A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | NICE Framework Specialty Areas and Work Role Table of Contents | Click to view the Master KSA List | ||||||||||||||||||||||||
2 | 5/15/2020 | Click to view the Master Task List | ||||||||||||||||||||||||
3 | NICE Specialty Area | NICE Specialty Area Definition | Work Role | Work Role Definition | Work Role ID | KSAs | Tasks | OPM Code (Fed Use) | ||||||||||||||||||
4 | SECURELY PROVISION (SP) - Conceptualizes, designs, procures, and/or builds secure information technology (IT) systems, with responsibility for aspects of system and/or network development. | |||||||||||||||||||||||||
5 | Risk Management (RSK) | Oversees, evaluates, and supports the documentation, validation, assessment, and authorization processes necessary to assure that existing and new information technology (IT) systems meet the organization's cybersecurity and risk requirements. Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives. | Authorizing Official/Designating Representative | Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009). | SP-RSK-001 | Click to view KSAs | Click to view Tasks | 611 | ||||||||||||||||||
6 | Security Control Assessor | Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37). | SP-RSK-002 | Click to view KSAs | Click to view Tasks | 612 | ||||||||||||||||||||
7 | Software Development (DEV) | Develops and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs following software assurance best practices. | Software Developer | Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs. | SP-DEV-001 | Click to view KSAs | Click to view Tasks | 621 | ||||||||||||||||||
8 | Secure Software Assessor | Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results. | SP-DEV-002 | Click to view KSAs | Click to view Tasks | 622 | ||||||||||||||||||||
9 | Systems Architecture (ARC) | Develops system concepts and works on the capabilities phases of the systems development life cycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes. | Enterprise Architect | Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures. | SP-ARC-001 | Click to view KSAs | Click to view Tasks | 651 | ||||||||||||||||||
10 | Security Architect | Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes. | SP-ARC-002 | Click to view KSAs | Click to view Tasks | 652 | ||||||||||||||||||||
11 | Technology R&D (TRD) | Conducts technology assessment and integration processes; provides and supports a prototype capability and/or evaluates its utility. | Research & Development Specialist | Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems. | SP-TRD-001 | Click to view KSAs | Click to view Tasks | 661 | ||||||||||||||||||
12 | Systems Requirements Planning (SRP) | Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions. Provides guidance to customers about applicability of information systems to meet business needs. | Systems Requirements Planner | Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions. | SP-SRP-001 | Click to view KSAs | Click to view Tasks | 641 | ||||||||||||||||||
13 | Test and Evaluation (TST) | Develops and conducts tests of systems to evaluate compliance with specifications and requirements by applying principles and methods for cost-effective planning, evaluating, verifying, and validating of technical, functional, and performance characteristics (including interoperability) of systems or elements of systems incorporating IT. | System Testing and Evaluation Specialist | Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results. | SP-TST-001 | Click to view KSAs | Click to view Tasks | 671 | ||||||||||||||||||
14 | Systems Development (SYS) | Works on the development phases of the systems development life cycle. | Information Systems Security Developer | Designs, develops, tests, and evaluates information system security throughout the systems development life cycle. | SP-SYS-001 | Click to view KSAs | Click to view Tasks | 631 | ||||||||||||||||||
15 | Systems Developer | Designs, develops, tests, and evaluates information systems throughout the systems development life cycle. | SP-SYS-002 | Click to view KSAs | Click to view Tasks | 632 | ||||||||||||||||||||
16 | OPERATE and MAINTAIN (OM) - Provides the support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security. | |||||||||||||||||||||||||
17 | Data Administration (DTA) | Develops and administers databases and/or data management systems that allow for the storage, query, protection, and utilization of data. | Database Administrator | Administers databases and/or data management systems that allow for the secure storage, query, protection, and utilization of data. | OM-DTA-001 | Click to view KSAs | Click to view Tasks | 421 | ||||||||||||||||||
18 | Data Analyst | Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes. | OM-DTA-002 | Click to view KSAs | Click to view Tasks | 422 | ||||||||||||||||||||
19 | Knowledge Management (KMG) | Manages and administers processes and tools that enable the organization to identify, document, and access intellectual capital and information content. | Knowledge Manager | Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content. | OM-KMG-001 | Click to view KSAs | Click to view Tasks | 431 | ||||||||||||||||||
20 | Customer Service and Technical Support (STS) | Addresses problems; installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered-level customer support). Typically provides initial incident information to the Incident Response (IR) Specialty. | Technical Support Specialist | Provides technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components (i.e., Master Incident Management Plan, when applicable). | OM-STS-001 | Click to view KSAs | Click to view Tasks | 411 | ||||||||||||||||||
21 | Network Services (NET) | Installs, configures, tests, operates, maintains, and manages networks and their firewalls, including hardware (e.g., hubs, bridges, switches, multiplexers, routers, cables, proxy servers, and protective distributor systems) and software that permit the sharing and transmission of all spectrum transmissions of information to support the security of information and information systems. | Network Operations Specialist | Plans, implements, and operates network services/systems, to include hardware and virtual environments. | OM-NET-001 | Click to view KSAs | Click to view Tasks | 441 | ||||||||||||||||||
22 | Systems Administration (ADM) | Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Manages accounts, firewalls, and patches. Responsible for access control, passwords, and account creation and administration. | System Administrator | Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures). | OM-ADM-001 | Click to view KSAs | Click to view Tasks | 451 | ||||||||||||||||||
23 | Systems Analysis (ANA) | Studies an organization's current computer systems and procedures, and designs information systems solutions to help the organization operate more securely, efficiently, and effectively. Brings business and information technology (IT) together by understanding the needs and limitations of both. | Systems Security Analyst | Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security. | OM-ANA-001 | Click to view KSAs | Click to view Tasks | 461 | ||||||||||||||||||
24 | OVERSEE and GOVERN (OV) - Provides leadership, management, direction, or development and advocacy so the organization may effectively conduct cybersecurity work. | |||||||||||||||||||||||||
25 | Legal Advice and Advocacy (LGA) | Provides legally sound advice and recommendations to leadership and staff on a variety of relevant topics within the pertinent subject domain. Advocates legal and policy changes, and makes a case on behalf of client via a wide range of written and oral work products, including legal briefs and proceedings. | Cyber Legal Advisor | Provides legal advice and recommendations on relevant topics related to cyber law. | OV-LGA-001 | Click to view KSAs | Click to view Tasks | 731 | ||||||||||||||||||
26 | Privacy Officer/Privacy Compliance Manager | Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance, governance/policy, and incident response needs of privacy and security executives and their teams. | OV-LGA-002 | Click to view KSAs | Click to view Tasks | 732 | ||||||||||||||||||||
27 | Training, Education, and Awareness (TEA) | Conducts training of personnel within pertinent subject domain. Develops, plans, coordinates, delivers and/or evaluates training courses, methods, and techniques as appropriate. | Cyber Instructional Curriculum Developer | Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs. | OV-TEA-001 | Click to view KSAs | Click to view Tasks | 711 | ||||||||||||||||||
28 | Cyber Instructor | Develops and conducts training or education of personnel within cyber domain. | OV-TEA-002 | Click to view KSAs | Click to view Tasks | 712 | ||||||||||||||||||||
29 | Cybersecurity Management (MGT) | Oversees the cybersecurity program of an information system or network, including managing information security implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, requirements, policy enforcement, emergency planning, security awareness, and other resources. | Information Systems Security Manager | Responsible for the cybersecurity of a program, organization, system, or enclave. | OV-MGT-001 | Click to view KSAs | Click to view Tasks | 722 | ||||||||||||||||||
30 | Communications Security (COMSEC) Manager | Individual who manages the Communications Security (COMSEC) resources of an organization (CNSSI 4009) or key custodian for a Crypto Key Management System (CKMS). | OV-MGT-002 | Click to view KSAs | Click to view Tasks | 723 | ||||||||||||||||||||
31 | Strategic Planning and Policy (SPP) | Develops policies and plans and/or advocates for changes in policy that support organizational cyberspace initiatives or required changes/enhancements. | Cyber Workforce Developer and Manager | Develops cyberspace workforce plans, strategies, and guidance to support cyberspace workforce manpower, personnel, training and education requirements and to address changes to cyberspace policy, doctrine, materiel, force structure, and education and training requirements. | OV-SPP-001 | Click to view KSAs | Click to view Tasks | 751 | ||||||||||||||||||
32 | Cyber Policy and Strategy Planner | Develops and maintains cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance. | OV-SPP-002 | Click to view KSAs | Click to view Tasks | 752 | ||||||||||||||||||||
