Cybersecurity Analyst

$ / mo

Category:

Analyze

Specialty area:
Сountry:

Ukraine

City:

Employment options:
Work & Experience:
Knowledges:
K0001

Knowledge of computer networking concepts and protocols, and network security methodologies.

K0002

Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

K0003

Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.

K0004

Knowledge of cybersecurity and privacy principles.

K0005

Knowledge of cyber threats an`d vulnerabilities.

K0006

Knowledge of specific operational impacts of cybersecurity lapses.

K0036

Knowledge of human-computer interaction principles.

K0058

Knowledge of network traffic analysis methods.

K0108

Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).

K0109

Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

K0177

Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).

K0349

Knowledge of website types, administration, functions, and content management system (CMS).

K0362

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

K0377

Knowledge of classification and control markings standards, policies and procedures.

K0392

Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).

K0395

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

K0405

Knowledge of current computer-based intrusion sets.

K0409

Knowledge of cyber intelligence/information collection capabilities and repositories.

K0415

Knowledge of cyber operations terminology/lexicon.

K0417

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

K0427

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

K0431

Knowledge of evolving/emerging communications technologies.

K0436

Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects.

K0437

Knowledge of general Supervisory control and data acquisition (SCADA) system components.

K0440

Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability.

K0444

Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP).

K0445

Knowledge of how modern digital and telephony networks impact cyber operations.

K0446

Knowledge of how modern wireless communications systems impact cyber operations.

K0449

Knowledge of how to extract, analyze, and use metadata.

K0458

Knowledge of intelligence disciplines.

K0460

Knowledge of intelligence preparation of the environment and similar processes.

K0464

Knowledge of intelligence support to planning, execution, and assessment.

K0469

Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions.

K0471

Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

K0480

Knowledge of malware.

K0499

Knowledge of operations security.

K0511

Knowledge of organizational hierarchy and cyber decision-making processes.

K0516

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

K0556

Knowledge of telecommunications fundamentals.

K0560

Knowledge of the basic structure, architecture, and design of modern communication networks.

K0561

Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

K0565

Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

K0603

Knowledge of the ways in which targets or threats use the Internet.

K0604

Knowledge of threat and/or target systems.

K0610

Knowledge of virtualization products (VMware, Virtual PC).

K0612

Knowledge of what constitutes a “threat” to a network.

K0614

Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.

K0131

Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies.

K0142

Knowledge of collection management processes, capabilities, and limitations.

K0143

Knowledge of front-end collection systems, including traffic collection, filtering, and selection.

K0224

Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.

K0351

Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation.

K0354

Knowledge of relevant reporting and dissemination procedures.

K0368

Knowledge of implants that enable cyber collection and/or preparation activities.

K0371

Knowledge of principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis).

K0376

Knowledge of internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

K0379

Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.

K0388

Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.

K0393

Knowledge of common networking devices and their configurations.

K0394

Knowledge of common reporting databases and tools.

K0397

Knowledge of security concepts in operating systems (e.g., Linux, Unix.)

K0418

Knowledge of data flow process for terminal or environment collection.

K0443

WITHDRAWN: Knowledge of how hubs, switches, routers work together in the design of a network. (See K0143)

K0447

Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).

K0451

Knowledge of identification and reporting processes.

K0470

Knowledge of Internet and routing protocols.

K0473

Knowledge of intrusion sets.

K0484

Knowledge of midpoint collection (process, objectives, organization, targets, etc.).

K0487

Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

K0489

Knowledge of network topology.

K0509

Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives.

K0510

Knowledge of organizational and partner policies, tools, capabilities, and procedures.

K0523

Knowledge of products and nomenclature of major vendors (e.g., security suites - Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities.

K0529

Knowledge of scripting

K0535

Knowledge of strategies and tools for target research.

K0544

Knowledge of target intelligence gathering and operational preparation techniques and life cycles.

K0557

Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.).

K0559

Knowledge of the basic structure, architecture, and design of converged applications.

K0608

Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).

K0221

Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).

K0357

Knowledge of analytical constructs and their use in assessing the operational environment

K0410

Knowledge of cyber laws and their effect on Cyber planning.

K0457

Knowledge of intelligence confidence levels.

K0465

Knowledge of internal and external partner cyber operations capabilities and tools.

K0507

Knowledge of organization or partner exploitation of digital networks.

K0533

Knowledge of specific target identifiers, and their usage.

K0414

Knowledge of cyber operations support or enabling processes.

K0413

Knowledge of cyber operation objectives, policies, and legalities.

K0439

Knowledge of governing authorities for targeting.

K0479

Knowledge of malware analysis and characteristics.

K0497

Knowledge of operational effectiveness assessment.

K0543

Knowledge of target estimated repair and recuperation times.

K0555

Knowledge of TCP/IP networking protocols.

K0403

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

K0424

Knowledge of denial and deception techniques.

K0442

Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless).

K0472

Knowledge of intrusion detection systems and signature development.

K0483

Knowledge of methods to integrate and summarize information from any potential sources.

K0567

Knowledge of the data flow from collection origin to repositories and tools.

K0356

Knowledge of analytic tools and techniques for language, voice and/or graphic material.

K0396

Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types.

K0398

Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML).

K0407

Knowledge of customer information needs.

K0416

Knowledge of cyber operations.

K0488

Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network.

K0491

Knowledge of networking and Internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.).

K0493

Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption).

K0524

Knowledge of relevant laws, regulations, and policies.

K0532

Knowledge of specialized target language (e.g., acronyms, jargon, technical terminology, code words).

K0545

Knowledge of target language(s).

Skills:
S0194

Skill in conducting non-attributable research.

S0211

Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

S0218

Skill in evaluating information for reliability, validity, and relevance.

S0227

Skill in identifying alternative analytical interpretations to minimize unanticipated outcomes.

S0228

Skill in identifying critical target elements, to include critical target elements for the cyber domain.

S0289

Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.

S0296

Skill in utilizing feedback to improve processes, products, and services.

S0303

Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources.

S0066

Skill in identifying gaps in technical capabilities.

S0184

Skill in analyzing traffic to identify network devices.

S0207

Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments.

S0223

Skill in generating operation plans in support of mission and target requirements.

S0236

Skill in identifying the devices that work at each level of protocol models.

S0237

Skill in identifying, locating, and tracking targets via geospatial analysis techniques

S0264

Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information).

S0269

Skill in researching vulnerabilities and exploits utilized in traffic.

S0300

Skill in writing (and submitting) requirements to meet gaps in technical capabilities.

S0360

Skill to analyze and assess internal and external partner cyber operations capabilities and tools.

S0271

Skill in reviewing and editing assessment products.

S0187

Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses).

S0208

Skill in determining the physical location of network devices.

S0248

Skill in performing target system analysis.

S0274

Skill in reviewing and editing target materials.

S0302

Skill in writing effectiveness reports.

S0178

Skill in analyzing essential network data (e.g., router configuration files, routing protocols).

S0181

Skill in analyzing midpoint collection data.

S0183

Skill in analyzing terminal or environment collection data.

S0191

Skill in assessing the applicability of available analytical tools to various situations.

S0197

Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis.

Abilities:
A0013

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

A0066

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

A0082

Ability to effectively collaborate via virtual teams.

A0106

Ability to think critically.

A0109

Ability to utilize multiple intelligence sources across all intelligence disciplines.

A0074

Ability to collaborate effectively with others.

A0092

Ability to identify/describe target vulnerability.

A0108

Ability to understand objectives and effects.

A0103

Ability to review processed target language materials for accuracy and completeness.

Licenses & certifications: