PD-WRL-007
Vulnerability Analysis OPM Code: 541

Protects against, identifies, and analyzes risks to technology systems or networks. Includes investigation of cybersecurity events or crimes related to technology systems and networks.

Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.

Code Description Work Roles
T1020 Determine the operational and safety impacts of cybersecurity lapses 37
T1041 Determine impact of software configurations 4
T1069 Evaluate organizational cybersecurity policy regulatory compliance 3
T1070 Evaluate organizational cybersecurity policy alignment with organizational directives 3
T1079 Develop cybersecurity risk profiles 4
T1084 Identify anomalous network activity 9
T1091 Perform authorized penetration testing on enterprise network assets 1
T1118 Identify vulnerabilities 7
T1119 Recommend vulnerability remediation strategies 8
T1229 Maintain deployable cyber defense audit toolkits 1
T1279 Prepare audit reports 2
T1341 Perform required reviews 1
T1489 Correlate incident data 7
T1619 Perform risk and vulnerability assessments 2
T1620 Recommend cost-effective security controls 1
Code Description Work Roles
K0068 Knowledge of programming language structures and logic 7
K0674 Knowledge of computer networking protocols 40
K0675 Knowledge of risk management processes 41
K0676 Knowledge of cybersecurity laws and regulations 41
K0677 Knowledge of cybersecurity policies and procedures 41
K0678 Knowledge of privacy laws and regulations 41
K0679 Knowledge of privacy policies and procedures 41
K0680 Knowledge of cybersecurity principles and practices 40
K0681 Knowledge of privacy principles and practices 40
K0682 Knowledge of cybersecurity threats 40
K0683 Knowledge of cybersecurity vulnerabilities 40
K0684 Knowledge of cybersecurity threat characteristics 40
K0685 Knowledge of access control principles and practices 21
K0686 Knowledge of authentication and authorization tools and techniques 21
K0688 Knowledge of common application vulnerabilities 5
K0698 Knowledge of cryptographic key management principles and practices 10
K0701 Knowledge of data backup and recovery policies and procedures 8
K0710 Knowledge of enterprise cybersecurity architecture principles and practices 20
K0716 Knowledge of host access control (HAC) systems and software 10
K0717 Knowledge of network access control (NAC) systems and software 10
K0728 Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices 20
K0729 Knowledge of non-repudiation principles and practices 20
K0730 Knowledge of cyber safety principles and practices 20
K0742 Knowledge of identity and access management (IAM) principles and practices 10
K0751 Knowledge of system threats 40
K0752 Knowledge of system vulnerabilities 40
K0760 Knowledge of server diagnostic tools and techniques 6
K0761 Knowledge of Fault Detection and Diagnostics (FDD) tools and techniques 5
K0770 Knowledge of system administration principles and practices 14
K0778 Knowledge of enterprise information technology (IT) architecture principles and practices 20
K0779 Knowledge of systems engineering processes 14
K0783 Knowledge of network attack characteristics 7
K0791 Knowledge of defense-in-depth principles and practices 19
K0797 Knowledge of ethical hacking tools and techniques 4
K0813 Knowledge of interpreted and compiled programming language characteristics 7
K0832 Knowledge of cyberattack characteristics 3
K0833 Knowledge of cyberattack actor characteristics 4
K0837 Knowledge of hardening tools and techniques 14
K0844 Knowledge of cyberattack stages 4
K0845 Knowledge of cyber intrusion activity phases 4
K0865 Knowledge of data classification standards and best practices 18
K0866 Knowledge of data classification tools and techniques 18
K0870 Knowledge of enterprise architecture (EA) reference models and frameworks 20
K0871 Knowledge of enterprise architecture (EA) principles and practices 20
K0879 Knowledge of industry cybersecurity models and frameworks 9
K0880 Knowledge of access control models and frameworks 9
K0882 Knowledge of ethical hacking principles and practices 2
K0891 Knowledge of the Open Systems Interconnect (OSI) reference model 13
K0915 Knowledge of network architecture principles and practices 21
K0924 Knowledge of network analysis tools and techniques 7
K0934 Knowledge of data classification policies and procedures 18
K0939 Knowledge of packet-level analysis tools and techniques 3
K0942 Knowledge of cryptology principles and practices 10
K0955 Knowledge of penetration testing principles and practices 8
K0956 Knowledge of penetration testing tools and techniques 8
K0969 Knowledge of cyber-attack tools and techniques 7
K0983 Knowledge of computer networking principles and practices 39
K1014 Knowledge of network security principles and practices 40
K1076 Knowledge of risk scoring principles and practices 3
K1079 Knowledge of web application security risks 13
K1087 Knowledge of social engineering tools and techniques 2
K1129 Knowledge of cyber defense auditing laws and regulations 1
K1130 Knowledge of cyber defense auditing policies and practices 1
K1182 Knowledge of organizational cybersecurity policies and configurations 3
Code Description Work Roles
S0483 Skill in identifying software communications vulnerabilities 7
S0492 Skill in performing threat environment analysis 1
S0532 Skill in analyzing software configurations 4
S0543 Skill in scanning for vulnerabilities 12
S0544 Skill in recognizing vulnerabilities 13
S0572 Skill in detecting host- and network-based intrusions 5
S0574 Skill in developing security system controls 11
S0578 Skill in evaluating security designs 9
S0588 Skill in performing threat modeling 2
S0591 Skill in performing social engineering 2
S0597 Skill in writing code in a currently supported programming language 7
S0641 Skill in reviewing logs 2
S0642 Skill in identifying evidence of past intrusions 2
S0656 Skill in assessing application vulnerabilities 2
S0675 Skill in optimizing system performance 10
S0686 Skill in performing risk assessments 12
S0688 Skill in performing network data analysis 7
S0804 Skill in assessing an organization's threat environment 1