Middle School Curriculum

Learning pathway for middle school students interested in cybersecurity education

Course List

Cybersec 210
I.T. Fundamentals
Cybersec 210: I.T. Fundamentals

This course prepares students for a cybersecurity career by helping them develop Information Technology (IT) knowledge and skills. This course includes a series of subjects that provide hands-on workforce development skills in computer hardware, networking, operating systems and information security concepts. This course familiarizes students with the Windows, Apple and Linux Operating Systems and web browsers. Students learn about software configurations and how to configure operating system and network components.

This course covers eight fundamental topics that will help students prepare for the CompTIA IT Fundamentals certification exam.

Cybersec 252
Python Programming
Cybersec 252: Python Programming

This course introduces students to computer programming using the Python programming language and interpreted programming principles. Python is a rich programing environment, uses a simple language syntax, has a powerful set of libraries and robust debugger. While it is easy for beginners to learn, it is widely used in cybersecurity and scientific areas for data exploration. Students will learn about data types, control flow, object-oriented programming, and graphical user interface-driven applications.

This course is also designed to help students prepare for the Microsoft MTA – Introduction to Programming Using Python certification exam.

Cybersec 254
Linux Essentials
Cybersec 254: Linux Essentials

This course introduces students to Linux. The most widely used operating system in the cyber and cloud computing environments. This course introduces students to the concepts and components of the Linux operating systems. Students will learn file management, data extraction, command scripting, security concepts and develop virtual machine skills.

This course is also designed to help students prepare for the Linux Professional Institute’s (LPI), Linux Essentials certification exam.

Cybersec 210: I.T. Fundamentals

This course prepares students for a cybersecurity career by helping them develop Information Technology (IT) knowledge and skills. This course includes a series of subjects that provide hands-on workforce development skills in computer hardware, networking, operating systems and information security concepts. This course familiarizes students with the Windows, Apple and Linux Operating Systems and web browsers. Students learn about software configurations and how to configure operating system and network components.

This course covers eight fundamental topics that will help students prepare for the CompTIA IT Fundamentals certification exam.

Cybersec 252: Python Programming

This course introduces students to computer programming using the Python programming language and interpreted programming principles. Python is a rich programing environment, uses a simple language syntax, has a powerful set of libraries and robust debugger. While it is easy for beginners to learn, it is widely used in cybersecurity and scientific areas for data exploration. Students will learn about data types, control flow, object-oriented programming, and graphical user interface-driven applications.

This course is also designed to help students prepare for the Microsoft MTA – Introduction to Programming Using Python certification exam.

Cybersec 254: Linux Essentials

This course introduces students to Linux. The most widely used operating system in the cyber and cloud computing environments. This course introduces students to the concepts and components of the Linux operating systems. Students will learn file management, data extraction, command scripting, security concepts and develop virtual machine skills.

This course is also designed to help students prepare for the Linux Professional Institute’s (LPI), Linux Essentials certification exam.

We are Cyber

Exposing students to the world of cybersecurity in the early years is key to building a pipeline of talent to address the workforce shortage that the industry faces. Watch this video to learn how this is being done here on the Cyber Coast.

Want a printable course list?

Want to easily reference back to these course descriptions? Get a free, printable course list and course description for the education pathways by filling out the form and clicking the link in the follow-up email.

Fill out this form to download the PDF course list

Why students love our cybersecurity programs
Our programs help students be ahead of the curve and become more college- and career-ready after high school.
How We Help Students
Learn from experts in the cybersecurity industry
Acceletrain was founded by leaders in the I.T. industry who are dedicated to applying their award-winning industry solutions to remove barriers to education.
Our Industry Expertise
Redefining virtual, distance, & classroom learning
Acceletrain features seamless, cloud-based online class communities that combines the benefits of traditional learning with the cost savings of internet-based training.
See How It Works
Previous slide
Next slide
Want to learn about career pathways after completion of our programs?

Use the chart below to learn more about the different career paths you or your student could go into with a cybersecurity education. Click one of the career fields (I.T., Cybersecurity, Cyber Effects, Intel, & Cross Functional) to see the various roles and duties associated with each.

I.T.
Data Analyst

Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

Related Job Titles:

  • Business Intelligence Analyst
  • Chief Data Officer / Security Officer
  • Data Architect
  • Data Engineer
  • Data Modeler
  • Data Protection Officer
  • Data Scientist
  • Data Security Analyst
  • Data Security Officer
  • Database Security Analyst
  • Information Dissemination Manager
  • Operations Research Analyst

Tasks:

  • Analyze & define data requirements & specifications
  • Develop data standards, policies, procedures
  • Analyze data sources to provide actionable recommendations
  • Assess the validity of source data & subsequent findings
  • Collect metrics & trending data
  • Provide actionable recommendations to critical stakeholders based on data analysis & findings

Database Administrator

Administers databases and/or data management systems that allow for the secure storage, query, protection, and utilization of data.

Related Job Titles:

  • Data Architect
  • Data Custodian
  • Data Manager
  • Data Protection Technician/Specialist
  • Data Security Manager/Specialist
  • Data Warehouse Specialist
  • Database Developer
  • Database Engineer/Architect
  • Information Dissemination Manager

Tasks:

  • Analyze & plan for anticipated changes in data capacity requirements
  • Maintain database management software
  • Monitor & maintain databases to ensure optimal performance
  • Perform backup & recovery of databases to ensure data integrity
  • Implement data management standards, requirements, & specifications
  • Install & configure database management systems & software

Enterprise Architect

Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.

Related Job Titles:

  • Chief Enterprise Architect
  • Cloud Solutions Architect
  • Data Architect
  • Enterprise Security Architect
  • Infrastructure Architect
  • Solutions Architect
  • System Architect

Tasks:

  • Employ secure configuration management processes.
  • Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines.
  • Identify and prioritize critical business functions in collaboration with organizational stakeholders.
  • Analyze user needs and requirements to plan architecture.
  • Develop enterprise architecture or system components required to meet user needs.
  • Document and update as necessary all definition and architecture activities.
  • Plan implementation strategy to ensure that enterprise components can be integrated and aligned.

Knowledge Manager

Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content.

Related Job Titles:

  • Business Analyst
  • Business Intelligence Analyst/Manager
  • Business and Requirements Analyst
  • Content Manager
  • Data Custodian
  • Data Storage Specialist
  • Information Dissemination Manager
  • Information Manager
  • Information Owner/Steward
  • Records and Information Management Specialist

Tasks:

  • Construct access paths to suites of information (e.g., link pages) to facilitate access by end-users
  • Develop an understanding of the needs & requirements of information end-users
  • Monitor and report the usage of knowledge management assets and resources
  • Plan and manage the delivery of knowledge management projects
  • Lead efforts to promote the organization's use of knowledge management and information sharing
  • Design, build, implement, and maintain a knowledge management framework that provides end-users access to the organization's intellectual capital

Network Operations Specialist

Plans, implements, and operates network services/systems, to include hardware and virtual environments.

