skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) | application engineer | High | Low | Low |
skill in applying confidentiality, integrity, and availability principles | application engineer | High | Low | Low |
skill in conducting capabilities and requirements analysis | application engineer | High | Low | Low |
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) | chief ict security officer | High | High | Low |
skill to compare indicators/observables with requirements | collection manager | High | Medium | Low |
skill in developing, testing, and implementing network infrastructure contingency and recovery plans | criminal investigator | High | Low | Low |
skill in deep analysis of captured malicious code (e.g., malware forensics) | criminal investigator | High | Medium | Low |
skill in one-way hash functions (e.g., secure hash algorithm [sha], message digest algorithm [md5]) and verifying the integrity of all files | criminal investigator | High | Low | Low |
skill in interpreting results of debugger to ascertain tactics, techniques, and procedures | criminal investigator | High | Medium | Low |
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality,integrity, availability, authentication, non-repudiation) | cyber defense analyst | High | Medium | Medium |
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes | cyber defense analyst | High | High | Medium |
skill in recognizing and categorizing types of vulnerabilities and associated attacks | cyber defense analyst | High | Medium | Medium |
skill in reading and interpreting signatures (e.g., snort) | cyber defense analyst | High | Medium | Medium |
skill in performing packet-level analysis | cyber defense analyst | High | Medium | Medium |
skill in developing and deploying signatures | cyber defense analyst | High | Medium | Medium |
skill in evaluating the adequacy of security designs | cyber defense analyst | High | Medium | Medium |
skill in collecting data from a variety of cyber defense resources | cyber defense analyst | High | High | Medium |
skill in securing network communications | cyber defense incident responder | High | Medium | Low |
skill in recognizing and categorizing types of vulnerabilities and associated attacks | cyber defense incident responder | High | Medium | Low |
skill in using security event correlation tools | cyber defense incident responder | High | Medium | Low |
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) | cyber defense infrastructure support specialist | High | Low | Medium |
skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution | cyber defense infrastructure support specialist | High | Low | Medium |
skill in securing network communications | cyber defense infrastructure support specialist | High | Low | Medium |
skill in applying host/network access controls (e.g., access control list) | cyber defense infrastructure support specialist | High | Low | Medium |
skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action | cyber intel planner | High | Medium | Low |
skill in extracting information from packet captures | cyber operator | High | Low | Low |
skill in data mining techniques (e.g., searching file systems) and analysis | cyber operator | High | Low | Low |
skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools | cyber operator | High | Low | Low |
skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action | cyber ops planner | High | Medium | Low |
skill in data mining techniques (e.g., searching file systems) and analysis | data analyst | High | Low | High |
skill in using multiple analytic tools, databases, and techniques (e.g., analyst’s notebook, a-space, anchory, m3, divergent/convergent thinking, link charts, matrices, etc.) | data analyst | High | Low | High |
skill in one-way hash functions (e.g., secure hash algorithm [sha], message digest algorithm [md5]) and verifying the integrity of all files | data analyst | Medium | Low | Low |
skill in performing packet-level analysis | digital forensics expert | High | Medium | Low |
skill in developing, testing, and implementing network infrastructure contingency and recovery plans | digital forensics expert | High | Low | Low |
skill in deep analysis of captured malicious code (e.g., malware forensics) | digital forensics expert | High | Medium | Low |
skill in one-way hash functions (e.g., secure hash algorithm [sha], message digest algorithm [md5]) and verifying the integrity of all files | digital forensics expert | High | Low | Low |
skill in interpreting results of debugger to ascertain tactics, techniques, and procedures | digital forensics expert | High | Medium | Low |
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) | enterprise architect | High | High | High |
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes | enterprise architect | High | Medium | Medium |
skill in recognizing and interpreting malicious network activity in traffic | exploitation analyst | High | Low | Low |
skill in researching vulnerabilities and exploits utilized in traffic | exploitation analyst | High | Low | Low |
skill in securing network communications | ict network administrator | High | Medium | Low |
skill in implementing, maintaining, and improving established network security practices | ict network administrator | High | Medium | Low |
skill in configuring and utilizing network protection components (e.g., firewalls, vpns, network intrusion detection systems)" | ict network administrator | High | Medium | Low |
skill in using multiple analytic tools, databases, and techniques (e.g., analyst’s notebook, a-space, anchory, m3, divergent/convergent thinking, link charts, matrices, etc.) | ict network administrator | Low | Low | Low |
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) | ict quality assurance manager | High | Low | Medium |
skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution | ict quality assurance manager | High | Low | Medium |
skill in applying confidentiality, integrity, and availability principles | ict quality assurance manager | High | Low | Medium |
