19 |
Knowledge of cyber defense and vulnerability assessment tools, including open source tools, and their capabilities. |
Knowledge |
27 |
Knowledge of cryptography and cryptographic key management concepts. |
Knowledge |
40 |
Knowledge of organization’s evaluation and validation requirements. |
Knowledge |
43A |
Knowledge of embedded systems. |
Knowledge |
58 |
Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. |
Knowledge |
70 |
Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). |
Knowledge |
95A |
Knowledge of penetration testing principles, tools, and techniques. |
Knowledge |
98 |
Knowledge of policy-based and risk adaptive access controls. |
Knowledge |
105 |
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). |
Knowledge |
128 |
Knowledge of systems diagnostic tools and fault identification techniques. |
Knowledge |
143 |
Knowledge of the organization’s enterprise information technology (IT) goals and objectives. |
Knowledge |
177B |
Knowledge of countermeasures for identified security risks. |
Knowledge |
179 |
Skill in designing security controls based on cybersecurity principles and tenets. |
Skill |
325 |
Knowledge of secure acquisitions (e.g., relevant Contracting Officer’s Technical Representative [COTR] duties, secure procurement, supply chain risk management). |
Knowledge |
600 |
Evaluate cost benefit, economic, and risk analysis in decision making process. |
Task |
696C |
Manage authorization packages. |
Task |
696B |
Authorizing Official only: Approve authorization packages. |
Task |
710 |
Monitor and evaluate a system’s compliance with information technology (IT) security, resilience, and dependability requirements. |
Task |
801A |
Provide enterprise cybersecurity and supply chain risk management guidance. |
Task |
836A |
Authorizing Official only: Determine if the security and privacy risk from operating a system or using a system, service, or application from an external provider is acceptable. |
Task |
942 |
Knowledge of the organization’s core business/mission processes. |
Knowledge |
952 |
Knowledge of emerging security issues, risks, and vulnerabilities. |
Knowledge |
965 |
Knowledge of organization’s risk tolerance and/or risk management approach. |
Knowledge |
979 |
Knowledge of supply chain risk management standards, processes, and practices. |
Knowledge |
1034B |
Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1034C |
Knowledge of Personal Health Information (PHI) data security standards. |
Knowledge |
1036 |
Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
1037A |
Knowledge of information technology (IT) risk management policies, requirements, and procedures. |
Knowledge |
1038 |
Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability. |
Knowledge |
1131 |
Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zackman, Federal Enterprise Architecture [FEA]). |
Knowledge |
1142 |
Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Knowledge |
1146 |
Develop and Implement cybersecurity independent audit processes for application software/networks/systems and oversee ongoing independent audits to ensure that operational and Research and Design (R&D) processes and procedures are in compliance with organizational and mandatory cybersecurity requirements and accurately followed by Systems Administrators and other cybersecurity staff when performing their day-to-day activities. |
Task |
1157A |
Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity and AI. |
Knowledge |
3591 |
Knowledge of organization objectives, leadership priorities, and decision-making risks. |
Knowledge |
5824 |
Authorizing Official only: Approve security and privacy assessment plans for systems and environments of operation. |
Task |
5837 |
Respond to threats and vulnerabilities based on the results of ongoing/continuous monitoring activities and risk assessments and decide if risk remains acceptable. |
Task |
5838 |
Review and approve security categorization results for systems. |
Task |
5839 |
Review security and privacy assessment plans for systems and environments of operation. |
Task |
6931 |
Knowledge of methods and techniques for analyzing risk. |
Knowledge |
6936 |
Knowledge of types of authorizations. |
Knowledge |
5827 |
Determine the authorization boundaries of systems. |
Task |