Systems Security Analysis

Responsible for developing and analyzing the integration, testing, operations, and maintenance of systems security. Prepares, performs, and manages the security aspects of implementing and operating a system.

  • T0309: Assess the effectiveness of security controls
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1023: Identify critical technology procurement requirements
  • T1075: Implement application cybersecurity policies
  • T1076: Implement system cybersecurity policies
  • T1077: Assess the organization's cybersecurity architecture
  • T1172: Determine if systems security operations and maintenance activities are property documented and updated
  • T1173: Determine that the application of security patches for commercial products meets timeline requirements
  • T1174: Document commercial product timeline requirements dictated by the management authority for intended operational environments
  • T1176: Determine if cybersecurity-enabled products reduce identified risk to acceptable levels
  • T1177: Determine if security control technologies reduce identified risk to acceptable levels
  • T1212: Implement cybersecurity countermeasures for systems and applications
  • T1218: Integrate automated capabilities for updating or patching system software
  • T1219: Develop processes and procedures for manual updating and patching of system software
  • T1255: Perform cybersecurity testing of developed applications and systems
  • T1263: Perform security reviews
  • T1264: Identify gaps in security architecture
  • T1265: Develop a cybersecurity risk management plan
  • T1278: Recommend system modifications
  • T1287: Document systems security activities
  • T1294: Advise on Risk Management Framework process activities and documentation
  • T1327: Update security documentation to reflect current application and system security design features
  • T1437: Determine effectiveness of configuration management processes
  • T1522: Determine if systems meet minimum security requirements
  • T1532: Develop procedures for system operations transfer to alternate sites
  • T1533: Test failover for system operations transfer to alternative sites
  • T1539: Analyze organizational cybersecurity posture trends
  • T1540: Develop organizational cybersecurity posture trend reports
  • T1541: Develop system security posture trend reports
  • T1548: Determine adequacy of access controls
  • T1550: Execute disaster recovery and continuity of operations processes
  • T1557: Implement security measures for systems and system components
  • T1559: Resolve vulnerabilities in systems and system components
  • T1560: Mitigate risks in systems and system components
  • T1563: Implement system security measures
  • T1568: Implement cross-domain solutions
  • T1574: Develop risk acceptance documentation for senior leaders and authorized representatives
  • T1583: Determine effectiveness of system implementation and testing processes
  • T1584: Establish minimum security requirements for applications
  • T1585: Determine if applications meet minimum security requirements
  • T1603: Recommend threat and vulnerability risk mitigation strategies
  • T1615: Advise stakeholders on vulnerability compliance
  • T1616: Resolve computer security incidents
  • T1618: Advise stakeholders on disaster recovery, contingency, and continuity of operations plans
  • K0018: Knowledge of encryption algorithms
  • K0674: Knowledge of computer networking protocols
  • K0675: Knowledge of risk management processes
  • K0676: Knowledge of cybersecurity laws and regulations
  • K0677: Knowledge of cybersecurity policies and procedures
  • K0678: Knowledge of privacy laws and regulations
  • K0679: Knowledge of privacy policies and procedures
  • K0680: Knowledge of cybersecurity principles and practices
  • K0681: Knowledge of privacy principles and practices
  • K0682: Knowledge of cybersecurity threats
  • K0683: Knowledge of cybersecurity vulnerabilities
  • K0684: Knowledge of cybersecurity threat characteristics
  • K0685: Knowledge of access control principles and practices
  • K0686: Knowledge of authentication and authorization tools and techniques
  • K0694: Knowledge of computer algorithm capabilities and applications
  • K0698: Knowledge of cryptographic key management principles and practices
  • K0707: Knowledge of database systems and software
  • K0710: Knowledge of enterprise cybersecurity architecture principles and practices
  • K0719: Knowledge of human-computer interaction (HCI) principles and practices
  • K0721: Knowledge of risk management principles and practices
  • K0723: Knowledge of vulnerability data sources
  • K0728: Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices
  • K0729: Knowledge of non-repudiation principles and practices
  • K0730: Knowledge of cyber safety principles and practices
  • K0731: Knowledge of systems security engineering (SSE) principles and practices
  • K0734: Knowledge of Risk Management Framework (RMF) requirements
  • K0735: Knowledge of risk management models and frameworks
  • K0736: Knowledge of information technology (IT) security principles and practices
  • K0739: Knowledge of mathematics principles and practices
