Saudi Cybersecurity Workforce Framework
Saudi Cybersecurity Workforce Framework
This marking protocol is widely used around the world. It has four colors (traffic lights):
White – No Restriction
Table of Contents
1. Introduction 5
1.1 An Overview 5
1.2 Methodology and Structure 5
2. The Saudi Cybersecurity Workforce Framework Taxonomy 7
2.1 Cybersecurity Architecture, Research and Development (CARD) Job Roles 11
2.2 Leadership and Workforce Development (LWD) Job Roles 12
2.3 Governance, Risk, Compliance and Laws (GRCL) Job Roles 13
2.4 Protection and Defense (PD) Job Roles 14
2.5 Industrial Control Systems and Operational Technologies (ICS/OT) Job Roles 16
3. Appendices 17
3.1 Appendix A: Job Role Details 17
3.1.1 Category Group: Cybersecurity Architecture, Research and Development (CARD) 17
3.1.2 Category Group: Leadership and Workforce Development (LWD) 21
3.1.3 Category Group: Governance, Risk, Compliance and Laws (GRCL) 24
3.1.4 Category Group: Protection and Defense (PD) 28
3.1.5 Category Group: Industrial Control Systems and Operational Technologies (ICS/OT) 35
3.2 Appendix B: List of Tasks, Knowledge, Skills and Abilities 38
List of Tables
Table 1: SCyWF Categories 9
Table 2: SCyWF Specialty Areas 10
Table 3: Cybersecurity Architecture, Research and Development (CARD) Job Roles 11
Table 4: Leadership and Workforce Development (LWD) Job Roles 12
Table 5: Governance, Risk, Compliance and Laws (GRCL) Job Roles 13
Table 6: Protection and Defense (PD) Job Roles 14
Table 7: Industrial Control Systems and Operational Technologies (ICS/OT) Job Roles 16
Table 8: SCyWF Numbering Scheme of TKSAs 38
Table 9: Tasks Descriptions 39
Table 10: Knowledge Descriptions 73
Table 11: Skills Descriptions 95
Table 12: Abilities Descriptions 108
List of Figures
Figure 1: SCyWF Framework Structure 6
Figure 2: The SCyWF Taxonomy 8
Sharing Indicator: White The Saudi Cybersecurity Workforce Framework
1 Introduction
The Saudi National Cybersecurity Authority (NCA) is leading the national effort to protect the
country’s cyber space. This mission requires a qualified national cybersecurity workforce capable of
carrying out all types of cybersecurity work. The NCA’s mandate was issued by Royal Order number
6801, dated October 31, 2017. It includes building the national cybersecurity workforce, participating
in the development of education and training programs, preparing professional standards and
frameworks and developing and running tests to assess cybersecurity professionals. The NCA has
developed the Saudi Cybersecurity Workforce Framework (SCyWF) as a foundational step towards
carrying out that mandate.
1.1 An Overview
The SCyWF categorizes cybersecurity work in Saudi Arabia, defines the job roles within each
category and sets the requirements for each job role in terms of tasks, knowledge, skills and abilities
(TKSAs).
The main objective of the SCyWF is to serve as a reference model and a guideline for preparing,
developing, recruiting, promoting and managing the cybersecurity workforce. It provides a common
lexicon that improves communication and content development for talent management activities. It
also helps in mapping learning outcomes of education and training programs to the knowledge, skills
and abilities (KSAs) required for different cybersecurity job roles.
Organizations are recommended to adopt this framework so they can align their cybersecurity
workforce structures and activities with the national frameworks and guidelines. However, they can
customize the framework to address their requirements.
Since cybersecurity is a highly dynamic discipline, the content of this framework will be reviewed
and updated periodically.
1 NIST Special Publication 800-181, “National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework”, 2017. https://
doi.org/10.6028/NIST.SP.800-181
in line with the NICE approach. However, the SCyWF categories, specialty areas and job roles are
different from those in the NICE framework and have been developed to address the cybersecurity
workforce demand in Saudi Arabia. The job roles, specialty areas and categories are defined as follows.
A job role is a set of cybersecurity tasks that need to be performed in a cybersecurity job. A job role
is defined by a set of tasks to be performed within that job role and a list of KSAs required to perform
those tasks. All SCyWF job roles are listed in Appendix A.
A specialty area is a group of job roles that serve a cybersecurity function and share common TKSAs.
A category is a group of specialty areas and the job roles associated with them, that serve related
cybersecurity functions.
This framework only covers job roles that are specific to cybersecurity. There are non-cybersecurity
job roles that have some cybersecurity responsibilities or require some cybersecurity KSAs. Most of
these non-cybersecurity job roles are IT job roles, and they are outside the scope of this framework. In
addition, all employees and IT users are expected to have some awareness of cybersecurity risks and
good practice.
Figure 1 illustrates the structure of the SCyWF.
Table 1 describes the SCyWF categories. Each category has a unique identifier (ID) composed of the first
characters of the category’s name (e.g. PD for Protection and Defense). This forms part of the full job role ID
for the job roles under each category as described in Appendix A.
Table 1: SCyWF Categories
Category Descriptions
Cybersecurity Architecture, Research and Development Conducts cybersecurity design, architecture, research
(CARD) and development activities.
Leads cybersecurity teams and work. Develops
Leadership and Workforce Development (LWD) cybersecurity human capital.
Develops organizational cybersecurity policies. Governs
cybersecurity structures and processes, manages cyber
Governance, Risk, Compliance and Laws (GRCL) risks and assures compliance with the organization’s
cybersecurity, risk management and related legal
requirements.
Identifies, analyzes, monitors, mitigates and manages
threats and vulnerabilities to IT systems and networks.
Protection and Defense (PD)
Uses defensive measures and multi-source information
to report events and respond to incidents.
Conducts cybersecurity tasks for Industrial Control
Industrial Control Systems and Operational Systems and Operational Technologies (ICS/OT).
Technologies (ICS/OT)
Table 2 describes the SCyWF specialty areas and the categories to which they belong. Each specialty area has a
unique ID composed of the first characters of the specialty area’s name (e.g. VA for Vulnerability Assessment).
This is used alongside the category ID when creating job role IDs for the jobs under each specialty area, as
described in Appendix A.
Table 3 describes the job roles in the Cybersecurity Architecture, Research and Development category.
Table 3: Cybersecurity Architecture, Research and Development (CARD) Job Roles
No Specialty Job Role Job Role ID Description
Area
Cybersecurity CARD-CA-001 Designs and oversees the development,
Architect implementation and configuration of
1 Cybersecurity cybersecurity systems and networks.
Architecture Secure Cloud CARD-CA-002 Designs, implements and operates secure cloud
(CA) Specialist computing systems and develops secure cloud
2 policies.
3 Systems Security CARD-CRD-001 Designs, develops, tests and evaluates security
Development of information systems throughout the
Specialist development life-cycle.
4 Cybersecurity CARD-CRD-002 Develops cybersecurity software, applications,
Developer systems and products.
5 Secure Software CARD-CRD-003 Assesses the security of computer applications,
Assessor software, code or programs and provides
actionable results.
6 Cybersecurity Cybersecurity CARD-CRD-004 Conducts scientific research in the
Research and Researcher cybersecurity field.
7 Development Cybersecurity CARD-CRD-005 Uses mathematical models and scientific
(CRD) Data Science methods and processes to design and
Specialist implement algorithms and systems that extract
cybersecurity insights and knowledge from
multiple large-scale data sets.
8 Cybersecurity CARD-CRD-006 Uses artificial intelligence models and
Artificial techniques (including machine learning ones) to
Intelligence design and implement algorithms and systems
Specialist that automate and improve the efficiency and
effectiveness of cybersecurity tasks.
Table 4 describes the job roles in the Leadership and Workforce Development category.
Table 4: Leadership and Workforce Development (LWD) Job Roles
No Specialty Job Role Job Role ID Description
Area
9 Chief Information LWD-L-001 Directs cybersecurity work within an
Security Officer/ organization, establishes vision and direction
Director for its cybersecurity and related strategies,
resources and activities and advises the
leadership on the effective management of the
organization’s cyber risks.
10 Cybersecurity LWD-L-002 Manages the security of information systems
Leadership (L)
Manager and functions within an organization. Leads a
cybersecurity team, unit and/or enterprise level
function.
11 Cybersecurity LWD-L-003 Provides expert consultancy and advice on
Advisor cybersecurity topics to an organization’s
leadership and to its cybersecurity leadership
and teams.
12 Cybersecurity LWD-WD-001 Develops plans, strategies and guidance within
Human Capital an organization to support the development and
Manager management of the cybersecurity workforce.
