Designs, develops, tests, and evaluates information systems throughout the systems development life cycle.
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats and vulnerabilities.
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of computer algorithms.
Knowledge of encryption algorithms
Knowledge of database systems.
Knowledge of organization's enterprise information security architecture.
Knowledge of organization's evaluation and validation requirements.
Knowledge of electrical engineering as applied to computer architecture (e.g., circuit boards, processors, chips, and computer hardware).
Knowledge of resiliency and redundancy.
Knowledge of installation, integration, and optimization of system components.
Knowledge of human-computer interaction principles.
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Knowledge of information security systems engineering principles (NIST SP 800-160).
Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
Knowledge of local area and wide area networking principles and concepts including bandwidth management.
Knowledge of mathematics (e.g. logarithms, trigonometry, linear algebra, calculus, statistics, and operational analysis).
Knowledge of microprocessors.
Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
Knowledge of operating systems.
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
Knowledge of parallel and distributed computing concepts.
Knowledge of policy-based and risk adaptive access controls.
Knowledge of Privacy Impact Assessments.
Knowledge of process engineering concepts.
Knowledge of secure configuration management techniques. (e.g., Security Technical Implementation Guides (STIGs), cybersecurity best practices on cisecurity.org).
Knowledge of software development models (e.g., Waterfall Model, Spiral Model).
Knowledge of software engineering.
Knowledge of structured analysis principles and methods.
Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools.
Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.
Knowledge of system life cycle management principles, including software security and usability.
Knowledge of systems testing and evaluation methods.
Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing).
Knowledge of the systems engineering process.
Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161)
Knowledge of interpreted and compiled computer languages.
Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.
Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations.
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
Knowledge of cybersecurity-enabled software products.
Knowledge of various types of computer architectures.
Knowledge of Personally Identifiable Information (PII) data security standards.
Knowledge of Payment Card Industry (PCI) data security standards.
Knowledge of Personal Health Information (PHI) data security standards.
Knowledge of security management.
Knowledge of an organization's information classification program and procedures for information compromise.
Knowledge of countermeasure design for identified security risks.
Knowledge of cryptology.
Knowledge of embedded systems.
Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs.
Knowledge of access authentication methods.
Skill in creating policies that reflect system security objectives.
Skill in designing countermeasures to identified security risks.
Skill in designing security controls based on cybersecurity principles and tenets.
Skill in designing the integration of hardware and software solutions.
Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).
Skill in developing and applying security system access controls.
Skill in discerning the protection needs (i.e., security controls) of information systems and networks.
Skill in evaluating the adequacy of security designs.
Skill in writing code in a currently supported programming language (e.g., Java, C++).
Skill in conducting audits or reviews of technical systems.
Skill in applying security controls.
Skill in network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
Skill in integrating and applying policies that meet system security objectives.
Skill in creating policies that enable systems to meet performance objectives (e.g. traffic routing, SLA's, CPU specifications).
Skill in the use of design modeling (e.g., unified modeling language).
Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
Analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support.
Build, test, and modify product prototypes using working models or theoretical models.
Design and develop cybersecurity or cybersecurity-enabled products.
Design or integrate appropriate data backup capabilities into overall system designs, and ensure that appropriate technical and procedural processes exist for secure system backups and protected storage of backup data.
Develop and direct system testing and validation procedures and documentation.
Develop architectures or system components consistent with technical specifications.
Develop Disaster Recovery and Continuity of Operations plans for systems under development and ensure testing prior to systems entering a production environment.
Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find work-arounds for communication protocols that are not interoperable).
Identify and prioritize essential system functions or sub-systems required to support essential capabilities or business functions for restoration or recovery after a system failure or during a system recovery event based on overall system requirements for continuity and availability.
Identify, assess, and recommend cybersecurity or cybersecurity-enabled products for use within a system and ensure that recommended products are in compliance with organization's evaluation and validation requirements.
Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.
Provide guidelines for implementing developed systems to customers or installation teams.
Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).
Store, retrieve, and manipulate data for analysis of system capabilities and requirements.
Utilize models and simulations to analyze or predict system performance under different operating conditions.
Implement and integrate system development life cycle (SDLC) methodologies (e.g., IBM Rational Unified Process) into development environment.
Employ configuration management processes.
Conduct a market analysis to identify, assess, and recommend commercial, Government off-the-shelf, and open source products for use within a system and ensure recommended products are in compliance with organization's evaluation and validation requirements.
Design and develop system administration and management functionality for privileged access users.
Design, implement, test, and evaluate secure interfaces between information systems, physical systems, and/or embedded technologies.
Incorporates risk-driven systems maintenance updates process to address system deficiencies (periodically and out of cycle).
Ensure that design and development activities are properly documented (providing a functional description of implementation) and updated as necessary.
Design hardware, operating systems, and software applications to adequately address requirements.
Design to security requirements to ensure requirements are met for all systems and/or applications.
Develop detailed design documentation for component and interface specifications to support system design and development.
Develop mitigation strategies to address cost, schedule, performance, and security risks.
Identify components or elements, allocate comprehensive functional components to include security functions, and describe the relationships between the elements.
Implement designs for new or existing system(s).
Perform security reviews and identify security gaps in architecture.
Provide input to implementation plans, standard operating procedures, maintenance documentation, and maintenance training materials
Provide support to test and evaluation activities.
Trace system requirements to design components and perform gap analysis.
Verify stability, interoperability, portability, and/or scalability of system architecture.
Analyze user needs and requirements to plan and conduct system development.
Develop designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations.
Collaborate on cybersecurity designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations, high integrity and availability requirements, multilevel security/processing of multiple classification levels, and processing Sensitive Compartmented Information).
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.