Investigate

Specialty areas are responsible for detecting and analyzing cyber events and/or crimes of IT systems, networks, and digital evidence.

Specialty Areas

Digital Forensics

Description

Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation, and/or criminal, fraud, counterintelligence or law enforcement investigations.

Related Job Titles
  • Computer Forensic Analyst
  • Computer Network Defense Forensic Analyst
  • Digital Forensic Examiner
  • Digital Media Collector
  • Forensic Analyst
  • Forensic Analyst (Cryptologic)
  • Forensic Technician
  • Network Forensic Examiner

Oversight & Development

Oversight and Development - Specialty areas providing leadership, management (pertinent to a CIO/CISO role), direction, and/or development and advocacy so that all individuals and the organization may effectively conduct cyber-security work.

Specialty Areas

Information Systems Security Operations (ISSO)

Description

Oversees the information assurance program of an information system in or outside the network environment; may include procurement duties.

Related Job Titles
  • Contracting Officer
  • Contracting Officer Technical Representative
  • Information Assurance Manager
  • Information Assurance Program Manager
  • Information Assurance Security Officer
  • Information Security Program Manager
  • Information Systems Security Manager
  • Information Systems Security Operations

Protect & Defend

Specialty areas responsible for the identification, analysis, and mitigation of threats to internal IT systems or networks.

Specialty Areas

Computer Network Defense (CND) Analysis

Description

Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.

Related Job Titles
  • CND Analyst (Cryptologic)
  • Cyber Security Intelligence Analyst
  • Focused Operations Analyst
  • Incident Analyst
  • Network Defense Technician
  • Network Security Engineer
  • Security Analyst
  • Security Operator
  • Sensor Analyst

CND Infrastructure Support

Description

Tests, implements, deploys, maintains, reviews and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities.

Related Job Titles
  • IDS Administrator
  • IDS Engineer
  • IDS Technician
  • Information Systems Security Engineer
  • Network Administrator
  • Network Analyst
  • Network Security Engineer
  • Network Security Specialist
  • Security Analyst
  • Security Engineer
  • Security Specialist
  • Systems Security Engineer

Incident Response

Description

Responds to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities.

Related Job Titles
  • Computer Crime Investigator
  • Incident Handler
  • Incident Responder
  • Incident Response Analyst
  • Incident Response Coordinator
  • Intrusion Analyst

Vulnerability Assessment and Management

Description

Vulnerability Assessment and Management - Conducts assessments of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations.

Related Job Titles
  • Blue Team Technician
  • Certified TEMPEST Professionals
  • Certified TEMPEST Technical Authority
  • Close Access Technician
  • CND Auditor
  • Compliance Manager
  • Ethical Hacker
  • Governance Manager
  • Information Security Engineer
  • Internal Enterprise Audit
  • Penetration Tester
  • Red Team Technician
  • Reverse Engineer
  • Risk/Vulnerability Analyst
  • Technical Surveillance Countermeasures Technician
  • Vulnerability Manager

Operate & Maintain

Specialty areas responsible for providing the support, administration, and maintenance necessary to ensure effective and efficient IT system performance and security.

Specialty Areas

Customer Service and Technical Support

Description

Addresses problems, installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered-level customer support).

Related Job Titles
  • Service Desk Operator
  • Computer Support Specialist
  • Customer Support
  • Help Desk Representative
  • Systems Administrator
  • Technical Support Specialist
  • User Support Specialist

Data Administration

Description

Develops and administers databases and/or data management systems that allow for the storage, query, and utilization of data.

Related Job Titles
  • Content Staging Specialist
  • Data Architect
  • Data Custodian
  • Data Manager
  • Data Warehouse Specialist
  • Database Administrator
  • Database Developer
  • Database Engineer/Architect
  • Information Dissemination Manager
  • Systems Operations Personnel

Network Services

Description

Installs, configures, tests, operates, maintains, and manages networks and their firewalls, including hardware (e.g., hubs, bridges, switches, multiplexers, routers, cables, proxy servers, and protective distributor systems) and software that permit the sharing and transmission of all spectrum transmissions of information to support the security of information and information systems.