13 Workforce Cybersecurity LWD-WD-002 Develops, plans, coordinates and evaluates
Development Instructional cybersecurity training and education programs,
(WD) Curriculum courses, contents, methods and techniques
Developer based on instructional needs.
14 Cybersecurity LWD-WD-003 Teaches, trains, develops and tests people in
Instructor cybersecurity topics.
Table 5 describes the job roles in the Governance, Risk, Compliance and Laws category.
Table 5: Governance, Risk, Compliance and Laws (GRCL) Job Roles
No Specialty Job Role Job Role ID Description
Area
15 Cybersecurity GRCL-GRC-001 Identifies, assesses and manages an
Risk Officer organization’s cybersecurity risks to protect its
information and technology assets in line with
organizational policies and procedures and
related laws and regulations.
16 Cybersecurity GRCL-GRC-002 Ensures an organization’s cybersecurity
Compliance program complies with applicable requirements,
Governance, Officer policies and standards.
17 Risk and Cybersecurity GRCL-GRC-003 Develops, updates and maintains cybersecurity
Compliance Policy Officer policies to support and align with an
(GRC) organization’s cybersecurity requirements.
18 Security Controls GRCL-GRC-004 Analyzes cybersecurity controls and assesses
Assessor their effectiveness.
19 Cybersecurity GRCL-GRC-005 Designs, performs and manages cybersecurity
Auditor audits to assess an organization’s compliance
with applicable requirements, policies,
standards and controls. Prepares audit reports
and communicates them to authorized parties.
20 Cybersecurity GRCL-LDP-001 Provides legal services on topics related to cyber
Legal Specialist laws and regulations.
21 Privacy/Data GRCL-LDP-002 Studies personal data schemes and the
Protection Officer applicable privacy laws and regulations.
Laws and Data
Analyzes privacy risks. Develops and oversees
Protection
the implementation of an organization’s privacy
(LDP)
and data protection compliance program and
internal policies. Supports organizational
response to a privacy or data protection
incident.
Table 6 describes the job roles in the Protection and Defense category.
Table 6: Protection and Defense (PD) Job Roles
No Specialty Job Role Job Role ID Description
Area
22 Cybersecurity PD-D-001 Uses data collected from cyber defense tools
Defense Analyst to analyze events that occur within their
organization to detect and mitigate cyber
threats.
23 Cybersecurity PD-D-002 Tests, implements, deploys, maintains and
Defense (D) administers hardware and software that protect
Infrastructure
Specialist and defend systems and networks against
cybersecurity threats.
24 Cybersecurity PD-D-003 Provides general cybersecurity support. Assists
Specialist in cybersecurity tasks.
25 Cryptography PD-P-001 Develops, evaluates, analyzes and identifies
Specialist weaknesses of, and improvements to,
cryptography systems and algorithms.
26 Identity PD-P-002 Manages individuals and entities identities
and Access and access to resources through applying
Protection (P) identification, authentication and authorization
Management
Specialist systems and processes.
27 Systems Security PD-P-003 Develops, tests and maintains systems’ security.
Analyst Analyzes security of operations and integrated
systems.
28 Vulnerability PD-VA-001 Performs vulnerability assessments of
Assessment systems and networks. Identifies where they
Specialist deviate from acceptable configurations or
applicable policies. Measures effectiveness of
Vulnerability defense-in-depth architecture against known
Assessment vulnerabilities.
29 (VA) Penetration PD-VA-002 Conducts authorized attempts to penetrate
Tester/Red Team computer systems or networks and physical
Specialist premises, using realistic threat techniques, to
evaluate their security and detect potential
vulnerabilities.
2.5 Industrial Control Systems and Operational Technologies (ICS/OT) Job Roles
Table 7 describes the job roles in the Industrial Control Systems and Operational Technologies category.
Table 7: Industrial Control Systems and Operational Technologies (ICS/OT) Job Roles
No Specialty Job Role Job Role ID Description
Area
36 ICS/OT ICSOT-ICSOT-001 Designs and oversees the development,
Cybersecurity implementation and configuration of
Architect cybersecurity systems and networks in ICS/
OT environments.
37 ICS/OT ICSOT-ICSOT-002 Tests, implements, deploys, maintains and
Cybersecurity administers hardware and software that
Infrastructure protect and defend systems and networks
Specialist against cybersecurity threat in ICS/OT
environments.
Industrial
38 ICS/OT ICSOT-ICSOT-003 Uses data collected from a variety of
Control Systems
Cybersecurity cybersecurity tools to analyze events that
and Operational
Defense Analyst occur within ICS/OT environments to detect
Technologies
and mitigate cybersecurity threats.
(ICS/OT)
39 ICS/OT ICSOT-ICSOT-004 Identifies, assesses and manages cybersecurity
Cybersecurity risks within ICS/OT environments. Evaluates
Risk Officer and analyzes the effectiveness of existing
cybersecurity controls and provides feedback
and recommendations based on assessments.
40 ICS/OT ICSOT-ICSOT-005 Investigates, analyzes and responds to
Cybersecurity cybersecurity incidents within ICS/OT
Incident environments.
Responder
For the KSAs required for each job role and the tasks associated with it, see Appendix A.
3 Appendices
3.1 Appendix A: Job Role Details
3.1.1 Category Group: Cybersecurity Architecture, Research and Development (CARD)
Job Role Details
Knowledge
K0001, K0002, K0003, K0004, K0005, K0006, K0074, K0119, K1039, K1040, K1041, K1042,
K1043, K1044, K1046, K1047
Skills S1031, S1032, S1033, S1034, S1035, S1036, S1037
Abilities A1006, A1007, A1008
Tasks
T0036, T0037, T0039, T0043, T0050, T0053, T0059, T0061, T0074, T0079, T2503, T2505,
T2507, T2508, T2509, T2510, T2511, T2512, T2514, T2516
K0001, K0002, K0003, K0004, K0005, K0006, K0007, K0008, K0009, K0010, K0011, K0013,
K0016, K0017, K0019, K0020, K0021, K0022, K0028, K0029, K0031, K0035, K0037, K0038,
Knowledge K0042, K0044, K0052, K0055, K0060, K0061, K0073, K0074, K0079, K0091, K0092, K0093,
K0100, K0110, K0113, K0118, K0124, K0125, K0126, K0128, K0133, K0146, K0153, K0168,
K0169, K1004, K1017, K1511, K2500, K2501, K2502, K5503
S0001, S0004, S0010, S0019, S0023, S0034, S0036, S0037, S0038, S0040, S0044, S0045,
S0046, S0047, S0048, S0050, S0051, S0055, S0061, S0063, S0064, S1008, S2500, S2501,
Skills S2502, S2503, S2504, S2505, S2506, S2507, S2508, S2509, S2510, S2511, S2512, S2513,
S2514, S2515, S2516, S2517, S2521, S2523, S2524, S2525, S2527, S2528, S2529, S2530,
S2531, S2532, S2533, S2534, S2535, S2536, S2539, S2540, S2541, S2542, S2543
A0001, A0002, A0003, A0004, A0005, A0008, A0012, A0015, A0016, A0017, A0018,
A0019, A0021, A0025, A0027, A0028, A0029, A0030, A0031, A0032, A0035, A0044,
Abilities A2502, A2503, A2504, A2505, A2506, A2507, A2508, A2509, A2511, A2512, A2513,
A2514, A2515, A2516, A2517, A2518, A2519, A2520, A2521, A2523, A2524, A2525,
A2526, A2527
Tasks
T0019, T0038, T1501, T3000, T3001, T3002, T3003, T3004, T3005, T3006, T3007, T3008,
T3009, T3010, T3052
Knowledge
K0002, K0003, K0004, K0005, K0006, K0044, K0065, K0074, K0084, K0125, K0126, K0128,
K3000, K3001, K3002, K3004, K5503
Skills S0058
Abilities A3000
Tasks
T0009, T0026, T0027, T0028, T0031, T0034, T0044, T0047, T0051, T0058, T0062, T0087,
T0101, T0106, T5003, T5025, T5031, T5040, T5054
K0001, K0002, K0003, K0004, K0005, K0006, K0019, K0021, K0024, K0025, K0032, K0033,
Knowledge K0036, K0043, K0047, K0052, K0064, K0074, K0084, K0087, K0088, K0090, K0099, K0100,
K0117, K0121, K0123, K0133, K0148, K0168, K0169, K5503
S0002, S0004, S0006, S0009, S0010, S0011, S0012, S0013, S0014, S0015, S0018, S0019,
S0020, S0022, S0023, S0024, S0025, S0026, S0027, S0033, S0035, S0041, S0044, S0046,
S0048, S0051, S0052, S0054, S0060, S1022, S1023, S1033, S1503, S2000, S2002, S2506,
Skills S2523, S2526, S2532, S2533, S2535, S2538, S3500, S3501, S5000, S5001, S5002, S5003,
S5004, S5005, S5006, S5007, S5008, S5009, S5010, S5011, S5012, S5013, S5014, S5017,
S5501, S5502, S5503, S5504, S5505, S5506, S5507, S5508, S5509, S5510, S5511, S5512,
S5513, S5514
Abilities A0034, A0036
3.1.5 Category Group: Industrial Control Systems and Operational Technologies (ICS/OT)
Tasks
T0009, T0026, T0027, T0028, T0031, T0044, T0047, T0051, T0058, T0062, T0087, T0101,
T0106, T5025, T5031, T6014, T6015
K0001, K0002, K0003, K0004, K0005, K0006, K0019, K0021, K0024, K0025, K0032, K0033,
Knowledge
K0036, K0043, K0047, K0052, K0064, K0074, K0084, K0087, K0088, K0090, K0099, K0100,
K0117, K0121, K0123, K0133, K0148, K0168, K5503, K6001, K6012, K6014, K6015, K6016,
K6017, K6018, K6019, K6020
S0002, S0004, S0006, S0009, S0010, S0011, S0012, S0013, S0014, S0015, S0018, S0019,
S0020, S0022, S0023, S0024, S0025, S0026, S0027, S0033, S0035, S0041, S0044, S0046,
S0048, S0051, S0052, S0054, S0060, S1022, S1023, S1033, S1034, S1503, S2000, S2002,
Skills S2506, S2523, S2526, S2532, S2533, S2535, S2538, S3500, S3501, S5000, S5001, S5002,
S5003, S5004, S5005, S5006, S5007, S5008, S5009, S5010, S5011, S5012, S5013, S5014,
S5017, S5501, S5502, S5503, S5504, S5505, S5506, S5507, S5508, S5509, S5510, S5511,
S5512, S5513, S5514, S6001, S6004, S6006, S6007
Abilities A6004, A6005, A6006
Governance, Risk, Compliance and Laws Governance, Risk and Compliance 2500-2999
Protection 4000-4499
Industrial Control Systems and Operational Industrial Control Systems and 6000-6499
Technologies (ICS/OT) Operational Technologies (ICS/OT)
T0003
Analyze organization's cybersecurity defense policies and configurations to evaluate compliance with
regulations and organizational directives.
