task |
1148B | Ensure supply chain, system, network, performance, and cyber security requirements are included in contract language and delivered. |
Task |
129 | Knowledge of system life cycle management principles, including software security and usability. |
Knowledge |
203 | Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system. |
Skill |
296 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
325A | Ability to ensure security practices are followed throughout the acquisition process. |
Ability |
5150 | Coordinate and manage the overall service provided to a customer end-to-end. |
Task |
524 | Develop and maintain strategic plans. |
Task |
537 | Develop methods to monitor and measure risk, compliance, and assurance efforts. |
Task |
5380 | Gather feedback on customer satisfaction and internal service performance to foster continual improvement. |
Task |
6160 | Ability to oversee the development and update of the lifecycle cost estimate. |
Ability |
629A | Identify and address cyber workforce planning and management issues (e.g. recruitment, retention, and training). |
Task |
68 | Knowledge of information technology (IT) architectural concepts and frameworks. |
Knowledge |
680A | Lead and oversee budget, staffing, and contracting. |
Task |
69 | Knowledge of Risk Management Framework (RMF) requirements. |
Knowledge |
69A | Knowledge of risk management processes and requirements per the Risk Management Framework (RMF). |
Knowledge |
760 | Perform needs analysis to determine opportunities for new and improved business process solutions. |
Task |
834 | Resolve conflicts in laws, regulations, policies, standards, or procedures. |
Task |
840B | Review or conduct audits of programs and projects. |
Task |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
949 | Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements. |
Task |
954 | Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk. |
Knowledge |
955A | Draft and publish supply chain security and risk management documents. |
Task |
979 | Knowledge of supply chain risk management standards, processes, and practices. |
Knowledge |
Conducts software and systems engineering and software systems research in order to develop new capabilities,…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
88 | Knowledge of new and emerging information technology (IT) and cybersecurity technologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
129 | Knowledge of system life cycle management principles, including software security and usability. |
Knowledge |
144A | Skill in applying the systems engineering process. |
Skill |
925 | Research current technology to understand capabilities of required system or network. |
Task |
927A | Research and evaluate available technologies and standards to meet customer requirements. |
Task |
934 | Identify cyber capabilities strategies for custom hardware and software development based on mission requirements. |
Task |
1076 | Collaborate with stakeholders to identify and/or develop appropriate solutions technology. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
10 | Knowledge of application vulnerabilities. |
Knowledge |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1038B | Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability). |
Knowledge |
1040A | Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure. |
Knowledge |
1056 | Knowledge of operations security. |
Knowledge |
1062 | Knowledge of software reverse engineering techniques. |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1077 | Design and develop new tools/technologies as related to cybersecurity. |
Task |
1078A | Troubleshoot prototype design and process issues throughout the product design, development, and pre-launch phases. |
Task |
1079A | Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate vulnerabilities. |
Task |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1135 | Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing). |
Knowledge |
1142A | Knowledge of industry standard security models. |
Knowledge |
1147A | Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce. |
Task |
155 | Skill in applying and incorporating information technologies into proposed solutions. |
Skill |
172 | Skill in creating and utilizing mathematical or statistical models. |
Skill |
180A | Skill in designing the integration of technology processes and solutions, including legacy systems and modern programming languages. |
Skill |
27 | Knowledge of cryptography and cryptographic key management concepts. |
Knowledge |
3068 | Ability to prepare and present briefings. |
Ability |
3069 | Ability to produce technical documentation. |
Ability |
321A | Knowledge of industry technologies and how differences affect exploitation/vulnerabilities. |
Knowledge |
383 | Skill in using scientific rules and methods to solve problems. |
Skill |
4 | Ability to identify systemic security issues based on the analysis of vulnerability and configuration data. |
Ability |
6919 | Ability to determine the best cloud deployment model for the appropriate operating environment. |
Ability |
6942 | Skill in designing or implementing cloud computing deployment models. |
Skill |
95A | Knowledge of penetration testing principles, tools, and techniques. |
Knowledge |
Analyzes the security of new or existing computer applications, software, or specialized utility programs and…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
56 | Knowledge of cybersecurity principles and methods that apply to software development. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
90 | Knowledge of operating systems. |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
109 | Knowledge of secure configuration management techniques. |
Knowledge |
177 | Skill in designing countermeasures to identified security risks. |
Skill |
197 | Skill in discerning the protection needs (i.e., security controls) of information systems and networks. |
Skill |
417 | Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews. |
Task |
432 | Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules. |
Task |
467 | Consult with engineering staff to evaluate interface between hardware and software. |
Task |
515B | Develop secure software testing and validation procedures. |
Task |
634 | Identify basic common coding flaws at a high level. |
Task |
645 | Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life. |
Task |
764A | Perform secure program testing, review, and/or assessment to identify potential flaws in codes and mitigate vulnerabilities. |
Task |
770 | Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change. |
Task |
826 | Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing. |
Task |
865 | Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria. |
Task |
972A | Determine and document software patches or the extent of releases that would leave software vulnerable. |
Task |
973A | Skill in using code analysis tools. |
Skill |
976 | Knowledge of software quality assurance process. |
Knowledge |
1020A | Skill in secure test plan design (e. g. unit, integration, system, acceptance). |
Skill |
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1037A | Knowledge of information technology (IT) risk management policies, requirements, and procedures. |
Knowledge |
1071 | Knowledge of secure software deployment methodologies, tools, and practices. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
100 | Knowledge of Privacy Impact Assessments. |
Knowledge |
102 | Knowledge of programming language structures and logic. |
Knowledge |
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1038B | Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability). |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1131 | Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]). |
Knowledge |
1135 | Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing). |
Knowledge |
1140A | Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic). |
Skill |
116 | Knowledge of software debugging principles. |
Knowledge |
117 | Knowledge of software design tools, methods, and techniques. |
Knowledge |
118 | Knowledge of software development models (e.g., Waterfall Model, Spiral Model). |
Knowledge |
119 | Knowledge of software engineering. |
Knowledge |
121 | Knowledge of structured analysis principles and methods. |
Knowledge |
124 | Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools. |
Knowledge |
149 | Knowledge of web services, including service-oriented architecture, Simple Object Access Protocol, and web service description language. |
Knowledge |
168 | Skill in conducting software debugging. |
Skill |
191 | Skill in developing and applying security system access controls. |
Skill |
20 | Knowledge of complex data structures. |
Knowledge |
2156 | Consult with customers about software system design and maintenance. |
Task |
23 | Knowledge of computer programming principles such as object-oriented design. |
Knowledge |
2335 | Direct software programming and development of documentation. |
Task |
2839 | Supervise and assign work to programmers, designers, technologists and technicians and other engineering and scientific personnel. |
Task |
3080 | Ability to use and understand complex mathematical concepts (e.g., discrete math). |
Ability |
38 | Knowledge of organization’s enterprise information security architecture system. |
Knowledge |
3B | Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks. |
Skill |
408A | Analyze and provide information to stakeholders that will support the development of security a application or modification of an existing security application. |
Task |
414A | Analyze security needs and software requirements to determine feasibility of design within time and cost constraints and security mandates. |
Task |
418 | Apply secure code documentation. |
Task |
43A | Knowledge of embedded systems. |
Knowledge |
459A | Conduct trial runs of programs and software applications to ensure the desired information is produced and instructions and security levels are correct. |
Task |
465 | Develop threat model based on customer interviews and requirements. |
Task |
515C | Develop system testing and validation procedures, programming, and documentation. |
Task |
602 | Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration. |
Task |
644 | Identify security implications and apply methodologies within centralized and decentralized environments across the enterprises computer systems in software development. |
Task |
6932 | Knowledge of mobile device (Android/iOS) development structures, principles, platforms, containers, languages, and the specific vulnerabilities associated with mobile device development. |
Knowledge |
6944 | Skill in implementing defensive programming techniques. |
Skill |
710 | Monitor and evaluate a system’s compliance with information technology (IT) security, resilience, and dependability requirements. |
Task |
72 | Knowledge of local area and wide area networking principles and concepts including bandwidth management. |
Knowledge |
74 | Knowledge of low-level computer languages (e.g., assembly languages). |
Knowledge |
756 | Perform integrated quality assurance testing for security functionality and resiliency attack. |
Task |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
850 | Store, retrieve, and manipulate data for analysis of system capabilities and requirements. |
Task |
904 | Knowledge of interpreted and compiled computer languages. |
Knowledge |
905 | Knowledge of secure coding techniques. |
Knowledge |
936 | Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers). |
Task |
95A | Knowledge of penetration testing principles, tools, and techniques. |
Knowledge |
968 | Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization). |
Knowledge |
969 | Perform penetration testing as required for new or updated applications. |
Task |
975 | Skill in integrating black box security testing tools into quality assurance process of software releases. |
Skill |
978A | Knowledge of root cause analysis techniques. |
Knowledge |
979 | Knowledge of supply chain risk management standards, processes, and practices. |
Knowledge |
980A | Skill in performing root cause analysis. |
Skill |
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g.,…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
38 | Knowledge of organization’s enterprise information security architecture system. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
68B | Ability to design architectures and frameworks. |
Ability |
70B | Skill in applying cybersecurity methods, such as firewalls, demilitarized zones, and encryption. |
Skill |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
143A | Knowledge of integrating the organization’s goals and objectives into the architecture. |
Knowledge |
183 | Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
Skill |
197A | Skill in translating operational requirements into protection needs (i.e., security controls). |
Skill |
534 | Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data primarily applicable to government organizations (e.g., UNCLASSIFIED, SECRET, and TOP SECRET). |
Task |
561 | Document and address organization’s information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition lifecycle. |
Task |
568 | Employ secure configuration management processes. |
Task |
579 | Ensure acquired or developed system(s) and architecture(s) are consistent with organization’s cybersecurity architecture guidelines. |
Task |
631 | Identify and prioritize critical business functions in collaboration with organizational stakeholders. |
Task |
646A | Document the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately. |
Task |
765 | Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. |
Task |
994 | Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment. |
Task |
1072A | Ability to apply network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Ability |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2248 | Develop a system security context, a preliminary system security CONOPS, and define baseline system security requirements in accordance with applicable cybersecurity requirements. |
Task |
2390 | Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents. |
Task |
3307 | Knowledge of cybersecurity-enabled software products. |
Knowledge |
6030 | Ability to apply an organization’s goals and objectives to develop and maintain architecture. |
Ability |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1037B | Knowledge of program protection planning to include information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements. |
Knowledge |
1038 | Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability. |
Knowledge |
1038B | Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability). |
Knowledge |
1073 | Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Knowledge |
109A | Knowledge of configuration management techniques. |
Knowledge |
110 | Knowledge of key concepts in security management (e.g., Release Management, Patch Management). |
Knowledge |
111A | Ability to apply secure system design tools, methods and techniques. |
Ability |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1130 | Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions). |
Knowledge |
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1135 | Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing). |
Knowledge |
1136A | Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud). |
Knowledge |
113A | Knowledge of N-tiered typologies including server and client operating systems. |
Knowledge |
1140A | Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic). |
Skill |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
1142B | Skill in applying security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Skill |
1147A | Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce. |
Task |
119 | Knowledge of software engineering. |
Knowledge |
124A | Ability to apply system design tools, methods, and techniques, including automated systems analysis and design tools. |
Ability |
130 | Knowledge of systems testing and evaluation methods. |
Knowledge |
132 | Knowledge of technology integration processes. |
Knowledge |
133 | Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers). |
Knowledge |
141A | Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures. |
Knowledge |
144 | Knowledge of the systems engineering process. |
Knowledge |
155 | Skill in applying and incorporating information technologies into proposed solutions. |
Skill |
180 | Skill in designing the integration of hardware and software solutions. |
Skill |