Related Job Titles:

  • Network Administrator
  • Network Analyst
  • Network Designer
  • Network Engineer
  • Network Systems Engineer
  • Network Systems and Data Communications Analyst
  • Telecommunications Engineer/ Personnel/ Specialist

Tasks:

  • Configure & optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling)
  • Develop and implement network backup and recovery procedures
  • Diagnose network connectivity problem
  • Install & maintain network infrastructure device operating system software (e.g., IOS, firmware)
  • Install or replace network hubs, routers, and switches
  • Monitor network capacity and performance
  • Test and maintain network infrastructure including software and hardware devices

Research & Development Specialist

Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.

Related Job Titles:

  • Capabilities and Development Specialist
  • Cybersecurity Research Analyst
  • Emerging Technology Specialist
  • Research & Development Engineer / Scientist / Analyst
  • Technology Research Analyst / Associate

Tasks:

  • Research current technology to understand capabilities of required system or network.
  • Identify cyber capabilities strategies for custom hardware and software development based on mission requirements.
  • Collaborate with stakeholders to identify and/or develop appropriate solutions technology.
  • Follow software and systems engineering life cycle standards and processes.
  • Research and evaluate available technologies and standards to meet customer requirements.

Software Developer

Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.

Related Job Titles:

  • Analyst Programmer
  • Cloud Developer
  • Computer Programmer
  • Configuration Manager
  • Full Stack Developer
  • Information Assurance (IA) Software Developer/Engineer
  • Mainframe Developer
  • Secure Software Engineer
  • Software Engineer/Architect
  • Web Application Developer

Tasks:

  • Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application.
  • Apply coding and testing standards, apply security testing tools including "'fuzzing" static-analysis code scanning tools, and conduct code reviews.
  • Compile and write documentation of program development and subsequent revisions, inserting comments in the coded instructions so others can understand the program.
  • Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities.
  • Develop software system testing and validation procedures, programming, and documentation.
  • Modify and maintain existing software to correct errors, to adapt it to new hardware, or to upgrade interfaces and improve performance.
  • Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities.

System Administrator

Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).

Related Job Titles:

  • Application Security Administrator
  • Identity Access Manager
  • Local Area Network (LAN)/Wide Area Network (WAN) Administrator
  • Platform Specialist
  • Security Administrator
  • Server Administrator
  • System Operations Personnel
  • System Security Administrator
  • UNIX/Windows System administrator
  • Web Administrator

Tasks:

  • Conduct functional and connectivity testing to ensure continuing operability.
  • Maintain baseline system security according to organizational policies.
  • Manage accounts, network rights, and access to systems and equipment.
  • Plan, execute, and verify data redundancy and system recovery procedures.
  • Install, update, and troubleshoot systems/servers.
  • Implement and enforce local network usage policies and procedures.
  • Manage system/server resources including performance, capacity, availability, serviceability, and recoverability.
  • Monitor and maintain system/server configuration.
  • Perform repairs on faulty system/server hardware.

Systems Developer

Designs, develops, tests, and evaluates information systems throughout the systems development life cycle.

Related Job Titles:

  • Database Developer
  • DevOps Engineer
  • Information Assurance (IA) Developer
  • Information Assurance (IA) Engineer
  • Information Systems Security Engineer
  • System Integration Engineer
  • Systems Engineer
  • Systems Security Engineer

Tasks:

  • Conduct functional and connectivity testing to ensure continuing operability.
  • Maintain baseline system security according to organizational policies.
  • Manage accounts, network rights, and access to systems and equipment.
  • Plan, execute, and verify data redundancy and system recovery procedures.
  • Install, update, and troubleshoot systems/servers.
  • Implement and enforce local network usage policies and procedures.
  • Manage system/server resources including performance, capacity, availability, serviceability, and recoverability.
  • Monitor and maintain system/server configuration.
  • Perform repairs on faulty system/server hardware.

Systems Requirement Planner

Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.

Related Job Titles:

  • Application Requirements Analyst / Manager
  • Business Analyst
  • Business Process Analyst
  • Business Relationship Manager
  • Requirements Analyst / Planner / Engineer
  • Solutions Architect
  • Solutions Delivery Analyst
  • Systems Analyst
  • Usability Analyst
  •  

Tasks:

  • Conduct risk analysis, feasibility study, and/or trade-off analysis to develop, document, and refine functional requirements and specifications.
  • Consult with customers to evaluate functional requirements.
  • Define project scope and objectives based on customer requirements.
  • Translate functional requirements into technical solutions.
  • Develop and document User Experience (UX) requirements including information architecture and user interface requirements.

System Testing & Evaluation Specialist

Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.

Related Job Titles:

  • Acceptance Tester
  • Application Security Analyst / Engineer
  • Blue Team Technician
  • Quality Assurance (QA) Tester
  • Release Engineer
  • Security Test Engineer
  • Software Quality Assurance (QA) Specialist / Engineer
  • Software Quality Engineer
  • System Evaluator
  • Testing and Evaluation Specialist

Tasks:

  • Determine level of assurance of developed capabilities based on test results.
  • Develop test plans to address specifications and requirements.
  • Determine scope, infrastructure, resources, and data sample size to ensure system requirements are adequately demonstrated.
  • Create auditable evidence of security measures.
  • Validate specifications and requirements for testability.
  • Analyze the results of software, hardware, or interoperability testing.
  • Perform developmental testing on systems under development, and operational testing.
  • Record and manage test data.

Technical Support Specialist

Provides technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components (i.e., Master Incident Management Plan, when applicable).

Related Job Titles:

  • Computer Support Specialist
  • Customer Support
  • Help Desk Representative
  • Mobile Device Manager
  • Network and Application Account Manager
  • Service Desk Operator
  • Telecom Support Specialist
  • User Support Specialist

Tasks:

  • Troubleshoot system hardware & software
  • Analyze incident data for emerging trends
  • Diagnose & resolve customer reported system incidents, problems, & events
  • Install & configure hardware, software, and peripheral equipment for system users in accordance with organizational standards
  • Administer accounts, network rights, and access to systems & equipment
  • Monitor & report client-level computer system performance

Cybersecurity
Authorizing Official/Designating Representative

Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009).

Related Job Titles:

  • Certifying Official
  • Compliance Manager
  • Designated Accrediting Authority
  • Information Assurance (IA) Officer

Tasks:

  • Manage and approve Accreditation Packages (e.g., ISO/IEC 15026-2).
  • Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network.
  • Establish acceptable limits for the software application, network, or system.
  • Manage Accreditation Packages (e.g., ISO/IEC 15026-2).

Communications Security (COMSEC) Manager

Individual who manages the Communications Security (COMSEC) resources of an organization (CNSSI 4009) or key custodian for a Crypto Key Management System (CKMS).

Related Job Titles:

  • Keying Material Manager
  • Network Services and Data Communications Specialist
  • Security Specialist (Crypto)
  • Telecommunications Specialist

Tasks:

  • Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements and on risk levels and security posture.
  • Ensure that security improvement actions are evaluated, validated, and implemented as required.
  • Recognize a possible security violation and take appropriate action to report the incident, as required.
  • Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered.

Cyber Defense Analyst

Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

Related Job Titles:

  • Computer Network Defense (CND) Analyst
  • Cybersecurity / Information Security Analyst
  • Enterprise Network Defense (END) Analyst
  • Incident Analyst
  • Network Defense Technician
  • Network Security Analyst / Specialist / Engineer
  • Security Operator
  • Sensor Analyst

Tasks:

  • Analyze and define data requirements and specifications.
  • Develop data standards, policies, and procedures.
  • Analyze data sources to provide actionable recommendations.
  • Assess the validity of source data and subsequent findings.
  • Collect metrics and trending data.
  • Provide actionable recommendations to critical stakeholders based on data analysis and findings.
  • Analyze and plan for anticipated changes in data capacity requirements.
  • Manage the compilation, cataloging, caching, distribution, and retrieval of data.
  • Provide a managed flow of relevant information (via web-based portals or other means) based on mission requirements.
  • Provide recommendations on new database technologies and architectures.
  • Conduct hypothesis testing using statistical processes.
  • Confer with systems analysts, engineers, programmers, and others to design application.
  • Develop and facilitate data-gathering methods.
  • Develop strategic insights from large data sets.
  • Develop and implement data mining and data warehousing programs.
  • Utilize different programming languages to write code, open files, read files, and write output to different files.

Cyber Defense Forensics Analyst

Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.

Related Job Titles:

  • Computer Forensic Analyst
  • Computer Network Defense (CND) Forensic Analyst
  • Cyber Forensic Analyst
  • Digital Forensic Examiner
  • Forensic Analyst (Cryptologic)
  • Forensic Technician
  • Host Forensic Examiner
  • Network Forensic Examiner

Tasks:

  • Conduct analysis of log files, evidence, and other information to determine best methods for identifying the perpetrator(s) of a network intrusion.
  • Confirm what is known about an intrusion and discover new information, if possible, after identifying intrusion via dynamic analysis.
  • Provide technical summary of findings in accordance with established reporting procedures.
  • Examine recovered data for information of relevance to the issue at hand.
  • Perform file system forensic analysis.
  • Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
  • Create a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes. This includes, but is not limited to, hard drives, floppy diskettes, CDs, PDAs, mobile phones, GPS, and all tape formats.
  • Decrypt seized data using technical means.
  • Ensure that chain of custody is followed for all digital media acquired in accordance with the Federal Rules of Evidence.
  • Identify digital evidence for examination and analysis in such a way as to avoid unintentional alteration.

Cyber Defense Incident Responder

Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.

Related Job Titles:

  • Computer Network Defense Incident Responder
  • Computer Security Incident Response Team Engineer
  • Disaster Recovery Specialist
  • Incident Handler
  • Incident Responder
  • Incident Response Analyst
  • Incident Response Coordinator
  • Incident Response Engineer

Tasks:

  • Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
  • Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.
  • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
  • Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies.
  • Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
  • Coordinate incident response functions.

Cyber Defense Infrastructure Support Specialist

Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.

Related Job Titles:

  • Continuous Diagnostics and Mitigation Specialist
  • Continuous Monitoring Specialist
  • Cyber Defense Engineer / Administrator
  • Cyber Tool Engineer / Administrator
  • Disaster Recovery / Emergency Management Specialist
  • Intrusion Detection System Administrator / Technician
  • Network Security Specialist / Engineer
  • Systems Security Administrator / Engineer
  • Trusted Internet Connection (TIC) Gateway Engineer

Tasks:

  • Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.
  • Build, install, configure, and test dedicated cyber defense hardware.
  • Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure.
  • Administer test bed(s), and test and evaluate applications, hardware infrastructure, rules/signatures, access controls, and configurations of platforms managed by service provider(s).
  • Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization).
  • Implement Risk Management Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for dedicated cyber defense systems within the enterprise, and document and maintain records for them.

Information Systems Security Developer

Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.

Related Job Titles:

  • Information Assurance (IA) Developer
  • Information Assurance Engineer
  • Information Systems Security Engineer
  • Security / Systems Engineer
  • Telecommunications Engineer

Tasks:

  • Analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support.
  • Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications.
  • Assess the effectiveness of cybersecurity measures utilized by system(s).
  • Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile.
  • Build, test, and modify product prototypes using working models or theoretical models.
  • Design hardware, operating systems, and software applications to adequately address cybersecurity requirements.

Secure Software Assessor

Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.

Related Job Titles:

  • Application Security Analyst / Engineer
  • Application Security Tester
  • Information Assurance (IA) Software Developer
  • Information Assurance (IA) Software Engineer
  • Secure Software Engineer
  • Security Engineer
  • Security Requirements Analyst
  • Software Assurance Analyst
  • Software Quality / Quality Assurance Engineer

Tasks:

  • Apply coding and testing standards, apply security testing tools including "'fuzzing" static-analysis code scanning tools, and conduct code reviews.
  • Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules.
  • Consult with engineering staff to evaluate interface between hardware and software.
  • Identify basic common coding flaws at a high level.
  • Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.
  • Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.
  • Perform secure program testing, review, and/or assessment to identify potential flaws in codes and mitigate vulnerabilities.

Security Architect

Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.

Related Job Titles:

  • Cybersecurity Architect
  • Information Assurance (IA) Architect
  • Information Security Architect
  • Security Solutions Architect

Tasks:

  • Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data primarily applicable to government organizations (e.g., UNCLASSIFIED, SECRET, and TOP SECRET).
  • Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle.
  • Employ secure configuration management processes.
  • Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
  • Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.
  • Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately.

Security Control Assessor

Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37).

Related Job Titles:

  • Assessor
  • Certifying Agent/Authority
  • Controls Validator
  • IT Auditor
  • Information Assurance (IA) Auditor
  • Information Assurance (IA) Compliance Analyst
  • System Certifier

Tasks:

  • Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks.
  • Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network.
  • Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.
  • Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).

Systems Security Analyst

Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.

