22 |
* Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 |
* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
217 |
Skill in preserving evidence integrity according to standard operating procedures or national standards. |
Skill |
281 |
Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, electronic organizers, hard drives, memory cards, modems, network components, printers, removable storage devices, scanners, telephones, copiers, credit card skimmers, facsimile machines, global positioning systems [GPSs]). |
Knowledge |
290 |
Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody). |
Knowledge |
340 |
Knowledge of types and collection of persistent data. |
Knowledge |
369 |
Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data. |
Skill |
1036 |
Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. |
Knowledge |
1157 |
* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 |
* Knowledge of cybersecurity principles. |
Knowledge |
1159 |
* Knowledge of cyber threats and vulnerabilities. |
Knowledge |
3155 |
Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3159 |
Knowledge of cyber operations support or enabling processes. |
Knowledge |
3211 |
Knowledge of cyber laws and legal considerations and their effect on cyber planning. |
Knowledge |
3235 |
Knowledge of deconfliction processes and procedures. |
Knowledge |
3257 |
Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities. |
Knowledge |
3262 |
Knowledge of evolving/emerging communications technologies. |
Knowledge |
3264 |
Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization. |
Knowledge |
3356 |
Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations. |
Knowledge |
3419 |
Knowledge of organization or partner exploitation of digital networks. |
Knowledge |
3585 |
Knowledge of accepted organization planning systems. |
Knowledge |
3591 |
Knowledge of organization objectives, leadership priorities, and decision-making risks. |
Knowledge |
3615 |
Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
Knowledge |
3627 |
Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3638 |
Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations. |
Knowledge |
3639 |
Knowledge of organization cyber operations programs, strategies, and resources. |
Knowledge |
6900 |
* Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 |
* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 |
* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |