|
OG-WRL-001 [723]
|
Communications Security (COMSEC) Management |
17 |
51 |
11 |
|
OG-WRL-002 [752]
|
Cybersecurity Policy and Planning |
25 |
34 |
9 |
|
OG-WRL-003 [751]
|
Cybersecurity Workforce Management |
58 |
54 |
20 |
|
OG-WRL-004 [711]
|
Cybersecurity Curriculum Development |
30 |
49 |
22 |
|
OG-WRL-005 [712]
|
Cybersecurity Instruction |
37 |
69 |
55 |
|
OG-WRL-006 [731]
|
Cybersecurity Legal Advice |
12 |
42 |
5 |
|
OG-WRL-007 [901]
|
Executive Cybersecurity Leadership |
37 |
45 |
18 |
|
OG-WRL-008 [732]
|
Privacy Compliance |
78 |
47 |
21 |
|
OG-WRL-009 [803]
|
Product Support Management |
38 |
58 |
17 |
|
OG-WRL-010 [801]
|
Program Management |
39 |
49 |
14 |
|
OG-WRL-011 [802]
|
Secure Project Management |
42 |
52 |
15 |
|
OG-WRL-012 [612]
|
Security Control Assessment |
52 |
132 |
123 |
|
OG-WRL-013 [611]
|
Systems Authorization |
10 |
75 |
18 |
|
OG-WRL-014 [722]
|
Systems Security Management |
76 |
110 |
17 |
|
OG-WRL-015 [804]
|
Technology Portfolio Management |
16 |
30 |
2 |
|
OG-WRL-016 [805]
|
Technology Program Auditing |
19 |
38 |
7 |
|
DD-WRL-001 [652]
|
Cybersecurity Architecture |
50 |
121 |
48 |
|
DD-WRL-002 [651]
|
Enterprise Architecture |
41 |
89 |
26 |
|
DD-WRL-003 [621]
|
Secure Software Development |
48 |
89 |
24 |
|
DD-WRL-004 [631 and 632]
|
Secure Systems Development |
73 |
119 |
40 |
|
DD-WRL-005 [622]
|
Software Security Assessment |
38 |
86 |
18 |
|
DD-WRL-006 [641]
|
Systems Requirements Planning |
29 |
85 |
24 |
|
DD-WRL-007 [671]
|
Systems Testing and Evaluation |
22 |
60 |
21 |
|
DD-WRL-008 [661]
|
Technology Research and Development |
23 |
73 |
22 |
|
IO-WRL-001 [422]
|
Data Analysis |
15 |
66 |
47 |
|
IO-WRL-002 [421]
|
Database Administration |
14 |
57 |
14 |
|
IO-WRL-003 [431]
|
Knowledge Management |
16 |
38 |
6 |
|
IO-WRL-004 [441]
|
Network Operations |
18 |
83 |
21 |
|
IO-WRL-005 [451]
|
Systems Administration |
26 |
79 |
32 |
|
IO-WRL-006 [461]
|
Systems Security Analysis |
44 |
88 |
18 |
|
IO-WRL-007 [411]
|
Technical Support |
23 |
52 |
20 |
|
PD-WRL-001 [511]
|
Defensive Cybersecurity |
43 |
125 |
38 |
|
PD-WRL-002 [212]
|
Digital Forensics |
46 |
94 |
42 |
|
PD-WRL-003 [531]
|
Incident Response |
29 |
55 |
23 |
|
PD-WRL-004 [521]
|
Infrastructure Support |
14 |
50 |
11 |
|
PD-WRL-005 [TBD]
|
Insider Threat Analysis |
58 |
75 |
36 |
|
PD-WRL-006 [141]
|
Threat Analysis |
38 |
76 |
51 |
|
PD-WRL-007 [541]
|
Vulnerability Analysis |
15 |
64 |
18 |
|
IN-WRL-001 [221]
|
Cybercrime Investigation |
30 |
58 |
19 |
|
IN-WRL-002 [211]
|
Digital Evidence Analysis |
52 |
93 |
30 |