6210
Knowledge
Knowledge of cloud service models and possible limitations for an incident response.
Core KSAT for the following Work Roles
Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
Manages and identifies program high-level technical specifications, which may include application design, cloud computing strategy and adoption, and integration of software applications into a functioning system to meet requirements.
Responsible for analysis and development of systems/software security through the product lifecycle to include integration, testing, operations and maintenance.
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.
Develops and conducts training or education of personnel within cyber domain.
Provides legal advice and recommendations on relevant topics related to cyber law.
Develops cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and initiatives.
Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.