2014 | Analyze candidate architectures, allocate security services, and select security mechanisms. |
Task |
21 | Knowledge of computer algorithms. |
Knowledge |
224 | Skill in design modeling and building use cases (e.g., unified modeling language). |
Skill |
238A | Skill in writing code in a currently supported programming language (e.g., Java, C++). |
Skill |
25 | Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]). |
Knowledge |
27 | Knowledge of cryptography and cryptographic key management concepts. |
Knowledge |
2887 | Write detailed functional specifications that document the architecture development process. |
Task |
3153 | Knowledge of circuit analysis. |
Knowledge |
3246 | Knowledge of confidentiality, integrity, and availability requirements. |
Knowledge |
34 | Knowledge of database systems. |
Knowledge |
3642 | Knowledge of various types of computer architectures. |
Knowledge |
40A | Knowledge of organization’s evaluation and validation criteria. |
Knowledge |
413A | Analyze user needs and requirements to plan architecture. |
Task |
42 | Knowledge of electrical engineering as applied to computer architecture, including circuit boards, processors, chips, and associated computer hardware. |
Knowledge |
43A | Knowledge of embedded systems. |
Knowledge |
465 | Develop threat model based on customer interviews and requirements. |
Task |
46A | Knowledge of system fault tolerance methodologies. |
Knowledge |
483 | Define and prioritize essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event. |
Task |
484 | Define appropriate levels of system availability based on critical system functions and ensure system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration. |
Task |
502A | Develop enterprise architecture or system components required to meet user needs. |
Task |
51 | Knowledge of how system components are installed, integrated, and optimized. |
Knowledge |
52 | Knowledge of human-computer interaction principles. |
Knowledge |
525A | Develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements. |
Task |
53 | Knowledge of the Security Assessment and Authorization process. |
Knowledge |
53A | Knowledge of risk assessments and authorization per Risk Management Framework processes. |
Knowledge |
569A | Document and update as necessary all definition and architecture activities. |
Task |
602 | Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration. |
Task |
6150 | Ability to optimize systems to meet enterprise performance requirements. |
Ability |
62 | Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
Knowledge |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
6330 | Knowledge of multi-level/security cross domain solutions. |
Knowledge |
65A | Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression). |
Knowledge |
6640 | Skill in designing multi-level security/cross domain solutions. |
Skill |
6680 | Skill in the use of design methods. |
Skill |
669 | Integrate and align information security and/or cybersecurity policies to ensure system analysis meets security requirements. |
Task |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
6919 | Ability to determine the best cloud deployment model for the appropriate operating environment. |
Ability |
6942 | Skill in designing or implementing cloud computing deployment models. |
Skill |
6945 | Skill in migrating workloads to, from, and among the different cloud computing service models. |
Skill |
69A | Knowledge of risk management processes and requirements per the Risk Management Framework (RMF). |
Knowledge |
75 | Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, and statistics. |
Knowledge |
78 | Knowledge of microprocessors. |
Knowledge |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
797 | Provide advice on project costs, design concepts, or design changes. |
Task |
8 | Knowledge of authentication, authorization, and access control methods. |
Knowledge |
807 | Provide input on security requirements to be included in statements of work and other appropriate procurement documents. |
Task |
809 | Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). |
Task |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
82A | Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs. |
Knowledge |
864A | Translate proposed capabilities into technical requirements. |
Task |
865 | Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria. |
Task |
90 | Knowledge of operating systems. |
Knowledge |
92 | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
936 | Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers). |
Task |
94 | Knowledge of parallel and distributed computing concepts. |
Knowledge |
993A | Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization’s enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]). |
Ability |
996A | Assess and design security management functions as related to cyberspace. |
Task |
Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements…
KSAT ID | Description | KSAT |
---|---|---|
19 | Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
53A | Knowledge of risk assessments and authorization per Risk Management Framework processes. |
Knowledge |
55 | Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data. |
Knowledge |
58 | Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
70 | Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
Knowledge |
77 | Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities. |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
183 | Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
Skill |
197 | Skill in discerning the protection needs (i.e., security controls) of information systems and networks. |
Skill |
537 | Develop methods to monitor and measure risk, compliance, and assurance efforts. |
Task |
548 | Develop specifications to ensure risk, compliance, and assurance efforts conform with security, resilience, and dependability requirements at the software application, system, and network environment level. |
Task |
566 | Draft statements of preliminary or residual security risks for system operation. |
Task |
691 | Maintain information systems assurance and accreditation materials. |
Task |
710 | Monitor and evaluate a system’s compliance with information technology (IT) security, resilience, and dependability requirements. |
Task |
1040A | Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure. |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1038B | Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability). |
Knowledge |
1039 | Skill in evaluating the trustworthiness of the supplier and/or product. |
Skill |
1131 | Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]). |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
1142 | Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Knowledge |
1146 | Develop and Implement cybersecurity independent audit processes for application software/networks/systems and oversee ongoing independent audits to ensure that operational and Research and Design (R&D) processes and procedures are in compliance with organizational and mandatory cybersecurity requirements and accurately followed by Systems Administrators and other cybersecurity staff when performing their day-to-day activities. |
Task |
121 | Knowledge of structured analysis principles and methods. |
Knowledge |
128 | Knowledge of systems diagnostic tools and fault identification techniques. |
Knowledge |
143 | Knowledge of the organization’s enterprise information technology (IT) goals and objectives. |
Knowledge |
156 | Skill in applying confidentiality, integrity, and availability principles. |
Skill |
203 | Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system. |
Skill |
27 | Knowledge of cryptography and cryptographic key management concepts. |
Knowledge |
38 | Knowledge of organization’s enterprise information security architecture system. |
Knowledge |
3B | Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks. |
Skill |
417 | Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews. |
Task |
43A | Knowledge of embedded systems. |
Knowledge |
457 | Conduct Privacy Impact Assessments (PIA) of the application’s security design for the appropriate security controls, which protect the confidentiality and integrity of Personally Identifiable Information (PII). |
Task |
69A | Knowledge of risk management processes and requirements per the Risk Management Framework (RMF). |
Knowledge |
772 | Perform validation steps, comparing actual results with expected results and analyze the differences to identify impact and risks. |
Task |
775 | Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks. |
Task |
798 | Provide an accurate technical evaluation of the software application, system, or network, documenting the security posture, capabilities, and vulnerabilities against relevant cybersecurity compliances. |
Task |
827 | Recommend new or revised security, resilience, and dependability measures based on the results of reviews. |
Task |
836 | Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network. |
Task |
836B | Review and approve security and privacy assessment plans. |
Task |
878 | Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations. |
Task |
879 | Verify that the software application/network/system accreditation and assurance documentation is current. |
Task |
88 | Knowledge of new and emerging information technology (IT) and cybersecurity technologies. |
Knowledge |
88B | Knowledge of new and emerging control systems technologies. |
Knowledge |
936 | Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers). |
Task |
942 | Knowledge of the organization’s core business/mission processes. |
Knowledge |
95B | Knowledge of penetration testing principles, tools, and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems). |
Knowledge |
Manages the user experience of a product focused on human factors by making products intuitive…
KSAT ID | Description | KSAT |
---|---|---|
16 | Knowledge of capabilities and requirements analysis. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
414 | Analyze user needs and software requirements to determine feasibility of design within time and cost constraints. |
Task |
466 | Consult with customers to evaluate functional requirements. |
Task |
797 | Provide advice on project costs, design concepts, or design changes. |
Task |
813 | Provide recommendations for possible improvements and upgrades. |
Task |
850 | Store, retrieve, and manipulate data for analysis of system capabilities and requirements. |
Task |
927A | Research and evaluate available technologies and standards to meet customer requirements. |
Task |
1144 | Develop and document User Experience (UX) requirements including information architecture and user interface requirements. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
3822A | Skill in managing user relationships, including determining user needs/requirements, managing user expectations, and demonstrating commitment to delivering quality results. |
Skill |
5150 | Coordinate and manage the overall service provided to a customer end-to-end. |
Task |
5970 | Plan and conduct user research and competitor analysis. |
Task |
5971 | Determine information architecture and create sitemaps. |
Task |
5972 | Conduct usability testing. |
Task |
5973 | Conduct qualitative and quantitative research and analysis. |
Task |
5974 | Work with users as a human factors liaison to determine user needs/requirements, manage user expectations, perform analysis, and demonstrate commitment to delivering quality results. |
Task |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7102 | Skill in using industry-standard design and prototyping tools. |
Skill |
7104 | Skill in interpreting data and feedback. |
Skill |
7105 | Skill in operating UX tools and methods. |
Skill |
7106 | Knowledge of developing user-centered conceptual and logical designs. |
Knowledge |
7107 | Knowledge of usability standards and application of usability standards. |
Knowledge |
7108 | Knowledge of user centered design principles. |
Knowledge |
7109 | Knowledge of usability testing. |
Knowledge |
Additional KSATs:
Executes software planning, requirements, risk management, design, development, architecture, modeling, estimation, configuration management, quality, security,…
KSAT ID | Description | KSAT |
---|---|---|
20 | Knowledge of complex data structures. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
23 | Knowledge of computer programming principles such as object-oriented design. |
Knowledge |
56 | Knowledge of cybersecurity principles and methods that apply to software development. |
Knowledge |
90 | Knowledge of operating systems. |
Knowledge |
102 | Knowledge of programming language structures and logic. |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
116 | Knowledge of software debugging principles. |
Knowledge |
117 | Knowledge of software design tools, methods, and techniques. |
Knowledge |
118A | Knowledge of software development models, methodologies, and practices (Waterfall Model, Spiral, Agile, DevSecOps). |
Knowledge |
119 | Knowledge of software engineering. |
Knowledge |
121 | Knowledge of structured analysis principles and methods. |
Knowledge |
124 | Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools. |
Knowledge |
149 | Knowledge of web services, including service-oriented architecture, Simple Object Access Protocol, and web service description language. |
Knowledge |
168 | Skill in conducting software debugging. |
Skill |
174 | Skill in creating programs that validate and process multiple inputs including command line arguments, environmental variables, and input streams. |
Skill |
185A | Skill in developing applications that can log and handle errors, exceptions, and application faults and logging. |
Skill |
191A | Knowledge of development and application of security system access controls. |
Knowledge |
238A | Skill in writing code in a currently supported programming language (e.g., Java, C++). |
Skill |
408 | Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application. |
Task |
414 | Analyze user needs and software requirements to determine feasibility of design within time and cost constraints. |
Task |
417 | Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews. |
Task |
418 | Apply secure code documentation. |
Task |
432 | Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules. |
Task |
446 | Compile and write documentation of program development and subsequent revisions, inserting comments in the coded instructions so others can understand the program. |
Task |
459A | Conduct trial runs of programs and software applications to ensure the desired information is produced and instructions and security levels are correct. |
Task |
461 | Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces. |
Task |
467 | Consult with engineering staff to evaluate interface between hardware and software. |
Task |
477 | Correct errors by making appropriate changes and rechecking the program to ensure desired results are produced. |
Task |
506 | Design, develop, and modify software systems, using scientific analysis and mathematical models to predict and measure outcome and consequences of design. |
Task |
515A | Develop software system testing and validation procedures, programming, and documentation. |
Task |
543 | Develop secure code and error handling. |
Task |
634 | Identify basic common coding flaws at a high level. |
Task |
709A | Modify and maintain existing software to correct errors, to adapt it to new hardware, or to upgrade interfaces and improve performance. |
Task |
764 | Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities. |
Task |
785 | Prepare detailed workflow charts and diagrams that describe input, output, and logical operation, and convert them into a series of instructions coded in a computer language. |
Task |
865 | Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria. |
Task |
904A | Knowledge of interpreted and compiled computer languages. |
Knowledge |
905A | Skill in applying secure coding techniques. |
Skill |
905 | Knowledge of secure coding techniques. |
Knowledge |
968 | Knowledge of software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, simplicity/minimization). |
Knowledge |
970A | Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities. |
Task |
973A | Skill in using code analysis tools. |
Skill |
1071A | Ability to develop secure software according to secure software deployment methodologies, tools, and practices. |
Ability |
1151 | Identify and leverage the enterprise-wide version control system while designing and developing secure applications. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2335 | Direct software programming and development of documentation. |
