Vulnerability Analysis

Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.

  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1041: Determine impact of software configurations
  • T1069: Evaluate organizational cybersecurity policy regulatory compliance
  • T1070: Evaluate organizational cybersecurity policy alignment with organizational directives
  • T1079: Develop cybersecurity risk profiles
  • T1084: Identify anomalous network activity
  • T1091: Perform authorized penetration testing on enterprise network assets
  • T1118: Identify vulnerabilities
  • T1119: Recommend vulnerability remediation strategies
  • T1229: Maintain deployable cyber defense audit toolkits
  • T1279: Prepare audit reports
  • T1341: Perform required reviews
  • T1489: Correlate incident data
  • T1619: Perform risk and vulnerability assessments
  • T1620: Recommend cost-effective security controls
  • K0068: Knowledge of programming language structures and logic
  • K0674: Knowledge of computer networking protocols
  • K0675: Knowledge of risk management processes
  • K0676: Knowledge of cybersecurity laws and regulations
  • K0677: Knowledge of cybersecurity policies and procedures
  • K0678: Knowledge of privacy laws and regulations
  • K0679: Knowledge of privacy policies and procedures
  • K0680: Knowledge of cybersecurity principles and practices
  • K0681: Knowledge of privacy principles and practices
  • K0682: Knowledge of cybersecurity threats
  • K0683: Knowledge of cybersecurity vulnerabilities
  • K0684: Knowledge of cybersecurity threat characteristics
  • K0685: Knowledge of access control principles and practices
  • K0686: Knowledge of authentication and authorization tools and techniques
  • K0688: Knowledge of common application vulnerabilities
  • K0698: Knowledge of cryptographic key management principles and practices
  • K0701: Knowledge of data backup and recovery policies and procedures
  • K0710: Knowledge of enterprise cybersecurity architecture principles and practices
  • K0716: Knowledge of host access control (HAC) systems and software
  • K0717: Knowledge of network access control (NAC) systems and software
  • K0728: Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices
  • K0729: Knowledge of non-repudiation principles and practices
  • K0730: Knowledge of cyber safety principles and practices
  • K0742: Knowledge of identity and access management (IAM) principles and practices
  • K0751: Knowledge of system threats
  • K0752: Knowledge of system vulnerabilities
  • K0760: Knowledge of server diagnostic tools and techniques
  • K0761: Knowledge of Fault Detection and Diagnostics (FDD) tools and techniques
  • K0770: Knowledge of system administration principles and practices
  • K0778: Knowledge of enterprise information technology (IT) architecture principles and practices
  • K0779: Knowledge of systems engineering processes
  • K0783: Knowledge of network attack characteristics
  • K0791: Knowledge of defense-in-depth principles and practices
  • K0797: Knowledge of ethical hacking tools and techniques
  • K0813: Knowledge of interpreted and compiled programming language characteristics
  • K0832: Knowledge of cyberattack characteristics
  • K0833: Knowledge of cyberattack actor characteristics
  • K0837: Knowledge of hardening tools and techniques
  • K0844: Knowledge of cyber attack stages
  • K0845: Knowledge of cyber intrusion activity phases
  • K0865: Knowledge of data classification standards and best practices
  • K0866: Knowledge of data classification tools and techniques
  • K0870: Knowledge of enterprise architecture (EA) reference models and frameworks
  • K0871: Knowledge of enterprise architecture (EA) principles and practices
  • K0879: Knowledge of industry cybersecurity models and frameworks
  • K0880: Knowledge of access control models and frameworks
  • K0882: Knowledge of ethical hacking principles and practices
  • K0891: Knowledge of the Open Systems Interconnect (OSI) reference model
  • K0915: Knowledge of network architecture principles and practices
  • K0924: Knowledge of network analysis tools and techniques
  • K0934: Knowledge of data classification policies and procedures
  • K0939: Knowledge of packet-level analysis tools and techniques
  • K0942: Knowledge of cryptology principles and practices
  • K0955: Knowledge of penetration testing principles and practices
  • K0956: Knowledge of penetration testing tools and techniques
  • K0969: Knowledge of cyber-attack tools and techniques
  • K0983: Knowledge of computer networking principles and practices
  • K1014: Knowledge of network security principles and practices
  • K1076: Knowledge of risk scoring principles and practices
  • K1079: Knowledge of web application security risks
  • K1087: Knowledge of social engineering tools and techniques
  • K1129: Knowledge of cyber defense auditing laws and regulations
  • K1130: Knowledge of cyber defense auditing policies and practices
  • K1182: Knowledge of organizational cybersecurity policies and configurations
  • S0483: Skill in identifying software communications vulnerabilities
  • S0492: Skill in performing threat environment analysis
  • S0532: Skill in analyzing software configurations
  • S0543: Skill in scanning for vulnerabilities
  • S0544: Skill in recognizing vulnerabilities
  • S0572: Skill in detecting host- and network-based intrusions
  • S0574: Skill in developing security system controls
  • S0578: Skill in evaluating security designs
  • S0588: Skill in performing threat modeling
  • S0591: Skill in performing social engineering
  • S0597: Skill in writing code in a currently supported programming language
  • S0641: Skill in reviewing logs
  • S0642: Skill in identifying evidence of past intrusions
  • S0656: Skill in assessing application vulnerabilities
  • S0675: Skill in optimizing system performance
  • S0686: Skill in performing risk assessments
  • S0688: Skill in performing network data analysis
  • S0804: Skill in assessing an organization's threat environment