Cybersecurity
Personnel who secure, defend, and preserve data, networks, net-centric capabilities, and other designated systems by ensuring appropriate security controls and measures are in place, and taking internal defense actions. This includes access to system controls, monitoring, administration, and integration of cybersecurity into all aspects of engineering and acquisition of cyberspace capabilities.
ASSOCIATED WORK ROLES
Work Role ID: 611
Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009).
Work Role ID: 723
Manages the Communications Security (COMSEC) resources of an organization (CNSSI No. 4009).
Work Role ID: 462
Responsible for device, equipment, and system-level cybersecurity configuration and day-to-day security operations of control systems, including security monitoring and maintenance along with stakeholder coordination to ensure the system and its interconnections are secure in support of mission operations.
Work Role ID: 511
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Work Role ID: 212
Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
Work Role ID: 531
Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
Work Role ID: 521
Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.
Work Role ID: 631
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Work Role ID: 722
Responsible for the cybersecurity of a program, organization, system, or enclave.
Work Role ID: 622
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Work Role ID: 652
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Work Role ID: 612
Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST 800-37).
Work Role ID: 541
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.