Skill ID: S0688

Skill in performing network data analysis

Work roles with this Skill

  • Cybersecurity Instruction

    NICE Framework ID: OG-WRL-005

    Responsible for developing and conducting cybersecurity awareness, training, or education.

  • Security Control Assessment

    NICE Framework ID: OG-WRL-012

    Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.

  • Systems Security Analysis

    NICE Framework ID: IO-WRL-006

    Responsible for developing and analyzing the integration, testing, operations, and maintenance of systems security. Prepares, performs, and manages the security aspects of implementing and operating a system.

  • Defensive Cybersecurity

    NICE Framework ID: PD-WRL-001

    Responsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.

  • Incident Response

    NICE Framework ID: PD-WRL-003

    Responsible for investigating, analyzing, and responding to network cybersecurity incidents.

  • Insider Threat Analysis

    NICE Framework ID: PD-WRL-005

    Responsible for identifying and assessing the capabilities and activities of cybersecurity insider threats; produces findings to help initialize and support law enforcement and counterintelligence activities and investigations.

  • Vulnerability Analysis

    NICE Framework ID: PD-WRL-007

    Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.

  • Target Network Analysis

    NICE Framework ID: CE-WRL-007

    Responsible for conducting advanced analysis of collection and open-source data to ensure target continuity; profiling targets and their activities; and developing techniques to gain target information. Determines how targets communicate, move, operate, and live based on knowledge of target technologies, digital networks, and applications.