T0004 Apply security policies to applications that interface with one another.
T0006
Develop security risk profiles of computer systems by assessing threats to, and vulnerabilities of,
those systems.
T0007
Conduct Privacy Impact Assessments (PIAs) to ensure that Personally Identifiable Information (PII)
is appropriately protected.
T0008
Collaborate with stakeholders to ensure business continuity and disaster recovery programs meet
organizational requirements.
T0009 Correlate incident data to identify vulnerabilities.
T0014 Develop statements of preliminary or residual cybersecurity risks for system operation.
Use cybersecurity products and security control technologies to reduce identified risk to an acceptable
T0015
level.
Ensure that protection and detection capabilities are aligned with the organization's cybersecurity
T0016
strategy, policies and other related documentation.
T0017 Establish and maintain appropriate communication channels with stakeholders.
T0018 Build relationships between the incident response team and internal and external partners.
Evaluate cybersecurity aspects of contracts to ensure compliance with financial, contractual, legal
T0019
and regulatory requirements.
T0020 Ensure that decisions relating to cybersecurity are based on sound risk management principles.
T0026 Analyze log files from multiple sources to identify possible threats to network security.
Triage incidents to identify specific vulnerability, determine scope, urgency and potential impact,
T0027
make recommendations that enable expeditious remediation.
T0028 Analyze and report cyber defense trends.
Correlate information from multiple sources to understand situation and determine the effectiveness
T0029
of an observed attack.
T0030 Perform file signature analysis.
Perform initial collection of images to relevant forensic standards; inspect to evaluate possible
T0031
mitigation and remediation measures.
T0032 Perform real-time forensic analysis.
T0039 Perform risk analysis whenever an application or system undergoes a major change.
Analyze exercise results and system environment to plan and recommend modifications and
T0040
adjustments.
Prepare cybersecurity assessment and audit reports that identify technical and procedural findings,
T0041
and include recommended remediation strategies and solutions.
T0042 Provide cybersecurity related guidance to inform business continuity and data protection plans.
T0043 Provide input to the risk management framework and related documentation.
T0044 Analyze network alerts from multiple sources to determine possible causes.
T0045 Review existing and proposed policies and related documentation with stakeholders.
T0047 Track and document cyber incidents from initial detection to final resolution.
T0048 Track audit findings and recommendations to ensure that appropriate mitigation actions are taken.
Capture and analyze network traffic associated with malicious activities using network monitoring
T0049
tools.
T0050 Review, update and maintain cybersecurity related documentation reflecting system design.
Write and publish cyber defense techniques, guidance and post incident reports to appropriate
T0051
constituencies.
T0052 Research current technology to understand cyber defense capability required by systems or networks.
Ensure cybersecurity risks are identified and managed appropriately through the organization's risk
T0053
governance process.
Provide timely detection, identification and alerting of possible attacks, anomalous activities and
T0054
misuse activities and distinguish them from benign activities.
Use cyber defense tools to monitor and analyze system activity continuously to identify malicious
T0055
activity.
Analyze malicious activity to determine vulnerabilities exploited, exploitation methods and effects
T0056
on system and information.
T0057 Identify, prioritize and coordinate the protection of critical cyber defense infrastructure and resources.
T0058 Employ defense-in-depth principles and practices in line with organizational policies.
T0065 Examine network topologies to understand data flows through the network.
T0071 Use network traffic to identify a network device's applications and operating systems.
T0077 Supervise and effectively assign work to staff working on cybersecurity related tasks.
T0078 Ensure that appropriate funding for cybersecurity training resources is made available.
T0085 Promote awareness of cyber policy and strategy as appropriate among the organization's management.
T0086 Review and assess cybersecurity staff effectiveness to identify skills gaps and training requirements.
T0087 Write and publish reviews to learn and promulgate lessons from cybersecurity events.
Interpret and apply applicable laws, statutes and regulatory documents to ensure they are reflected
T0088
in the cybersecurity policies.
T0089 Identify and develop reverse engineering tools to enhance capabilities and detect vulnerabilities.
Design, develop, integrate and update system security measures that provide confidentiality, integrity,
T0096
availability, authentication and non-repudiation.
T0097 Analyze and report on trends in the organization's security posture.
T0107 Make cybersecurity recommendations to leadership based on significant threats and vulnerabilities.
T0110 Support the Chief Information Officer (CIO) in the formulation of cybersecurity policies.
T0111 Work with stakeholders to resolve cybersecurity incidents and vulnerability compliance issues.
Provide cybersecurity advice and input for disaster recovery, contingency, and continuity of
T0112
operations plans.
Perform technical and nontechnical risk and vulnerability assessments of organizational technology
T0113
environments.
Apply cybersecurity functions (e.g., encryption, access control and identity management) to reduce
T0114
exploitation opportunities.
T0126 Work with others on policies, processes and procedures relating to cybersecurity and privacy.
Ensure that appropriate controls are in place to effectively mitigate risk and address privacy concerns
T0127
during a risk assessment process.
T0128 Work with others to implement and maintain a cybersecurity risk management program.
Identify and assign individuals to specific roles associated with the execution of the Risk Management
T0129
Framework.
Establish a risk management strategy for the organization that includes a determination of risk
T0130
tolerance.
Conduct an initial risk assessment of stakeholder assets and update the risk assessment on an ongoing
T0131
basis.
Work with organizational officials to ensure continuous monitoring tool data provides situation
T0132
awareness of risk levels.
T0133 Use continuous monitoring tools to assess risk on an ongoing basis.
Review and analyze cybersecurity threats to provide stakeholders with information needed to
T0135
respond to threats.
T0136 Make recommendations to enable effective remediation of vulnerabilities.
T0137 Ensure sound principles are reflected in the organization's mission, vision and goals.
Deliver secure cloud solutions to development teams, ensure security of cloud migrations and cloud
T0500
application development.
Work within and across multi-disciplinary teams as a domain expert in cloud security architecture
T0501
standards and methodologies.
T0502 Evaluate and determine the adequacy of security architectures and designs.
T0503 Develop and implement secure cloud strategy in conjunction with enterprise architecture.
