SkillJob profileDegree of specialisationDegree of knowledgeDemand from labour market
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)application engineerHighLowLow
skill in applying confidentiality, integrity, and availability principlesapplication engineerHighLowLow
skill in conducting capabilities and requirements analysisapplication engineerHighLowLow
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)chief ict security officerHighHighLow
skill to compare indicators/observables with requirementscollection managerHighMediumLow
skill in developing, testing, and implementing network infrastructure contingency and recovery planscriminal investigatorHighLowLow
skill in deep analysis of captured malicious code (e.g., malware forensics)criminal investigatorHighMediumLow
skill in one-way hash functions (e.g., secure hash algorithm [sha], message digest algorithm [md5]) and verifying the integrity of all filescriminal investigatorHighLowLow
skill in interpreting results of debugger to ascertain tactics, techniques, and procedurescriminal investigatorHighMediumLow
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality,integrity, availability, authentication, non-repudiation)cyber defense analystHighMediumMedium
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomescyber defense analystHighHighMedium
skill in recognizing and categorizing types of vulnerabilities and associated attackscyber defense analystHighMediumMedium
skill in reading and interpreting signatures (e.g., snort)cyber defense analystHighMediumMedium
skill in performing packet-level analysiscyber defense analystHighMediumMedium
skill in developing and deploying signaturescyber defense analystHighMediumMedium
skill in evaluating the adequacy of security designscyber defense analystHighMediumMedium
skill in collecting data from a variety of cyber defense resourcescyber defense analystHighHighMedium
skill in securing network communicationscyber defense incident responderHighMediumLow
skill in recognizing and categorizing types of vulnerabilities and associated attackscyber defense incident responderHighMediumLow
skill in using security event correlation toolscyber defense incident responderHighMediumLow
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)cyber defense infrastructure support specialistHighLowMedium
skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolutioncyber defense infrastructure support specialistHighLowMedium
skill in securing network communicationscyber defense infrastructure support specialistHighLowMedium
skill in applying host/network access controls (e.g., access control list)cyber defense infrastructure support specialistHighLowMedium
skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of actioncyber intel plannerHighMediumLow
skill in extracting information from packet capturescyber operatorHighLowLow
skill in data mining techniques (e.g., searching file systems) and analysiscyber operatorHighLowLow
skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote toolscyber operatorHighLowLow
skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of actioncyber ops plannerHighMediumLow
skill in data mining techniques (e.g., searching file systems) and analysisdata analystHighLowHigh
skill in using multiple analytic tools, databases, and techniques (e.g., analyst’s notebook, a-space, anchory, m3, divergent/convergent thinking, link charts, matrices, etc.)data analystHighLowHigh
skill in one-way hash functions (e.g., secure hash algorithm [sha], message digest algorithm [md5]) and verifying the integrity of all filesdata analystMediumLowLow
skill in performing packet-level analysisdigital forensics expertHighMediumLow
skill in developing, testing, and implementing network infrastructure contingency and recovery plansdigital forensics expertHighLowLow
skill in deep analysis of captured malicious code (e.g., malware forensics)digital forensics expertHighMediumLow
skill in one-way hash functions (e.g., secure hash algorithm [sha], message digest algorithm [md5]) and verifying the integrity of all filesdigital forensics expertHighLowLow
skill in interpreting results of debugger to ascertain tactics, techniques, and proceduresdigital forensics expertHighMediumLow
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)enterprise architectHighHighHigh
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomesenterprise architectHighMediumMedium
skill in recognizing and interpreting malicious network activity in trafficexploitation analystHighLowLow
skill in researching vulnerabilities and exploits utilized in trafficexploitation analystHighLowLow
skill in securing network communicationsict network administratorHighMediumLow
skill in implementing, maintaining, and improving established network security practicesict network administratorHighMediumLow
skill in configuring and utilizing network protection components (e.g., firewalls, vpns, network intrusion detection systems)"ict network administratorHighMediumLow
skill in using multiple analytic tools, databases, and techniques (e.g., analyst’s notebook, a-space, anchory, m3, divergent/convergent thinking, link charts, matrices, etc.)ict network administratorLowLowLow
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)ict quality assurance managerHighLowMedium
skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolutionict quality assurance managerHighLowMedium
