Work Role Description: Conducts detailed investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.
Work Role Description: Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
Work Role Description: Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.
Work Role Description: Administers databases and/or data management systems that allow for the secure storage, query, protection, and utilization of data.
Work Role Description: Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.
Work Role Description: Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
Work Role Description: Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Work Role Description: Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.
Work Role Description: Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.
Work Role Description: Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Work Role Description: Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.
Work Role Description: Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.
Work Role Description: Designs, develops, tests, and evaluates information systems throughout the systems development life cycle.