T0504 Develop and enforce secure designs for technology teams to consume cloud services.
T0505 Build solutions to identify existing organizational data within cloud environments.
Provide subject matter expertise to develop and architect the next generation of organizational
T0506
cybersecurity.
T0507 Employ secure configuration management processes.
T0508 Identify and prioritize critical business functions in collaboration with organizational stakeholders.
T0511 Analyze candidate architectures, allocate security services and select security mechanisms.
Define system security context, concept of operations and baseline requirements in line with
T0512
applicable cybersecurity policies.
T0513 Evaluate security architectures and designs proposed in procurement documents.
T0514 Write detailed functional specifications that document the architecture development process.
T0516 Develop enterprise architecture or system components required to meet user needs.
T0517 Document and update as necessary all definition and architecture activities.
T0518 Determine security controls for information systems and networks and document appropriately.
T1001 Analyze and plan for anticipated changes in data capacity requirements.
Analyze information to determine, recommend and plan the development of a new application or
T1002
modification of an existing application.
Assess how user needs and software requirements can be met in line with cybersecurity policies and
T1003
determine feasibility of design within time and cost constraints.
Analyze design constraints and trade-offs in detailed system cybersecurity design and consider life
T1004
cycle support.
T1005 Apply coding and testing security standards.
T1013 Evaluate interface between hardware and software, in consultation with engineering staff.
Ensure that desired results are produced by rechecking the program and correct errors by making
T1014
appropriate changes.
T1015 Design and develop cybersecurity or cybersecurity-enabled products.
T1016 Design hardware, operating systems and software applications to address cybersecurity requirements.
Design or integrate appropriate secure system backup and protected storage of back up data
T1017
capabilities into designs.
T1018 Develop and direct procedures and documentation for system testing and validation.
T1019 Review and validate data mining and data warehousing programs, processes and requirements.
Develop detailed security design documentation for component and interface specifications to
T1021
support system design and development.
Develop and test disaster recovery and continuity of operations plans for systems under development
T1022
prior to systems entering a production environment.
T1023 Develop secure code and error handling processes and documentation.
T1024 Inform hardware configuration through evaluation of cost constraints and security restrictions.
T1025 Examine recovered data for information relevant to cybersecurity events and incidents.
T1026 Identify and allocate security functions to components and describe the relationships between them.
Identify and direct the remediation of technical problems encountered during testing and
T1027
implementation of new systems.
Identify and prioritize essential system functions or sub-systems required to support essential
T1028 capabilities or business functions for restoration or recovery after a system failure or during a system
recovery event based on overall system requirements for continuity and availability.
T1029 Identify, at a high level, basic common coding errors.
Apply methodologies to correct common coding errors with security implications to ensure
T1030
development of secure software.
Ensure that cybersecurity is built into software development, maintenance and decommissioning
T1031
processes.
T1032 Ensure that cybersecurity is incorporated into system design.
T1034 Manage the compilation, cataloging, caching, distribution and retrieval of data.
T1035 Perform integrated quality assurance testing of security systems' functionality and resilience.
Prepare detailed workflow charts and diagrams that describe input, output and logical operation of
T1036
security systems.
Provide a managed flow of relevant information (via web-based portals or other means) based on
T1037
mission requirements.
T1038 Provide guidelines for implementing developed systems to customers or installation teams.
T1041 Store, retrieve, and manipulate data for analysis of system capabilities and requirements.
T1048 Analyze user needs and requirements to plan and conduct system security development.
T1049 Develop cybersecurity designs to meet operational needs and environmental factors.
Follow software and systems engineering life cycle standards and processes when developing
T1058
cybersecurity systems and solutions.
T1059 Analyze data sources to provide actionable recommendations.
T1062 Confer with systems analysts, engineers, programmers and others to design cybersecurity applications.
Design, implement, test and evaluate secure interfaces between information systems, physical systems
T1063
and embedded technologies.
T1064 Develop and facilitate data-gathering methods.
T1067 Provide stakeholders with actionable recommendations derived from data analysis and findings.
Utilize technical documentation or resources to implement new mathematical, data science, or
T1068
computer science methodologies.
T1069 Effectively allocate storage capacity in the design of data management systems.
T1070 Read, interpret, write, modify and execute simple scripts to perform tasks.
Utilize different programming languages to write code, open files, read files and write output to
T1071
different files.
T1072 Utilize open source languages.
Troubleshoot prototype design and process issues throughout the product design, development and
T1073
pre-launch phases.
T1074 Find opportunities to develop new capability to address vulnerabilities.
Identify and leverage enterprise-wide security processes and services while designing and developing
T1075
secure applications.
Analyze and provide information to stakeholders to support the development or modification of
T1076
security applications.
Analyze security needs and software requirements to determine feasibility of design within time and
T1077
cost constraints and security mandates.
Conduct trial runs of programs and software applications to ensure that the desired information is
T1078
produced, and instructions and security levels are correct.
T1079 Design to security requirements to ensure requirements are met for all systems and applications.
T1080 Develop software testing and validation procedures, programming and documentation.
T1082 Develop system testing and validation procedures, programming and documentation.
T1083 Develop and implement data mining and data warehousing programs.
T1084 Develop mitigation strategies to address cost, schedule, performance and security risks.
Modify and maintain existing software to correct errors, adapt to new hardware, or upgrade interfaces
T1085
and improve performance.
Perform secure program testing, review and assessment to identify potential flaws in codes and
T1086
mitigate vulnerabilities.
T1087 Perform security reviews and identify security gaps in architecture.
Provide input to information systems security implementation plans and standard operating
T1088
procedures.
T1089 Trace system requirements to design components and perform gap analysis.
T1091 Research and evaluate available technologies and standards to meet customer requirements.
Determine and document software patches or the extent of releases that would leave software
T1092
vulnerable.
Review, approve, prioritize and submit operational requirements for research, development and
T1093
acquisition of cyber capabilities.
T1094 Develop world class automated processes and artificial intelligence solutions.
T1095 Define and develop automated computational solutions, including analytic and algorithmic solutions.
T1096 Leverage statistical and machine learning techniques for trend identification and predictive analysis.
Apply knowledge of machine learning, computer vision, remote sensing and big data processing to
T1097
important problems by developing software to measure the feasibility of algorithms and approaches.
Analyze data and conduct quantitative data analysis using a variety of datasets to identify, monitor
T1098
and explore operations.
Keep current with computer vision and machine learning research to replicate and baseline new
T1099
techniques.
T1100 Use visualization tools to visualize data and create dashboards to communicate results.
T1504 Ensure that cybersecurity improvement actions are evaluated, implemented and reviewed as required.
T1505 Ensure that cybersecurity inspections, tests and reviews are coordinated for the network environment.
Ensure that cybersecurity requirements are included in all business continuity and disaster recovery
T1506
planning operations.
T1507 Ensure that cybersecurity architecture design is aligned with the organization's cybersecurity strategy.
Evaluate development of new systems and processes to ensure that appropriate security controls are
T1508
implemented.
T1509 Identify alternative cybersecurity strategies to address organizational security objective.
T1510 Identify the implications of new technologies and upgrades on cybersecurity across the organization.
T1511 Communicate effectively with third parties in the event of a cybersecurity incident.
Review and, if appropriate, approve cybersecurity capabilities of proposed new technologies prior to
T1512
organizational adoption.
T1513 Ensure that organizational situational awareness is maintained from a cybersecurity perspective.
Ensure that information relating to the organization's cybersecurity is appropriately managed,
T1514
evaluated and shared.
T1515 Review the effectiveness of the organization's cybersecurity controls against its strategic goals.
T1516 Ensure that cybersecurity training and awareness programs are carried out on a regular basis.
T1518 Participate in the development or modification of cybersecurity program plans and requirements.
T1519 Ensure that all documentation relating to network security is developed, issued and maintained.
T1520 Ensure that cybersecurity awareness training is provided to all members of staff.
T1521 Ensure that cybersecurity requirements are included as appropriate in any procurement action.
T1524 Ensure that appropriate resources are allocated to meet the organization's cybersecurity requirements.
Manage the regular review and maintenance of the organization's cybersecurity policy and associated
T1525
documentation.
T1526 Ensure that appropriate actions are taken to mitigate the risk in the event of a cybersecurity incident.
Use internationally available documentation relating to cybersecurity implementation to inform and
T1527
enhance organizational documentation.
Advocate cybersecurity related topics with senior management, to ensure the organization's strategic
T1528
goals include cybersecurity.
Ensure that organizational cybersecurity strategy is effectively addressed by cybersecurity policies
T1529
and related documents.