skill in applying confidentiality, integrity, and availability principlesict quality assurance managerHighLowMedium
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomesict quality assurance managerHighLowHigh
skill in recognizing and categorizing types of vulnerabilities and associated attacksict quality assurance managerMediumLowLow
skill in using security event correlation toolsict quality assurance managerHighLowLow
skill in reviewing logs to identify evidence of past intrusionsict quality assurance managerHighLowLow
skill in using public-key infrastructure (pki) encryption and digital signature capabilities into applications (e.g., s/mime email, ssl traffic)ict quality assurance managerLowLowLow
skill to anticipate new security threatsict resilience managerHighLowLow
skill in creating policies that reflect system security objectivesict resilience managerHighMediumLow
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomesict security managerHighMediumLow
skill in using multiple analytic tools, databases, and techniques (e.g., analyst’s notebook, a-space, anchory, m3, divergent/convergent thinking, link charts, matrices, etc.)ict security managerHighLowLow
skill in using public-key infrastructure (pki) encryption and digital signature capabilities into applications (e.g., s/mime email, ssl traffic)ict security managerHighLowLow
skill to respond and take local actions in response to threat sharing alerts from service providers"ict security managerHighLowLow
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)ict system developerHighMediumLow
skill in reviewing logs to identify evidence of past intrusionsict system developerHighLowLow
skill in applying confidentiality, integrity, and availability principlesict trainerHighLowLow
skill in performing packet-level analysisict trainerHighLowLow
skill in configuring and utilizing network protection components (e.g., firewalls, vpns, network intrusion detection systems)ict trainerHighLowLow
skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote toolsict trainerHighLowLow
skill in developing and executing technical training programs and curriculaict trainerHighLowLow
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)information systems security developerHighHighLow
skill in developing and applying security system access controlsinformation systems security developerHighHighLow
skill in evaluating the adequacy of security designsinformation systems security developerHighHighLow
skill in conducting research using all available sources (including deep web)knowledge engineerHighLowMedium
skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of actionpartner integration plannerHighMediumLow
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)production engineering technicianHighLowLow
skill in conducting test event and secure test plan design (e. g. unit, integration, system, acceptance)production engineering technicianHighLowLow
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)secure software assessorHighMediumLow
skill in developing and applying security system access controlssecure software assessorHighMediumLow
skill in using public-key infrastructure (pki) encryption and digital signature capabilities into applications (e.g., s/mime email, ssl traffic)secure software assessorLowLowLow
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)security architectHighMediumHigh
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomessecurity architectHighMediumHigh
skill in using public-key infrastructure (pki) encryption and digital signature capabilities into applications (e.g.,s/mime email, ssl traffic)security architectLowLowLow
skill in assessing the application of cryptographic standardssecurity architectHighMediumMedium
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomessecurity managerHighMediumMedium
skill in creating policies that reflect system security objectivessecurity managerHighMediumMedium
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)software developerLowLowLow
skill in creating policies that reflect system security objectivessoftware developerMediumLowLow
skill in developing and applying security system access controlssoftware developerHighMediumHigh
skill in evaluating the adequacy of security designssoftware developerHighLowMedium
skill in using public-key infrastructure (pki) encryption and digital signature capabilities into applications (e.g., s/mime email, ssl traffic)software developerHighMediumHigh
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)systems security analystHighLowLow
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomessystems security analystHighLowLow
skill in developing and applying security system access controlssystems security analystHighLowLow
skill in evaluating the adequacy of security designssystems security analystHighLowLow
skill in using multiple analytic tools, databases, and techniques (e.g., analyst’s notebook, a-space, anchory, m3, divergent/convergent thinking, link charts, matrices, etc.)target developerLowLowLow
skill in analyzing essential network data (e.g., router configuration files, routing protocols), network traffic capacity and performance characteristicstarget network analystHighLowLow
skill in conducting social network analysis, buddy list analysis, and/or cookie analysistarget network analystHighLowLow