  • K0742: Knowledge of identity and access management (IAM) principles and practices
  • K0744: Knowledge of operating system (OS) systems and software
  • K0745: Knowledge of parallel and distributed computing principles and practices
  • K0749: Knowledge of process engineering principles and practices
  • K0751: Knowledge of system threats
  • K0752: Knowledge of system vulnerabilities
  • K0756: Knowledge of security management principles and practices
  • K0757: Knowledge of system design tools and techniques
  • K0758: Knowledge of server administration principles and practices
  • K0759: Knowledge of client and server architecture
  • K0765: Knowledge of software engineering principles and practices
  • K0772: Knowledge of systems testing and evaluation tools and techniques
  • K0773: Knowledge of telecommunications principles and practices
  • K0778: Knowledge of enterprise information technology (IT) architecture principles and practices
  • K0779: Knowledge of systems engineering processes
  • K0791: Knowledge of defense-in-depth principles and practices
  • K0803: Knowledge of supply chain risk management principles and practices
  • K0820: Knowledge of supply chain risks
  • K0828: Knowledge of supply chain risk management standards and best practices
  • K0834: Knowledge of technology procurement principles and practices
  • K0840: Knowledge of hardware reverse engineering tools and techniques
  • K0842: Knowledge of software reverse engineering tools and techniques
  • K0848: Knowledge of network systems management principles and practices
  • K0849: Knowledge of network systems management tools and techniques
  • K0851: Knowledge of reverse engineering principles and practices
  • K0859: Knowledge of encryption tools and techniques
  • K0865: Knowledge of data classification standards and best practices
  • K0866: Knowledge of data classification tools and techniques
  • K0870: Knowledge of enterprise architecture (EA) reference models and frameworks
  • K0871: Knowledge of enterprise architecture (EA) principles and practices
  • K0872: Knowledge of service management principles and practices
  • K0873: Knowledge of service management standards and best practices
  • K0877: Knowledge of application firewall principles and practices
  • K0878: Knowledge of network firewall principles and practices
  • K0879: Knowledge of industry cybersecurity models and frameworks
  • K0880: Knowledge of access control models and frameworks
  • K0894: Knowledge of computer architecture principles and practices
  • K0915: Knowledge of network architecture principles and practices
  • K0917: Knowledge of Personally Identifiable Information (PII) data security standards and best practices
  • K0918: Knowledge of Payment Card Industry (PCI) data security standards and best practices
  • K0919: Knowledge of Personal Health Information (PHI) data security standards and best practices
  • K0920: Knowledge of risk management policies and procedures
  • K0924: Knowledge of network analysis tools and techniques
  • K0927: Knowledge of configuration management tools and techniques
  • K0928: Knowledge of systems engineering principles and practices
  • K0930: Knowledge of credential management systems and software
  • K0931: Knowledge of data-at-rest encryption (DARE) standards and best practices
  • K0932: Knowledge of cryptographic key storage systems and software
  • K0934: Knowledge of data classification policies and procedures
  • K0937: Knowledge of countermeasure design principles and practices
  • K0942: Knowledge of cryptology principles and practices
  • K0947: Knowledge of computer engineering principles and practices
  • K0948: Knowledge of embedded systems and software
  • K0983: Knowledge of computer networking principles and practices
  • K1014: Knowledge of network security principles and practices
  • K1050: Knowledge of critical information requirements
  • K1120: Knowledge of Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation (CIAAN) principles and practices
  • K1216: Knowledge of service-oriented security architecture practices and principles
  • K1222: Knowledge of system availability requirements
  • S0141: Skill in assessing security systems designs
  • S0479: Skill in evaluating supplier trustworthiness
  • S0480: Skill in evaluating product trustworthiness
  • S0483: Skill in identifying software communications vulnerabilities
  • S0484: Skill in developing user credential management systems
  • S0485: Skill in implementing user credential management systems
  • S0486: Skill in implementing enterprise key escrow systems
  • S0543: Skill in scanning for vulnerabilities
  • S0544: Skill in recognizing vulnerabilities
  • S0570: Skill in designing the integration of hardware solutions
  • S0571: Skill in designing the integration of software solutions
  • S0574: Skill in developing security system controls
  • S0578: Skill in evaluating security designs
  • S0597: Skill in writing code in a currently supported programming language
  • S0667: Skill in assessing security controls
  • S0674: Skill in installing system and component upgrades
  • S0675: Skill in optimizing system performance
  • S0688: Skill in performing network data analysis