Review the effectiveness and efficiency of the procurement function in ensuring that cybersecurity
T1530 requirements and supply chain risks are addressed as necessary and make improvements where
necessary.
T1531 Ensure cybersecurity requirements of all information technology systems are determined.
Participate in the acquisition process as necessary and ensure that appropriate supply chain risk
T1532
management practices are adopted.
T1533 Ensure that appropriate cybersecurity resource are always available.
Develop and maintain appropriate cybersecurity policies and related documentation to ensure the
T1534
organization's critical infrastructure is appropriately protected.
Collaborate with stakeholders in the organization and with third parties when identifying future
T1535
cybersecurity strategy requirements.
Identify and recruit appropriately skilled resources to address cybersecurity activities within the
T1536
organization.
T1537 Brief senior management on developments and trends in cybersecurity.
T1538 Brief senior management on cybersecurity controls required to protect the organization.
T2003 Develop and maintain a cybersecurity strategy that aligns to the organization's business strategy.
T2004 Develop or identify awareness training materials that are appropriate for intended audiences.
T2012 Write instructional materials to provide detailed guidance to the organization's staff or units.
T2020 Develop or assist in the development of written tests for measuring and assessing learner proficiency.
T2021 Assess the effectiveness and efficiency of instruction against different performance indicators.
T2029 Develop the goals and objectives for an organizational cybersecurity training curriculum.
Ensure that cybersecurity careers are managed in accordance with organizational HR policies and
T2030
directives.
Establish and collect metrics to monitor and validate cybersecurity workforce capacity, capability
T2031
and readiness.
T2032 Establish and oversee requirements, qualifications and processes for cyber career entry.
Establish cyber career paths to allow career progression, development and growth within and
T2033
between cyber career fields.
T2034 Establish data requirements to support cyber workforce management and reporting requirements.
Establish, resource, implement and assess cyber workforce management programs in accordance
T2035
with organizational requirements.
Evaluate instructional strategy and delivery options in conjunction with educators and trainers to
T2036
develop the most effective organizational learning and development plan.
T2037 Review and apply cyber career qualification standards.
T2038 Review and apply organizational policies related to or influencing the cyber workforce.
Support integration of qualified cyber workforce personnel into information systems life cycle
T2039
development processes.
T2041 Create training courses tailored to the audience and physical or virtual environments.
T2042 Deliver training courses tailored to the audience and physical or virtual environments.
T2043 Apply concepts, procedures, software, equipment and technology applications to students.
T2044 Design training curriculum and course content based on the organization and workforce requirements.
T2046 Ensure that training meets cybersecurity training, education, or awareness goals and objectives.
Identify and address cyber workforce planning and management issues including recruitment,
T2047
retention and training.
Plan and coordinate the delivery of classroom techniques and formats for the most effective learning
T2048
environment.
T2049 Plan non-classroom educational techniques and formats.
Conduct periodic reviews and revisions of course content for accuracy, completeness, alignment and
T2050
currency.
Recommend revisions to curriculum and course content based on feedback from previous training
T2051
sessions.
T2052 Serve as an internal consultant and advisor in own area of expertise.
T2053 Review and approve training supplier selection and management policies.
Develop or assist with the development of training materials to increase workforce understanding of
T2054
organizational cybersecurity, data protection and privacy policies, including legal obligations.
T2500 Develop methods to effectively monitor and measure risk, compliance and assurance efforts.
Develop specifications to ensure that risk, compliance and assurance efforts conform with
T2501
cybersecurity requirements.
Maintain knowledge of applicable cybersecurity defense policies, regulations and compliance
T2502
documents as they pertain to cybersecurity defense auditing.
T2503 Manage and approve agreed accreditation packages.
Monitor and evaluate a system's compliance with cybersecurity, resilience and dependability
T2504
requirements.
Plan and conduct cybersecurity authorization reviews and assurance case development for initial
T2505
installation of systems and networks.
Provide an accurate technical evaluation of software applications, systems, or networks and document
T2506
their compliance with agreed cybersecurity requirements.
Review risk registers or other similar documents to confirm that the level of risk is within acceptable
T2507
limits for each software application, system and network.
Carry out an audit of application software/network/system security against documented cybersecurity
T2508
policies and provide recommendations for remediation where gaps appear.
T2509 Develop cybersecurity compliance processes and audits for services provided by third parties.
Regularly review and ensure that cybersecurity policies and related documentation are aligned with
T2510
the organization's stated business objectives and strategy.
Define and document the effect of implementation of a new system or new interfaces between
T2511
systems on the security posture of the existing environment.
T2512 Ensure that security design and cybersecurity development activities are appropriately documented.
T2513 Determine and document supply chain risks for critical system elements, where they exist.
T3000 Evaluate the effectiveness of policies, standards, or procedures against the organization's strategy.
T3001 Interpret and apply laws, regulations, policies, standards, or procedures as necessary.
Resolve conflicts in policies, standards, or procedures where they contradict applicable laws or
T3002
regulations.
Acquire and maintain a working knowledge of constitutional issues which arise in relevant laws,
T3003
regulations, policies, agreements, standards, procedures etc.
Provide cybersecurity expertise to the framing of pleadings to properly identify alleged violations of
T3004
law, regulations, or policy/guidance.
T3005 Develop guidelines for implementation of relevant cybersecurity controls.
Provide cybersecurity guidance to oversight and compliance personnel regarding compliance with
T3006
cybersecurity policies and relevant legal and regulatory requirements.
Evaluate the impact of changes in laws and regulations on an organization's cybersecurity policies
T3007
and related documentation.
Provide cybersecurity related guidance on laws, regulations, policies, standards, or procedures to
T3008
management, personnel, or clients.
Assist with the implementation of new or revised laws, regulations, executive orders etc. as they
T3009
relate to cybersecurity policies and other documentation.
T3010 Provide cybersecurity related guidance in the preparation of legal and other relevant documents.
Work with the organization's legal advisers and relevant third parties to ensure that all services
T3011
comply with privacy and data security requirements.
Work with the organization's legal advisers, management and other stakeholders to ensure the
T3012
organization has and maintains appropriate privacy and confidentiality documentation.
Work with stakeholders to develop relationships with regulators and government departments
T3013
responsible for privacy and data security issues.
Ensure all processing and data source are registered with the relevant privacy and data protection
T3014
authorities where required.
Work with business teams and senior management to ensure awareness of best practices relating to
T3015
information privacy and data security.
T3016 Work with senior management to establish a committee responsible for the oversight of data privacy.
T3017 Provide leadership on the committee responsible for the oversight of data privacy.
T3018 Develop and document procedures for reporting self-disclosures of any evidence of privacy violations.
Serve as the information privacy liaison for users of technology systems, reporting breaches to senior
T3019
management.
Develop training materials and other communications to increase employees understanding of
T3020
company privacy policies, data handling practices and legal obligations.
Oversee, direct and ensure delivery of initial privacy training and orientation to all employees,
T3021
volunteers, contractors, alliances, business associates and other appropriate third parties.
T3022 Ensure that privacy training and awareness activities are delivered on a regular basis.
Work with external affairs to develop relationships with consumer organizations and other NGOs
T3023
with an interest in privacy and data security issues.
Work with organization administration, legal advisers and other related parties to represent the
T3024
organization’s information privacy interests with external parties.
Report on a periodic basis regarding the status of the privacy program to senior management and
T3025
other responsible individuals or committees.
T3026 Provide leadership for the organization’s privacy program.
Direct and oversee privacy specialists and coordinate privacy and data security programs with senior
T3027
management to ensure consistency across the organization.
T3028 Ensure compliance with privacy practices across the organization.
Work with legal and HR teams to develop appropriate sanctions for failure to comply with the
T3029
organization's privacy policies and procedures.
Resolve allegations of noncompliance with organizational privacy policies or notice of information
T3030
practices in a timely manner.
T3031 Establish and maintain a risk management and compliance framework for privacy.
Review the organization's data and privacy projects to ensure that they are compliant with the
T3032
organization's privacy and data security policies.
Establish a process for managing all aspects of complaints concerning the organization’s privacy
T3033
policies and procedures.
Provide leadership in the planning, design and evaluation of privacy and cybersecurity related
T3034
projects.
T3035 Establish and maintain an internal privacy audit program.
Periodically review and update the privacy program to incorporate changes in laws, regulations or
T3036
organizational policy.
Provide development guidance and assistance relating to the organization's information privacy
T3037
policies and procedures.
Ensure that the use of technologies maintains and does not erode, privacy protections on use,
T3038
collection and disclosure of personal information.