33 | Executive Cyber Leadership (EXL) | Supervises, manages, and/or leads work and workers performing cyber and cyber-related and/or cyber operations work. | Executive Cyber Leadership | Executes decision-making authorities and establishes vision and direction for an organization's cyber and cyber-related resources and/or operations. | OV-EXL-001 | Click to view KSAs | Click to view Tasks | 901 | ||||||||||||||||||
34 | Program/Project Management (PMA) and Acquisition | Applies knowledge of data, information, processes, organizational interactions, skills, and analytical expertise, as well as systems, networks, and information exchange capabilities to manage acquisition programs. Executes duties governing hardware, software, and information system acquisition programs and other program management policies. Provides direct support for acquisitions that use information technology (IT) (including National Security Systems), applying IT-related laws and policies, and provides IT-related guidance throughout the total acquisition life cycle. | Program Manager | Leads, coordinates, communicates, integrates, and is accountable for the overall success of the program, ensuring alignment with agency or enterprise priorities. | OV-PMA-001 | Click to view KSAs | Click to view Tasks | 801 | ||||||||||||||||||
35 | IT Project Manager | Directly manages information technology projects. | OV-PMA-002 | Click to view KSAs | Click to view Tasks | 802 | ||||||||||||||||||||
36 | Product Support Manager | Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components. | OV-PMA-003 | Click to view KSAs | Click to view Tasks | 803 | ||||||||||||||||||||
37 | IT Investment/Portfolio Manager | Manages a portfolio of IT investments that align with the overall needs of mission and enterprise priorities. | OV-PMA-004 | Click to view KSAs | Click to view Tasks | 804 | ||||||||||||||||||||
38 | IT Program Auditor | Conducts evaluations of an IT program or its individual components to determine compliance with published standards. | OV-PMA-005 | Click to view KSAs | Click to view Tasks | 805 | ||||||||||||||||||||
39 | PROTECT and DEFEND (PR) - Identifies, analyzes, and mitigates threats to internal information technology (IT) systems and/or networks. | |||||||||||||||||||||||||
40 | Cybersecurity Defense Analysis (CDA) | Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. | Cyber Defense Analyst | Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. | PR-CDA-001 | Click to view KSAs | Click to view Tasks | 511 | ||||||||||||||||||
41 | Cybersecurity Defense Infrastructure Support (INF) | Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities. | Cyber Defense Infrastructure Support Specialist | Tests, implements, deploys, maintains, and administers the infrastructure hardware and software. | PR-INF-001 | Click to view KSAs | Click to view Tasks | 521 | ||||||||||||||||||
42 | Incident Response (CIR) | Responds to crises or urgent situations within the pertinent domain to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities. | Cyber Defense Incident Responder | Investigates, analyzes, and responds to cyber incidents within the network environment or enclave. | PR-CIR-001 | Click to view KSAs | Click to view Tasks | 531 | ||||||||||||||||||
43 | Vulnerability Assessment and Management (VAM) | Conducts assessments of threats and vulnerabilities; determines deviations from acceptable configurations, enterprise or local policy; assesses the level of risk; and develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational situations. | Vulnerability Assessment Analyst | Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. | PR-VAM-001 | Click to view KSAs | Click to view Tasks | 541 | ||||||||||||||||||
44 | ANALYZE (AN) - Performs highly-specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence. | |||||||||||||||||||||||||
45 | Threat Analysis (TWA) | Identifies and assesses the capabilities and activities of cybersecurity criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities. | Threat/Warning Analyst | Develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber threat/warning assessments. | AN-TWA-001 | Click to view KSAs | Click to view Tasks | 141 | ||||||||||||||||||
46 | Exploitation Analysis (EXP) | Analyzes collected information to identify vulnerabilities and potential for exploitation. | Exploitation Analyst | Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks. | AN-EXP-001 | Click to view KSAs | Click to view Tasks | 121 | ||||||||||||||||||
47 | All-Source Analysis (ASA) | Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications. | All-Source Analyst | Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations. | AN-ASA-001 | Click to view KSAs | Click to view Tasks | 111 | ||||||||||||||||||
48 | Mission Assessment Specialist | Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness. | AN-ASA-002 | Click to view KSAs | Click to view Tasks | 112 | ||||||||||||||||||||
49 | Targets (TGT) | Applies current knowledge of one or more regions, countries, non-state entities, and/or technologies. | Target Developer | Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation. | AN-TGT-001 | Click to view KSAs | Click to view Tasks | 131 | ||||||||||||||||||
