- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
- Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
- Knowledge of cybersecurity and privacy principles.
- Knowledge of cyber threats and vulnerabilities.
- Knowledge of specific operational impacts of cybersecurity lapses.
- Knowledge of communication methods, principles, and concepts that support the network infrastructure.
- Knowledge of capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware.
- Knowledge of organization's Local and Wide Area Network connections.
- Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
- Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
- Knowledge of local area and wide area networking principles and concepts including bandwidth management.
- Knowledge of measures or indicators of system performance and availability.
- Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
- Knowledge of remote access technology concepts.
- Knowledge of server administration and systems engineering theories, concepts, and methods.
- Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing).
- Knowledge of Virtual Private Network (VPN) security.
- Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
- Knowledge of network tools (e.g., ping, traceroute, nslookup)
- Knowledge of different types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).
- Knowledge of web filtering technologies.
- Knowledge of the capabilities of different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
- Knowledge of the range of existing networks (e.g., PBX, LANs, WANs, WIFI, SCADA).
- Knowledge of Wi-Fi.
- Knowledge of Voice over IP (VoIP).
- Knowledge of the common attack vectors on the network layer.
- Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
- Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
- Knowledge of symmetric key rotation techniques and concepts.
- Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
- Knowledge of Personally Identifiable Information (PII) data security standards.
- Knowledge of Payment Card Industry (PCI) data security standards.
- Knowledge of Personal Health Information (PHI) data security standards.
- Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.
- Knowledge of an organization's information classification program and procedures for information compromise.
- Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
- Knowledge of controls related to the use, processing, storage, and transmission of data.
Network Operations Specialist
Plans, implements, and operates network services/systems, to include hardware and virtual environments.
- Skill in analyzing network traffic capacity and performance characteristics.
- Skill in establishing a routing schema.
- Skill in implementing, maintaining, and improving established network security practices.
- Skill in installing, configuring, and troubleshooting LAN and WAN components such as routers, hubs, and switches.
- Skill in using network management tools to analyze network traffic patterns (e.g., simple network management protocol).
- Skill in securing network communications.
- Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters).
- Skill in configuring and utilizing network protection components (e.g., Firewalls, VPNs, network intrusion detection systems).
- Skill in implementing and testing network infrastructure contingency and recovery plans.
- Skill in applying various subnet techniques (e.g., CIDR)
- Skill in configuring and utilizing computer protection components (e.g., hardware firewalls, servers, routers, as appropriate).
- Ability to operate network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.
- Ability to operate common network tools (e.g., ping, traceroute, nslookup).
- Ability to execute OS command line (e.g., ipconfig, netstat, dir, nbtstat).
- Ability to operate the organization's LAN/WAN pathways.
- Ability to monitor measures or indicators of system performance and availability.
- Ability to operate different electronic communication systems and methods (e.g., e-mail, VOIP, IM, web forums, Direct Video Broadcasts).
- Ability to monitor traffic flows across the network.
- Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).
- Configure and optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling).
- Develop and implement network backup and recovery procedures.
- Diagnose network connectivity problem.
- Implement new system design procedures, test procedures, and quality standards.
- Install and maintain network infrastructure device operating system software (e.g., IOS, firmware).
- Install or replace network hubs, routers, and switches.
- Integrate new systems into existing network architecture.
- Monitor network capacity and performance.
- Patch network vulnerabilities to ensure that information is safeguarded against outside parties.
- Provide feedback on network requirements, including network architecture and infrastructure.
- Test and maintain network infrastructure including software and hardware devices.