Monitor systems development and operations to ensure compliance with cybersecurity and privacy
T3039
policies.
T3040 Conduct privacy impact assessments of proposed rules on the privacy of personal information.
T3041 Review all cybersecurity plans to ensure alignment between cybersecurity and privacy practices.
Develop and manage procedures for vetting and auditing vendors for compliance with appropriate
T3042
privacy, data security, legislative and regulatory requirements.
Ensure all complaints concerning the organization's privacy policies and related documentation are
T3043
addressed in a timely manner by appropriate resource.
T3044 Identify and remediate areas where the organization is not fully compliant with privacy requirements.
Coordinate with the Chief Information Security Officer (or equivalent) to ensure alignment between
T3045
cybersecurity and privacy practices.
Develop and maintain appropriate communications and training to promote and educate all
T3046 employees including senior management regarding privacy compliance and the consequences of
noncompliance.
T3047 Ensure that privacy compliance monitoring activities are carried out on an ongoing basis.
T3048 Ensure that appropriate technologies are used to maintain compliance with privacy requirements.
Develop strategic plans with senior management to ensure that personal information is processed
T3049
accordance with applicable privacy requirements.
Develop and maintain enterprise-wide procedures to ensure that new products and services are
T3050
developed in accordance with organizational privacy policies and legal obligations.
Work with the Chief Information Security Officer, legal counsel and senior management to manage
T3051
privacy incidents and breaches in accordance with legal and regulatory requirements.
T3052 Maintain awareness of applicable privacy laws, regulations and accreditation standards.
T3053 Manage company participation in public events related to privacy and data security.
Characterize and analyze network traffic to identify anomalous activity and potential threats to
T3501
network resources.
T3502 Manage and administer the updating of rules and signatures for cyber defense applications.
T3503 Coordinate with other cyber defense staff to validate network alerts.
Provide summary reports of network events and other cybersecurity-relevant activities in line with
T3504
organizational policies and requirements.
T3505 Build, install, configure, patch and test dedicated cyber defense hardware and software.
T3506 Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure.
Administer test beds and test and evaluate applications, hardware infrastructure, rules, signatures,
T3507
access controls and configurations of platforms managed by service providers.
T3508 Create, edit and manage network access control lists on specialized cyber defense systems.
T3509 Identify and report potential conflicts with implementation of any cyber defense tools.
Implement risk management framework and security assessment and authorization requirements
T3510 for dedicated cyber defense systems within the organization and document and maintain records
for them.
Select the security controls for a system and document the functional description of the planned
T3511
control implementations in a security plan.
T3512 Implement the security controls specified in a security plan or other system documentation.
Apply service-oriented security architecture principles to meet the organization's confidentiality,
T4000
integrity and availability requirements.
Ensure all systems security operations and maintenance activities are properly documented and
T4001
updated as necessary.
Apply security patches to commercial products in accordance with the timelines dictated by the
T4002
management authority for the intended operational environment.
T4003 Implement specific cybersecurity countermeasures for systems and applications.
T4004 Integrate automated capabilities for updating or patching system software where practical.
T4005 Ensure cybersecurity testing of developed applications and systems.
T4006 Document and update systems security implementation, operations and maintenance activities.
T4009 Develop and test procedures to transfer system operations to an alternate site.
T4013 Ensure the integration and implementation of cross-domain solutions in a secure environment.
Make recommendations to management to make mitigation and correction measures or accept risks
T4014
when security deficiencies are identified during testing.
T4015 Verify minimum security requirements are in place for all applications.
T4016 Work with other teams to design, develop and provide identity access management solutions.
T4017 Work with cybersecurity architect to develop the identity access management strategy.
T4018 Ensure identity access management implementations follow organization's standards and policies.
Work with stakeholders to identify and address gaps in the identity access management
T4019
implementation.
T4020 Mentor and advise team members on identity access management systems and processes.
T4021 Develop, design and implement cryptographic algorithms to meet organization's requirements.
Design and develop systems administration and management functionality for privileged access
T4026
users.
T4027 Administer accounts, network rights and access to systems and equipment.
T4028 Establish continuous monitoring tools and technologies access control process and procedures.
T4029 Ensure that continuous monitoring tools and technologies access control is managed adequately.
T4513 Design simulated attacks to reflect impact in the organization's business and its users.
T4514 Present test findings, risks and conclusions to technical and non-technical audiences.
Explain business impact of vulnerabilities identified through testing to make case for addressing
T4515
them.
T4516 Conduct physical security assessments of servers, systems and network devices.
T4517 Test for vulnerabilities in web applications, client applications and standard applications.
T4518 Use security testing and code scanning tools to conduct code reviews.
Analyze log files, evidence and other information to determine best methods for identifying
T5000
perpetrators of a network intrusion.
T5001 Interview victims of a possible cybercrime and witnesses.
T5002 Confirm what is known about an intrusion and seek to discover new information.
T5006 Provide technical summary of findings in accordance with established reporting procedures.
Ensure that chain of custody is followed for all acquired digital media in accordance with national
T5007
law or organizational policies as applicable.
Fuse results from analysis of networks, infrastructure and digital evidence with results from other
T5008
criminal investigations and operations.
T5009 Determine whether a cybersecurity incident may be a violation of law requiring specific legal action.
T5011 Identify evidence that can prove that a cybercrime took place.
Identify, collect and seize documentary or physical evidence associated with cyber intrusion incidents,
T5012
investigations and operations.
Perform dynamic analysis to boot an “image” of a drive - with or without the original - to see the
T5013
intrusion as the user may have seen it, in a native environment.
T5014 Perform hash comparison against databases required by organizational policies.
T5017 Ensuring data integrity when preparing digital media for imaging.
T5019 Provide technical assistance in acquiring, securing, handling or analyzing digital evidence.
T5020 Recognize and report forensic artifacts in line with reporting policies.
T5021 Secure electronic devices and information sources required for analysis.
T5023 Use specialized equipment and techniques to perform forensic tasks in line with policy.
T5028 Perform static analysis to mount an "image" of a drive - with or without the original.
T5031 Coordinate with threat intelligence analysts to correlate threat assessment data.
T5032 Take necessary steps to mitigate potential risks from the incident to people, assets and resources.
Assess and report on actions and behaviors relevant to the investigation of victims, witnesses, or
T5033
suspects.
Determine the extent of threats and risks arising from them and recommend courses of action or
T5034
countermeasures to mitigate them.
T5035 Provide criminal investigative support to legal authorities during the judicial process.
T5038 Perform file and registry monitoring on the running system after identifying intrusion.
T5039 Enter information for acquired digital media into tracking database.
T5049 Document the investigation in line with legal standards and requirements.
Review forensic images, volatile data and other data sources to recover potentially relevant
T5050
information.
T5051 Write and publish recommendations and reports on incident findings to appropriate constituencies.
Review gathered information for validity and relevance to the investigation in line with organizational
T5052
policies.
T5054 Identify and select most effective sources of information to assist with incident investigation.
Sanitize reports to protect proprietary, commercial, personal or otherwise sensitive or confidential
T5055
data or methods.
T5056 Track status of requests for information in line with the organization's policies.
T5058 Identify potential malicious activity from memory dumps, logs and packet captures.
T5059 Examine recovered data for information of relevance to the issue at hand.
Devise creative and custom exploits, solutions and techniques to discover vulnerabilities and
T5060
exploitability of the targets.
T5061 Interview those suspected of having committed a cybercrime.
T5500 Use reviews to recommend new or revised security, resilience and dependability measures.
Analyze the results of software, hardware, or interoperability testing to identify cost-effective
T5501
improvements that can reduce identified risks.
T5502 Answer requests for information in line with the organization's policies.
Use knowledge of threat actors and activities to build common understanding of organization's
T5503
current risk profile.
T5504 Use knowledge of threat actors and activities to inform organization's response to a cyber incident.
T5505 Coordinate, validate and manage the organization's cyber threat intelligence sources and feeds.
T5506 Identify information gaps in threat intelligence and assess their implications for the organization.
T5508 Work collaboratively and share information with threat intelligence analysts working in related fields.
T5509 Conduct network scouting and analyze vulnerabilities of systems within a network.
T5511 Detect exploits against networks and hosts of interest to inform understanding of threat actor activity.
T5514 Apply analytic techniques to gain information about threats actors of interest.
T5518 Evaluate available capabilities to combat likely threat activities to recommend efficient solutions.
T5520 Identify and evaluate threat critical capabilities, requirements and vulnerabilities.
T5524 Monitor and report changes in threat dispositions, activities, tactics, capabilities and objectives.
