Technology Research and Development

Responsible for conducting software and systems engineering and software systems research to develop new capabilities with fully integrated cybersecurity. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.

  • T1019: Determine special needs of cyber-physical systems
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1023: Identify critical technology procurement requirements
  • T1041: Determine impact of software configurations
  • T1079: Develop cybersecurity risk profiles
  • T1084: Identify anomalous network activity
  • T1118: Identify vulnerabilities
  • T1119: Recommend vulnerability remediation strategies
  • T1142: Validate data mining and data warehousing programs, processes, and requirements
  • T1337: Identify system and network capabilities
  • T1338: Develop cybersecurity capability strategies for custom hardware and software development
  • T1378: Identify cybersecurity solutions tools and technologies
  • T1379: Design cybersecurity tools and technologies
  • T1380: Develop cybersecurity tools and technologies
  • T1424: Evaluate network infrastructure vulnerabilities
  • T1425: Recommend network infrastructure enhancements
  • T1489: Correlate incident data
  • T1491: Design data management systems
  • T1493: Troubleshoot prototype design and process issues
  • T1494: Recommend vulnerability exploitation functional and security-related features
  • T1495: Recommend vulnerability mitigation functional- and security-related features
  • T1496: Develop reverse engineering tools
  • T1610: Determine if hardware and software complies with defined specifications and requirements
  • K0176: Knowledge of Extensible Markup Language (XML) schemas
  • K0674: Knowledge of computer networking protocols
  • K0675: Knowledge of risk management processes
  • K0676: Knowledge of cybersecurity laws and regulations
  • K0677: Knowledge of cybersecurity policies and procedures
  • K0678: Knowledge of privacy laws and regulations
  • K0679: Knowledge of privacy policies and procedures
  • K0680: Knowledge of cybersecurity principles and practices
  • K0681: Knowledge of privacy principles and practices
  • K0682: Knowledge of cybersecurity threats
  • K0683: Knowledge of cybersecurity vulnerabilities
  • K0684: Knowledge of cybersecurity threat characteristics
  • K0688: Knowledge of common application vulnerabilities
  • K0696: Knowledge of digital forensic data principles and practices
  • K0698: Knowledge of cryptographic key management principles and practices
  • K0710: Knowledge of enterprise cybersecurity architecture principles and practices
  • K0718: Knowledge of network communications principles and practices
  • K0721: Knowledge of risk management principles and practices
  • K0731: Knowledge of systems security engineering (SSE) principles and practices
  • K0736: Knowledge of information technology (IT) security principles and practices
  • K0743: Knowledge of new and emerging technologies
  • K0749: Knowledge of process engineering principles and practices
  • K0751: Knowledge of system threats
  • K0752: Knowledge of system vulnerabilities
  • K0758: Knowledge of server administration principles and practices
  • K0765: Knowledge of software engineering principles and practices
  • K0771: Knowledge of system life cycle management principles and practices
  • K0773: Knowledge of telecommunications principles and practices
  • K0778: Knowledge of enterprise information technology (IT) architecture principles and practices
  • K0779: Knowledge of systems engineering processes
  • K0780: Knowledge of hardware maintenance policies and procedures
  • K0791: Knowledge of defense-in-depth principles and practices
  • K0792: Knowledge of network configurations
  • K0797: Knowledge of ethical hacking tools and techniques
  • K0803: Knowledge of supply chain risk management principles and practices
  • K0809: Knowledge of digital forensics data characteristics
  • K0812: Knowledge of digital communication systems and software
  • K0820: Knowledge of supply chain risks
  • K0828: Knowledge of supply chain risk management standards and best practices
  • K0834: Knowledge of technology procurement principles and practices
  • K0838: Knowledge of supply chain risk management policies and procedures
  • K0839: Knowledge of critical infrastructure systems and software
  • K0840: Knowledge of hardware reverse engineering tools and techniques
  • K0841: Knowledge of middleware software capabilities and applications
  • K0842: Knowledge of software reverse engineering tools and techniques
  • K0851: Knowledge of reverse engineering principles and practices
  • K0870: Knowledge of enterprise architecture (EA) reference models and frameworks
  • K0871: Knowledge of enterprise architecture (EA) principles and practices
  • K0877: Knowledge of application firewall principles and practices
  • K0878: Knowledge of network firewall principles and practices
  • K0882: Knowledge of ethical hacking principles and practices
  • K0884: Knowledge of covert communication tools and techniques
  • K0894: Knowledge of computer architecture principles and practices
  • K0915: Knowledge of network architecture principles and practices
  • K0923: Knowledge of operating system structures and internals
  • K0924: Knowledge of network analysis tools and techniques
  • K0925: Knowledge of wireless communication tools and techniques
  • K0926: Knowledge of signal jamming tools and techniques
  • K0928: Knowledge of systems engineering principles and practices
  • K0936: Knowledge of network hardware threats and vulnerabilities
  • K0942: Knowledge of cryptology principles and practices
  • K0947: Knowledge of computer engineering principles and practices
  • K0955: Knowledge of penetration testing principles and practices
  • K0956: Knowledge of penetration testing tools and techniques
  • K0983: Knowledge of computer networking principles and practices
  • K1014: Knowledge of network security principles and practices
  • K1019: Knowledge of operations security (OPSEC) principles and practices
  • K1050: Knowledge of critical information requirements
  • K1073: Knowledge of hardware asset management principles and practices
  • K1088: Knowledge of knowledge management tools and techniques
  • K1172: Knowledge of mission requirements
  • K1207: Knowledge of reverse engineering tools and techniques
  • K1217: Knowledge of software and systems engineering life cycle standards
  • S0172: Skill in applying secure coding techniques
  • S0385: Skill in communicating complex concepts
  • S0391: Skill in creating technical documentation
  • S0465: Skill in identifying critical infrastructure systems
  • S0466: Skill in identifying systems designed without security considerations
  • S0475: Skill in recognizing digital forensics data
  • S0481: Skill in identifying forensic digital footprints
  • S0482: Skill in performing forensic data analysis
  • S0483: Skill in identifying software communications vulnerabilities
  • S0532: Skill in analyzing software configurations
  • S0543: Skill in scanning for vulnerabilities
  • S0544: Skill in recognizing vulnerabilities
  • S0551: Skill in applying information technologies into proposed solutions
  • S0562: Skill in creating mathematical models
  • S0563: Skill in creating statistical models
  • S0660: Skill in performing systems engineering
  • S0668: Skill in designing technology processes and solutions
  • S0669: Skill in integrating technology processes and solutions
  • S0675: Skill in optimizing system performance
  • S0744: Skill in performing technical writing
  • S0807: Skill in solving problems
  • S0827: Skill in communicating with internal and external stakeholders