The Workforce Framework for Cybersecurity, commonly referred to as the NICE Framework, is a nationally focused resource to help employers develop their cybersecurity workforce. It establishes a common lexicon that describes cybersecurity work and workers regardless of where or for whom the work is performed. The NICE Framework applies across public, private, and academic sectors.

The NICE program of the National Institute for Standards and Technology (NIST) released NICE Framework Components v1.0.0(link is external) in March 2024. This data includes changes to Work Role Categories and Work Role names and descriptions; 11 Competency Areas; new Insider Threat Analysis Work Role; and updates to align Task, Knowledge, and Skill (TKS) statements with the TKS Authoring Guide principles(link is external).

The NICE Framework includes the following components: 

  • Work Role Categories (7): A high-level grouping of common cybersecurity functions
  • Work Roles (52): A grouping of work for which someone is responsible or accountable. Please note, Work Roles are not synonymous to job titles or occupations.
  • TKS Statements (2,200+): A set of discrete building blocks that describe the work to be done (in the form of Tasks) and what is required to perform that work (through Knowledge and Skills).
  • Competency Areas (11): Clusters of related Knowledge and Skill statements that correlate with one’s capability to perform Tasks in a particular domain.

To explore the updated version of the NICE Framework, click on the Work Role Categories below or use the links at the top of this page to search within the NICE Framework components. To learn more, visit the NICE Framework Resource Center(link is external) and review the NICE Framework Overview PDF(link is external).

Work Role Categories

Work Roles

Communications Security (COMSEC) Management

Responsible for managing the Communications Security (COMSEC) resources of an organization.

Cybersecurity Policy and Planning

Responsible for developing and maintaining cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance.

Cybersecurity Workforce Management

Responsible for developing cybersecurity workforce plans, assessments, strategies, and guidance, including cybersecurity-related staff training, education, and hiring processes. Makes adjustments in response to or in anticipation of changes to cybersecurity-related policy, technology, and staffing needs and requirements.Authors mandated workforce planning strategies to maintain compliance with legislation, regulation, and policy.

Cybersecurity Curriculum Development

Responsible for developing, planning, coordinating, and evaluating cybersecurity awareness, training, or education content, methods, and techniques based on instructional needs and requirements.

Cybersecurity Instruction

Responsible for developing and conducting cybersecurity awareness, training, or education.

Cybersecurity Legal Advice

Responsible for providing cybersecurity legal advice and recommendations, including monitoring related legislation and regulations.

Executive Cybersecurity Leadership

Responsible for establishing vision and direction for an organization's cybersecurity operations and resources and their impact on digital and physical spaces. Possesses authority to make and execute decisions that impact an organization broadly, including policy approval and stakeholder engagement.

Privacy Compliance

Responsible for developing and overseeing an organization’s privacy compliance program and staff, including establishing and managing privacy-related governance, policy, and incident response needs.

Product Support Management

Responsible for planning, estimating costs, budgeting, developing, implementing, and managing product support strategies in order to field and maintain the readiness and operational capability of systems and components.

Program Management

Responsible for leading, coordinating, and the overall success of a defined program. Includes communicating about the program and ensuring alignment with agency or organizational priorities.

Secure Project Management

Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.

Security Control Assessment

Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.

Systems Authorization

Responsible for operating an information system at an acceptable level of risk to organizational operations, organizational assets, individuals, other organizations, and the nation.

Systems Security Management

Responsible for managing the cybersecurity of a program, organization, system, or enclave.

Technology Portfolio Management

Responsible for managing a portfolio of technology investments that align with the overall needs of mission and enterprise priorities.

Technology Program Auditing

Responsible for conducting evaluations of technology programs or their individual components to determine compliance with published standards.

The NICE Framework data used for this tool is from the NICE Framework Components v1.0.0.(link is external)