Work Role Description: Conducts detailed investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.
Work Role Description: Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
Work Role Description: Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).
Work Role Description: Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.
Work Role Description: Plans, implements, and operates network services/systems, to include hardware and virtual environments.
Work Role Description: Responsible for the cybersecurity of a program, organization, system, or enclave.
Work Role Description: Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
Work Role Description: Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
Work Role Description: Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.
Work Role Description: Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
Work Role Description: Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Work Role Description: Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.
Work Role Description: Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Work Role Description: Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009).
Work Role Description: Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37).
Work Role Description: Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.
Work Role Description: Designs, develops, tests, and evaluates information systems throughout the systems development life cycle.
Work Role Description: Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Work Role Description: Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.