SP-ARC-001 Enterprise Architect

Conceptualizes, designs, procures, and/or builds secure information technology (IT) systems, with responsibility for aspects of system and/or network development.

Develops system concepts and works on the capabilities phases of the systems development life cycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.

Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.

Knowledges 52

Code Description Work Roles
K0001 Knowledge of computer networking concepts and protocols, and network security methodologies. 52
K0002 Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). 52
K0003 Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. 52
K0004 Knowledge of cybersecurity and privacy principles. 52
K0005 Knowledge of cyber threats and vulnerabilities. 52
K0006 Knowledge of specific operational impacts of cybersecurity lapses. 52
K0024 Knowledge of database systems. 7
K0027 Knowledge of organization's enterprise information security architecture. 9
K0028 Knowledge of organization's evaluation and validation requirements. 8
K0030 Knowledge of electrical engineering as applied to computer architecture (e.g., circuit boards, processors, chips, and computer hardware). 4
K0035 Knowledge of installation, integration, and optimization of system components. 6
K0037 Knowledge of Security Assessment and Authorization process. 5
K0043 Knowledge of industry-standard and organizationally accepted analysis principles and methods. 7
K0044 Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). 14
K0052 Knowledge of mathematics (e.g. logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis). 6
K0056 Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML). 11
K0060 Knowledge of operating systems. 13
K0061 Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). 11
K0063 Knowledge of parallel and distributed computing concepts. 6
K0074 Knowledge of key concepts in security management (e.g., Release Management, Patch Management). 4
K0075 Knowledge of security system design tools, methods, and techniques. 3
K0082 Knowledge of software engineering. 7
K0091 Knowledge of systems testing and evaluation methods. 6
K0093 Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing). 8
K0102 Knowledge of the systems engineering process. 7
K0170 Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations. 12
K0179 Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). 19
K0180 Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. 9
K0198 Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions). 6
K0200 Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). 11
K0203 Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). 10
K0207 Knowledge of circuit analysis. 2
K0211 Knowledge of confidentiality, integrity, and availability requirements. 2
K0212 Knowledge of cybersecurity-enabled software products. 4
K0214 Knowledge of the Risk Management Framework Assessment Methodology. 2
K0227 Knowledge of various types of computer architectures. 4
K0240 Knowledge of multi-level security systems and cross domain solutions. 2
K0264 Knowledge of program protection planning (e.g. information technology (IT) supply chain security/risk management policies, anti-tampering techniques, and requirements). 2
K0275 Knowledge of configuration management techniques. 3
K0286 Knowledge of N-tiered typologies (e.g. including server and client operating systems). 2
K0287 Knowledge of an organization's information classification program and procedures for information compromise. 18
K0291 Knowledge of the enterprise information technology (IT) architectural concepts and patterns (e.g., baseline, validated design, and target architectures.) 2
K0293 Knowledge of integrating the organization’s goals and objectives into the architecture. 2
K0299 Knowledge in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. 1
K0322 Knowledge of embedded systems. 10
K0323 Knowledge of system fault tolerance methodologies. 2
K0325 Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression). 6
K0326 Knowledge of demilitarized zones. 2
K0332 Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. 14
K0333 Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs. 6
K0487 Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). 4
K0516 Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. 10

Skills 8

Code Description Work Roles
S0005 Skill in applying and incorporating information technologies into proposed solutions. 4
S0024 Skill in designing the integration of hardware and software solutions. 5
S0027 Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. 7
S0050 Skill in design modeling and building use cases (e.g., unified modeling language). 3
S0060 Skill in writing code in a currently supported programming language (e.g., Java, C++). 7
S0122 Skill in the use of design methods. 2
S0367 Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). 14
S0374 Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations. 3

Abilities 9

Code Description Work Roles
A0008 Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]). 3
A0015 Ability to conduct vulnerability scans and recognize vulnerabilities in security systems. 8
A0027 Ability to apply an organization's goals and objectives to develop and maintain architecture. 3
A0038 Ability to optimize systems to meet enterprise performance requirements. 2
A0051 Ability to execute technology integration processes. 1
A0060 Ability to build architectures and frameworks. 1
A0123 Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). 15
A0170 Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations. 11
A0172 Ability to set up a physical or logical sub-networks that separates an internal local area network (LAN) from other untrusted networks. 2

Tasks 19

Code Description Work Roles
T0307 Analyze candidate architectures, allocate security services, and select security mechanisms. 2
T0314 Develop a system security context, a preliminary system security Concept of Operations (CONOPS), and define baseline system security requirements in accordance with applicable cybersecurity requirements. 2
T0328 Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents. 2
T0338 Write detailed functional specifications that document the architecture development process. 2
T0427 Analyze user needs and requirements to plan architecture. 2
T0440 Capture and integrate essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event. 1
T0448 Develop enterprise architecture or system components required to meet user needs. 2
T0473 Document and update as necessary all definition and architecture activities. 2
T0517 Integrate results regarding the identification of gaps in security architecture. 1
T0521 Plan implementation strategy to ensure that enterprise components can be integrated and aligned. 1
T0542 Translate proposed capabilities into technical requirements. 2
T0051 Define appropriate levels of system availability based on critical system functions and ensure that system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration. 2
T0084 Employ secure configuration management processes. 2
T0090 Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines. 2
T0108 Identify and prioritize critical business functions in collaboration with organizational stakeholders. 2
T0196 Provide advice on project costs, design concepts, or design changes. 4
T0205 Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials). 6
T0555 Document how the implementation of a new system or new interface between systems impacts the current and target environment including but not limited to security posture. 1
T0557 Integrate key management functions as related to cyberspace. 1