|
S0001
|
Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems. |
6 |
|
S0006
|
Skill in applying confidentiality, integrity, and availability principles. |
3 |
|
S0027
|
Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. |
7 |
|
S0034
|
Skill in discerning the protection needs (i.e., security controls) of information systems and networks. |
6 |
|
S0038
|
Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system. |
5 |
|
S0073
|
Skill in using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere, Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, etc.). |
5 |
|
S0078
|
Skill in recognizing and categorizing types of vulnerabilities and associated attacks. |
3 |
|
S0097
|
Skill in applying security controls. |
3 |
|
S0100
|
Skill in utilizing or developing learning activities (e.g., scenarios, instructional games, interactive exercises). |
2 |
|
S0110
|
Skill in identifying Test & Evaluation infrastructure (people, ranges, tools, instrumentation) requirements. |
2 |
|
S0111
|
Skill in interfacing with customers. |
2 |
|
S0112
|
Skill in managing test assets, test resources, and test personnel to ensure effective completion of test events. |
2 |
|
S0115
|
Skill in preparing Test & Evaluation reports. |
2 |
|
S0120
|
Skill in reviewing logs to identify evidence of past intrusions. |
2 |
|
S0124
|
Skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution. |
2 |
|
S0128
|
Skill in using manpower and personnel IT systems. |
2 |
|
S0134
|
Skill in conducting reviews of systems. |
2 |
|
S0135
|
Skill in secure test plan design (e. g. unit, integration, system, acceptance). |
3 |
|
S0136
|
Skill in network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. |
2 |
|
S0137
|
Skill in conducting application vulnerability assessments. |
2 |
|
S0138
|
Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic). |
5 |
|
S0141
|
Skill in assessing security systems designs. |
2 |
|
S0145
|
Skill in integrating and applying policies that meet system security objectives. |
3 |
|
S0147
|
Skill in assessing security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, NIST SP 800-53, Cybersecurity Framework, etc.). |
3 |
|
S0171
|
Skill in performing impact/risk assessments. |
2 |
|
S0172
|
Skill in applying secure coding techniques. |
2 |
|
S0173
|
Skill in using security event correlation tools. |
2 |
|
S0174
|
Skill in using code analysis tools. |
3 |
|
S0175
|
Skill in performing root cause analysis. |
3 |
|
S0176
|
Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures. |
4 |
|
S0177
|
Skill in analyzing a target's communication networks. |
2 |
|
S0184
|
Skill in analyzing traffic to identify network devices. |
4 |
|
S0232
|
Skill in identifying intelligence gaps and limitations. |
2 |
|
S0233
|
Skill in identifying language issues that may have an impact on organization objectives. |
2 |
|
S0234
|
Skill in identifying leads for target development. |
2 |
|
S0235
|
Skill in identifying non-target regional languages and dialects |
2 |
|
S0236
|
Skill in identifying the devices that work at each level of protocol models. |
3 |
|
S0237
|
Skill in identifying, locating, and tracking targets via geospatial analysis techniques |
2 |
|
S0238
|
Skill in information prioritization as it relates to operations. |
2 |
|
S0239
|
Skill in interpreting compiled and interpretive programming languages. |
2 |
|
S0240
|
Skill in interpreting metadata and content as applied by collection systems. |
2 |
|
S0241
|
Skill in interpreting traceroute results, as they apply to network analysis and reconstruction. |
2 |
|
S0242
|
Skill in interpreting vulnerability scanner results to identify vulnerabilities. |
2 |
|
S0243
|
Skill in knowledge management, including technical documentation techniques (e.g., Wiki page). |
2 |
|
S0244
|
Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results. |
3 |
|
S0248
|
Skill in performing target system analysis. |
3 |
|
S0249
|
Skill in preparing and presenting briefings. |
8 |
|
S0250
|
Skill in preparing plans and related correspondence. |
5 |
|
S0251
|
Skill in prioritizing target language material. |
2 |
|
S0252
|
Skill in processing collected data for follow-on analysis. |
2 |
|
S0254
|
Skill in providing analysis to aid writing phased after action reports. |
3 |
|
S0271
|
Skill in reviewing and editing assessment products. |
3 |
|
S0273
|
Skill in reviewing and editing plans. |
3 |
|
S0278
|
Skill in tailoring analysis to the necessary levels (e.g., classification and organizational). |
6 |
|
S0279
|
Skill in target development in direct support of collection operations. |
2 |
|
S0280
|
Skill in target network anomaly identification (e.g., intrusions, dataflow or processing, target implementation of new technologies). |
2 |
|
S0281
|
Skill in technical writing. |
3 |
|
S0296
|
Skill in utilizing feedback to improve processes, products, and services. |
9 |
|
S0304
|
Skill to access information on current assets available, usage. |
3 |
|
S0305
|
Skill to access the databases where plans/directives/guidance are maintained. |
3 |
|
S0306
|
Skill to analyze strategic guidance for issues requiring clarification and/or additional guidance. |
2 |
|
S0307
|
Skill to analyze target or threat sources of strength and morale. |
2 |
|
S0325
|
Skill to develop a collection plan that clearly shows the discipline that can be used to collect the information needed. |
2 |
|
S0329
|
Skill to evaluate requests for information to determine if response information exists. |
2 |
|
S0332
|
Skill to extract information from available tools and applications associated with collection requirements and collection operations management. |
2 |
|
S0367
|
Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). |
14 |
|
S0370
|
Skill to use cyber defense Service Provider reporting structure and processes within one’s own organization. |
2 |
|
S0374
|
Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations. |
3 |