Skill ID: S0236
Skill Description: Skill in identifying the devices that work at each level of protocol models.
Work Roles with this Skill:
- Work Role ID: AN-EXP-001Work Roles: Exploitation AnalystWork Role Description: Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.Category: AnalyzeSpecialty Area(s): Exploitation Analysis
- Work Role ID: CO-OPS-001Work Roles: Cyber OperatorWork Role Description: Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executes on-net operations.Category: Collect and OperateSpecialty Area(s): Cyber Operations
- Work Role ID: SP-RSK-002Work Roles: Security Control AssessorWork Role Description: Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37).Category: Securely ProvisionSpecialty Area(s): Risk Management