• T1019: Determine special needs of cyber-physical systems
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1023: Identify critical technology procurement requirements
  • T1041: Determine impact of software configurations
  • T1079: Develop cybersecurity risk profiles
  • T1084: Identify anomalous network activity
  • T1118: Identify vulnerabilities
  • T1119: Recommend vulnerability remediation strategies
  • T1142: Validate data mining and data warehousing programs, processes, and requirements
  • T1337: Identify system and network capabilities
  • T1338: Develop cybersecurity capability strategies for custom hardware and software development
  • T1378: Identify cybersecurity solutions tools and technologies
  • T1379: Design cybersecurity tools and technologies
  • T1380: Develop cybersecurity tools and technologies
  • T1424: Evaluate network infrastructure vulnerabilities
  • T1425: Recommend network infrastructure enhancements
  • T1489: Correlate incident data
  • T1491: Design data management systems
  • T1493: Troubleshoot prototype design and process issues
  • T1494: Recommend vulnerability exploitation functional and security-related features
  • T1495: Recommend vulnerability mitigation functional- and security-related features
  • T1496: Develop reverse engineering tools
  • T1610: Determine if hardware and software complies with defined specifications and requirements