Task |
5200 | Design, implement, test, and evaluate secure interfaces between information systems, physical systems, and/or embedded technologies. |
Task |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
100 | Knowledge of Privacy Impact Assessments. |
Knowledge |
1020A | Skill in secure test plan design (e. g. unit, integration, system, acceptance). |
Skill |
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1037A | Knowledge of information technology (IT) risk management policies, requirements, and procedures. |
Knowledge |
1038B | Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability). |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
109 | Knowledge of secure configuration management techniques. |
Knowledge |
1131 | Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]). |
Knowledge |
1135 | Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing). |
Knowledge |
1140A | Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic). |
Skill |
1149A | Enable applications with public keying by leveraging existing public key infrastructure (PKI) libraries and incorporating certificate management and encryption functionalities when appropriate. |
Task |
1150A | Identify and leverage the enterprise-wide security services while designing and developing secure applications (e.g., Enterprise PKI, Federated Identity server, Enterprise AV solution) when appropriate. |
Task |
172 | Skill in creating and utilizing mathematical or statistical models. |
Skill |
177 | Skill in designing countermeasures to identified security risks. |
Skill |
197 | Skill in discerning the protection needs (i.e., security controls) of information systems and networks. |
Skill |
2156 | Consult with customers about software system design and maintenance. |
Task |
2839 | Supervise and assign work to programmers, designers, technologists and technicians and other engineering and scientific personnel. |
Task |
3080 | Ability to use and understand complex mathematical concepts (e.g., discrete math). |
Ability |
38 | Knowledge of organization’s enterprise information security architecture system. |
Knowledge |
3822A | Skill in managing user relationships, including determining user needs/requirements, managing user expectations, and demonstrating commitment to delivering quality results. |
Skill |
3B | Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks. |
Skill |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
43A | Knowledge of embedded systems. |
Knowledge |
602 | Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration. |
Task |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
644 | Identify security implications and apply methodologies within centralized and decentralized environments across the enterprises computer systems in software development. |
Task |
645 | Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life. |
Task |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
6919 | Ability to determine the best cloud deployment model for the appropriate operating environment. |
Ability |
6942 | Skill in designing or implementing cloud computing deployment models. |
Skill |
6945 | Skill in migrating workloads to, from, and among the different cloud computing service models. |
Skill |
7097 | Knowledge of planning for long-term maintainability using architectural structures, viewpoints, styles, design decisions and frameworks, and the underlying data structures. |
Knowledge |
72 | Knowledge of local area and wide area networking principles and concepts including bandwidth management. |
Knowledge |
726 | Oversee and make recommendations regarding configuration management. |
Task |
74 | Knowledge of low-level computer languages (e.g., assembly languages). |
Knowledge |
756 | Perform integrated quality assurance testing for security functionality and resiliency attack. |
Task |
770 | Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change. |
Task |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
826 | Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing. |
Task |
850 | Store, retrieve, and manipulate data for analysis of system capabilities and requirements. |
Task |
95B | Knowledge of penetration testing principles, tools, and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems). |
Knowledge |
971 | Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements. |
Task |
972A | Determine and document software patches or the extent of releases that would leave software vulnerable. |
Task |
976 | Knowledge of software quality assurance process. |
Knowledge |
978A | Knowledge of root cause analysis techniques. |
Knowledge |
979 | Knowledge of supply chain risk management standards, processes, and practices. |
Knowledge |
980A | Skill in performing root cause analysis. |
Skill |
Plans, prepares, and performs testing, evaluation, verification, and validation of software to evaluate results against…
KSAT ID | Description | KSAT |
---|---|---|
16 | Knowledge of capabilities and requirements analysis. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
130 | Knowledge of systems testing and evaluation methods. |
Knowledge |
130A | Knowledge of systems security testing and evaluation methods. |
Knowledge |
144 | Knowledge of the systems engineering process. |
Knowledge |
169 | Skill in conducting test events. |
Skill |
176 | Skill in designing a data analysis structure (i.e., the types of data your test must generate and how to analyze those data). |
Skill |
182 | Skill in determining an appropriate level of test rigor for a given system. |
Skill |
190 | Skill in developing operations-based testing scenarios. |
Skill |
220 | Skill in systems integration testing. |
Skill |
239 | Skill in writing test plans. |
Skill |
412A | Analyze the results of software, hardware, or interoperability testing. |
Task |
414 | Analyze user needs and software requirements to determine feasibility of design within time and cost constraints. |
Task |
452 | Conduct functional and connectivity testing to ensure continuing operability. |
Task |
508 | Determine level of assurance of developed capabilities based on test results. |
Task |
515A | Develop software system testing and validation procedures, programming, and documentation. |
Task |
550 | Develop test plans to address specifications and requirements. |
Task |
694 | Make recommendations based on test results. |
Task |
748A | Perform developmental testing on systems under development. |
Task |
757A | Perform interoperability testing on systems exchanging electronic information with other systems. |
Task |
761A | Perform operational testing. |
Task |
858A | Test, evaluate, and verify hardware and/or software to determine compliance with defined specifications and requirements. |
Task |
858B | Record and manage test data. |
Task |
950 | Skill in evaluating test plans for applicability and completeness. |
Skill |
951 | Determine scope, infrastructure, resources, and data sample size to ensure system requirements are adequately demonstrated. |
Task |
978A | Knowledge of root cause analysis techniques. |
Knowledge |
1020A | Skill in secure test plan design (e. g. unit, integration, system, acceptance). |
Skill |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5650 | Validate specifications and requirements for testability. |
Task |
5866A | Create or customize existing Test and Evaluation Master Plans (TEMPs) for systems. |
Task |
5877A | Develop possible solutions for technical risks and limitations of planned tests. |
Task |
5914 | Report test and evaluation deficiencies and possible solutions to appropriate personnel. |
Task |
5920A | Test components to ensure they work as intended in a variety of scenarios for all aspects of the application. |
Task |
5933 | Conduct automated testing for acceptance testing, functional testing, integration testing, interoperability testing, load/stress testing, performance testing, regression testing, and unit testing. |
Task |
5934 | Develop and maintain a tool framework for automated test and evaluation. |
Task |
5936 | Evaluate reliability, availability, and maintainability data. |
Task |
5937 | Assess the system’s effectiveness and suitability for meeting user need and based on test and evaluation results. |
Task |
6020 | Ability to analyze test data. |
Ability |
6060 | Ability to collect, verify, and validate test data. |
Ability |
6170 | Ability to translate data and test results into evaluative conclusions. |
Ability |
6430 | Knowledge of Test & Evaluation processes. |
Knowledge |
6530 | Skill in designing and documenting overall program Test & Evaluation strategies. |
Skill |
6630 | Skill in preparing Test & Evaluation reports. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7003A | Knowledge of security risks, threats, and vulnerabilities and potential risk mitigation solutions. |
Knowledge |
7004A | Knowledge of Test & Evaluation frameworks. |
Knowledge |
7006A | Knowledge of best practices from industry and academia in test design activities for verification and validation of systems. |
Knowledge |
7025A | Knowledge of how software solutions integrate with cloud or other IT infrastructure. |
Knowledge |
7044 | Knowledge of testing, evaluation, validation, and verification (T&E V&V) tools and procedures to ensure systems are working as intended. |
Knowledge |
7054A | Knowledge of tools for testing the robustness and resilience of software products and solutions. |
Knowledge |
7077A | Skill in translating operation requirements for systems into testing requirements. |
Skill |
7085 | Knowledge of software environments (e.g., development, testing, integration, production, etc.) and appropriate T&E application in those environments. |
Knowledge |
7086 | Ability to construct, maintain, and conduct testing in various test environments. |
Ability |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
238A | Skill in writing code in a currently supported programming language (e.g., Java, C++). |
Skill |
393A | Administer test bed(s), and test and evaluate applications, hardware infrastructure, rules/signatures, access controls, and configurations of platforms managed by service provider(s). |
Task |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
431A | Build, assess, and modify product prototypes using working models or theoretical models. |
Task |
53 | Knowledge of the Security Assessment and Authorization process. |
Knowledge |
5910A | Provide quality assurance of software products throughout their lifecycle. |
Task |
5935 | Perform usability surveys on operators/users of the system. |
Task |
5938 | Integrate digital engineering models and data into test designs. |
Task |
6500 | Skill in conducting Test Readiness Reviews. |
Skill |
6580 | Skill in identifying Test & Evaluation infrastructure (people, ranges, tools, instrumentation) requirements. |
Skill |
6600 | Skill in managing test assets, test resources, and test personnel to ensure effective completion of test events. |
Skill |
6641 | Skill in providing Test & Evaluation resource estimate. |
Skill |
7009A | Knowledge of coding and scripting in languages that support software development and use. |
Knowledge |
7012A | Knowledge of current test standards and safety standards that are applicable to software development. |
Knowledge |
7028A | Knowledge of how to automate development, testing, security, and deployment of software to the DoD. |
Knowledge |
7034A | Knowledge of interactions and integration of DataOps, MLOps, and DevSecOps solution. |
Knowledge |
7036A | Knowledge of laws, regulations, and policies related to software development, cybersecurity, data security/privacy, and use of publicly procured data for government. |
Knowledge |
7070A | Skill in integrating software Test & Evaluation frameworks into test strategies for specific projects. |
Skill |
7083 | Ability to measure human systems interaction (usability, workload, system trust). |
Ability |
7084 | Ability to evaluate user training and documentation update processes. |
Ability |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
83 | Knowledge of network hardware devices and functions. |
Knowledge |
874 | Utilize models and simulations to analyze or predict system performance under different operating conditions. |
Task |
904 | Knowledge of interpreted and compiled computer languages. |
Knowledge |
965 | Knowledge of organization’s risk tolerance and/or risk management approach. |
Knowledge |
980A | Skill in performing root cause analysis. |
Skill |
Manages and identifies program high-level technical specifications, which may include application design, cloud computing strategy…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
42A | Knowledge of engineering concepts as applied to computer architecture and associated computer hardware/software. |
Knowledge |
56 | Knowledge of cybersecurity principles and methods that apply to software development. |
Knowledge |
68A | Ability to build architectures and frameworks. |
Ability |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
116 | Knowledge of software debugging principles. |
Knowledge |
117 | Knowledge of software design tools, methods, and techniques. |
Knowledge |
118A | Knowledge of software development models, methodologies, and practices (Waterfall Model, Spiral, Agile, DevSecOps). |
Knowledge |
119 | Knowledge of software engineering. |
Knowledge |
129 | Knowledge of system life cycle management principles, including software security and usability. |
Knowledge |
141A | Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures. |
Knowledge |
170 | Skill in configuring and optimizing software. |
Skill |
180 | Skill in designing the integration of hardware and software solutions. |
Skill |
413A | Analyze user needs and requirements to plan architecture. |
Task |
414 | Analyze user needs and software requirements to determine feasibility of design within time and cost constraints. |
Task |
467 | Consult with engineering staff to evaluate interface between hardware and software. |
Task |
502A | Develop enterprise architecture or system components required to meet user needs. |
Task |
569A | Document and update as necessary all definition and architecture activities. |
Task |
785A | Prepare detailed workflow charts, models, and diagrams that describe input, output, and logical operation. |
Task |
1125 | Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration. |
Knowledge |
1151A | Leverage enterprise-wide version control system while designing and developing secure applications. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2156 | Consult with customers about software system design and maintenance. |
Task |
2335 | Direct software programming and development of documentation. |
Task |
5956 | Provide Cloud and Cloud Security guidance to leadership. |
Task |
5957 | Develop a company’s cloud computing strategy. |
Task |
5958 | Develop and implements cloud strategies. |
Task |
5959 | Convert the technical requirements of a project into the architecture and design that will guide the final product. |
Task |
5960 | Design and implement cloud computing solutions, including designing the cloud infrastructure, the cloud application architecture, and the cloud security architecture. |
Task |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7096 | Knowledge of both cloud computing and how it is applied in a variety of industries. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1136A | Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud). |
Knowledge |
1147A | Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce. |
Task |
126 | Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design. |
Knowledge |
143A | Knowledge of integrating the organization’s goals and objectives into the architecture. |
Knowledge |
3080 | Ability to use and understand complex mathematical concepts (e.g., discrete math). |
Ability |
38 | Knowledge of organization’s enterprise information security architecture system. |
Knowledge |
412A | Analyze the results of software, hardware, or interoperability testing. |
Task |
414A | Analyze security needs and software requirements to determine feasibility of design within time and cost constraints and security mandates. |
Task |
44 | Knowledge of enterprise messaging systems and associated software. |
Knowledge |
75 | Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, and statistics. |
Knowledge |
971 | Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements. |
Task |
Installs, configures, troubleshoots, and maintains hardware, software, and administers system accounts.
