misp-galaxy/tools/nist-nice/cybersecurity-opm.csv

15 KiB

1000Not Applicable - Does NOT involve work functions in information technology (IT), cybersecurity, or cyber-related areas.12/01/2016Present
2111All-Source Analyst - All-Source Analysis - Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations. (Analyze)12/01/2016Present
3112Mission Assessment Specialist - All-Source Analysis - Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness. (Analyze)12/01/2016Present
4121Exploitation Analyst - Exploitation Analysis - Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks. (Analyze)12/01/2016Present
5131Target Developer - Targets - Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation. (Analyze)12/01/2016Present
6132Target Network Analyst - Targets - Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks and the applications on them. (Analyze)12/01/2016Present
7141Warning Analyst - Threat Analysis - Develops unique cyber indicators to maintain constant awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber warning assessments. (Analyze)12/01/2016Present
8151Multi-Disciplined Language Analyst - Language Analysis - Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate intelligence information derived from language, voice and/or graphic material. Creates, and maintains language specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects. (Analyze)12/01/2016Present
9211Forensics Analyst - Digital Forensics - Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents. (Investigate)12/01/2016Present
10212Cyber Defense Forensics Analyst - Digital Forensics - Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. (Investigate)12/01/2016Present
11221Cyber Crime Investigator - Cyber Investigation - Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques. (Investigate)12/01/2016Present
12311All Source-Collection Manager - Collection Operations - Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to meet leadership's intent. Determines capabilities of available collection assets, identifies new collection capabilities; and constructs and disseminates collection plans. Monitors execution of tasked collection to ensure effective execution of the collection plan. (Collect and Operate)12/01/2016Present
13312All Source-Collection Requirements Manager - Collection Operations - Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of collection requirements. Evaluates performance of collection assets and collection operations. (Collect and Operate)12/01/2016Present
14321Cyber Operator - Cyber Operations - Conducts collection, processing, and/or geolocation of systems in order to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executing on-net operations. (Collect and Operate)12/01/2016Present
15331Cyber Intel Planner - Cyber Operational Planning - Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace. (Collect and Operate)12/01/2016Present
16332Cyber Ops Planner - Cyber Operational Planning - Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions. (Collect and Operate)12/01/2016Present
17333Partner Integration Planner - Cyber Operational Planning - Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions. (Collect and Operate)12/01/2016Present
18411Technical Support Specialist - Customer Service and Technical Support - Provides technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components. (i.e., Master Incident Management Plan, when applicable). (Operate and Maintain)12/01/2016Present
19421Database Administrator - Data Administration - Administers databases and/or data management systems that allow for the storage, query, and utilization of data. (Operate and Maintain)12/01/2016Present
20422Data Analyst - Data Administration - Examines data from multiple disparate sources with the goal of providing new insight. Designs and implements custom algorithms, flow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes. (Operate and Maintain)12/01/2016Present
21431Knowledge Manager - Knowledge Management - Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content. (Operate and Maintain)12/01/2016Present
22441Network Operations Specialist - Network Services - Plans, implements, and operates network services/systems, to include hardware and virtual environments. (Operate and Maintain)12/01/2016Present
23451System Administrator - Systems Administration - Installs, configures, troubleshoots, and maintains hardware and software, and administers system accounts. (Operate and Maintain)12/01/2016Present
24461Systems Security Analyst - Systems Analysis - Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security. (Operate and Maintain)12/01/2016Present
25511Cyber Defense Analyst - Cyber Defense Analysis - Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. (Protect and Defend)12/01/2016Present
26521Cyber Defense Infrastructure Support Specialist - Cyber Defense Infrastructure Support - Tests, implements, deploys, maintains, and administers the infrastructure hardware and software. (Protect and Defend)12/01/2016Present
27531Cyber Defense Incident Responder - Incident Response - Investigates, analyzes, and responds to cyber incidents within the network environment or enclave. (Protect and Defend)12/01/2016Present