Related Job Titles:

  • Cybersecurity Analyst
  • Information Assurance Operational Engineer
  • Information Assurance Specialist
  • Information Security Analyst / Administrator
  • Information Systems Security Analyst / Specialist
  • Network Security Vulnerability Technician (NSVT)
  • Security Analyst
  • Systems Analyst
  • Systems Compliance Analyst
  • Systems Security Specialist

Tasks:

  • Apply security policies to meet security objectives of the system.
  • Ensure all systems security operations and maintenance activities are properly documented and updated as necessary.
  • Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.
  • Plan and recommend modifications or adjustments based on exercise results or system environment.
  • Properly document all systems security implementation, operations, and maintenance activities and update as necessary.
  • Analyze and report organizational security posture trends.

Vulnerability Assessment Analysts

Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.

Related Job Titles:

  • Blue Team Technician
  • Computer Network Defense (CND) Auditor
  • Ethical Hacker
  • Information Security Engineer
  • Network Security Engineer
  • Penetration Tester
  • Red Team Technician
  • Reverse Engineer
  • Risk Assessment Engineer
  • Risk Assessor
  • Risk/Vulnerability Specialist / Manager
  • System / Application Security Tester

Tasks:

  • Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.
  • Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
  • Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
  • Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.
  • Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).

Cyber Effects
Cyber Operator

Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executes on-net operations.

Tasks:

  • Analyze internal operational architecture, tools, and procedures for ways to improve performance.
  • Collaborate with development organizations to create and deploy the tools needed to achieve objectives.
  • Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers).
  • Detect exploits against targeted networks and hosts and react accordingly.

Cyber Ops Planner

Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions.

Tasks:

  • Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives.
  • Apply expertise in policy and processes to facilitate the development, negotiation, and internal staffing of plans and/or memorandums of agreement.
  • Assess target vulnerabilities and/or operational capabilities to determine course of action.
  • Contribute to crisis action planning for cyber operations and to the development of the organization's decision support tools if necessary.
  • Use intelligence estimates to counter potential target actions.

Exploitation Analyst

Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

Tasks:

  • Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.
  • Examine intercept-related metadata and content with an understanding of targeting significance.
  • Profile network or system administrators and their activities.

Missions Assessment Specialist

Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness.

Tasks:

  • Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.
  • Conduct end-of-operations assessments, in-depth research and analysis, nodal analysis, and target research and analysis.
  • Develop measures of effectiveness and measures of performance.
  • Estimate operational effects generated through cyber activities.
  • Identify threat vulnerabilities.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.

Partner Integration Planner

Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.

Tasks:

  • Apply expertise in policy and processes to facilitate the development, negotiation, and internal staffing of plans and/or memorandums of agreement.
  • Assist and advise interagency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives.
  • Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials).
  • Contribute to the development, staffing, and coordination of cyber operations policies, performance standards, plans and approval packages with appropriate internal and/or external decision makers.
  • Coordinate with intelligence and cyber defense partners to obtain relevant essential information.
  • Develop or participate in the development of standards for providing, requesting, and/or obtaining support from external partners to synchronize cyber operations.
  • Develop strategy and processes for partner planning, operations, and capability development.
  • Provide subject matter expertise to planning efforts with internal and external cyber operations partners.
  • Serve as a liaison with external partners.

Target Developer

Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation.

Tasks:

  • Accurately characterize targets.
  • Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.
  • Conduct nodal analysis and target research and analysis.
  • Develop all-source intelligence targeting materials.
  • Develop measures of effectiveness and measures of performance.
  • Provide time sensitive targeting support.
  • Sanitize and minimize information to protect sources and methods.

Target Network Analyst

Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks, and the applications on them.

Tasks:

  • Classify documents in accordance with classification guidelines.
  • Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.
  • Conduct quality control to determine validity and relevance of information gathered about networks.
  • Determine what technologies are used by a given target.
  • Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.

Threat/Warning Analyst

Develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber threat/warning assessments.

Tasks:

  • Maintain a common intelligence picture.
  • Collaborate with intelligence analysts/targeting organizations involved in related areas.
  • Conduct in-depth research and analysis.
  • Identify threats to Blue Force vulnerabilities.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.
  • Monitor open source websites for hostile content directed towards organizational or partner interests.
  • Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
  • Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.

Intel
All Source-Collection Manager

Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to meet leadership's intent. Determines capabilities of available collection assets, identifies new collection capabilities; and constructs and disseminates collection plans. Monitors execution of tasked collection to ensure effective execution of the collection plan.

Tasks:

  • Adjust collection operations or collection plan to address identified issues/challenges and to synchronize collections with overall operational requirements.
  • Analyze plans, directives, guidance and policy for factors that would influence collection management's operational structure and requirement s (e.g., duration, scope, communication requirements, interagency/international agreements).
  • Assess and apply operational environment factors and risks to collection management process.
  • Determine how identified factors affect the tasking, collection, processing, exploitation and dissemination architecture's form and function.
  • Develop a method for comparing collection reports to outstanding requirements to identify information gaps.
  • Establish processing, exploitation and dissemination management activity using approved guidance and/or procedures.
  • Prioritize collection requirements for collection platforms based on platform capabilities.

All Source-Collection Requirements Manager

Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of collection requirements. Evaluates performance of collection assets and collection operations.

Tasks:

  • Analyze feedback to determine extent to which collection products and services are meeting requirements.
  • Analyze incoming collection requests.
  • Assess the effectiveness of collections in satisfying priority information gaps, using available capabilities and methods, and adjust collection strategies and collection requirements accordingly.
  • Collaborate with customer to define information requirements.
  • Develop a method for comparing collection reports to outstanding requirements to identify information gaps.
  • Validate the link between collection requests and critical information requirements and priority intelligence requirements of leadership.

All-Source Analyst

Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.

Tasks:

  • Answer requests for information.
  • Maintain a common intelligence picture.
  • Brief threat and/or target current situations.
  • Conduct in-depth research and analysis.
  • Generate requests for information.
  • Identify threat tactics, and methodologies.
  • Monitor operational environment and report on adversarial activities which fulfill leadership's priority information requirements.
  • Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.

Cyber Intel Planner

Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.

Tasks:

  • Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives.
  • Coordinate for intelligence support to operational planning activities.
  • Assess all-source intelligence and recommend targets to support cyber operation objectives.
  • Assess target vulnerabilities and/or operational capabilities to determine course of action.
  • Assist in the development and refinement of priority information requirements.
  • Enable synchronization of intelligence support plans across partner organizations as required.
  • Identify cyber intelligence gaps and shortfalls for cyber operational planning.
  • Lead and coordinate intelligence support to operational planning.

Multi-Disciplined Language Analyst

Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate intelligence information derived from language, voice and/or graphic material. Creates and maintains language-specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects.

