Knowledge ID: K0061
Knowledge Description: Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
Work Roles with this Knowledge:
- Work Role ID: OM-ANA-001Work Roles: Systems Security AnalystWork Role Description: Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.Category: Operate and MaintainSpecialty Area(s): Systems Analysis
- Work Role ID: OM-NET-001Work Roles: Network Operations SpecialistWork Role Description: Plans, implements, and operates network services/systems, to include hardware and virtual environments.Category: Operate and MaintainSpecialty Area(s): Network Services
- Work Role ID: OV-MGT-001Work Roles: Information Systems Security ManagerWork Role Description: Responsible for the cybersecurity of a program, organization, system, or enclave.Category: Oversee and GovernSpecialty Area(s): Cybersecurity Management
- Work Role ID: PR-CDA-001Work Roles: Cyber Defense AnalystWork Role Description: Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.Category: Protect and DefendSpecialty Area(s): Cyber Defense Analysis
- Work Role ID: PR-INF-001Work Roles: Cyber Defense Infrastructure Support SpecialistWork Role Description: Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.Category: Protect and DefendSpecialty Area(s): Cyber Defense Infrastructure Support
- Work Role ID: PR-VAM-001Work Roles: Vulnerability Assessment AnalystWork Role Description: Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.Category: Protect and DefendSpecialty Area(s): Vulnerability Assessment and Management
- Work Role ID: SP-ARC-001Work Roles: Enterprise ArchitectWork Role Description: Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.Category: Securely ProvisionSpecialty Area(s): Systems Architecture
- Work Role ID: SP-ARC-002Work Roles: Security ArchitectWork Role Description: Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.Category: Securely ProvisionSpecialty Area(s): Systems Architecture
- Work Role ID: SP-SRP-001Work Roles: Systems Requirements PlannerWork Role Description: Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.Category: Securely ProvisionSpecialty Area(s): Systems Requirements Planning
- Work Role ID: SP-SYS-001Work Roles: Information Systems Security DeveloperWork Role Description: Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.Category: Securely ProvisionSpecialty Area(s): Systems Development
- Work Role ID: SP-SYS-002Work Roles: Systems DeveloperWork Role Description: Designs, develops, tests, and evaluates information systems throughout the systems development life cycle.Category: Securely ProvisionSpecialty Area(s): Systems Development