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes | ict quality assurance manager | High | Low | High |
skill in recognizing and categorizing types of vulnerabilities and associated attacks | ict quality assurance manager | Medium | Low | Low |
skill in using security event correlation tools | ict quality assurance manager | High | Low | Low |
skill in reviewing logs to identify evidence of past intrusions | ict quality assurance manager | High | Low | Low |
skill in using public-key infrastructure (pki) encryption and digital signature capabilities into applications (e.g., s/mime email, ssl traffic) | ict quality assurance manager | Low | Low | Low |
skill to anticipate new security threats | ict resilience manager | High | Low | Low |
skill in creating policies that reflect system security objectives | ict resilience manager | High | Medium | Low |
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes | ict security manager | High | Medium | Low |
skill in using multiple analytic tools, databases, and techniques (e.g., analyst’s notebook, a-space, anchory, m3, divergent/convergent thinking, link charts, matrices, etc.) | ict security manager | High | Low | Low |
skill in using public-key infrastructure (pki) encryption and digital signature capabilities into applications (e.g., s/mime email, ssl traffic) | ict security manager | High | Low | Low |
skill to respond and take local actions in response to threat sharing alerts from service providers" | ict security manager | High | Low | Low |
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) | ict system developer | High | Medium | Low |
skill in reviewing logs to identify evidence of past intrusions | ict system developer | High | Low | Low |
skill in applying confidentiality, integrity, and availability principles | ict trainer | High | Low | Low |
skill in performing packet-level analysis | ict trainer | High | Low | Low |
skill in configuring and utilizing network protection components (e.g., firewalls, vpns, network intrusion detection systems) | ict trainer | High | Low | Low |
skill in reverse engineering (e.g., hex editing, binary packaging utilities, debugging, and strings analysis) to identify function and ownership of remote tools | ict trainer | High | Low | Low |
skill in developing and executing technical training programs and curricula | ict trainer | High | Low | Low |
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) | information systems security developer | High | High | Low |
skill in developing and applying security system access controls | information systems security developer | High | High | Low |
skill in evaluating the adequacy of security designs | information systems security developer | High | High | Low |
skill in conducting research using all available sources (including deep web) | knowledge engineer | High | Low | Medium |
skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action | partner integration planner | High | Medium | Low |
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) | production engineering technician | High | Low | Low |
skill in conducting test event and secure test plan design (e. g. unit, integration, system, acceptance) | production engineering technician | High | Low | Low |
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) | secure software assessor | High | Medium | Low |
skill in developing and applying security system access controls | secure software assessor | High | Medium | Low |
skill in using public-key infrastructure (pki) encryption and digital signature capabilities into applications (e.g., s/mime email, ssl traffic) | secure software assessor | Low | Low | Low |
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) | security architect | High | Medium | High |
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes | security architect | High | Medium | High |
skill in using public-key infrastructure (pki) encryption and digital signature capabilities into applications (e.g.,s/mime email, ssl traffic) | security architect | Low | Low | Low |
skill in assessing the application of cryptographic standards | security architect | High | Medium | Medium |
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes | security manager | High | Medium | Medium |
skill in creating policies that reflect system security objectives | security manager | High | Medium | Medium |
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) | software developer | Low | Low | Low |
skill in creating policies that reflect system security objectives | software developer | Medium | Low | Low |
skill in developing and applying security system access controls | software developer | High | Medium | High |
skill in evaluating the adequacy of security designs | software developer | High | Low | Medium |
skill in using public-key infrastructure (pki) encryption and digital signature capabilities into applications (e.g., s/mime email, ssl traffic) | software developer | High | Medium | High |
skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) | systems security analyst | High | Low | Low |
skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes | systems security analyst | High | Low | Low |
skill in developing and applying security system access controls | systems security analyst | High | Low | Low |
skill in evaluating the adequacy of security designs | systems security analyst | High | Low | Low |
skill in using multiple analytic tools, databases, and techniques (e.g., analyst’s notebook, a-space, anchory, m3, divergent/convergent thinking, link charts, matrices, etc.) | target developer | Low | Low | Low |
skill in analyzing essential network data (e.g., router configuration files, routing protocols), network traffic capacity and performance characteristics | target network analyst | High | Low | Low |
skill in conducting social network analysis, buddy list analysis, and/or cookie analysis | target network analyst | High | Low | Low |