Tasks:

  • Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets.
  • Advise managers and operators on language and cultural issues that impact organization objectives.
  • Analyze and process information using language and/or cultural expertise.
  • Conduct analysis of target communications to identify essential information in support of organization objectives.
  • Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing.
  • Identify target communications within the global network.
  • Transcribe target voice and graphic materials in the target language.
  • Identify foreign language terminology within computer programs (e.g., comments, variable names).

Cross Functional
Lifecycle Management

IT Investment/Portfolio Manager
Manages a portfolio of IT investments that align with the overall needs of mission and enterprise priorities.

IT Program Auditor
Conducts evaluations of an IT program or its individual components to determine compliance with published standards.

IT Project Manager
Directly manages information technology projects.

Product Support Manager
Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components.

Program Manager
Leads, coordinates, communicates, integrates, and is accountable for the overall success of the program, ensuring alignment with agency or enterprise priorities.

Talent Management

Cyber Instructional Curriculum Developer
Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.

Cyber Instructor
Develops and conducts training or education of personnel within cyber domain.

Cyber Workforce Developer and Manager
Develops cyberspace workforce plans, strategies, and guidance to support cyberspace workforce manpower, personnel, training and education requirements and to address changes to cyberspace policy, doctrine, materiel, force structure, and education and training requirements.

Strategic Management

Cyber Policy and Strategy Planner
Develops and maintains cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance.

Executive Cyber Leadership
Executes decision-making authorities and establishes vision and direction for an organization's cyber and cyber-related resources and/or operations.

Privacy Officer/Privacy Compliance Manager
Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance, governance/policy, and incident response needs of privacy and security executives and their teams.

Legal/Law Enforcement

Cyber Crime Investigator
Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques.

Cyber Legal Advisor
Provides legal advice and recommendations on relevant topics related to cyber law.

Law Enforcement/Counterintelligence Forensics Analyst
Conducts detailed investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.

Want to learn about career pathways after completion of our programs?

Use the chart below to learn more about the different career paths you or your student could go into with a cybersecurity education. Click one of the fields on top (I.T., Cybersecurity, Cyber Effects, Intel, & Cross Functional) to see the various roles and duties associated with each.

Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

Related Job Titles:

  • Business Intelligence Analyst
  • Chief Data Officer / Security Officer
  • Data Architect
  • Data Engineer
  • Data Modeler
  • Data Protection Officer
  • Data Scientist
  • Data Security Analyst
  • Data Security Officer
  • Database Security Analyst
  • Information Dissemination Manager
  • Operations Research Analyst

Tasks:

  • Analyze & define data requirements & specifications
  • Develop data standards, policies, procedures
  • Analyze data sources to provide actionable recommendations
  • Assess the validity of source data & subsequent findings
  • Collect metrics & trending data
  • Provide actionable recommendations to critical stakeholders based on data analysis & findings

Administers databases and/or data management systems that allow for the secure storage, query, protection, and utilization of data.

Related Job Titles:

  • Data Architect
  • Data Custodian
  • Data Manager
  • Data Protection Technician/Specialist
  • Data Security Manager/Specialist
  • Data Warehouse Specialist
  • Database Developer
  • Database Engineer/Architect
  • Information Dissemination Manager

Tasks:

  • Analyze & plan for anticipated changes in data capacity requirements
  • Maintain database management software
  • Monitor & maintain databases to ensure optimal performance
  • Perform backup & recovery of databases to ensure data integrity
  • Implement data management standards, requirements, & specifications
  • Install & configure database management systems & software

Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.

Related Job Titles:

  • Chief Enterprise Architect
  • Cloud Solutions Architect
  • Data Architect
  • Enterprise Security Architect
  • Infrastructure Architect
  • Solutions Architect
  • System Architect

Tasks:

  • Employ secure configuration management processes.
  • Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines.
  • Identify and prioritize critical business functions in collaboration with organizational stakeholders.
  • Analyze user needs and requirements to plan architecture.
  • Develop enterprise architecture or system components required to meet user needs.
  • Document and update as necessary all definition and architecture activities.
  • Plan implementation strategy to ensure that enterprise components can be integrated and aligned.

Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content.

Related Job Titles:

  • Business Analyst
  • Business Intelligence Analyst/Manager
  • Business and Requirements Analyst
  • Content Manager
  • Data Custodian
  • Data Storage Specialist
  • Information Dissemination Manager
  • Information Manager
  • Information Owner/Steward
  • Records and Information Management Specialist

Tasks:

  • Construct access paths to suites of information (e.g., link pages) to facilitate access by end-users
  • Develop an understanding of the needs & requirements of information end-users
  • Monitor and report the usage of knowledge management assets and resources
  • Plan and manage the delivery of knowledge management projects
  • Lead efforts to promote the organization's use of knowledge management and information sharing
  • Design, build, implement, and maintain a knowledge management framework that provides end-users access to the organization's intellectual capital

Plans, implements, and operates network services/systems, to include hardware and virtual environments.

Related Job Titles:

  • Network Administrator
  • Network Analyst
  • Network Designer
  • Network Engineer
  • Network Systems Engineer
  • Network Systems and Data Communications Analyst
  • Telecommunications Engineer/ Personnel/ Specialist

Tasks:

  • Configure & optimize network hubs, routers, and switches (e.g., higher-level protocols, tunneling)
  • Develop and implement network backup and recovery procedures
  • Diagnose network connectivity problem
  • Install & maintain network infrastructure device operating system software (e.g., IOS, firmware)
  • Install or replace network hubs, routers, and switches
  • Monitor network capacity and performance
  • Test and maintain network infrastructure including software and hardware devices

Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.

Related Job Titles:

  • Capabilities and Development Specialist
  • Cybersecurity Research Analyst
  • Emerging Technology Specialist
  • Research & Development Engineer / Scientist / Analyst
  • Technology Research Analyst / Associate

Tasks:

  • Research current technology to understand capabilities of required system or network.
  • Identify cyber capabilities strategies for custom hardware and software development based on mission requirements.
  • Collaborate with stakeholders to identify and/or develop appropriate solutions technology.
  • Follow software and systems engineering life cycle standards and processes.
  • Research and evaluate available technologies and standards to meet customer requirements.

Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.

