Breadcrumb
  1. Workforce Development
  2. NICE Workforce Framework for Cybersecurity (NICE Framework)
  3. Knowledge Search
  4. K0695

Knowledge statement ID: K0695

Knowledge of programming principles and practices

Work roles with this Knowledge

  • Secure Software Development

    NICE Framework ID: DD-WRL-003

    Responsible for developing, creating, modifying, and maintaining computer applications, software, or specialized utility programs.

  • Software Security Assessment

    NICE Framework ID: DD-WRL-005

    Responsible for analyzing the security of new or existing computer applications, software, or specialized utility programs and delivering actionable results.

  • Data Analysis

    NICE Framework ID: IO-WRL-001

    Responsible for analyzing data from multiple disparate sources to provide cybersecurity and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

  • Multi-Disciplined Language Analysis

    NICE Framework ID: CI-WRL-005

    <p>Responsible for applying language and cultural expertise with target, threat, and technical knowledge to process, analyze, and disseminate intelligence information derived from language, voice, and/or graphic materials. Creates and maintains language-specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects.</p>

  • Cyberspace Operations

    NICE Framework ID: CE-WRL-001

    Responsible for gathering evidence on criminal or foreign intelligence entities to mitigate and protect against possible or real-time threats. Conducts collection, processing, and geolocation of systems to exploit, locate, and track targets. Performs network navigation and tactical forensic analysis and executes on-net operations when directed.

  • Exploitation Analysis

    NICE Framework ID: CE-WRL-003

    Responsible for identifying access and intelligence collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.