OG-WRL-014
Systems Security Management OPM Code: 722

Provides leadership, management, direction, and advocacy so the organization may effectively manage cybersecurity-related risks to the enterprise and conduct cybersecurity work.

Responsible for managing the cybersecurity of a program, organization, system, or enclave. 

Code Description Work Roles
T1019 Determine special needs of cyber-physical systems 10
T1020 Determine the operational and safety impacts of cybersecurity lapses 37
T1022 Review enterprise information technology (IT) goals and objectives 9
T1023 Identify critical technology procurement requirements 11
T1026 Determine procurement requirements 9
T1052 Integrate black-box security testing tools into quality assurance processes 2
T1056 Acquire resources to support cybersecurity program goals and objectives 4
T1057 Conduct an effective enterprise continuity of operations program 3
T1058 Advise senior management on risk levels and security posture 3
T1059 Perform cost/benefit analyses of cybersecurity programs, policies, processes, systems, and elements 5
T1060 Advise senior management on organizational cybersecurity efforts 5
T1061 Advise senior leadership and authorizing official of changes affecting the organization's cybersecurity posture 1
T1086 Collect and maintain system cybersecurity report data 1
T1087 Create system cybersecurity reports 1
T1088 Communicate the value of cybersecurity to organizational stakeholders 4
T1113 Develop the enterprise continuity of operations strategy 3
T1114 Establish the enterprise continuity of operations program 3
T1178 Determine if security improvement actions are evaluated, validated, and implemented as required 2
T1180 Determine if cybersecurity inspections, tests, and reviews are coordinated for the network environment 1
T1181 Determine if cybersecurity requirements are integrated into continuity planning 1
T1182 Determine if security engineering is used when acquiring or developing protection and detection capabilities 1
T1183 Determine if protection and detection capabilities are consistent with organization-level cybersecurity architecture 1
T1186 Establish enterprise information security architecture 2
T1188 Determine if baseline security safeguards are appropriately installed 1
T1201 Determine implications of new and upgraded technologies to the cybersecurity program 1
T1221 Disseminate incident and other Computer Network Defense (CND) information 2
T1222 Determine security requirements for new information technologies 3
T1223 Determine security requirements for new operational technologies 3
T1224 Determine impact of noncompliance on organizational risk levels 2
T1225 Determine impact of noncompliance on effectiveness of the enterprise's cybersecurity program 2
T1226 Align cybersecurity priorities with organizational security strategy 2
T1227 Manage cybersecurity budget, staffing, and contracting 8
T1233 Monitor cybersecurity data sources 1
T1234 Develop Computer Network Defense (CND) guidance for organizational stakeholders 2
T1235 Manage threat and target analysis 1
T1236 Manage the production of threat information 1
T1238 Determine the effectiveness of enterprise cybersecurity safeguards 2
T1245 Oversee the cybersecurity training and awareness program 1
T1246 Establish Assessment and Authorization (A&A) processes 1
T1247 Develop computer environment cybersecurity plans and requirements 1
T1284 Develop standard operating procedures for secure network system operations 1
T1285 Distribute standard operating procedures 1
T1286 Maintain standard operating procedures 1
T1291 Advise stakeholders on the development of continuity of operations plans 4
T1293 Advise on security requirements to be included in statements of work 2
T1295 Provide cybersecurity awareness and training 1
T1298 Communicate situational awareness information to leadership 1
T1300 Report cybersecurity incidents 2
T1304 Recommend organizational cybersecurity resource allocations 1
T1307 Develop cybersecurity policy recommendations 2
T1308 Coordinate cybersecurity policy review and approval processes 2
T1310 Implement protective or corrective measures when a cybersecurity incident or vulnerability is discovered 3
T1317 Determine if appropriate threat mitigation actions have been taken 1
T1321 Manage computing environment system operations 1
T1335 Promote cybersecurity awareness to management 6
T1336 Verify the inclusion of sound cybersecurity principles in the organization's vision and goals 6
T1342 Oversee policy standards and implementation strategy development 2
T1343 Provide cybersecurity guidance to organizational risk governance processes 2