Related Job Titles:

  • Analyst Programmer
  • Cloud Developer
  • Computer Programmer
  • Configuration Manager
  • Full Stack Developer
  • Information Assurance (IA) Software Developer/Engineer
  • Mainframe Developer
  • Secure Software Engineer
  • Software Engineer/Architect
  • Web Application Developer

Tasks:

  • Analyze information to determine, recommend, and plan the development of a new application or modification of an existing application.
  • Apply coding and testing standards, apply security testing tools including "'fuzzing" static-analysis code scanning tools, and conduct code reviews.
  • Compile and write documentation of program development and subsequent revisions, inserting comments in the coded instructions so others can understand the program.
  • Perform secure programming and identify potential flaws in codes to mitigate vulnerabilities.
  • Develop software system testing and validation procedures, programming, and documentation.
  • Modify and maintain existing software to correct errors, to adapt it to new hardware, or to upgrade interfaces and improve performance.
  • Apply cybersecurity functions (e.g., encryption, access control, and identity management) to reduce exploitation opportunities.

Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).

Related Job Titles:

  • Application Security Administrator
  • Identity Access Manager
  • Local Area Network (LAN)/Wide Area Network (WAN) Administrator
  • Platform Specialist
  • Security Administrator
  • Server Administrator
  • System Operations Personnel
  • System Security Administrator
  • UNIX/Windows System administrator
  • Web Administrator

Tasks:

  • Conduct functional and connectivity testing to ensure continuing operability.
  • Maintain baseline system security according to organizational policies.
  • Manage accounts, network rights, and access to systems and equipment.
  • Plan, execute, and verify data redundancy and system recovery procedures.
  • Install, update, and troubleshoot systems/servers.
  • Implement and enforce local network usage policies and procedures.
  • Manage system/server resources including performance, capacity, availability, serviceability, and recoverability.
  • Monitor and maintain system/server configuration.
  • Perform repairs on faulty system/server hardware.

Designs, develops, tests, and evaluates information systems throughout the systems development life cycle.

Related Job Titles:

  • Database Developer
  • DevOps Engineer
  • Information Assurance (IA) Developer
  • Information Assurance (IA) Engineer
  • Information Systems Security Engineer
  • System Integration Engineer
  • Systems Engineer
  • Systems Security Engineer

Tasks:

  • Conduct functional and connectivity testing to ensure continuing operability.
  • Maintain baseline system security according to organizational policies.
  • Manage accounts, network rights, and access to systems and equipment.
  • Plan, execute, and verify data redundancy and system recovery procedures.
  • Install, update, and troubleshoot systems/servers.
  • Implement and enforce local network usage policies and procedures.
  • Manage system/server resources including performance, capacity, availability, serviceability, and recoverability.
  • Monitor and maintain system/server configuration.
  • Perform repairs on faulty system/server hardware.

Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.

Related Job Titles:

  • Application Requirements Analyst / Manager
  • Business Analyst
  • Business Process Analyst
  • Business Relationship Manager
  • Requirements Analyst / Planner / Engineer
  • Solutions Architect
  • Solutions Delivery Analyst
  • Systems Analyst
  • Usability Analyst
  •  

Tasks:

  • Conduct risk analysis, feasibility study, and/or trade-off analysis to develop, document, and refine functional requirements and specifications.
  • Consult with customers to evaluate functional requirements.
  • Define project scope and objectives based on customer requirements.
  • Translate functional requirements into technical solutions.
  • Develop and document User Experience (UX) requirements including information architecture and user interface requirements.

Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.

Related Job Titles:

  • Acceptance Tester
  • Application Security Analyst / Engineer
  • Blue Team Technician
  • Quality Assurance (QA) Tester
  • Release Engineer
  • Security Test Engineer
  • Software Quality Assurance (QA) Specialist / Engineer
  • Software Quality Engineer
  • System Evaluator
  • Testing and Evaluation Specialist

Tasks:

  • Determine level of assurance of developed capabilities based on test results.
  • Develop test plans to address specifications and requirements.
  • Determine scope, infrastructure, resources, and data sample size to ensure system requirements are adequately demonstrated.
  • Create auditable evidence of security measures.
  • Validate specifications and requirements for testability.
  • Analyze the results of software, hardware, or interoperability testing.
  • Perform developmental testing on systems under development, and operational testing.
  • Record and manage test data.

Provides technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components (i.e., Master Incident Management Plan, when applicable).

Related Job Titles:

  • Computer Support Specialist
  • Customer Support
  • Help Desk Representative
  • Mobile Device Manager
  • Network and Application Account Manager
  • Service Desk Operator
  • Telecom Support Specialist
  • User Support Specialist

Tasks:

  • Troubleshoot system hardware & software
  • Analyze incident data for emerging trends
  • Diagnose & resolve customer reported system incidents, problems, & events
  • Install & configure hardware, software, and peripheral equipment for system users in accordance with organizational standards
  • Administer accounts, network rights, and access to systems & equipment
  • Monitor & report client-level computer system performance

Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009).

Related Job Titles:

  • Certifying Official
  • Compliance Manager
  • Designated Accrediting Authority
  • Information Assurance (IA) Officer

Tasks:

  • Manage and approve Accreditation Packages (e.g., ISO/IEC 15026-2).
  • Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network.
  • Establish acceptable limits for the software application, network, or system.
  • Manage Accreditation Packages (e.g., ISO/IEC 15026-2).

Individual who manages the Communications Security (COMSEC) resources of an organization (CNSSI 4009) or key custodian for a Crypto Key Management System (CKMS).

Related Job Titles:

  • Keying Material Manager
  • Network Services and Data Communications Specialist
  • Security Specialist (Crypto)
  • Telecommunications Specialist

Tasks:

  • Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements and on risk levels and security posture.
  • Ensure that security improvement actions are evaluated, validated, and implemented as required.
  • Recognize a possible security violation and take appropriate action to report the incident, as required.
  • Supervise or manage protective or corrective measures when a cybersecurity incident or vulnerability is discovered.

Examines data from multiple disparate sources with the goal of providing security and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

Related Job Titles:

  • Computer Network Defense (CND) Analyst
  • Cybersecurity / Information Security Analyst
  • Enterprise Network Defense (END) Analyst
  • Incident Analyst
  • Network Defense Technician
  • Network Security Analyst / Specialist / Engineer
  • Security Operator
  • Sensor Analyst

Tasks:

  • Analyze and define data requirements and specifications.
  • Develop data standards, policies, and procedures.
  • Analyze data sources to provide actionable recommendations.
  • Assess the validity of source data and subsequent findings.
  • Collect metrics and trending data.
  • Provide actionable recommendations to critical stakeholders based on data analysis and findings.
  • Analyze and plan for anticipated changes in data capacity requirements.
  • Manage the compilation, cataloging, caching, distribution, and retrieval of data.
  • Provide a managed flow of relevant information (via web-based portals or other means) based on mission requirements.
  • Provide recommendations on new database technologies and architectures.
  • Conduct hypothesis testing using statistical processes.
  • Confer with systems analysts, engineers, programmers, and others to design application.
  • Develop and facilitate data-gathering methods.
  • Develop strategic insights from large data sets.
  • Develop and implement data mining and data warehousing programs.
  • Utilize different programming languages to write code, open files, read files, and write output to different files.

Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.

Related Job Titles:

  • Computer Forensic Analyst
  • Computer Network Defense (CND) Forensic Analyst
  • Cyber Forensic Analyst
  • Digital Forensic Examiner
  • Forensic Analyst (Cryptologic)
  • Forensic Technician
  • Host Forensic Examiner
  • Network Forensic Examiner

Tasks:

  • Conduct analysis of log files, evidence, and other information to determine best methods for identifying the perpetrator(s) of a network intrusion.
  • Confirm what is known about an intrusion and discover new information, if possible, after identifying intrusion via dynamic analysis.
  • Provide technical summary of findings in accordance with established reporting procedures.
  • Examine recovered data for information of relevance to the issue at hand.
  • Perform file system forensic analysis.
  • Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
  • Create a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes. This includes, but is not limited to, hard drives, floppy diskettes, CDs, PDAs, mobile phones, GPS, and all tape formats.
  • Decrypt seized data using technical means.
  • Ensure that chain of custody is followed for all digital media acquired in accordance with the Federal Rules of Evidence.
  • Identify digital evidence for examination and analysis in such a way as to avoid unintentional alteration.

Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.

Related Job Titles:

  • Computer Network Defense Incident Responder
  • Computer Security Incident Response Team Engineer
  • Disaster Recovery Specialist
  • Incident Handler
  • Incident Responder
  • Incident Response Analyst
  • Incident Response Coordinator
  • Incident Response Engineer

Tasks:

  • Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
  • Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.
  • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
  • Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies.
  • Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
  • Coordinate incident response functions.

Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.

Related Job Titles:

  • Continuous Diagnostics and Mitigation Specialist
  • Continuous Monitoring Specialist
  • Cyber Defense Engineer / Administrator
  • Cyber Tool Engineer / Administrator
  • Disaster Recovery / Emergency Management Specialist
  • Intrusion Detection System Administrator / Technician
  • Network Security Specialist / Engineer
  • Systems Security Administrator / Engineer
  • Trusted Internet Connection (TIC) Gateway Engineer

Tasks:

  • Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.
  • Build, install, configure, and test dedicated cyber defense hardware.
  • Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure.
  • Administer test bed(s), and test and evaluate applications, hardware infrastructure, rules/signatures, access controls, and configurations of platforms managed by service provider(s).
  • Identify potential conflicts with implementation of any cyber defense tools (e.g., tool and signature testing and optimization).
  • Implement Risk Management Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for dedicated cyber defense systems within the enterprise, and document and maintain records for them.

Designs, develops, tests, and evaluates information system security throughout the systems development life cycle.

Related Job Titles:

  • Information Assurance (IA) Developer
  • Information Assurance Engineer
  • Information Systems Security Engineer
  • Security / Systems Engineer
  • Telecommunications Engineer

Tasks:

  • Analyze design constraints, analyze trade-offs and detailed system and security design, and consider life cycle support.
  • Apply security policies to applications that interface with one another, such as Business-to-Business (B2B) applications.
  • Assess the effectiveness of cybersecurity measures utilized by system(s).
  • Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile.
  • Build, test, and modify product prototypes using working models or theoretical models.
  • Design hardware, operating systems, and software applications to adequately address cybersecurity requirements.

Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.

Related Job Titles:

  • Application Security Analyst / Engineer
  • Application Security Tester
  • Information Assurance (IA) Software Developer
  • Information Assurance (IA) Software Engineer
  • Secure Software Engineer
  • Security Engineer
  • Security Requirements Analyst
  • Software Assurance Analyst
  • Software Quality / Quality Assurance Engineer

Tasks:

  • Apply coding and testing standards, apply security testing tools including "'fuzzing" static-analysis code scanning tools, and conduct code reviews.
  • Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules.
  • Consult with engineering staff to evaluate interface between hardware and software.
  • Identify basic common coding flaws at a high level.
  • Identify security issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life.
  • Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.
  • Perform secure program testing, review, and/or assessment to identify potential flaws in codes and mitigate vulnerabilities.

Ensures that the stakeholder security requirements necessary to protect the organization’s mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.

Related Job Titles:

  • Cybersecurity Architect
  • Information Assurance (IA) Architect
  • Information Security Architect
  • Security Solutions Architect

Tasks:

  • Develop/integrate cybersecurity designs for systems and networks with multilevel security requirements or requirements for the processing of multiple classification levels of data primarily applicable to government organizations (e.g., UNCLASSIFIED, SECRET, and TOP SECRET).
  • Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle.
  • Employ secure configuration management processes.
  • Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
  • Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.
  • Determine the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately.

Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37).

Related Job Titles:

  • Assessor
  • Certifying Agent/Authority
  • Controls Validator
  • IT Auditor
  • Information Assurance (IA) Auditor
  • Information Assurance (IA) Compliance Analyst
  • System Certifier

Tasks:

  • Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks.
  • Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network.
  • Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.
  • Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).

Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.

Related Job Titles:

  • Cybersecurity Analyst
  • Information Assurance Operational Engineer
  • Information Assurance Specialist
  • Information Security Analyst / Administrator
  • Information Systems Security Analyst / Specialist
  • Network Security Vulnerability Technician (NSVT)
  • Security Analyst
  • Systems Analyst
  • Systems Compliance Analyst
  • Systems Security Specialist

Tasks:

  • Apply security policies to meet security objectives of the system.
  • Ensure all systems security operations and maintenance activities are properly documented and updated as necessary.
  • Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.
  • Plan and recommend modifications or adjustments based on exercise results or system environment.
  • Properly document all systems security implementation, operations, and maintenance activities and update as necessary.
  • Analyze and report organizational security posture trends.

Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.

Related Job Titles:

  • Blue Team Technician
  • Computer Network Defense (CND) Auditor
  • Ethical Hacker
  • Information Security Engineer
  • Network Security Engineer
  • Penetration Tester
  • Red Team Technician
  • Reverse Engineer
  • Risk Assessment Engineer
  • Risk Assessor
  • Risk/Vulnerability Specialist / Manager
  • System / Application Security Tester

Tasks:

  • Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.
  • Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
  • Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
  • Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.
  • Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).

Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executes on-net operations.

Tasks:

  • Analyze internal operational architecture, tools, and procedures for ways to improve performance.
  • Collaborate with development organizations to create and deploy the tools needed to achieve objectives.
  • Deploy tools to a target and utilize them once deployed (e.g., backdoors, sniffers).
  • Detect exploits against targeted networks and hosts and react accordingly.

Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions.

