Cybersecurity

Vulnerability Assessment Analyst

This role performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.

Personnel performing this work role may unofficially or alternatively be called:

Technical Support Specialist

This role provides technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components (i.e., Master Incident Management Plan, when applicable).

Personnel performing this work role may unofficially or alternatively be called:

Security Control Assessor

This role conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37).

Personnel performing this work role may unofficially or alternatively be called:

Network Operations Specialist

This role plans, implements, and operates network services/systems, to include hardware and virtual environments.

Personnel performing this work role may unofficially or alternatively be called:

  • Network Administrator
  • Network Analyst
  • Network Designer
  • Network Engineer
  • Network Systems and Data Communications Analyst
  • Network Systems Engineer
  • Telecommunications Engineer/ Personnel/ Specialist

Category: Operate and Maintain
Specialty Area: Network Services