Knowledge ID: K0224

Knowledge Description: Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. 

Work Roles with this Knowledge:

  • Work Role ID: AN-EXP-001
    Work Role Name: Exploitation Analyst
    Work Role Description: Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
    Category: Analyze
    Specialty Area(s): Exploitation Analysis
  • Work Role ID: CO-OPS-001
    Work Role Name: Cyber Operator
    Work Role Description: Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executes on-net operations.
    Specialty Area(s): Cyber Operations
  • Work Role ID: IN-FOR-002
    Work Role Description: Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
    Category: Investigate
    Specialty Area(s): Digital Forensics
  • Work Role ID: OM-STS-001
    Work Role Description: Provides technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components (i.e., Master Incident Management Plan, when applicable).
  • Work Role ID: PR-VAM-001
    Work Role Description: Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.