Skill ID: S0001
Skill Description: Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
Work Roles with this Skill:
- Work Role ID: OV-TEA-002Work Roles: Cyber InstructorWork Role Description: Develops and conducts training or education of personnel within cyber domain.Category: Oversee and GovernSpecialty Area(s): Training, Education, and Awareness
- Work Role ID: PR-VAM-001Work Roles: Vulnerability Assessment AnalystWork Role Description: Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.Category: Protect and DefendSpecialty Area(s): Vulnerability Assessment and Management
- Work Role ID: SP-DEV-001Work Roles: Software DeveloperWork Role Description: Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.Category: Securely ProvisionSpecialty Area(s): Software Development
- Work Role ID: SP-DEV-002Work Roles: Secure Software AssessorWork Role Description: Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.Category: Securely ProvisionSpecialty Area(s): Software Development
- Work Role ID: SP-RSK-002Work Roles: Security Control AssessorWork Role Description: Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37).Category: Securely ProvisionSpecialty Area(s): Risk Management
- Work Role ID: SP-SYS-001Work Roles: Information Systems Security DeveloperWork Role Description: Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.Category: Securely ProvisionSpecialty Area(s): Systems Development