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
76 | Knowledge of measures or indicators of system performance and availability. |
Knowledge |
96 | Knowledge of performance tuning tools and techniques. |
Knowledge |
99A | Knowledge of principles and methods for integrating system components. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
127 | Knowledge of systems administration concepts. |
Knowledge |
171A | Skill in correcting physical and technical problems that impact system/server performance. |
Skill |
211A | Skill in monitoring and optimizing system/server performance. |
Skill |
216A | Skill in recovering failed systems/servers. |
Skill |
219A | Skill in operating system administration. |
Skill |
344 | Knowledge of virtualization technologies and virtual machine development and maintenance. |
Knowledge |
452 | Conduct functional and connectivity testing to ensure continuing operability. |
Task |
518 | Develop and document systems administration standard operating procedures. |
Task |
518A | Comply with organization systems administration standard operating procedures. |
Task |
521A | Implement and enforce local network usage policies and procedures. |
Task |
683 | Maintain baseline system security according to organizational policies. |
Task |
695 | Manage accounts, network rights, and access to systems and equipment. |
Task |
701A | Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. |
Task |
713A | Monitor and maintain system/server configuration. |
Task |
763B | Perform repairs on faulty system/server hardware. |
Task |
781 | Plan, execute, and verify data redundancy and system recovery procedures. |
Task |
835A | Troubleshoot hardware/software interface and interoperability problems. |
Task |
986 | Knowledge of organizational information technology (IT) user security policies (e.g., account creation, password rules, access control). |
Knowledge |
1033 | Knowledge of basic system administration, network, and operating system hardening techniques. |
Knowledge |
1153A | Install, update, and troubleshoot systems/servers. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1074A | Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly. |
Knowledge |
112A | Knowledge of systems engineering theories, concepts, and methods. |
Knowledge |
113 | Knowledge of server and client operating systems. |
Knowledge |
114A | Knowledge of system/server diagnostic tools and fault identification techniques. |
Knowledge |
141 | Knowledge of the enterprise information technology (IT) architecture. |
Knowledge |
145 | Knowledge of the type and frequency of routine maintenance needed to keep equipment functioning properly. |
Knowledge |
148 | Knowledge of Virtual Private Network (VPN) security. |
Knowledge |
167A | Skill in conducting system/server planning, management, and maintenance. |
Skill |
170 | Skill in configuring and optimizing software. |
Skill |
194 | Skill in diagnosing connectivity problems. |
Skill |
195A | Skill in troubleshooting failed system components (i.e., servers) |
Skill |
202A | Skill in identifying and anticipating system/server performance, availability, capacity, or configuration problems. |
Skill |
206A | Skill in installing system and component upgrades. |
Skill |
209 | Skill in maintaining directory services. |
Skill |
287 | Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT]). |
Knowledge |
342A | Knowledge of operating system command line/prompt. |
Knowledge |
386 | Skill in using virtual machines. |
Skill |
434A | Check system hardware availability, functionality, integrity, and efficiency. |
Task |
456A | Conduct periodic system maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing. |
Task |
499 | Design group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs. |
Task |
572 | Ensure application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment. |
Task |
6590 | Skill in interfacing with customers. |
Skill |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
6919 | Ability to determine the best cloud deployment model for the appropriate operating environment. |
Ability |
6942 | Skill in designing or implementing cloud computing deployment models. |
Skill |
6945 | Skill in migrating workloads to, from, and among the different cloud computing service models. |
Skill |
70 | Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
Knowledge |
72 | Knowledge of local area and wide area networking principles and concepts including bandwidth management. |
Knowledge |
728A | Oversee installation, implementation, configuration, and support of system components. |
Task |
763A | Diagnose faulty system/server hardware. |
Task |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
811 | Provide ongoing optimization and problem solving support. |
Task |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
892 | Skill in configuring and utilizing software-based computer protection tools (e.g., software firewalls, anti-virus software, anti-spyware). |
Skill |
Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
40 | Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
169 | Skill in conducting test events. |
Skill |
176 | Skill in designing a data analysis structure (i.e., the types of data your test must generate and how to analyze those data). |
Skill |
182 | Skill in determining an appropriate level of test rigor for a given system. |
Skill |
190 | Skill in developing operations-based testing scenarios. |
Skill |
220 | Skill in systems integration testing. |
Skill |
239 | Skill in writing test plans. |
Skill |
412A | Analyze the results of software, hardware, or interoperability testing. |
Task |
508 | Determine level of assurance of developed capabilities based on test results. |
Task |
550 | Develop test plans to address specifications and requirements. |
Task |
694 | Make recommendations based on test results. |
Task |
748A | Perform developmental testing on systems under development. |
Task |
757A | Perform interoperability testing on systems exchanging electronic information with other systems. |
Task |
761A | Perform operational testing. |
Task |
858B | Record and manage test data. |
Task |
858A | Test, evaluate, and verify hardware and/or software to determine compliance with defined specifications and requirements. |
Task |
950 | Skill in evaluating test plans for applicability and completeness. |
Skill |
951 | Determine scope, infrastructure, resources, and data sample size to ensure system requirements are adequately demonstrated. |
Task |
1006 | Create auditable evidence of security measures. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
5650 | Validate specifications and requirements for testability. |
Task |
6020 | Ability to analyze test data. |
Ability |
6060 | Ability to collect, verify, and validate test data. |
Ability |
6170 | Ability to translate data and test results into evaluative conclusions. |
Ability |
6430 | Knowledge of Test & Evaluation processes. |
Knowledge |
6500 | Skill in conducting Test Readiness Reviews. |
Skill |
6530 | Skill in designing and documenting overall program Test & Evaluation strategies. |
Skill |
6580 | Skill in identifying Test & Evaluation infrastructure (people, ranges, tools, instrumentation) requirements. |
Skill |
6600 | Skill in managing test assets, test resources, and test personnel to ensure effective completion of test events. |
Skill |
6630 | Skill in preparing Test & Evaluation reports. |
Skill |
6641 | Skill in providing Test & Evaluation resource estimate. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1038B | Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability). |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1131 | Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]). |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
1142 | Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Knowledge |
127 | Knowledge of systems administration concepts. |
Knowledge |
144 | Knowledge of the systems engineering process. |
Knowledge |
238A | Skill in writing code in a currently supported programming language (e.g., Java, C++). |
Skill |
3307 | Knowledge of cybersecurity-enabled software products. |
Knowledge |
38 | Knowledge of organization’s enterprise information security architecture system. |
Knowledge |
417 | Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews. |
Task |
53A | Knowledge of risk assessments and authorization per Risk Management Framework processes. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
826 | Address security implications in the software acceptance phase including completion criteria, risk acceptance and documentation, common criteria, and methods of independent testing. |
Task |
83 | Knowledge of network hardware devices and functions. |
Knowledge |
904 | Knowledge of interpreted and compiled computer languages. |
Knowledge |
Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
38 | Knowledge of organization’s enterprise information security architecture system. |
Knowledge |
64 | Knowledge of information security systems engineering principles. |
Knowledge |
70 | Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
109 | Knowledge of secure configuration management techniques. |
Knowledge |
118 | Knowledge of software development models (e.g., Waterfall Model, Spiral Model). |
Knowledge |
119 | Knowledge of software engineering. |
Knowledge |
130 | Knowledge of systems testing and evaluation methods. |
Knowledge |
144 | Knowledge of the systems engineering process. |
Knowledge |
530A | Develop detailed design documentation for component and interface specifications to support system design and development. |
Task |
659A | Implement designs for new or existing system(s). |
Task |
1000A | Ensure design and development activities are properly documented (providing a functional description of implementation) and updated as necessary. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
3642 | Knowledge of various types of computer architectures. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
100 | Knowledge of Privacy Impact Assessments. |
Knowledge |
1002B | Skill in conducting reviews of technical systems. |
Skill |
101 | Knowledge of process engineering concepts. |
Knowledge |
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1038 | Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability. |
Knowledge |
1073A | Skill in network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Skill |
1073B | Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Knowledge |
110A | Knowledge of security management. |
Knowledge |
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
1142 | Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Knowledge |
1152A | Implement and integrate systems engineering methodologies into development environment. |
Task |
121 | Knowledge of structured analysis principles and methods. |
Knowledge |
124B | Knowledge of system design tools, methods, and techniques. |
Knowledge |
126 | Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design. |
Knowledge |
129A | Knowledge of system life cycle management principles. |
Knowledge |
133 | Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers). |
Knowledge |
173A | Skill in integrating and applying policies that meet system security objectives. |
Skill |
173B | Skill in creating policies that enable systems to meet performance objectives (e.g. traffic routing, SLA’s, CPU specifications). |
Skill |
177 | Skill in designing countermeasures to identified security risks. |
Skill |
177A | Knowledge of countermeasure design for identified security risks. |
Knowledge |
179 | Skill in designing security controls based on cybersecurity principles and tenets. |
Skill |
180 | Skill in designing the integration of hardware and software solutions. |
Skill |
181A | Skill in detecting host and network based intrusions via intrusion detection technologies. |
Skill |
181B | Knowledge of how detection technologies are used to detect host and network-based intrusions. |
Knowledge |
191A | Knowledge of development and application of security system access controls. |
Knowledge |
197 | Skill in discerning the protection needs (i.e., security controls) of information systems and networks. |
Skill |
199 | Skill in evaluating the adequacy of security designs. |
Skill |
224A | Skill in the use of design modeling (e.g., unified modeling language). |
Skill |
2354 | Employ configuration management processes. |
Task |
238A | Skill in writing code in a currently supported programming language (e.g., Java, C++). |
Skill |
25B | Knowledge of encryption algorithms. |
Knowledge |
27A | Knowledge of cryptology. |
Knowledge |
3153 | Knowledge of circuit analysis. |
Knowledge |
3307 | Knowledge of cybersecurity-enabled software products. |
Knowledge |
34 | Knowledge of database systems. |
Knowledge |
3687 | Skill in applying security controls. |
Skill |
416A | Analyze design constraints, analyze trade-offs and security design, and consider lifecycle support. |
Task |
42 | Knowledge of electrical engineering as applied to computer architecture, including circuit boards, processors, chips, and associated computer hardware. |
Knowledge |
431A | Build, assess, and modify product prototypes using working models or theoretical models. |
Task |
43A | Knowledge of embedded systems. |
Knowledge |
46 | Knowledge of fault tolerance. |
Knowledge |
494 | Design and develop cybersecurity or cybersecurity-enabled products. |
Task |
500B | Design hardware, operating systems, or software applications to adequately address requirements. |
Task |
501 | Design or integrate appropriate data backup capabilities into overall system designs, and ensure appropriate technical and procedural processes exist for secure system backups and protected storage of backup data. |
Task |
503A | Design to security requirements to ensure requirements are met for all systems and/or applications. |
Task |
51 | Knowledge of how system components are installed, integrated, and optimized. |
Knowledge |
5110 | Conduct a market analysis to identify, assess, and recommend commercial, GOTS, and open source products for use within a system and ensure recommended products are in compliance with organization’s evaluation and validation requirements. |
Task |
516A | Develop testing and validation procedures and documentation. |
Task |
5190 | Design and develop system administration and management functionality for privileged access users. |
Task |
52 | Knowledge of human-computer interaction principles. |
Knowledge |
5200A | Design, implement, assess, and evaluate secure interfaces between information systems, physical systems, and/or embedded technologies. |
Task |
527 | Develop architectures or system components consistent with technical specifications. |
Task |
531 | Develop Disaster Recovery and Continuity of Operations plans for systems under development and ensure testing prior to systems entering a production environment. |
Task |
5400 | Incorporates risk-driven systems maintenance updates process to address system deficiencies (periodically and out of cycle). |
Task |
542A | Develop risk mitigation strategies and cybersecurity countermeasures to address cost, performance, and security risks and to resolve vulnerabilities and recommend security changes to system or system components as needed. |
Task |
542A | Develop mitigation strategies to address cost, schedule, performance, and security risks. |
Task |
602 | Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration. |
Task |
626A | Identify components or elements, allocate comprehensive functional components to include security functions, and describe the relationships between the elements. |
Task |
630 | Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find work-arounds for communication protocols that are not interoperable). |
Task |
632 | Identify and prioritize essential system functions or sub-systems required to support essential capabilities or business functions for restoration or recovery after a system failure or during a system recovery event based on overall system requirements for continuity and availability. |
Task |
63A | Knowledge of information systems and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
648 | Identify, assess, and recommend cybersecurity or cybersecurity-enabled products for use within a system and ensure recommended products are in compliance with organization’s evaluation and validation requirements. |
Task |
65A | Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression). |
Knowledge |
6945 | Skill in migrating workloads to, from, and among the different cloud computing service models. |
Skill |
72 | Knowledge of local area and wide area networking principles and concepts including bandwidth management. |
Knowledge |
75 | Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, and statistics. |
Knowledge |
766A | Perform security reviews and identify security gaps in architecture. |
Task |
770 | Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change. |
Task |
78 | Knowledge of microprocessors. |
Knowledge |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
803 | Provide guidelines for implementing developed systems to customers or installation teams. |
Task |
808B | Provide input to implementation plans, standard operating procedures, maintenance documentation, and maintenance training materials |
Task |
809 | Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). |
Task |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
82A | Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs. |
Knowledge |
850 | Store, retrieve, and manipulate data for analysis of system capabilities and requirements. |
Task |
856A | Provide support to test and evaluation activities. |
Task |
860A | Trace system requirements to design components and perform gap analysis. |
Task |
874 | Utilize models and simulations to analyze or predict system performance under different operating conditions. |
Task |
877A | Verify stability, interoperability, portability, and/or scalability of system architecture. |
Task |
8A | Knowledge of access authentication methods. |
Knowledge |
90 | Knowledge of operating systems. |
Knowledge |
904A | Knowledge of interpreted and compiled computer languages. |
Knowledge |
92 | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
94 | Knowledge of parallel and distributed computing concepts. |
Knowledge |
98 | Knowledge of policy-based and risk adaptive access controls. |
Knowledge |
998A | Analyze user needs and requirements to plan and conduct system development. |
Task |
999A | Develop designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations. |
Task |
999C | Collaborate with cybersecurity professionals to implement cybersecurity into designs to meet specific operational needs and environmental factors (e.g., access controls, automate d applications, networked operations, high integrity and availability requirements, multilevel security/processing of multiple classification levels, and processing Sensitive Compartmented Information). |
Task |
Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.