28541Vulnerability Assessment Analyst - Vulnerability Assessment and Management - Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. (Protect and Defend)12/01/2016Present
29611Authorizing Official/Designating Representative - Risk Management - Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009). (Securely Provision)12/01/2016Present
30612Security Control Assessor - Risk Management - Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37). (Securely Provision)12/01/2016Present
31621Software Developer - Software Development - Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs. (Securely Provision)12/01/2016Present
32622Secure Software Assessor - Software Development - Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results. (Securely Provision)12/01/2016Present
33631Information Systems Security Developer - Systems Development - Designs, develops, tests, and evaluates information system security throughout the systems development life cycle. (Securely Provision)12/01/2016Present
34632Systems Developer - Systems Development - Designs, develops, tests, and evaluates information systems throughout the systems development life cycle. (Securely Provision)12/01/2016Present
35641Systems Requirements Planner - Systems Requirements Planning - Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions. (Securely Provision)12/01/2016Present
36651Enterprise Architect - Systems Architecture - Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures. (Securely Provision)12/01/2016Present
37652Security Architect - Systems Architecture - Designs enterprise and systems security throughout the development life cycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes. (Securely Provision)12/01/2016Present
38661Research & Development Specialist - Technology R&D - Conducts software and systems engineering and software systems research in order to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems. (Securely Provision)12/01/2016Present
39671System Testing and Evaluation Specialist - Test and Evaluation - Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results. (Securely Provision)12/01/2016Present
40711Cyber Instructional Curriculum Developer - Training, Education, and Awareness - Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs. (Oversee and Govern)12/01/2016Present
41712Cyber Instructor- Training, Education, and Awareness - Develops and conducts training or education of personnel within cyber domain. (Oversee and Govern)12/01/2016Present
42722Information Systems Security Manager - Cybersecurity Management - Responsible for the cybersecurity of a program, organization, system, or enclave. (Oversee and Govern)12/01/2016Present
43723COMSEC Manager - Cybersecurity Management - Manages the Communications Security (COMSEC) resources of an organization (CNSSI 4009). (Oversee and Govern)12/01/2016Present
44731Cyber Legal Advisor - Legal Advice and Advocacy - Provides legal advice and recommendations on relevant topics related to cyber law. (Oversee and Govern)12/01/2016Present
45732Privacy Compliance Manager - Legal Advice and Advocacy - Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance needs of privacy and security executives and their teams. (Oversee and Govern)12/01/2016Present
46751Cyber Workforce Developer and Manager - Strategic Planning and Policy - Develops cyberspace workforce plans, strategies and guidance to support cyberspace workforce manpower, personnel, training and education requirements and to address changes to cyberspace policy, doctrine, materiel, force structure, and education and training requirements. (Oversee and Govern)12/01/2016Present
47752Cyber Policy and Strategy Planner - Strategic Planning and Policy - Develops cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and initiatives. (Oversee and Govern)12/01/2016Present
48801Program Manager - Acquisition and Program/Project Management - Leads, coordinates, communicates, integrates and is accountable for the overall success of the program, ensuring alignment with critical agency priorities. (Oversee and Govern)12/01/2016Present
49802IT Project Manager - Acquisition and Program/Project Management - Directly manages information technology projects to provide a unique service or product. (Oversee and Govern)12/01/2016Present
50803Product Support Manager - Acquisition and Program/Project Management- Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components. (Oversee and Govern)12/01/2016Present
51804IT Investment/Portfolio Manager - Acquisition and Program/Project Management - Manages a portfolio of IT capabilities that align with the overall needs of mission and business enterprise priorities. (Oversee and Govern)12/01/2016Present
52805IT Program Auditor - Acquisition and Program/Project Management - Conducts evaluations of an IT program or its individual components, to determine compliance with published standards. (Oversee and Govern)12/01/2016Present
53901Executive Cyber Leadership - Executive Cyber Leadership - Executes decision-making authorities and establishes vision and direction for an organization's cyber and cyber-related resources and/or operations. (Oversee and Govern)12/01/2016Present