Tasks:

  • Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives.
  • Apply expertise in policy and processes to facilitate the development, negotiation, and internal staffing of plans and/or memorandums of agreement.
  • Assess target vulnerabilities and/or operational capabilities to determine course of action.
  • Contribute to crisis action planning for cyber operations and to the development of the organization's decision support tools if necessary.
  • Use intelligence estimates to counter potential target actions.

Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

Tasks:

  • Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.
  • Examine intercept-related metadata and content with an understanding of targeting significance.
  • Profile network or system administrators and their activities.

Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness.

Tasks:

  • Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.
  • Conduct end-of-operations assessments, in-depth research and analysis, nodal analysis, and target research and analysis.
  • Develop measures of effectiveness and measures of performance.
  • Estimate operational effects generated through cyber activities.
  • Identify threat vulnerabilities.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.

Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.

Tasks:

  • Apply expertise in policy and processes to facilitate the development, negotiation, and internal staffing of plans and/or memorandums of agreement.
  • Assist and advise interagency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives.
  • Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials).
  • Contribute to the development, staffing, and coordination of cyber operations policies, performance standards, plans and approval packages with appropriate internal and/or external decision makers.
  • Coordinate with intelligence and cyber defense partners to obtain relevant essential information.
  • Develop or participate in the development of standards for providing, requesting, and/or obtaining support from external partners to synchronize cyber operations.
  • Develop strategy and processes for partner planning, operations, and capability development.
  • Provide subject matter expertise to planning efforts with internal and external cyber operations partners.
  • Serve as a liaison with external partners.

Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation.

Tasks:

  • Accurately characterize targets.
  • Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.
  • Conduct nodal analysis and target research and analysis.
  • Develop all-source intelligence targeting materials.
  • Develop measures of effectiveness and measures of performance.
  • Provide time sensitive targeting support.
  • Sanitize and minimize information to protect sources and methods.

Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks, and the applications on them.

Tasks:

  • Classify documents in accordance with classification guidelines.
  • Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.
  • Conduct quality control to determine validity and relevance of information gathered about networks.
  • Determine what technologies are used by a given target.
  • Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.

Develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber threat/warning assessments.

Tasks:

  • Maintain a common intelligence picture.
  • Collaborate with intelligence analysts/targeting organizations involved in related areas.
  • Conduct in-depth research and analysis.
  • Identify threats to Blue Force vulnerabilities.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.
  • Monitor open source websites for hostile content directed towards organizational or partner interests.
  • Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
  • Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.

Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to meet leadership's intent. Determines capabilities of available collection assets, identifies new collection capabilities; and constructs and disseminates collection plans. Monitors execution of tasked collection to ensure effective execution of the collection plan.

Tasks:

  • Adjust collection operations or collection plan to address identified issues/challenges and to synchronize collections with overall operational requirements.
  • Analyze plans, directives, guidance and policy for factors that would influence collection management's operational structure and requirement s (e.g., duration, scope, communication requirements, interagency/international agreements).
  • Assess and apply operational environment factors and risks to collection management process.
  • Determine how identified factors affect the tasking, collection, processing, exploitation and dissemination architecture's form and function.
  • Develop a method for comparing collection reports to outstanding requirements to identify information gaps.
  • Establish processing, exploitation and dissemination management activity using approved guidance and/or procedures.
  • Prioritize collection requirements for collection platforms based on platform capabilities.

Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of collection requirements. Evaluates performance of collection assets and collection operations.

Tasks:

  • Analyze feedback to determine extent to which collection products and services are meeting requirements.
  • Analyze incoming collection requests.
  • Assess the effectiveness of collections in satisfying priority information gaps, using available capabilities and methods, and adjust collection strategies and collection requirements accordingly.
  • Collaborate with customer to define information requirements.
  • Develop a method for comparing collection reports to outstanding requirements to identify information gaps.
  • Validate the link between collection requests and critical information requirements and priority intelligence requirements of leadership.

Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.

Tasks:

  • Answer requests for information.
  • Maintain a common intelligence picture.
  • Brief threat and/or target current situations.
  • Conduct in-depth research and analysis.
  • Generate requests for information.
  • Identify threat tactics, and methodologies.
  • Monitor operational environment and report on adversarial activities which fulfill leadership's priority information requirements.
  • Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.

Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.

Tasks:

  • Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives.
  • Coordinate for intelligence support to operational planning activities.
  • Assess all-source intelligence and recommend targets to support cyber operation objectives.
  • Assess target vulnerabilities and/or operational capabilities to determine course of action.
  • Assist in the development and refinement of priority information requirements.
  • Enable synchronization of intelligence support plans across partner organizations as required.
  • Identify cyber intelligence gaps and shortfalls for cyber operational planning.
  • Lead and coordinate intelligence support to operational planning.

Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate intelligence information derived from language, voice and/or graphic material. Creates and maintains language-specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects.

Tasks:

  • Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets.
  • Advise managers and operators on language and cultural issues that impact organization objectives.
  • Analyze and process information using language and/or cultural expertise.
  • Conduct analysis of target communications to identify essential information in support of organization objectives.
  • Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing.
  • Identify target communications within the global network.
  • Transcribe target voice and graphic materials in the target language.
  • Identify foreign language terminology within computer programs (e.g., comments, variable names).

IT Investment/Portfolio Manager
Manages a portfolio of IT investments that align with the overall needs of mission and enterprise priorities.

IT Program Auditor
Conducts evaluations of an IT program or its individual components to determine compliance with published standards.

IT Project Manager
Directly manages information technology projects.

Product Support Manager
Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components.

Program Manager
Leads, coordinates, communicates, integrates, and is accountable for the overall success of the program, ensuring alignment with agency or enterprise priorities.

Cyber Instructional Curriculum Developer
Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs.

Cyber Instructor
Develops and conducts training or education of personnel within cyber domain.

Cyber Workforce Developer and Manager
Develops cyberspace workforce plans, strategies, and guidance to support cyberspace workforce manpower, personnel, training and education requirements and to address changes to cyberspace policy, doctrine, materiel, force structure, and education and training requirements.

Cyber Policy and Strategy Planner
Develops and maintains cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance.

Executive Cyber Leadership
Executes decision-making authorities and establishes vision and direction for an organization's cyber and cyber-related resources and/or operations.

Privacy Officer/Privacy Compliance Manager
Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance, governance/policy, and incident response needs of privacy and security executives and their teams.

Cyber Crime Investigator
Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques.

Cyber Legal Advisor
Provides legal advice and recommendations on relevant topics related to cyber law.

Law Enforcement/Counterintelligence Forensics Analyst
Conducts detailed investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.

Ready to nurture student development & education?

Contact us today to receive more information and to begin building a better future.