KSAT ID | Description | KSAT |
---|---|---|
9 | Knowledge of applicable business processes and operations of customer organizations. |
Knowledge |
16 | Knowledge of capabilities and requirements analysis. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
64 | Knowledge of information security systems engineering principles. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
129 | Knowledge of system life cycle management principles, including software security and usability. |
Knowledge |
143 | Knowledge of the organization’s enterprise information technology (IT) goals and objectives. |
Knowledge |
162 | Skill in conducting capabilities and requirements analysis. |
Skill |
458 | Conduct risk analysis, feasibility study, and/or trade-off analysis to develop, document, and refine functional requirements and specifications. |
Task |
466 | Consult with customers to evaluate functional requirements. |
Task |
487 | Define project scope and objectives based on customer requirements. |
Task |
863 | Translate functional requirements into technical solutions. |
Task |
911A | Ability to interpret and translate customer requirements into operational capabilities. |
Ability |
1144 | Develop and document User Experience (UX) requirements including information architecture and user interface requirements. |
Task |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
100 | Knowledge of Privacy Impact Assessments. |
Knowledge |
1002A | Skill in conducting reviews of systems. |
Skill |
1003 | Develop and document supply chain risks for critical system elements, as appropriate. |
Task |
1004 | Knowledge of critical information technology (IT) procurement requirements. |
Knowledge |
1005 | Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes). |
Knowledge |
101 | Knowledge of process engineering concepts. |
Knowledge |
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
1037 | Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. |
Knowledge |
1038B | Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability). |
Knowledge |
1040A | Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure. |
Knowledge |
1073 | Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Knowledge |
109 | Knowledge of secure configuration management techniques. |
Knowledge |
110 | Knowledge of key concepts in security management (e.g., Release Management, Patch Management). |
Knowledge |
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
124 | Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools. |
Knowledge |
126 | Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design. |
Knowledge |
130 | Knowledge of systems testing and evaluation methods. |
Knowledge |
133 | Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers). |
Knowledge |
144 | Knowledge of the systems engineering process. |
Knowledge |
155 | Skill in applying and incorporating information technologies into proposed solutions. |
Skill |
156 | Skill in applying confidentiality, integrity, and availability principles. |
Skill |
158 | Skill in applying organization-specific systems analysis principles and techniques. |
Skill |
2214 | Design and document quality standards. |
Task |
224 | Skill in design modeling and building use cases (e.g., unified modeling language). |
Skill |
2343 | Document a system’s purpose and preliminary system security concept of operations. |
Task |
25 | Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]). |
Knowledge |
2692 | Ensure that all systems components can be integrated and aligned (e.g., procedures, databases, policies, software, and hardware). |
Task |
27 | Knowledge of cryptography and cryptographic key management concepts. |
Knowledge |
46 | Knowledge of fault tolerance. |
Knowledge |
476 | Coordinate with systems architects and developers, as needed, to provide oversight in the development of design solutions. |
Task |
51 | Knowledge of how system components are installed, integrated, and optimized. |
Knowledge |
511B | Define baseline security requirements in accordance with applicable guidelines. |
Task |
517 | Develop and document requirements, capabilities, and constraints for design procedures and processes. |
Task |
528A | Develop cost estimates for new or modified system(s). |
Task |
55 | Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data. |
Knowledge |
602 | Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration. |
Task |
62 | Knowledge of industry-standard and organizationally accepted analysis principles and methods. |
Knowledge |
65A | Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression). |
Knowledge |
669 | Integrate and align information security and/or cybersecurity policies to ensure system analysis meets security requirements. |
Task |
68 | Knowledge of information technology (IT) architectural concepts and frameworks. |
Knowledge |
700A | Manage the information technology (IT) planning process to ensure that developed solutions meet customer requirements. |
Task |
726 | Oversee and make recommendations regarding configuration management. |
Task |
760 | Perform needs analysis to determine opportunities for new and improved business process solutions. |
Task |
78 | Knowledge of microprocessors. |
Knowledge |
789 | Prepare use cases to justify the need for specific information technology (IT) solutions. |
Task |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
82A | Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs. |
Knowledge |
88A | Knowledge of current and emerging cyber technologies. |
Knowledge |
90 | Knowledge of operating systems. |
Knowledge |
92 | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
94 | Knowledge of parallel and distributed computing concepts. |
Knowledge |
Responsible for analysis and development of systems/software security through the product lifecycle to include integration,…
KSAT ID | Description | KSAT |
---|---|---|
3C | Skill in recognizing vulnerabilities in information and/or data systems. |
Skill |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
25 | Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]). |
Knowledge |
27A | Knowledge of cryptology. |
Knowledge |
34 | Knowledge of database systems. |
Knowledge |
51 | Knowledge of how system components are installed, integrated, and optimized. |
Knowledge |
58 | Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
70 | Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
Knowledge |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
82A | Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs. |
Knowledge |
90 | Knowledge of operating systems. |
Knowledge |
92 | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
109A | Knowledge of configuration management techniques. |
Knowledge |
110A | Knowledge of security management. |
Knowledge |
111 | Knowledge of security system design tools, methods, and techniques. |
Knowledge |
130A | Knowledge of systems security testing and evaluation methods. |
Knowledge |
144 | Knowledge of the systems engineering process. |
Knowledge |
177B | Knowledge of countermeasures for identified security risks. |
Knowledge |
179A | Skill in assessing security controls based on cybersecurity principles and tenets. |
Skill |
183 | Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
Skill |
191 | Skill in developing and applying security system access controls. |
Skill |
199 | Skill in evaluating the adequacy of security designs. |
Skill |
420 | Apply security policies to meet security objectives of the system. |
Task |
421 | Apply service oriented security architecture principles to meet organization’s confidentiality, integrity, and availability requirements. |
Task |
559A | Analyze and report organizational security posture trends. |
Task |
559B | Analyze and report system security posture trends. |
Task |
571 | Ensure all systems security operations and maintenance activities are properly documented and updated as necessary. |
Task |
572 | Ensure application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment. |
Task |
576 | Ensure cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level. |
Task |
593A | Assess adequate access controls based on principles of least privilege and need-to-know. |
Task |
653B | Implement security measures to mitigate or remediate vulnerabilities and security deficiencies, and provide justification for acceptance of residual risk. |
Task |
660 | Implement specific cybersecurity countermeasures for systems and/or applications. |
Task |
661A | Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation. |
Task |
671 | Integrate automated capabilities for updating or patching system software where practical and develop processes and procedures for manual updating and patching of system software based on current and projected patch timeline requirements for the operational environment of the system. |
Task |
710 | Monitor and evaluate a system’s compliance with information technology (IT) security, resilience, and dependability requirements. |
Task |
717A | Assess and monitor cybersecurity related to system implementation and testing practices. |
Task |
729A | Verify minimum security requirements are in place for all applications. |
Task |
754 | Perform cybersecurity testing of developed applications and/or systems. |
Task |
765 | Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. |
Task |
806A | Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities. |
Task |
806 | Provide cybersecurity guidance to leadership. |
Task |
809 | Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). |
Task |
876 | Verify and update security documentation reflecting the application/system security design features. |
Task |
880A | Work with stakeholders to resolve computer security incidents and vulnerability compliance. |
Task |
922A | Knowledge of how to use network analysis tools to identify vulnerabilities. |
Knowledge |
936 | Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers). |
Task |
938A | Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans. |
Task |
1006 | Create auditable evidence of security measures. |
Task |
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1037A | Knowledge of information technology (IT) risk management policies, requirements, and procedures. |
Knowledge |
1039B | Knowledge of how to evaluate the trustworthiness of the supplier and/or product. |
Knowledge |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1073 | Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Knowledge |
1135 | Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing). |
Knowledge |
1138A | Knowledge of developing and applying user credential management system. |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2054 | Assess the effectiveness of security controls. |
Task |
3642 | Knowledge of various types of computer architectures. |
Knowledge |
5050 | Assess all the configuration management (change configuration/release management) processes. |
Task |
5928 | Identify, define, and document system security requirements and recommend solutions to management. |
Task |
5929 | Install software that monitors systems and networks for security breaches and intrusions. |
Task |
5930 | Educate and train staff on information system security best practices. |
Task |
5931 | Select and use appropriate security testing tools. |
Task |
5932 | Select and use appropriate secure coding standards and analyze code for common weaknesses, vulnerabilities, and hardening against common attack patterns. |
Task |
6140 | Ability to leverage best practices and lessons learned of external organizations and academic institutions dealing with cyber issues. |
Ability |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
6240 | Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE). |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
7079 | Knowledge of security systems including anti-virus applications, content filtering, firewalls, authentication systems, and intrusion detection and notification systems. |
Knowledge |
7080 | Knowledge of database security. |
Knowledge |
7081 | Knowledge of vulnerabilities of various encryption systems. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1040A | Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure. |
Knowledge |
1132A | Knowledge of information technology (IT) service catalogues. |
Knowledge |
1133 | Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1139A | Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption. |
Knowledge |
1142 | Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Knowledge |
119 | Knowledge of software engineering. |
Knowledge |
133 | Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers). |
Knowledge |
160A | Skill in assessing security systems designs. |
Skill |
180 | Skill in designing the integration of hardware and software solutions. |
Skill |
21 | Knowledge of computer algorithms. |
Knowledge |
238A | Skill in writing code in a currently supported programming language (e.g., Java, C++). |
Skill |
417 | Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews. |
Task |
419 | Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications. |
Task |
43A | Knowledge of embedded systems. |
Knowledge |
52 | Knowledge of human-computer interaction principles. |
Knowledge |
525A | Develop procedures and test fail-over for system operations transfer to an alternate site based on system availability requirements. |
Task |
602 | Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration. |
Task |
670A | Ensure the integration and implementation of Cross-Domain Solutions (CDS) in a secure environment. |
Task |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
7082 | Ability to implement Zero Trust security in DoD Systems/Software. |
Ability |
782 | Plan and recommend modifications or adjustments based on exercise results or system environment. |
Task |
795 | Properly document all systems security implementation, operations and maintenance activities and update as necessary. |
Task |
94 | Knowledge of parallel and distributed computing concepts. |
Knowledge |
The Target Analyst Reporter (TAR) provides synthesized products to customers by researching, analyzing, and reporting…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1036 | Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
1056 | Knowledge of operations security. |
Knowledge |
2001 | Accurately characterize targets. |
Task |
2081 | Classify documents in accordance with classification guidelines. |
Task |
