How to prepare for jobs in Cyber Security – 02

Cyber Security Job 02
Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on pinterest
Pinterest

In our last Blog, we discussed the K-S-A concept for Cybersecurity. In this blog, we will continue from our last blog and will discuss the domains of cybersecurity and will relate different positions to these domains.

Also, we will discuss the different tasks need to be taken care of in these positions.

Tasks describe a position’s duties and responsibilities, and KSAs describe the position’s needed skills and qualifications

This information when used during the creation or revision of position descriptions in vacancy announcements and job postings, will help candidates to seek out specific positions for which they are interested, capable, or qualified. 

7 Domains to work in Cybersecurity domains are

  1. Securely Provision
  2. Operate and Maintain
  3. Oversee and Govern 
  4. Protect and Defend
  5. Analyze
  6. Collect and Operate
  7. Investigate

A brief about these 7 domains:

1. Securely Provision
Conceptualizes, designs, procures, and/or builds secure information technology (IT) systems, with responsibility for aspects of system and/or network development

2. Operate and Maintain
Provides the support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security

3. Oversee and Govern
Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work.

4. Protect and Defend
Identifies, analyzes, and mitigates threats to internal information technology (IT) systems and/or networks.

5. Analyze
Performs highly-specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.

6. Collect and Operate
Provides specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.

7. Investigate
Investigates cybersecurity events or crimes related to information technology (IT) systems, networks, and digital evidence.

These seven domains cover the overall Cybersecurity. To go in more details, we can further divide the 7 domains into work areas

Cyber Security Domain

Work Areas

Securely Provision

Risk Management 

Software Development

Systems Architecture

Technology R&D

Systems Requirements Planning

Test and Evaluation

Systems Development

 

Operate and Maintain

Data Administration

Knowledge Management

Customer Service and Technical Support

Network Services

Systems Administration

Systems Analysis

 

Oversee and Govern

Legal Advice and Advocacy

Training, Education, and Awareness

Cybersecurity Management

Strategic Planning and Policy

Executive Cyber Leadership

Program/Project Management and Acquisition

 

Protect and Defend

Cyber Defense Analysis

Cyber Defense Infrastructure Support

Incident Response

Vulnerability Assessment and Management

 

Analyze

Threat Analysis

Exploitation Analysis

All-Source Analysis

Targets

Language Analysis 

 

Collect and Operate

Collection Operations

Cyber Operational Planning

Cyber Operations

 

Investigate

Cyber Investigation

Digital Forensics

All the position in Cyber security domain have roles and responsibilities of a defined work area and in some of the organization the positions will have roles and responsibilities covering multiple work areas. 

So, let’s see the Cyber security positions of each work areas 

 

Cyber Security Domain

Work Areas

Positions

Securely Provision

Risk Management 

  • Authorizing Official/Designating Representative
  • Security Control Assessor

Software Development

  • Software Developer
  • Secure Software Assessor

Systems Architecture

  • Enterprise Architect
  • Security Architect

Technology R&D

  • Research & Development Specialist

Systems Requirements Planning

  • Systems Requirements Planner

Test and Evaluation

  • System Testing and Evaluation Specialist

Systems Development

  • Information Systems Security Developer
  • Systems Developer
 

Operate and Maintain

Data Administration

  • Database Administrator
  • Data Analyst

Knowledge Management

  • Knowledge Manager

Customer Service and Technical Support

  • Technical Support Specialist

Network Services

  • Network Operations Specialist

Systems Administration

  • System Administrator

Systems Analysis

  • Systems Security Analyst
 

Oversee and Govern

Legal Advice and Advocacy

  • Cyber Legal Advisor
  • Privacy Officer/Privacy Compliance Manager

Training, Education, and Awareness

  • Cyber Instructional Curriculum Developer
  • Cyber Instructor

Cybersecurity Management

  • Information Systems Security Manager
  • Communications Security  Manager

Strategic Planning and Policy

  • Cyber Workforce Developer and Manager
  • Cyber Policy and Strategy Planner

Executive Cyber Leadership

  • Executive Cyber Leadership

Program/Project Management and Acquisition

  • Program Manager
  • IT Project Manager
  • Product Support Manager
  • IT Investment/Portfolio Manager
  • IT Program Auditor
 

Protect and Defend

Cyber Defense Analysis

  • Cyber Defense Analyst

Cyber Defense Infrastructure Support

  • Cyber Defense Infrastructure Support Specialist

Incident Response

  • Cyber Defense Incident Responder

Vulnerability Assessment and Management

  • Vulnerability Assessment Analyst
 

Analyze

Threat Analysis

  • Threat/Warning Analyst

Exploitation Analysis

  • Exploitation Analyst

All-Source Analysis

  • All-Source Analyst
  • Mission Assessment Specialist

Targets

  • Target Developer
  • Target Network Analyst

Language Analysis 

  • Multi-Disciplined Language Analyst
 

Collect and Operate

Collection Operations

  • All Source-Collection Manager
  • All Source-Collection Requirements Manager

Cyber Operational Planning

  • Cyber Intel Planner
  • Cyber Ops Planner
  • Partner Integration Planner

Cyber Operations

  • Cyber Operator
 

Investigate

Cyber Investigation

  • Cyber Crime Investigator

Digital Forensics

  • Law Enforcement/Counterintelligence Forensics Analyst
  • Cyber Defense Forensics Analyst

Now with the knowledge of all the cybersecurity positions, anyone can decide the career path within these positions but to be more precise we need to have the understanding of each position’s requirements i.e. K-S-As. 

In our coming blogs, we will discuss some positions. Also, we will link positions with the KSAs and the required certifications and experience for these positions in Cybersecurity.

Thank you, Friends!


Subscribe To Our Newsletter

Get updates and learn from the best

More To Explore

25learn-Learn Scientifically
Information Security

About 25learn.com

We are a company which aims to provide education content via Scientifically proven techniques to increase the Learning & Retention Power in the Students with

How to become secuirty architect-25learn.com
Information Security

All about Security Architects-01

Who is a Security Architect? A Security Architect is a person who plans, designs and reviews the security requirements of any organisation. What Security Architects