Related Job Titles
  • Cabling Technician
  • Converged Network Engineer
  • Network Administrator
  • Network Analyst
  • Network Designer
  • Network Engineer
  • Network Systems and Data Communications Analyst
  • Network Systems Engineer
  • Systems Engineer
  • Telecommunications Engineer/Personnel/Specialist

System Administration

Description

Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Also manages accounts, firewalls, and patches. Responsible for access control, passwords, and account creation and administration.

Related Job Titles
  • LAN Administrator
  • Platform Specialist
  • Security Administrator
  • Server Administrator
  • System Operations Personnel
  • Systems Administrator
  • Website Administrator

Systems Security Analysis

Description

Conducts the integration/testing, operations, and maintenance of systems security.

Related Job Titles
  • IA Operational Engineer
  • Information Assurance Security Officer
  • Information Security Analyst/Administrator
  • Information Security Manager
  • Information Security Specialist
  • Information Systems Security Engineer
  • Information Systems Security Manager
  • Platform Specialist
  • Security Administrator
  • Security Analyst
  • Security Control Assessor
  • Security Engineer

Securely Provision

Specialty areas concerned with conceptualizing, designing, and building secure IT systems, with responsibility for some aspect of the systems' development.

Specialty Areas

Information Assurance Compliance

Description

Oversees, evaluates, and supports the documentation, validation, and accreditation processes necessary to assure that new IT systems meet the organization's information assurance and security requirements. Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.

Related Job Titles
  • Accreditor
  • Analyst/Manager
  • Auditor
  • Authorizing Official Designated Representative
  • Certification Agent
  • Certifying Official
  • Compliance Manager
  • Designated Accrediting Authority
  • IA Compliance
  • IA Manager
  • IA Officer
  • IT Auditor
  • Portfolio Manager
  • QA Specialist
  • Risk/Vulnerability Analyst
  • Security Control Assessor
  • Systems Analyst
  • Validator

Systems Security Architecture

Description

Develops system concepts and works on the capabilities phases of the systems development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.

Related Job Titles
  • IA Architect
  • Information Security Architect
  • Information Systems Security Engineer
  • Network Security Analyst
  • R&D Engineer
  • Security Architect
  • Security Engineer
  • Security Solutions Architect
  • Systems Engineer
  • Systems Security Analyst

Test and Evaluation

Description

Develops and conducts tests of systems to evaluate compliance with specifications and requirements by applying principles and methods for cost-effective planning, evaluating, verifying, and validating of technical, functional, and performance characteristics (including interoperability) of systems or elements of systems incorporating IT.

Related Job Titles
  • Application Security Tester
  • Information Systems Security Engineer
  • Quality Assurance Tester
  • R&D Engineer
  • R&D Research Engineer
  • Security Systems Engineer
  • Software Quality Assurance Engineer
  • Software Quality Engineer
  • Systems Engineer
  • Testing and Evaluation Specialist

Analyze

Specialty areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.

Specialty Areas

Exploitation Analysis

Description

Analyzes collected information to identify vulnerabilities and potential for exploitation.

Related Job Titles
  • Security Analyst
  • Vulnerability Analyst
  • Threat Intelligence Analyst
  • Security Engineer

Threat Analysis

Description

Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities.

Related Job Titles
  • Security Analyst
  • Security Operations Center (SOC) Analyst
  • Vulnerability Analyst
  • Cybersecurity Specialist
  • Threat Intelligence Analyst
  • Security Engineer

Collect & Operate

Specialty areas responsible for specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.

Specialty Areas

Cyber Operations Planning

Description

Performs in-depth joint targeting and cyber planning process. Gathers information and develops detailed Operational Plans and Orders supporting requirements. Conducts strategic and operational-level planning across the full range of operations for integrated information and cyberspace operations.

Related Job Titles
  • Cyberspace Joint Operation Planner
  • Cyber Operations Planner

Cyber Operations

Description

Performs activities to gather evidence on criminal or foreign intelligence entities in order to mitigate possible or real-time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.

Related Job Titles
  • Cyber Systems Operator
  • Cybersecurity Operations Solutions Engineer
  • Cyber Operations Officer

Contact Us

We have anticipated all of the steps to take when implementing a certification program for your agency or department. We’re here to help you when and if you need assistance.

Simply fill out the form below and we’ll contact you to answer your questions and provide information about certification pricing for government.

TryCertmaster
RoadMap-Solid