Analyze

Performs highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.

Specialty Areas

All-Source Analysis

Description

Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications.

Related Job Titles
  • All-Source Analyst

Exploitation Analysis

Description

Analyzes collected information to identify vulnerabilities and potential for exploitation.

Related Job Titles
  • Exploitation Analyst

Threat Analysis

Description

Identifies and assesses the capabilities and activities of cybersecurity criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities.

Related Job Titles
  • Threat/Warning Analyst

Collect & Operate

Specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.

Specialty Areas

Cyber Operational Planning

Description

Performs in-depth joint targeting and cyber planning process. Gathers information and develops detailed Operational Plans and Orders supporting requirements. Conducts strategic and operational-level planning across the full range of operations for integrated information and cyberspace operations.

Related Job Titles
  • Partner Integration Planner
  • Cyber Ops Planner

Collection Operations

Description

Executes collection using appropriate strategies and within the priorities established through the collection management process.

Related Job Titles
  • All Source-Collection Manager
  • All Source-Collection Requirements Manager

Cyber Operations

Description

Performs activities to gather evidence on criminal or foreign intelligence entities in order to mitigate possible or real-time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.

Related Job Titles
  • Cyber Systems Operator
  • Cybersecurity Operations Solutions Engineer
  • Cyber Operations Officer

Investigate

Investigates cyber events or crimes related to information technology (IT) systems, networks, and digital evidence.

Specialty Areas

Cyber Investigation

Description

Applies tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interview and interrogation techniques, surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of prosecution versus intelligence gathering.

Related Job Titles
  • Cyber Crime Investigator

Digital Forensics

Description

Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations.

Related Job Titles
  • Cyber Defense Forensics Analyst
  • Law Enforcement / Counterintelligence Forensics Analyst

Operate & Maintain

Provides the support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security.

Specialty Areas

Customer Service and Technical Support

Description

Addresses problems; installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered-level customer support). Typically provides initial incident information to the Incident Response (IR) Specialty.

Related Job Titles
  • Technical Support Specialist

Data Administration

Description

Develops and administers databases and/or data management systems that allow for the storage, query, protection, and utilization of data.

Related Job Titles
  • Database Administrator
  • Data Analyst

Knowledge Management

Description

Manages and administers processes and tools that enable the organization to identify, document, and access intellectual capital and information content.

Related Job Titles
  • Knowledge Manager

Network Services

Description

Installs, configures, tests, operates, maintains, and manages networks and their firewalls, including hardware (e.g., hubs, bridges, switches, multiplexers, routers, cables, proxy servers, and protective distributor systems) and software that permit the sharing and transmission of all spectrum transmissions of information to support the security of information and information systems.

Related Job Titles
  • Network Operations Specialist

Systems Administration

Description

Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Manages accounts, firewalls, and patches. Responsible for access control, passwords, and account creation and administration.

Related Job Titles
  • Systems Administrator

Systems Analysis

Description

Studies an organization's current computer systems and procedures, and designs information systems solutions to help the organization operate more securely, efficiently, and effectively. Brings business and information technology (IT) together by understanding the needs and limitations of both.

Related Job Titles
  • Systems Security Analyst

Oversee & Govern

Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work.

Specialty Areas

Cybersecurity Management

Description

Oversees the cybersecurity program of an information system or network, including managing information security implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, requirements, policy enforcement, emergency planning, security awareness, and other resources.

Related Job Titles
  • COMSEC Manager
  • Information Systems Security Manager

Program/Project Management and Acquisition

Description

Applies knowledge of data, information, processes, organizational interactions, skills, and analytical expertise, as well as systems, networks, and information exchange capabilities to manage acquisition programs. Executes duties governing hardware, software, and information system acquisition programs and other program management policies. Provides direct support for acquisitions that use information technology (IT) (including National Security Systems), applying IT-related laws and policies, and provides IT-related guidance throughout the total acquisition life cycle.

Related Job Titles
  • IT Investment / Portfolio Manager
  • IT Program Auditor
  • IT Project Manager
  • Program Manager

Strategic Planning and Policy

Description

Develops policies and plans and/or advocates for changes in policy that support organizational cyberspace initiatives or required changes/enhancements.

Related Job Titles
  • Cyber Policy and Strategy Planner

Protect & Defend

Identifies, analyzes, and mitigates threats to internal information technology (IT) systems or networks.

Specialty Areas

Cyber Defense Analysis

Description

Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.

Related Job Titles
  • Cyber Defense Analyst

Cyber Defense Infrastructure Support

Description

Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities.

Related Job Titles
  • Cyber Defense Infrastructure Support Specialist

Incident Response

Description

Responds to crises or urgent situations within the pertinent domain to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities.

Related Job Titles
  • Cyber Defense Incident Responder

Vulnerability Assessment and Management

Description

Conducts assessments of threats and vulnerabilities; determines deviations from acceptable configurations, enterprise or local policy; assesses the level of risk; and develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational situations.

Related Job Titles
  • Vulnerability Assessment Analyst

Securely Provision

Conceptualizes, designs, and builds secure information technology (IT) systems, with responsibility for some aspect of the systems' development.

Specialty Areas

Risk Management

Description

Oversees, evaluates, and supports the documentation, validation, assessment, and authorization processes necessary to assure that existing and new information technology (IT) systems meet the organization's cybersecurity and risk requirements. Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.

Related Job Titles
  • Security Control Assessor

Software Development

Description

Develops and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs following software assurance best practices.

Related Job Titles
  • Secure Software Assessor

Systems Architecture

Description

Develops system concepts and works on the capabilities phases of the systems development life cycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.

Related Job Titles
  • Security Architect

Systems Development

Description

Works on the development phases of the systems development life cycle.

Related Job Titles
  • Information Systems Security Developer

Systems Requirements Planning

Description

Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions. Provides guidance to customers about applicability of information systems to meet business needs.

Related Job Titles
  • Systems Requirements Planner

Technology R&D

Description

Conducts technology assessment and integration processes; provides and supports a prototype capability and/or evaluates its utility.

Related Job Titles
  • Research & Development Specialist

Test and Evaluation

Description

Develops and conducts tests of systems to evaluate compliance with specifications and requirements by applying principles and methods for cost-effective planning, evaluating, verifying, and validating of technical, functional, and performance characteristics (including interoperability) of systems or elements of systems incorporating IT.

Related Job Titles
  • System Testing and Evaluation Specialist