T1344 Determine if procurement activities sufficiently address supply chain risks 5
T1345 Recommend improvements to procurement activities to address cybersecurity requirements 6
T1354 Identify system cybersecurity requirements 4
T1355 Determine if vulnerability remediation plans are in place 3
T1356 Develop vulnerability remediation plans 3
T1357 Determine if cybersecurity requirements have been successfully implemented 4
T1358 Determine the effectiveness of organizational cybersecurity policies and procedures 4
T1368 Support cybersecurity compliance activities 2
T1369 Determine if acquisitions, procurement, and outsourcing efforts address cybersecurity requirements 6
T1373 Determine organizational compliance 1
T1374 Forecast ongoing service demands 1
T1375 Conduct periodic reviews of security assumptions 1
T1376 Develop critical infrastructure protection policies and procedures 2
T1377 Implement critical infrastructure protection policies and procedures 2
T1476 Promote awareness of cybersecurity policy and strategy among management 6
T1586 Conduct cybersecurity risk assessments 3
T1601 Advise stakeholders on enterprise cybersecurity risk management 4
T1602 Advise stakeholders on supply chain risk management 4
Code Description Work Roles
K0018 Knowledge of encryption algorithms 10
K0092 Knowledge of technology integration processes 2
K0674 Knowledge of computer networking protocols 40
K0675 Knowledge of risk management processes 41
K0676 Knowledge of cybersecurity laws and regulations 41
K0677 Knowledge of cybersecurity policies and procedures 41
K0678 Knowledge of privacy laws and regulations 41
K0679 Knowledge of privacy policies and procedures 41
K0680 Knowledge of cybersecurity principles and practices 40
K0681 Knowledge of privacy principles and practices 40
K0682 Knowledge of cybersecurity threats 40
K0683 Knowledge of cybersecurity vulnerabilities 40
K0684 Knowledge of cybersecurity threat characteristics 40
K0685 Knowledge of access control principles and practices 21
K0686 Knowledge of authentication and authorization tools and techniques 21
K0687 Knowledge of business operations standards and best practices 5
K0701 Knowledge of data backup and recovery policies and procedures 8
K0709 Knowledge of business continuity and disaster recovery (BCDR) policies and procedures 5
K0710 Knowledge of enterprise cybersecurity architecture principles and practices 20
K0716 Knowledge of host access control (HAC) systems and software 10
K0717 Knowledge of network access control (NAC) systems and software 10
K0721 Knowledge of risk management principles and practices 19
K0723 Knowledge of vulnerability data sources 5
K0724 Knowledge of incident response principles and practices 8
K0725 Knowledge of incident response tools and techniques 8
K0726 Knowledge of incident handling tools and techniques 8
K0727 Knowledge of analysis standards and best practices 7
K0731 Knowledge of systems security engineering (SSE) principles and practices 13
K0732 Knowledge of intrusion detection tools and techniques 4
K0734 Knowledge of Risk Management Framework (RMF) requirements 14
K0735 Knowledge of risk management models and frameworks 13
K0736 Knowledge of information technology (IT) security principles and practices 18
K0740 Knowledge of system performance indicators 4
K0741 Knowledge of system availability measures 4
K0743 Knowledge of new and emerging technologies 15
K0744 Knowledge of operating system (OS) systems and software 16
K0746 Knowledge of policy-based access controls 15
K0747 Knowledge of Risk Adaptive (Adaptable) Access Controls (RAdAC) 15
K0749 Knowledge of process engineering principles and practices 13
K0751 Knowledge of system threats 40
K0752 Knowledge of system vulnerabilities 40
K0754 Knowledge of resource management principles and practices 7
K0758 Knowledge of server administration principles and practices 13
K0759 Knowledge of client and server architecture 16
K0765 Knowledge of software engineering principles and practices 15
K0769 Knowledge of system design standards and best practices 4
K0770 Knowledge of system administration principles and practices 14
K0771 Knowledge of system life cycle management principles and practices 9
K0778 Knowledge of enterprise information technology (IT) architecture principles and practices 20
K0779 Knowledge of systems engineering processes 14
K0783 Knowledge of network attack characteristics 7
K0791 Knowledge of defense-in-depth principles and practices 19
K0798 Knowledge of program management principles and practices 2
K0799 Knowledge of project management principles and practices 2