2087 | Collaborate with intelligence analysts/targeting organizations involved in related areas. |
Task |
2089 | Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas. |
Task |
2101 | Identify and conduct analysis of target communications to identify information essential to support operations. |
Task |
2134 | Conduct target research and analysis. |
Task |
2183 | Coordinate with other organizations to deconflict reporting. |
Task |
2195 | Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology. |
Task |
2236 | Determine if information meets reporting requirements. |
Task |
2243 | Determine what technologies are used by a given target. |
Task |
2356 | Engage customers to understand customers’ intelligence needs and wants. |
Task |
2400 | Examine intercept-related metadata and content with an understanding of targeting significance. |
Task |
2427 | Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.) |
Task |
2429 | Generate requests for information. |
Task |
2434 | Identify threat tactics, and methodologies. |
Task |
244 | Ability to determine the validity of technology trend data. |
Ability |
2441 | Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
2459A | Identify cyber intelligence gaps and shortfalls. |
Task |
2515 | Initiate requests to guide tasking and assist with collection management. |
Task |
2542 | Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications. |
Task |
2568 | Make recommendations to guide collection in support of customer requirements. |
Task |
2608 | Monitor target networks to provide indications and warning of target communications changes or processing failures. |
Task |
2621 | Provide SME and support to planning/developmental forums and working groups as appropriate. |
Task |
2628A | Provide subject matter expertise to development of exercises. |
Task |
2715 | Produce reports based on intelligence information using appropriate formats for dissemination. |
Task |
2719 | Profile targets and their activities. |
Task |
2770 | Provide time sensitive targeting support. |
Task |
2779 | Review appropriate information sources to determine validity and relevance of information gathered. |
Task |
2781 | Reconstruct networks in diagram or report format. |
Task |
2798 | Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources. |
Task |
2818 | Sanitize and minimize information to protect sources and methods. |
Task |
2840 | Support identification and documentation of collateral effects. |
Task |
2893 | Assess, document, and apply a target’s motivation and/or frame of reference to facilitate analysis, targeting and collection opportunities. |
Task |
2894 | Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination. |
Task |
2897 | Conduct analysis of target communications to identify essential information in support of organization objectives. |
Task |
2902 | Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing. |
Task |
2904 | Identify cyber threat tactics and methodologies. |
Task |
2905 | Identify target communications within the global network. |
Task |
2906 | Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis. |
Task |
2912 | Perform or support technical network analysis and mapping. |
Task |
2919 | Perform social network analysis and document as appropriate. |
Task |
2922 | Tip critical or time-sensitive information to appropriate customers. |
Task |
296 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3002 | Ability to focus research efforts to meet the customer’s decision-making needs. |
Ability |
3020 | Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information. |
Ability |
3021 | Ability to collaborate effectively with others. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3047 | Ability to function effectively in a dynamic, fast-paced environment. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3052 | Ability to identify intelligence gaps. |
Ability |
3073 | Ability to recognize and mitigate cognitive biases which may affect analysis. |
Ability |
3074 | Ability to recognize and mitigate deception in reporting and analysis. |
Ability |
3077 | Ability to think critically. |
Ability |
3078 | Knowledge of target methods and procedures. |
Knowledge |
3081 | Ability to utilize multiple intelligence sources across all intelligence disciplines. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3113 | Knowledge of target intelligence gathering and operational preparation techniques and life cycles. |
Knowledge |
3117 | Knowledge of all-source reporting and dissemination procedures. |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3146 | Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3158 | Knowledge of cyber operation objectives, policies, and legalities. |
Knowledge |
3166 | Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies. |
Knowledge |
3172 | Knowledge of collection sources including conventional and non-conventional sources. |
Knowledge |
3174 | Knowledge of the intelligence requirements development and request for information processes. |
Knowledge |
3179 | Knowledge of common networking devices and their configurations. |
Knowledge |
3181 | Knowledge of common reporting databases and tools. |
Knowledge |
3219 | Knowledge of cyber operations. |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3237 | Knowledge of denial and deception techniques. |
Knowledge |
3242 | Knowledge of document classification procedures, policy, resources, and personnel. |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3288 | Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless). |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3296 | Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http). |
Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3324 | Knowledge of information and collateral intelligence sources. |
Knowledge |
3338 | Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions. |
Knowledge |
3346 | Knowledge of Internet and routing protocols. |
Knowledge |
3382 | Knowledge of methods to integrate and summarize information from any potential sources. |
Knowledge |
3386 | Knowledge of midpoint collection (process, objectives, organization, targets, etc.). |
Knowledge |
3407 | Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3418 | Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors). |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3450 | Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure. |
Knowledge |
3505 | Knowledge of strategies and tools for target research. |
Knowledge |
3534 | Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference. |
Knowledge |
3542 | Knowledge of the basic structure, architecture, and design of converged applications. |
Knowledge |
3564 | Knowledge of the data flow from collection origin to repositories and tools. |
Knowledge |
3582 | Knowledge of the intelligence frameworks, processes, and related systems. |
Knowledge |
3595 | Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements. |
Knowledge |
3603 | Knowledge of the principal methods, procedures, and techniques of gathering information and producing intelligence. |
Knowledge |
3608 | Knowledge of the purpose and contribution of target templates. |
Knowledge |
3616 | Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
Knowledge |
3617 | Knowledge of the structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3664 | Skill in identifying how a target communicates. |
Skill |
3667 | Skill in analyzing a target’s communication networks. |
Skill |
3678 | Skill in analyzing traffic to identify network devices. |
Skill |
3689 | Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses). |
Skill |
3692 | Skill in assessing the applicability of available analytical tools to various situations. |
Skill |
3708 | Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis. |
Skill |
3765 | Skill in disseminating items of highest intelligence value in a timely manner. |
Skill |
3771 | Skill in evaluating data sources for relevance, reliability, and objectivity. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3773 | Skill in evaluating information to recognize relevance, priority, etc. |
Skill |
3774 | Skill in evaluating accesses for intelligence value. |
Skill |
3778 | Skill in exploiting/querying organizational and/or partner collection databases. |
Skill |
3787 | Skill in identifying a target’s communications networks. |
Skill |
3797 | Skill in identifying leads for target development. |
Skill |
3803 | Skill in identifying, locating, and tracking targets via geospatial analysis techniques |
Skill |
3812 | Skill in interpreting metadata and content as applied by collection systems. |
Skill |
3822 | Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results. |
Skill |
3828 | Skill in navigating network visualization software. |
Skill |
3863 | Skill in recognizing midpoint opportunities and essential information. |
Skill |
3864 | Skill in recognizing relevance of information. |
Skill |
3865 | Skill in recognizing significant changes in a target’s communication patterns. |
Skill |
3867 | Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information). |
Skill |
3867A | Skill in recognizing technical information that may be used for target development including intelligence development. |
Skill |
3873 | Skill in researching essential information. |
Skill |
3885 | Skill in fusion analysis |
Skill |
3890 | Skill in synthesizing, analyzing, and prioritizing meaning across data sets. |
Skill |
3908 | Skill in using research methods including multiple, different sources to reconstruct a target network. |
Skill |
3915 | Skill in using geospatial data and applying geospatial resources. |
Skill |
3923 | Skill in using non-attributable networks. |
Skill |
3951 | Skill in writing about facts and ideas in a clear, convincing, and organized manner. |
Skill |
4072 | Knowledge of collection systems, capabilities, and processes. |
Knowledge |
4073 | Knowledge of the feedback cycle in collection processes. |
Knowledge |
4078 | Knowledge of target or threat cyber actors and procedures. |
Knowledge |
4079 | Knowledge of basic cyber operations activity concepts (e.g., foot printing, scanning and enumeration, penetration testing, white/black listing). |
Knowledge |
4085 | Knowledge of approved intelligence dissemination processes. |
Knowledge |
4086 | Knowledge of relevant laws, regulations, and policies. |
Knowledge |
4088 | Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure). |
Knowledge |
4089 | Knowledge of target communication tools and techniques. |
Knowledge |
4090 | Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes). |
Knowledge |
4094 | Knowledge of networking and internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.). |
Knowledge |
4095 | Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML). |
Knowledge |
4097 | Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network. |
Knowledge |
4099 | Knowledge of customer information needs. |
Knowledge |
4106 | Knowledge of analytic tools and techniques. |
Knowledge |
4113 | Knowledge of the request for information process. |
Knowledge |
4118 | Skill in identifying a target’s network characteristics. |
Skill |
4121 | Skill in assessing a target’s frame of reference (e.g., motivation, technical capability, organizational structure, sensitivities). |
Skill |
4123 | Skill in conducting research using all available sources. |
Skill |
4125 | Skill in complying with the legal restrictions for targeted information. |
Skill |
4128 | Skill in developing intelligence reports. |
Skill |
4129 | Skill in evaluating and interpreting metadata. |
Skill |
4134 | Skill in identifying intelligence gaps and limitations. |
Skill |
4141 | Skill in providing analysis on target-related matters (e.g., language, cultural, communications). |
Skill |
4148 | Ability to review processed target language materials for accuracy and completeness. |
Ability |
4160 | Skill in interpreting traceroute results, as they apply to network analysis and reconstruction. |
Skill |
4165 | Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption). |
Knowledge |
4166 | Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types. |
Knowledge |
4396 | Knowledge of basic cloud-based technologies and concepts. |
Knowledge |
4421 | Knowledge of Critical Intelligence Communication (CRITIC) identification and reporting process. |
Knowledge |
4423 | Knowledge of cryptologic and SIGINT reporting and dissemination procedures. |
Knowledge |
4460 | Knowledge of how and when to request assistance from the Cryptanalysis and Signals Analysis and/or CNO. |
Knowledge |
4470 | Knowledge of intelligence sources and their characteristics. |
Knowledge |
4491 | Knowledge of methods, tools, sources, and techniques used to research, integrate and summarize information pertaining to target. |
Knowledge |
4523 | Knowledge of quality review process and procedures. |
Knowledge |
4570 | Knowledge of the overall mission of the Cyber Mission Forces (CMF). |
Knowledge |
4578 | Knowledge of the specific missions for CMF (i.e., Cyber Mission Teams (CMT), National Mission Teams (NMT), Combat Support Team (CST), National Support Team (NST), Cyber Protection Team (CPT). |
Knowledge |
4582 | Knowledge of the U.S. SIGNIT System (USSS) authorities, responsibilities, and contributions to the cyberspace operations mission. |
Knowledge |
4612 | Skill in conducting derivative classification IAW organization standards/Policy |
Skill |
4613 | Skill in conducting quality review of serialized reports and reporting for time-sensitive USCYBERCOM operations. |
Skill |
4619 | Skill in developing and maintaining target profiles. |
Skill |
4625 | Skill in drafting serialized reports to support time-sensitive USCYBERCOM operations. |
Skill |
4626 | Skill in drafting serialized reports to the quality level meeting release standards. |
Skill |
4629 | Skill in executing post publication processes IAW organization standards/Policy |
Skill |
4651 | Skill in providing feedback to enhance future collection and analysis. |
Skill |
4656 | Skill in recognizing exploitation opportunities. |
Skill |
4657 | Skill in recognizing targeting opportunities and essential information. |
Skill |
4662 | Skill in releasing serialized and time-sensitive reports. |
Skill |
8010 | Apply analytic techniques to validate information or data in reporting. |
Task |
8011 | Apply and/or develop analytic techniques to provide better intelligence. |
Task |
8013 | Apply customer requirements to the analysis process. |
Task |
8022 | Assist in the mitigation of collection gaps. |
