Printer Friendly

Functional Specialty Areas.

Securely Provision

Information Assurance (IA) Compliance - Oversees, evaluates and supports the documentation, validation and accreditation processes necessary to assure that new IT systems meet an organization's IA requirements. Examples of job titles: designated accrediting authority; IA program manager; IA manager; IA officer; accreditor; validator.

Systems Development - Works on the development phases of the systems development life cycle. Examples of job titles: systems engineer; IA engineer; information systems security engineer; IA developer; configuration manager.

Software Engineering - Develops, creates, and writes/modifies codes, computer applications, software or specialized utility programs. Examples of job titles: software developer; software engineer; computer programmer; Web application developer; IA software engineer.

Systems Requirements Planning - Consults with customers to evaluate functional requirements and translates these requirements into technical solutions. Examples of job titles: computer systems analyst; capabilities development specialist; solutions architect; systems engineer; contracting officer technical representative.

Enterprise Architecture - Responsible for the capabilities phases of the systems development life cycle. Examples of job titles: systems engineer; information systems security engineer; IA architect; network security analyst; security architect.

Test and Evaluation - Develops and conducts tests of systems to evaluate integration processes. Examples of job titles: computer network operator; testing and evaluation technician; systems engineer; information systems security engineer; IA engineer; R&D engineer.

Operate & Maintain

Network Operations Management - Plans, organizes and directs the operation, administration, maintenance and provisioning of networked systems to ensure availability and integrity of information. Examples of job titles: senior watch officer; information systems manager; data center manager; computer services director; combat information systems officer.

Network Services - Installs, configures, tests and maintains networks including hardware (hubs, bridges, switches, multiplexers and routers) and software that permit sharing and transmission of information. Examples of job titles: network designer; network administrator; network engineer; network systems and data communications analyst; spectrum warfare officer; telecommunications engineer.

System Administration - Installs, configures, troubleshoots and maintains server hardware and software to ensure confidentiality, integrity and availability. Also manages accounts, firewalls and patches. Responsible for access control/passwords/ account creation administration. Examples of job titles: website administrator; systems administrator; server administrator.

Data Administration - Develops and administers databases and/or data management systems that allow for the storage, query and utilization of data. Examples of job titles: data warehouse specialist; database developer; database administrator; data architect; information dissemination manager; content staging specialist.

Customer Service and Technical Support - Provides technical support and training to customers who need assistance with using client level hardware and software. Examples of job titles: computer support specialist; technical support specialist; help desk representative; systems administrator.

Knowledge Management - Manages and administers processes and tools that enable the organization to identify, document and access intellectual capital and content. Examples of job titles: business information manager; document steward; content administrator; information resources manager; cyber battlespace operations officer.

Information Systems Security Management - Oversees the IA program of an information system in or outside the network environment; may include procurement duties. Examples of job titles: information systems security officer (ISSO); IA manager; IA officer, IA program manager.

Systems Security Analysis - Conducts the integration/testing, operations and maintenance of systems security. Examples of job titles: IA officer; information systems security engineer; IA operational engineer; spectrum warfare officer.

Protect & Defend

CND Management - Oversees Computer Network Defense Service Provider (CND-SP) operations within organizations. Examples of job titles: mission manager; senior watch officer.

CND Incident Response - Investigates and analyzes all response activities related to cyber incidents within the network environment or enclave. Examples of job titles: incident responder; incident handler; computer crime investigator.

Vulnerability Assessment and Management - Conducts assessments on threats and vulnerabilities, determines the level of risk, deviations from acceptable configurations, enterprise or local policy, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations. Examples of job titles: CND auditor, close access technician; red team technician; blue team technician.

CND Infrastructure Support - Tests, implements, deploys, maintains, and administers the infrastructure hardware and software that are required to effectively manage the CND-SP network and resources. Examples of job titles: CND network security engineer; intrusion detection system (IDS) engineer; IDS technician; IDS administrator; security specialist.

CND Analysis - Uses data collected from a variety of CND tools (including intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occur within their environment for the purpose of mitigating threats. Examples of job titles: incident analyst; sensor analyst; network defense technician.
COPYRIGHT 2011 U.S. Navy
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2011 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Publication:CHIPS
Date:Oct 1, 2011
Words:717
Previous Article:Cyber Strategy initiatives.
Next Article:Ongoing and future cybersecurity workforce development.
Topics:

Terms of use | Privacy policy | Copyright © 2021 Farlex, Inc. | Feedback | For webmasters