K0803 Knowledge of supply chain risk management principles and practices 17
K0818 Knowledge of new and emerging cybersecurity risks 6
K0820 Knowledge of supply chain risks 18
K0822 Knowledge of risk tolerance principles and practices 2
K0823 Knowledge of incident response policies and procedures 2
K0824 Knowledge of incident response roles and responsibilities 2
K0825 Knowledge of threat vector characteristics 6
K0827 Knowledge of software quality assurance (SQA) principles and practices 3
K0828 Knowledge of supply chain risk management standards and best practices 16
K0831 Knowledge of network attack vectors 8
K0834 Knowledge of technology procurement principles and practices 11
K0837 Knowledge of hardening tools and techniques 14
K0838 Knowledge of supply chain risk management policies and procedures 13
K0839 Knowledge of critical infrastructure systems and software 13
K0840 Knowledge of hardware reverse engineering tools and techniques 15
K0842 Knowledge of software reverse engineering tools and techniques 15
K0848 Knowledge of network systems management principles and practices 8
K0849 Knowledge of network systems management tools and techniques 8
K0851 Knowledge of reverse engineering principles and practices 15
K0859 Knowledge of encryption tools and techniques 13
K0865 Knowledge of data classification standards and best practices 18
K0866 Knowledge of data classification tools and techniques 18
K0870 Knowledge of enterprise architecture (EA) reference models and frameworks 20
K0871 Knowledge of enterprise architecture (EA) principles and practices 20
K0877 Knowledge of application firewall principles and practices 12
K0878 Knowledge of network firewall principles and practices 12
K0891 Knowledge of the Open Systems Interconnect (OSI) reference model 13
K0892 Knowledge of cyber defense laws and regulations 13
K0915 Knowledge of network architecture principles and practices 21
K0917 Knowledge of Personally Identifiable Information (PII) data security standards and best practices 15
K0918 Knowledge of Payment Card Industry (PCI) data security standards and best practices 16
K0919 Knowledge of Personal Health Information (PHI) data security standards and best practices 16
K0928 Knowledge of systems engineering principles and practices 13
K0934 Knowledge of data classification policies and procedures 18
K0947 Knowledge of computer engineering principles and practices 14
K0955 Knowledge of penetration testing principles and practices 8
K0956 Knowledge of penetration testing tools and techniques 8
K0962 Knowledge of targeting laws and regulations 11
K0963 Knowledge of exploitation laws and regulations 11
K0983 Knowledge of computer networking principles and practices 39
K1014 Knowledge of network security principles and practices 40
K1050 Knowledge of critical information requirements 8
K1077 Knowledge of data security controls 6
K1079 Knowledge of web application security risks 13
K1084 Knowledge of data privacy controls 6
K1093 Knowledge of black-box software testing 2
K1133 Knowledge of cybersecurity engineering 1
K1137 Knowledge of cybersecurity requirements 11
K1171 Knowledge of mission assurance practices and principles 3
K1179 Knowledge of organization's security strategy 2
K1180 Knowledge of organizational cybersecurity goals and objectives 11
K1183 Knowledge of organizational cybersecurity policies and procedures 6
K1188 Knowledge of organizational policies and procedures 4
K1189 Knowledge of organizational policy and procedures 1
K1209 Knowledge of risk mitigation principles and practices 4
K1225 Knowledge of system life cycles 2
Code Description Work Roles
S0462 Skill in integrating information security requirements in the acquisitions process 7
S0463 Skill in implementing software quality control processes 7
S0465 Skill in identifying critical infrastructure systems 10
S0466 Skill in identifying systems designed without security considerations 10
S0479 Skill in evaluating supplier trustworthiness 6
S0509 Skill in evaluating security products 5
S0564 Skill in creating system security policies 2
S0572 Skill in detecting host- and network-based intrusions 5
S0574 Skill in developing security system controls 11
S0578 Skill in evaluating security designs 9
S0616 Skill in applying black-box software testing 2
S0617 Skill in interpreting signatures 2
S0826 Skill in communicating with external organizations 2
S0841 Skill in identifying possible security violations 2
S0850 Skill in performing cost/benefit analysis 4
S0858 Skill in performing economic analysis 4
S0878 Skill in performing risk analysis 9