Task |
8023 | Assist planners in the development of courses of action |
Task |
8038 | Conduct pre and post publication actions |
Task |
8063 | Develop analytical techniques to gain more target information. |
Task |
8065 | Develop and maintain target profiles using appropriate corporate tools and databases (e.g. Target associations, activities, communication infrastructures, etc.). |
Task |
8081 | Document and disseminate analytic findings. |
Task |
8090 | Enable targeting offices to find new sources of collection. |
Task |
8100 | Evaluate the strengths and weaknesses of the intelligence source. |
Task |
8101 | Evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
8108 | Identify and facilitate partner relationships to enhance mission capabilities |
Task |
8128 | Lead work role working groups/planning and development forums |
Task |
8137 | Manipulate information in mission relevant databases (e.g., converting data, generating reports). |
Task |
8138 | Mitigate collection gaps |
Task |
8145 | Perform network analysis to support new or continued collection. |
Task |
8149 | Perform quality review and provide feedback on the materials delivered on which analysis and reporting is conducted. |
Task |
8155 | Prioritize reporting based on SIGINT reporting instructions or other mission reporting priorities. |
Task |
8157 | Produce digital network intelligence against specific named target sets. |
Task |
8173 | Provide intel target recommendations which meet leadership objectives. |
Task |
8176 | Provide SME support for the development and implementation of exercises. |
Task |
8191 | Select, build, and develop query strategies against appropriate collection databases. |
Task |
8203 | Understand hacker TTPs and methodologies. |
Task |
8204 | Understand network components and their functionality to enable analysis and target development. |
Task |
8205 | Understand technologies used by a given target |
Task |
8213 | Verify and validate that network graphics are accurate and comply with reporting policy. |
Task |
912 | Knowledge of collection management processes, capabilities, and limitations. |
Knowledge |
915 | Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
Knowledge |
The TDNA conducts advanced analysis of collection and open-source data to ensure target continuity, profile…
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1056 | Knowledge of operations security. |
Knowledge |
2001 | Accurately characterize targets. |
Task |
2059 | Provide expertise to course of action development. |
Task |
2066 | Provide expertise to the development of measures of effectiveness and measures of performance. |
Task |
2081 | Classify documents in accordance with classification guidelines. |
Task |
2087 | Collaborate with intelligence analysts/targeting organizations involved in related areas. |
Task |
2089 | Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas. |
Task |
2099 | Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets. |
Task |
2101 | Identify and conduct analysis of target communications to identify information essential to support operations. |
Task |
2134 | Conduct target research and analysis. |
Task |
2195 | Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology. |
Task |
2236 | Determine if information meets reporting requirements. |
Task |
2243 | Determine what technologies are used by a given target. |
Task |
2249 | Develop all-source intelligence targeting materials. |
Task |
2251 | Apply analytic techniques to gain more target information. |
Task |
2289 | Develop measures of effectiveness and measures of performance. |
Task |
2356 | Engage customers to understand customers’ intelligence needs and wants. |
Task |
2393 | Generate and evaluate the effectiveness of network analysis strategies. |
Task |
2400 | Examine intercept-related metadata and content with an understanding of targeting significance. |
Task |
2427 | Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.) |
Task |
2429 | Generate requests for information. |
Task |
2434 | Identify threat tactics, and methodologies. |
Task |
244 | Ability to determine the validity of technology trend data. |
Ability |
2441 | Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
2453 | Identify collection gaps and potential collection strategies against targets. |
Task |
2458 | Identify critical target elements. |
Task |
2459 | Identify intelligence gaps and shortfalls. |
Task |
2469 | Identify network components and their functionality to enable analysis and target development. |
Task |
2515 | Initiate requests to guide tasking and assist with collection management. |
Task |
2542 | Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications. |
Task |
2568 | Make recommendations to guide collection in support of customer requirements. |
Task |
2608 | Monitor target networks to provide indications and warning of target communications changes or processing failures. |
Task |
2621 | Provide SME and support to planning/developmental forums and working groups as appropriate. |
Task |
2628 | Participate in exercises. |
Task |
2628A | Provide subject matter expertise to development of exercises. |
Task |
2639 | Perform content and/or metadata analysis to meet organization objectives. |
Task |
2719 | Profile targets and their activities. |
Task |
2749 | Provide input for targeting effectiveness assessments for leadership acceptance. |
Task |
2770 | Provide time sensitive targeting support. |
Task |
2779 | Review appropriate information sources to determine validity and relevance of information gathered. |
Task |
2798 | Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources. |
Task |
2818 | Sanitize and minimize information to protect sources and methods. |
Task |
2840 | Support identification and documentation of collateral effects. |
Task |
2893 | Assess, document, and apply a target’s motivation and/or frame of reference to facilitate analysis, targeting and collection opportunities. |
Task |
2894 | Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination. |
Task |
2897 | Conduct analysis of target communications to identify essential information in support of organization objectives. |
Task |
2902 | Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing. |
Task |
2905 | Identify target communications within the global network. |
Task |
2906 | Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis. |
Task |
2909 | Provide feedback to collection managers to enhance future collection and analysis. |
Task |
2919 | Perform social network analysis and document as appropriate. |
Task |
2922 | Tip critical or time-sensitive information to appropriate customers. |
Task |
296 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. |
Knowledge |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3002 | Ability to focus research efforts to meet the customer’s decision-making needs. |
Ability |
3020 | Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information. |
Ability |
3021 | Ability to collaborate effectively with others. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3047 | Ability to function effectively in a dynamic, fast-paced environment. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3052 | Ability to identify intelligence gaps. |
Ability |
3073 | Ability to recognize and mitigate cognitive biases which may affect analysis. |
Ability |
3074 | Ability to recognize and mitigate deception in reporting and analysis. |
Ability |
3077 | Ability to think critically. |
Ability |
3078 | Knowledge of target methods and procedures. |
Knowledge |
3081 | Ability to utilize multiple intelligence sources across all intelligence disciplines. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3113 | Knowledge of target intelligence gathering and operational preparation techniques and life cycles. |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3146 | Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3158 | Knowledge of cyber operation objectives, policies, and legalities. |
Knowledge |
3166 | Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies. |
Knowledge |
3172 | Knowledge of collection sources including conventional and non-conventional sources. |
Knowledge |
3174 | Knowledge of the intelligence requirements development and request for information processes. |
Knowledge |
3179 | Knowledge of common networking devices and their configurations. |
Knowledge |
3181 | Knowledge of common reporting databases and tools. |
Knowledge |
3219 | Knowledge of cyber operations. |
Knowledge |
3237 | Knowledge of denial and deception techniques. |
Knowledge |
3242 | Knowledge of document classification procedures, policy, resources, and personnel. |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3281 | Knowledge of governing authorities for targeting. |
Knowledge |
3288 | Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless). |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3296 | Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http). |
Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3324 | Knowledge of information and collateral intelligence sources. |
Knowledge |
3338 | Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions. |
Knowledge |
3346 | Knowledge of Internet and routing protocols. |
Knowledge |
3367 | Knowledge of all applicable statutes, laws, regulations and policies governing cyber targeting and exploitation. |
Knowledge |
3368 | Knowledge of legal considerations in targeting. |
Knowledge |
3382 | Knowledge of methods to integrate and summarize information from any potential sources. |
Knowledge |
3386 | Knowledge of midpoint collection (process, objectives, organization, targets, etc.). |
Knowledge |
3407 | Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3418 | Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors). |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3450 | Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure. |
Knowledge |
3505 | Knowledge of strategies and tools for target research. |
Knowledge |
3534 | Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference. |
Knowledge |
3542 | Knowledge of the basic structure, architecture, and design of converged applications. |
Knowledge |
3564 | Knowledge of the data flow from collection origin to repositories and tools. |
Knowledge |
3582 | Knowledge of the intelligence frameworks, processes, and related systems. |
Knowledge |
3587 | Knowledge of targeting cycles. |
Knowledge |
3595 | Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements. |
Knowledge |
3603 | Knowledge of the principal methods, procedures, and techniques of gathering information and producing intelligence. |
Knowledge |
3608 | Knowledge of the purpose and contribution of target templates. |
Knowledge |
3616 | Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
Knowledge |
3617 | Knowledge of the structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3626 | Knowledge of the organization’s planning, operations and targeting cycles. |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3664 | Skill in identifying how a target communicates. |
Skill |
3667 | Skill in analyzing a target’s communication networks. |
Skill |
3678 | Skill in analyzing traffic to identify network devices. |
Skill |
3689 | Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses). |
Skill |
3692 | Skill in assessing the applicability of available analytical tools to various situations. |
Skill |
3708 | Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis. |
Skill |
3737 | Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects. |
Skill |
3765 | Skill in disseminating items of highest intelligence value in a timely manner. |
Skill |
3771 | Skill in evaluating data sources for relevance, reliability, and objectivity. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3773 | Skill in evaluating information to recognize relevance, priority, etc. |
Skill |
3774 | Skill in evaluating accesses for intelligence value. |
Skill |
3778 | Skill in exploiting/querying organizational and/or partner collection databases. |
Skill |
3787 | Skill in identifying a target’s communications networks. |
Skill |
3797 | Skill in identifying leads for target development. |
Skill |
3803 | Skill in identifying, locating, and tracking targets via geospatial analysis techniques |
Skill |
3812 | Skill in interpreting metadata and content as applied by collection systems. |
Skill |
3822 | Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results. |
Skill |
3828 | Skill in navigating network visualization software. |
Skill |
3863 | Skill in recognizing midpoint opportunities and essential information. |
Skill |
3864 | Skill in recognizing relevance of information. |
Skill |
3865 | Skill in recognizing significant changes in a target’s communication patterns. |
Skill |
3867A | Skill in recognizing technical information that may be used for target development including intelligence development. |
Skill |
3873 | Skill in researching essential information. |
Skill |
3885 | Skill in fusion analysis |
Skill |
3890 | Skill in synthesizing, analyzing, and prioritizing meaning across data sets. |
Skill |
3908 | Skill in using research methods including multiple, different sources to reconstruct a target network. |
Skill |
3915 | Skill in using geospatial data and applying geospatial resources. |
Skill |
3923 | Skill in using non-attributable networks. |
Skill |
3951 | Skill in writing about facts and ideas in a clear, convincing, and organized manner. |
Skill |
4072 | Knowledge of collection systems, capabilities, and processes. |
Knowledge |
4073 | Knowledge of the feedback cycle in collection processes. |
Knowledge |
4078 | Knowledge of target or threat cyber actors and procedures. |
Knowledge |
4079 | Knowledge of basic cyber operations activity concepts (e.g., foot printing, scanning and enumeration, penetration testing, white/black listing). |
Knowledge |
4085 | Knowledge of approved intelligence dissemination processes. |
Knowledge |
4086 | Knowledge of relevant laws, regulations, and policies. |
Knowledge |
4088 | Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure). |
Knowledge |
4089 | Knowledge of target communication tools and techniques. |
Knowledge |
4090 | Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes). |
Knowledge |
4094 | Knowledge of networking and internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.). |
Knowledge |
4095 | Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML). |
Knowledge |