50 | Target Network Analyst | Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks, and the applications on them. | AN-TGT-002 | Click to view KSAs | Click to view Tasks | 132 | ||||||||||||||||||||
51 | Language Analysis (LNG) | Applies language, cultural, and technical expertise to support information collection, analysis, and other cybersecurity activities. | Multi-Disciplined Language Analyst | Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate intelligence information derived from language, voice and/or graphic material. Creates and maintains language-specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects. | AN-LNG-001 | Click to view KSAs | Click to view Tasks | 151 | ||||||||||||||||||
52 | COLLECT and OPERATE (CO) - Provides specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence. | |||||||||||||||||||||||||
53 | Collection Operations (CLO) | Executes collection using appropriate strategies and within the priorities established through the collection management process. | All Source-Collection Manager | Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to meet leadership's intent. Determines capabilities of available collection assets, identifies new collection capabilities; and constructs and disseminates collection plans. Monitors execution of tasked collection to ensure effective execution of the collection plan. | CO-CLO-001 | Click to view KSAs | Click to view Tasks | 311 | ||||||||||||||||||
54 | All Source-Collection Requirements Manager | Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of collection requirements. Evaluates performance of collection assets and collection operations. | CO-CLO-002 | Click to view KSAs | Click to view Tasks | 312 | ||||||||||||||||||||
55 | Cyber Operational Planning (OPL) | Performs in-depth joint targeting and cybersecurity planning process. Gathers information and develops detailed Operational Plans and Orders supporting requirements. Conducts strategic and operational-level planning across the full range of operations for integrated information and cyberspace operations. | Cyber Intel Planner | Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace. | CO-OPL-001 | Click to view KSAs | Click to view Tasks | 331 | ||||||||||||||||||
56 | Cyber Ops Planner | Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions. | CO-OPL-002 | Click to view KSAs | Click to view Tasks | 332 | ||||||||||||||||||||
57 | Partner Integration Planner | Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions. | CO-OPL-003 | Click to view KSAs | Click to view Tasks | 333 | ||||||||||||||||||||
58 | Cyber Operations (OPS) | Performs activities to gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities. | Cyber Operator | Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executes on-net operations. | CO-OPS-001 | Click to view KSAs | Click to view Tasks | 321 | ||||||||||||||||||
59 | INVESTIGATE (IN) - Investigates cybersecurity events or crimes related to information technology (IT) systems, networks, and digital evidence | |||||||||||||||||||||||||
60 | Cyber Investigation (INV) | Applies tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interview and interrogation techniques, surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of prosecution versus intelligence gathering. | Cyber Crime Investigator | Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques. | IN-INV-001 | Click to view KSAs | Click to view Tasks | 221 | ||||||||||||||||||
61 | Digital Forensics (FOR) | Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation and/or criminal, fraud, counterintelligence, or law enforcement investigations. | Law Enforcement /CounterIntelligence Forensics Analyst | Conducts detailed investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents. | IN-FOR-001 | Click to view KSAs | Click to view Tasks | 211 | ||||||||||||||||||
62 | Cyber Defense Forensics Analyst | Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. | IN-FOR-002 | Click to view KSAs | Click to view Tasks | 212 | ||||||||||||||||||||
63 | ||||||||||||||||||||||||||
64 | ||||||||||||||||||||||||||
65 | ||||||||||||||||||||||||||
66 | ||||||||||||||||||||||||||
67 | ||||||||||||||||||||||||||
68 | ||||||||||||||||||||||||||
69 | ||||||||||||||||||||||||||
70 | ||||||||||||||||||||||||||
71 | ||||||||||||||||||||||||||
72 | ||||||||||||||||||||||||||
73 | ||||||||||||||||||||||||||
74 | ||||||||||||||||||||||||||
75 | ||||||||||||||||||||||||||
76 | ||||||||||||||||||||||||||
77 | ||||||||||||||||||||||||||
78 | ||||||||||||||||||||||||||
79 | ||||||||||||||||||||||||||
80 | ||||||||||||||||||||||||||
81 | ||||||||||||||||||||||||||
82 | ||||||||||||||||||||||||||
83 | ||||||||||||||||||||||||||
84 | ||||||||||||||||||||||||||
85 | ||||||||||||||||||||||||||
86 | ||||||||||||||||||||||||||
87 | ||||||||||||||||||||||||||
88 | ||||||||||||||||||||||||||
89 | ||||||||||||||||||||||||||
90 | ||||||||||||||||||||||||||
91 | ||||||||||||||||||||||||||
92 | ||||||||||||||||||||||||||
93 | ||||||||||||||||||||||||||
94 | ||||||||||||||||||||||||||
95 | ||||||||||||||||||||||||||
96 | ||||||||||||||||||||||||||
97 | ||||||||||||||||||||||||||
98 | ||||||||||||||||||||||||||
99 | ||||||||||||||||||||||||||
100 |