3C |
Skill in recognizing vulnerabilities in information and/or data systems. |
Skill |
21 |
Knowledge of computer algorithms. |
Knowledge |
27A |
Knowledge of cryptology. |
Knowledge |
34 |
Knowledge of database systems. |
Knowledge |
52 |
Knowledge of human-computer interaction principles. |
Knowledge |
58 |
Knowledge of known vulnerabilities from alerts, advisories, errata, and bulletins. |
Knowledge |
75A |
Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis. |
Knowledge |
94 |
Knowledge of parallel and distributed computing concepts. |
Knowledge |
144 |
Knowledge of the systems engineering process. |
Knowledge |
238A |
Skill in writing code in a currently supported programming language (e.g., Java, C++). |
Skill |
417 |
Apply coding and testing standards, apply security testing tools including “‘fuzzing” static-analysis code scanning tools, and conduct code reviews. |
Task |
419 |
Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications. |
Task |
421 |
Apply service oriented security architecture principles to meet organization’s confidentiality, integrity, and availability requirements. |
Task |
572 |
Ensure application of security patches for commercial products integrated into system design meet the timelines dictated by the management authority for the intended operational environment. |
Task |
602 |
Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration. |
Task |
653B |
Implement security measures to mitigate or remediate vulnerabilities and security deficiencies, and provide justification for acceptance of residual risk. |
Task |
660 |
Implement specific cybersecurity countermeasures for systems and/or applications. |
Task |
670A |
Ensure the integration and implementation of Cross-Domain Solutions (CDS) in a secure environment. |
Task |
671 |
Integrate automated capabilities for updating or patching system software where practical and develop processes and procedures for manual updating and patching of system software based on current and projected patch timeline requirements for the operational environment of the system. |
Task |
710 |
Monitor and evaluate a system’s compliance with information technology (IT) security, resilience, and dependability requirements. |
Task |
717A |
Assess and monitor cybersecurity related to system implementation and testing practices. |
Task |
754 |
Perform cybersecurity testing of developed applications and/or systems. |
Task |
765 |
Perform security reviews, identify gaps in security architecture, and develop a security risk management plan. |
Task |
806 |
Provide cybersecurity guidance to leadership. |
Task |
809 |
Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). |
Task |
880A |
Work with stakeholders to resolve computer security incidents and vulnerability compliance. |
Task |
936 |
Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers). |
Task |
938A |
Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans. |
Task |
1006 |
Create auditable evidence of security measures. |
Task |
1034B |
Knowledge of Payment Card Industry (PCI) data security standards. |
Knowledge |
1039B |
Knowledge of how to evaluate the trustworthiness of the supplier and/or product. |
Knowledge |
1072 |
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). |
Knowledge |
1073 |
Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
Knowledge |
1132A |
Knowledge of information technology (IT) service catalogues. |
Knowledge |
1133 |
Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). |
Knowledge |
1135 |
Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing). |
Knowledge |
1138A |
Knowledge of developing and applying user credential management system. |
Knowledge |
1139A |
Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption. |
Knowledge |
1142 |
Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). |
Knowledge |
5928 |
Identify, define, and document system security requirements and recommend solutions to management. |
Task |
5929 |
Install software that monitors systems and networks for security breaches and intrusions. |
Task |
5930 |
Educate and train staff on information system security best practices. |
Task |
5931 |
Select and use appropriate security testing tools. |
Task |
5932 |
Select and use appropriate secure coding standards and analyze code for common weaknesses, vulnerabilities, and hardening against common attack patterns. |
Task |
6140 |
Ability to leverage best practices and lessons learned of external organizations and academic institutions dealing with cyber issues. |
Ability |
6210 |
Knowledge of cloud service models and possible limitations for an incident response. |
Knowledge |
6240 |
Knowledge of critical protocols (e.g., IPSEC, AES, GRE, IKE). |
Knowledge |
6910 |
Ability to determine whether a security incident violates a privacy principle or legal standard requiring specific legal action. |
Ability |
6918 |
Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments. |
Ability |
7079 |
Knowledge of security systems including anti-virus applications, content filtering, firewalls, authentication systems, and intrusion detection and notification systems. |
Knowledge |
7080 |
Knowledge of database security. |
Knowledge |
7081 |
Knowledge of vulnerabilities of various encryption systems. |
Knowledge |
7082 |
Ability to implement Zero Trust security in DoD Systems/Software. |
Ability |