4097 | Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network. |
Knowledge |
4099 | Knowledge of customer information needs. |
Knowledge |
4106 | Knowledge of analytic tools and techniques. |
Knowledge |
4118 | Skill in identifying a target’s network characteristics. |
Skill |
4121 | Skill in assessing a target’s frame of reference (e.g., motivation, technical capability, organizational structure, sensitivities). |
Skill |
4123 | Skill in conducting research using all available sources. |
Skill |
4125 | Skill in complying with the legal restrictions for targeted information. |
Skill |
4128 | Skill in developing intelligence reports. |
Skill |
4129 | Skill in evaluating and interpreting metadata. |
Skill |
4134 | Skill in identifying intelligence gaps and limitations. |
Skill |
4141 | Skill in providing analysis on target-related matters (e.g., language, cultural, communications). |
Skill |
4160 | Skill in interpreting traceroute results, as they apply to network analysis and reconstruction. |
Skill |
4165 | Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption). |
Knowledge |
4166 | Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types. |
Knowledge |
4223 | Ability to contribute to the collection management process |
Ability |
4421 | Knowledge of Critical Intelligence Communication (CRITIC) identification and reporting process. |
Knowledge |
4423 | Knowledge of cryptologic and SIGINT reporting and dissemination procedures. |
Knowledge |
4428 | Knowledge of cybersecurity concepts and principles. |
Knowledge |
4431 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
4460 | Knowledge of how and when to request assistance from the Cryptanalysis and Signals Analysis and/or CNO. |
Knowledge |
4470 | Knowledge of intelligence sources and their characteristics. |
Knowledge |
4490 | Knowledge of methods, tools, sources, and techniques used to research, integrate and summarize all-source information pertaining to target. |
Knowledge |
4523 | Knowledge of quality review process and procedures. |
Knowledge |
4533 | Knowledge of SIGINT laws and directives. |
Knowledge |
4570 | Knowledge of the overall mission of the Cyber Mission Forces (CMF). |
Knowledge |
4578 | Knowledge of the specific missions for CMF (i.e., Cyber Mission Teams (CMT), National Mission Teams (NMT), Combat Support Team (CST), National Support Team (NST), Cyber Protection Team (CPT). |
Knowledge |
4582 | Knowledge of the U.S. SIGNIT System (USSS) authorities, responsibilities, and contributions to the cyberspace operations mission. |
Knowledge |
4631 | Skill in geolocating targets. |
Skill |
4643 | Skill in operational use of raw collection databases. |
Skill |
4645 | Skill in performing data fusion from all-source intelligence for geospatial analysis. |
Skill |
4651 | Skill in providing feedback to enhance future collection and analysis. |
Skill |
4656 | Skill in recognizing exploitation opportunities. |
Skill |
4659 | Skill in recognizing the value of survey data. |
Skill |
4667 | Skill in selector normalization. |
Skill |
4669 | Skill in targeting (e.g., selectors). |
Skill |
8011 | Apply and/or develop analytic techniques to provide better intelligence. |
Task |
8013 | Apply customer requirements to the analysis process. |
Task |
8023 | Assist planners in the development of courses of action |
Task |
8025 | Be aware of hacker TTPs and methodologies. |
Task |
8063 | Develop analytical techniques to gain more target information. |
Task |
8064 | Develop and lead exercises |
Task |
8065 | Develop and maintain target profiles using appropriate corporate tools and databases (e.g. Target associations, activities, communication infrastructures, etc.). |
Task |
8081 | Document and disseminate analytic findings. |
Task |
8090 | Enable targeting offices to find new sources of collection. |
Task |
8100 | Evaluate the strengths and weaknesses of the intelligence source. |
Task |
8108 | Identify and facilitate partner relationships to enhance mission capabilities |
Task |
8128 | Lead work role working groups/planning and development forums |
Task |
8137 | Manipulate information in mission relevant databases (e.g., converting data, generating reports). |
Task |
8138 | Mitigate collection gaps |
Task |
8145 | Perform network analysis to support new or continued collection. |
Task |
8157 | Produce digital network intelligence against specific named target sets. |
Task |
8172 | Provide input to training and mitigation plan based on advancements in hardware and software technologies (e.g. attend training or conferences, reading) and their potential implications. |
Task |
8173 | Provide intel target recommendations which meet leadership objectives. |
Task |
8178 | Provide time sensitive support to operations. |
Task |
8191 | Select, build, and develop query strategies against appropriate collection databases. |
Task |
8205 | Understand technologies used by a given target |
Task |
912 | Knowledge of collection management processes, capabilities, and limitations. |
Knowledge |
915 | Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
Knowledge |
Provides technical support to customers who need assistance utilizing client level hardware and software in…
KSAT ID | Description | KSAT |
---|---|---|
7A | Knowledge of successful capabilities to identify the solutions to less common and more complex system problems. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
33A | Knowledge of procedures used for documenting and querying reported incidents, problems, and events. |
Knowledge |
76 | Knowledge of measures or indicators of system performance and availability. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
127 | Knowledge of systems administration concepts. |
Knowledge |
142A | Knowledge of the operations and processes for incident, problem, and event management. |
Knowledge |
145A | Knowledge of IT system operation, maintenance, and security needed to keep equipment functioning properly. |
Knowledge |
165A | Skill in conducting research for troubleshooting novel client-level problems. |
Skill |
204 | Skill in identifying possible causes of degradation of system performance or availability and initiating actions needed to mitigate this degradation. |
Skill |
221A | Skill in configuring and validating network workstations and peripherals in accordance with approved standards and/or specifications. |
Skill |
222B | Knowledge of the basic operation of computers. |
Knowledge |
235 | Skill in using the appropriate tools for repairing software, hardware, and peripheral equipment of a system. |
Skill |
264A | Knowledge of basic physical computer components and architectures. |
Knowledge |
281 | Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, electronic organizers, hard drives, memory cards, modems, network components, printers, removable storage devices, scanners, telephones, copiers, credit card skimmers, facsimile machines, global positioning systems [GPSs]). |
Knowledge |
554A | Diagnose and resolve customer reported system incidents, problems, and events. |
Task |
665A | Install and configure hardware, software, and peripheral equipment for system users in accordance with organizational standards. |
Task |
695A | Administer accounts, network rights, and access to systems and equipment. |
Task |
714A | Monitor and report client-level computer system performance. |
Task |
866 | Troubleshoot system hardware and software. |
Task |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6010 | Ability to accurately define incidents, problems, and events in the trouble ticketing system. |
Ability |
6310 | Knowledge of industry best practices for service desk. |
Knowledge |
6350 | Knowledge of organizational security policies. |
Knowledge |
6400 | Knowledge of remote access processes, tools, and capabilities related to customer support. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
1034A | Knowledge of Personally Identifiable Information (PII) data security standards. |
Knowledge |
1034B | Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C | Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
2016 | Analyze incident data for emerging trends. |
Task |
2253 | Develop and deliver technical training to educate others or meet customer needs. |
Task |
2549 | Maintain incident tracking and solution database. |
Task |
6110 | Ability to develop, update, and/or maintain standard operating procedures (SOPs). |
Ability |
639A | Make recommendations based on trend analysis for enhancements to software and hardware solutions to enhance customer experience. |
Task |
698A | Perform asset management/inventory of information technology (IT) resources. |
Task |
830A | Develop a trend analysis and impact report. |
Task |
Performs assessments of systems and networks within the NE or enclave and identifies where those…
KSAT ID | Description | KSAT |
---|---|---|
3B | Skill in conducting vulnerability scans and recognizing vulnerabilities in information systems and networks. |
Skill |
10A | Skill in conducting application vulnerability assessments. |
Skill |
10 | Knowledge of application vulnerabilities. |
Knowledge |
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
92 | Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
95B | Knowledge of penetration testing principles, tools, and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems). |
Knowledge |
105 | Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
150 | Knowledge of what constitutes a network attack and the relationship to both threats and vulnerabilities. |
Knowledge |
225A | Skill in the use of penetration testing tools and techniques, including specialized tools for non-traditional systems and networks (e.g., control systems). |
Skill |
411A | Analyze organization’s cybersecurity policies and configurations and evaluate compliance with regulations and organizational directives. |
Task |
685A | Maintain deployable cybersecurity audit toolkit (e.g., specialized cyber defense software and hardware) to support cybersecurity audit missions. |
Task |
692 | Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing. |
Task |
784 | Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions. |
Task |
922B | Skill in using network analysis tools, including specialized tools for non-traditional systems and networks (e.g., control systems), to identify vulnerabilities. |
Skill |
940B | Perform technical (evaluation of technology) and non-technical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, control system and operational environments, enclave boundary, supporting infrastructure, and applications). |
Task |
1072 | Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs:
KSAT ID | Description | KSAT |
---|---|---|
102 | Knowledge of programming language structures and logic. |
Knowledge |
102A | Ability to apply programming language structures (e.g., source code review) and logic. |
Ability |
1033 | Knowledge of basic system administration, network, and operating system hardening techniques. |
Knowledge |
1038A | Knowledge of infrastructure supporting information technology (IT) for safety, performance, and reliability. |
Knowledge |
1069 | Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation or privileges, maintaining access, network exploitation, covering tracks). |
Knowledge |
1141A | Knowledge of an organization’s information classification program and procedures for information compromise. |
Knowledge |
1142 | Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Knowledge |
128 | Knowledge of systems diagnostic tools and fault identification techniques. |
Knowledge |
160 | Skill in assessing the robustness of security systems and designs. |
Skill |
181A | Skill in detecting host and network based intrusions via intrusion detection technologies. |
Skill |
210 | Skill in mimicking threat behaviors. |
Skill |
214B | Knowledge of packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump). |
Knowledge |
226 | Skill in the use of social engineering techniques. |
Skill |
27 | Knowledge of cryptography and cryptographic key management concepts. |
Knowledge |
27B | Skill in assessing the application of cryptographic standards. |
Skill |
29 | Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools. |
Knowledge |
3150 | Knowledge of ethical hacking principles and techniques. |
Knowledge |
3222 | Knowledge of data backup and restoration concepts. |
Knowledge |
3513 | Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems. |
Knowledge |
4 | Ability to identify systemic security issues based on the analysis of vulnerability and configuration data. |
Ability |
448 | Conduct and/or support authorized penetration testing on enterprise network assets. |
Task |
49 | Knowledge of host/network access control mechanisms (e.g., access control list). |
Knowledge |
6210 | Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
63 | Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
Knowledge |
6660 | Skill in reviewing logs to identify evidence of past intrusions. |
Skill |
6918 | Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
79 | Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). |
Knowledge |
801B | Knowledge of threat and risk assessment. |
Knowledge |
81A | Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. |
Knowledge |
897A | Skill in performing impact/risk assessments. |
Skill |
904 | Knowledge of interpreted and compiled computer languages. |
Knowledge |
939 | Conduct required reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews [TSCM], TEMPEST countermeasure reviews). |
Task |
941A | Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes). |
Task |
991 | Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution). |
Knowledge |
992B | Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). |
Knowledge |
992C | Knowledge of threat environments (e.g., first generation threat actors, threat activities). |
Knowledge |
U.S. Government Notice and Consent
You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only.
By using this IS (which includes any device attached to this IS), you consent to the following conditions:
· The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.
· At any time, the USG may inspect and seize data stored on this IS.
· Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG authorized purpose.
· This IS includes security measures (e.g., authentication and access controls) to protect USG interests – not for your personal benefit or privacy.
Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details.