T5526 Monitor open source websites for hostile content directed towards organizational or partner interests.
Monitor and report on threat actor activities to fulfil organization's threat intelligence and reporting
T5527
requirements.
Use expertise on threat actors and activities to support activities to plan and develop the organization's
T5528
cybersecurity strategy and resources.
Provide information and assessments of threat actors to assist stakeholders in planning and executing
T5529
cybersecurity activities.
Provide real-time cyber threat intelligence analysis and support during cybersecurity incidents and
T5530
exercises.
T5531 Monitor cyber threat intelligence feeds and report significant network events and intrusions.
Perform incident handling, event triage, network analysis, threat detection, trend analysis, metric
T5532
development and vulnerability information dissemination.
T5533 Support threat and vulnerability analysis and cybersecurity advisory services and recommendations.
T5537 Develop information requirements necessary for answering priority information requests.
T5545 Identify foreign language terminology within computer programs (e.g., comments, variable names).
Define and prioritize essential system capabilities or business functions required for partial or full
T6000
system restoration after a catastrophic failure event in IT and ICS/OT environments.
Develop and integrate cybersecurity designs for systems and networks with multilevel security
T6001
requirements in IT and ICS/OT environments.
Document and address organization’s security, architecture and systems security engineering
T6002
requirements throughout the acquisition life cycle in IT and ICS/OT environments.
Ensure that acquired or developed systems and architectures are consistent with organization’s
T6003
cybersecurity architecture guidelines in IT and ICS/OT environments.
T6004 Translate proposed capabilities into technical requirements in IT and ICS/OT environments.
Conduct analysis of physical and logical digital technologies in IT and ICS/OT enviroments to
T6005
identify potential avenues of access.
Research emerging communications technology trends to inform organizational design and security
T6006
policies in IT and ICS/OT environments.
Select the security controls for a system and document the functional description of the planned
T6007
control implementations in a security plan in IT and ICS/OT environments.
Implement the security controls specified in a security plan or other system documentation in IT
T6008
and ICS/OT environments.
Work with agile team members to conduct fast prototyping, feasibility studies and evaluation of new
T6009
technologies in IT and ICS/OT environments.
Design systems and solutions to support successful proofs-of-concept and pilot projects in emerging
T6010
technology areas in IT and ICS/OT environments.
Read and interpret technical diagrams, specifications, drawings, blueprints and schematics relating
T6011
to systems and networks in IT and ICS/OT environments..
T6012 Understand and troubleshoot fault areas in industrial automation and communication systems.
T6013 Determine and document security controls for systems and networks in IT and ICS/OT environments.
Coordinate and provide expert technical support to the organization's cybersecurity team to resolve
T6014
ICS/OT cybersecurity incidents.
Perform real-time cybersecurity incident handling tasks in ICS/OT environment to support deployed
T6015
incident response team.
Perform risk analysis for ICS/OT environments whenever an application or a system undergoes a
T6016
change.
K0001
Knowledge of network components, their operation and appropriate network security controls and
methods.
K0002 Knowledge and understanding of risk assessment, mitigation and management methods.
K0003
Knowledge of relevant cybersecurity aspects of legislative and regulatory requirements, relating to
ethics and privacy.
K0004 Knowledge of the principles of cybersecurity and privacy.
K0013 Knowledge of cybersecurity defense and vulnerability assessment tools and their capabilities.
K0019 Knowledge of appropriate data backup and recovery methods and solutions, including testing.
K0021
Knowledge of cybersecurity aspects of business continuity and disaster recovery planning and
including testing.
K0022 Knowledge of the organization's enterprise cybersecurity architecture.
K0025 Knowledge of how network services and protocols interact to provide network communications.
K0029
Knowledge of cybersecurity controls and privacy requirements for the management of risks relating
to data.
K0030 Knowledge of cybersecurity and privacy principles as they apply to software development.
K0031
Knowledge of sources of information relating to the identification and effective treatment of
vulnerabilities.
K0032 Knowledge of incident categories, incident responses and timelines for responses.
K0033 Knowledge of best practices for incident response and incident management.
K0036 Knowledge of host-based and network-based intrusion detection methodologies and techniques.
K0044 Knowledge and understanding of new technologies and solutions from a cybersecurity perspective.
K0055 Knowledge of industry standard systems diagnostic tools and fault identification techniques.
K0059
Knowledge of the capabilities and functionality of technologies for organizing and managing
information.
K0060 Knowledge of the process for reporting cybersecurity incidents.
K0064 Knowledge of the components of a network attack and their relationship to threats and vulnerabilities.
K0065
Knowledge of appropriate processes, reporting and investigative tools relating to insider threat
investigations, including laws and regulations where relevant.
K0066 Knowledge of physical computer components and peripherals' architectures and functions.
K0067 Knowledge of attackers' relevant to the organization's tactics, techniques and procedures.
K0074 Knowledge of the national cybersecurity regulations and requirements relevant to the organization.
K0075 Knowledge of types of digital forensics data and how to recognize them.
K0079 Knowledge of the organization's core business processes and how cybersecurity affects them.
K0080 Knowledge of cybersecurity threats, risks and issues posed by new technologies and malicious actors.
K0081
Knowledge of import and export control regulations relevant to cybersecurity risk management
activities, knowledge and technologies.
K0082 Knowledge of the organization's risk management processes.
K0083
Knowledge of supply chain risk management standards, processes and practices from a cybersecurity
perspective.
K0084 Knowledge of cybersecurity policies, procedures and regulations.
K0088 Knowledge of different types of cyber attackers, their capabilities and objectives.
K0090
Knowledge of system administration, network management and operating system hardening
methods.
K0091 Knowledge of relevant legislative and regulatory requirements.
K0093
Knowledge of critical information systems that were designed with limited technical cybersecurity
controls.
K0094 Knowledge of hardware reverse engineering techniques.
K0100
Knowledge of network security architecture concepts including topology, protocols, components,
and principles.
K0101 Knowledge of network systems management principles, models, methods and tools.
K0103 Knowledge of the impact of signature implementation on viruses, malware and attacks.
K0106
Knowledge of cloud-based knowledge management technologies and concepts applicable to security,
governance, procurement and administration.
K0107
Knowledge of data classification standards and methodologies as they relate to the management of
cybersecurity risk.
K0108 Knowledge of database access application programming interfaces.
K0109 Knowledge of organizational process improvement concepts and process maturity models.
K0111 Knowledge of service management concepts for networks and related standards.
K0113 Knowledge of industry standard security models and their effective application.
K0118
Knowledge of relevant laws, legal authorities, restrictions and regulations that govern and are
applicable to cybersecurity activities.
K0119 Knowledge of system administration concepts for operating systems used by the organization.
K0121 Knowledge of cloud service models and how those models can limit incident response.
K0122 Knowledge of the full spectrum of defensive and offensive cybersecurity capabilities.
K0126 Knowledge of data security standards relating to the sector in which the organization operates.
K0128
Knowledge of legislation, regulations and other standards applicable to critical infrastructure
cybersecurity.
K0129 Knowledge of configuration management techniques.
K0131 Knowledge of current and emerging data encryption security features in databases.
K0135 Knowledge of potential vulnerabilities in all network equipment and how it is used.
K0144
Knowledge of the principal methods, procedures and techniques for gathering, producing, reporting
and sharing cybersecurity information.
K0145 Knowledge of operating system command-line tools.
K0146 Knowledge of embedded systems and how cybersecurity controls can be applied to them.
K0147 Knowledge of intrusion detection and prevention system tools and applications.
K0149
Knowledge of network design processes, including security objectives, operational objectives and
trade-offs.
K0150 Knowledge of current and emerging cybersecurity technologies and associated threats.
K0153 Knowledge of penetration testing and red teaming principles, tools and techniques.
K0160 Knowledge of organizational objectives, leadership priorities and risk management methods.
K0168 Knowledge of public sources detailing common application security risks and mitigations.
K0511 Knowledge of integrating the organization’s goals and objectives into the system architecture.
K0515 Knowledge of the structure, architecture and design of modern digital and telephony networks.
K1002 Knowledge of database management systems, query languages, table relationships and views.
K1004
Knowledge of the organization's evaluation and validation requirements in relation to cybersecurity
risk management.
K1005 Knowledge of enterprise messaging systems and associated software.
K1006 Knowledge of how to use resiliency and redundancy to mitigate cybersecurity risks.
K1007 Knowledge of cybersecurity systems engineering principles and standards used by the organization.
K1008
Knowledge of local and wide area networking principles and concepts including bandwidth
management.
K1009 Knowledge of process engineering concepts.
