Systems Security Analysis

Responsible for developing and analyzing the integration, testing, operations, and maintenance of systems security. Prepares, performs, and manages the security aspects of implementing and operating a system.

  • T0309: Assess the effectiveness of security controls
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1023: Identify critical technology procurement requirements
  • T1075: Implement application cybersecurity policies
  • T1076: Implement system cybersecurity policies
  • T1077: Assess the organization's cybersecurity architecture
  • T1172: Determine if systems security operations and maintenance activities are property documented and updated
  • T1173: Determine that the application of security patches for commercial products meets timeline requirements
  • T1174: Document commercial product timeline requirements dictated by the management authority for intended operational environments
  • T1176: Determine if cybersecurity-enabled products reduce identified risk to acceptable levels
  • T1177: Determine if security control technologies reduce identified risk to acceptable levels
  • T1212: Implement cybersecurity countermeasures for systems and applications
  • T1218: Integrate automated capabilities for updating or patching system software
  • T1219: Develop processes and procedures for manual updating and patching of system software
  • T1255: Perform cybersecurity testing of developed applications and systems
  • T1263: Perform security reviews
  • T1264: Identify gaps in security architecture
  • T1265: Develop a cybersecurity risk management plan
  • T1278: Recommend system modifications
  • T1287: Document systems security activities
  • T1294: Advise on Risk Management Framework process activities and documentation
  • T1327: Update security documentation to reflect current application and system security design features
  • T1437: Determine effectiveness of configuration management processes
  • T1522: Determine if systems meet minimum security requirements
  • T1532: Develop procedures for system operations transfer to alternate sites
  • T1533: Test failover for system operations transfer to alternative sites
  • T1539: Analyze organizational cybersecurity posture trends
  • T1540: Develop organizational cybersecurity posture trend reports
  • T1541: Develop system security posture trend reports
  • T1548: Determine adequacy of access controls
  • T1550: Execute disaster recovery and continuity of operations processes
  • T1557: Implement security measures for systems and system components
  • T1559: Resolve vulnerabilities in systems and system components
  • T1560: Mitigate risks in systems and system components
  • T1563: Implement system security measures
  • T1568: Implement cross-domain solutions
  • T1574: Develop risk acceptance documentation for senior leaders and authorized representatives
  • T1583: Determine effectiveness of system implementation and testing processes
  • T1584: Establish minimum security requirements for applications
  • T1585: Determine if applications meet minimum security requirements
  • T1603: Recommend threat and vulnerability risk mitigation strategies
  • T1615: Advise stakeholders on vulnerability compliance
  • T1616: Resolve computer security incidents
  • T1618: Advise stakeholders on disaster recovery, contingency, and continuity of operations plans