Cyber Defense Infrastructure Support Specialist

Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.

Below are the Knowledge, Skills, Abilities and Tasks identified as being required to perform this work role.

Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
K0003Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
K0004Knowledge of cybersecurity and privacy principles.
K0005Knowledge of cyber threats and vulnerabilities.
K0006Knowledge of specific operational impacts of cybersecurity lapses.
K0007Knowledge of authentication, authorization, and access control methods.
K0021Knowledge of data backup and recovery.
K0033Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
K0042Knowledge of incident response and handling methodologies.
K0044Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
K0053Knowledge of measures or indicators of system performance and availability.
K0054Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities.
K0058Knowledge of network traffic analysis methods.
K0059Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
K0061Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
K0062Knowledge of packet-level analysis.
K0077Knowledge of server and client operating systems.
K0079Knowledge of software debugging principles.
K0104Knowledge of Virtual Private Network (VPN) security.
K0106Knowledge of what constitutes a network attack and a network attack??s relationship to both threats and vulnerabilities.
K0121Knowledge of information security program management and project management principles and techniques.
K0123Knowledge of legal governance related to admissibility (e.g. Rules of Evidence).
K0124Knowledge of multiple cognitive domains and tools and methods applicable for learning in each domain.
K0135Knowledge of web filtering technologies.
K0157Knowledge of cyber defense and information security policies, procedures, and regulations.
K0179Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
K0205Knowledge of basic system, network, and OS hardening techniques.
K0258Knowledge of test procedures, principles, and methodologies (e.g., Capabilities and Maturity Model Integration (CMMI)).
K0274Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.
K0324Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
K0332Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
K0334Knowledge of network traffic analysis (tools, methodologies, processes).
K0367Knowledge of penetration testing.
T0042Coordinate with Cyber Defense Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, antivirus, and content blacklists) for specialized cyber defense applications.
T0180Perform system administration on specialized cyber defense applications and systems (e.g., antivirus, audit and remediation) or Virtual Private Network (VPN) devices, to include installation, configuration, maintenance, backup, and restoration.
T0261Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.
T0335Build, install, configure, and test dedicated cyber defense hardware.
T0348Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure.
T0420Administer test bed(s), and test and evaluate applications, hardware infrastructure, rules/signatures, access controls, and configurations of platforms managed by service provider(s).
T0438Create, edit, and manage network access control lists on specialized cyber defense systems (e.g., firewalls and intrusion prevention systems).
T0483Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization).
T0486Implement Risk Management Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for dedicated cyber defense systems within the enterprise, and document and maintain records for them.