K1018
Knowledge of system design tools, methods and techniques, including automated systems analysis
and design tools.
K1019 Knowledge of web services.
K1025 Knowledge of applications that can log errors, exceptions and application faults.
K1026
Knowledge of how to work with and use the output of R&D centers, think tanks, academic research
and industry.
K1027 Knowledge of how to utilize technologies and tools to explore, analyze and represent data.
K1032 Knowledge of network analysis tools used to identify software communications vulnerabilities.
K1035
Knowledge of engineering concepts as applied to computer architecture and associated computer
hardware/software.
K1036 Knowledge of information theory.
K1041
Knowledge of software integration or testing, including analyzing and implementing test plans and
scripts.
K1042 Knowledge of statistical methods.
K1500 Knowledge of best practice measures or indicators of system performance and availability.
K1502
Knowledge of best practice server administration and systems engineering theories, concepts and
methods.
K1503 Knowledge of server, client and mobile operating systems.
K1504 Knowledge of system software and organizational design standards, techniques and methods.
K1505 Knowledge of best practice technology integration processes where relevant for cybersecurity.
K1506 Knowledge of best practice program management and project management principles and techniques.
K1507 Knowledge of best practice incident response methods, roles and responsibilities.
K1508 Knowledge of current and emerging cybersecurity threats and threat vectors.
K1511 Knowledge of cybersecurity controls related to the use, processing, storage and transmission of data.
K2000 Knowledge of cognitive domains and the tools and methods applicable for learning in each domain.
K2001 Knowledge of virtualization technologies and virtual machine development and maintenance.
K2002
Knowledge of different learning assessment, test and evaluation techniques and how and when to
use them.
K2007 Knowledge of Learning Management Systems and their use in managing learning.
K2008 Knowledge of learning styles and how to develop training to accommodate them.
K2011
Knowledge of the Saudi cybersecurity workforce framework, job roles and associated tasks,
knowledge, skills and abilities.
K2012
Knowledge of the uses of written, oral and visual media to support training and techniques for
production, communication and dissemination of media.
K2013 Knowledge of the organization's human resource policies, processes and procedures.
K2014 Knowledge the organization's training and education policies, processes and procedures.
K2015 Knowledge of principles and processes for conducting training and education needs assessment.
K2016
Knowledge of concepts, procedures, software, equipment and technology applications relevant to
cybersecurity training.
K2017 Knowledge of test and evaluation processes for learners.
K2018 Knowledge of methods for designing curricula, teaching and instruction for individuals and groups.
K2019
Knowledge of external organizations and academic institutions specializing in cybersecurity
education and research and development.
K2020
Knowledge of technical delivery options for cybersecurity training and exercising and their
limitations.
K2021
Knowledge of how capture the flag and other cybersecurity related exercises and competitions can
assist in improving practical skills.
K2500
Knowledge of the organization's local and wide area network connections and the risks they pose to
its cybersecurity.
K2501
Knowledge of best practices for reviewing and determining the suitability of technology solutions to
meet cybersecurity requirements.
K2502 Knowledge of the organization's enterprise IT architecture and the risks it poses to its cybersecurity.
K2506
Knowledge of formats and best practice for issuing cybersecurity compliance reports to external
partners.
K2507
Knowledge of the organization's formats for management and compliance reporting relating to
cybersecurity risks, readiness and progress against plans.
K2508
Knowledge of who is developing the organization’s strategies, policies and plans are, along with their
contact details and their expectations.
K3000
Knowledge of concepts and practices of processing digital forensic data to ensure admissibility of
evidence.
K3001
Knowledge of cyber threat intelligence gathering principles, policies and procedures including legal
authority and restrictions.
K3002 Knowledge of the organization's policies and standard operating procedures relating to cybersecurity.
Knowledge of foreign disclosure policies and import/export control regulations in relation to
K3003
cybersecurity.
K3004
Knowledge of how to produce cybersecurity privacy disclosure statements in line with applicable
laws.
K3005 Knowledge of privacy enhancing technologies including their operation and reporting capabilities.
K3006
Knowledge of human-computer interaction and the principles of usable design, as they relate to
cybersecurity.
K3500 Knowledge of basic system, network and OS hardening techniques.
K3501
Knowledge of test procedures, principles and methodologies relevant to developing and integrating
cybersecurity capability.
Knowledge of transmission technologies and jamming techniques that enable and prevent
K3502 transmission of undesirable information or prevent installed systems from operating correctly and
the laws relating to their usage.
K4005 Knowledge of remote access processes, tools, and capabilities related to customer support.
K4006
Knowledge of how to evaluate supplier and product trustworthiness including use of external sources
of advice.
K4007 Knowledge of IT service catalogues.
K4009 Knowledge of implementing enterprise key escrow systems to support data-at-rest encryption.
K4011 Knowledge of data concealment techniques and how technologies can apply or counter them.
K4015 Knowledge of encryption algorithms and tools for wireless local area networks.
K4501 Knowledge of the infrastructure that supports the safety, performance and reliability of IT.
K4502 Knowledge of penetration testing principles, techniques and best practice application.
K4503
Knowledge of computer programming concepts, including computer languages, programming,
testing, debugging and file types.
K4504 Knowledge of using programming languages relevant to the systems and infrastructure to be tested.
K4505 Knowledge of using operating systems and their toolsets relevant to the systems being tested.
K4506 Knowledge of how to mimic the attacks a social engineer would use to attempt a system breach.
K4507 Knowledge of encryption cracking tools, password cracking tools and remote access methods.
K4508
Knowledge of using network servers and networking tools used by the organization or systems being
tested.
K4509 Knowledge of using and selecting security tools and products.
K4510
Knowledge of using the tools and frameworks that are most readily available to hackers seeking to
attack the organization.
K5000 Knowledge of server diagnostic tools and fault identification techniques.
K5001 Knowledge of the main types of electronic device, their vulnerabilities and how they store data.
K5005
Knowledge of the investigative techniques required for hardware, operating systems and network
technologies.
K5006
Knowledge of applicable laws and the organization's policies and procedures relating to the collection
and admissibility of digital evidence.
K5007
Knowledge of processes for collecting, packaging, transporting and storing electronic evidence while
maintaining chain of custody.
K5008 Knowledge of types of persistent data and how to collect them.
K5009 Knowledge of tools and techniques for webmail collection, searching and analysis.
K5010 Knowledge of the system files that contain relevant information and where to find them.
K5011 Knowledge of how to conduct deployed forensics operations and the tools that support them.
K5013 Knowledge of the global social dynamics of the different cyber threat types.
K5016 Knowledge of national or applicable judicial and court procedure for cybercrime and fraud cases.
K5029 Knowledge of network architecture concepts including topology, protocols and components.
K5501 Knowledge of website types, administration, functions and content management systems.
K5507 Knowledge of cyber threat intelligence sources and their respective capabilities.
Knowledge of cybersecurity operations concepts, terminology, principles, limitations and
K5508
effects.
Knowledge of evolving and emerging communications technologies and their implications for
K5509
cybersecurity.
K5513 Knowledge of the risks digital telephony networks pose for an organization's cybersecurity.
K5514 Knowledge of the risks wireless networks pose for an organization's cybersecurity.
K5521 Knowledge of which cyber threat actors are relevant to the organization.
K5522 Knowledge of the threat environment within which the organization is operating.
K5524 Knowledge of the organization's leadership, structure and cyber decision-making processes.
Knowledge of the structure, main capabilities and vulnerabilities of the threat actors relevant
K5525
to the organization.
Knowledge of the tactics, techniques and procedures of the threat actors relevant to the
K5526
organization.
K5527 Knowledge of telecommunications fundamentals.
Knowledge of the basic structure, architecture and design of modern digital and telephony
K5528
networks.
K5529 Knowledge of the factors of threat that could impact collection operations.
Knowledge of how threat actors relevant to the organization use the internet and the targeting
K5530
information they could learn about the organization from it.
K5531 Knowledge of threat systems.
K6019 Knowledge of intrusion detection methodologies and techniques for detecting ICS intrusions.
S0001 Skill in effectively conducting vulnerability scans and identifying vulnerabilities in security systems.
S0002 Skill of identifying, capturing, containing and reporting malware.
S0003 Skill in applying and incorporating information technologies into proposed solutions.
S0004 Skill in applying core cybersecurity principles.
S0005 Skill in applying host and network access controls.
S0006 Skill in developing and deploying signatures.
S0007 Skill in designing countermeasures to identified security risks.
S0008 Skill in designing the integration of hardware and software solutions.
S0009 Skill in using intrusion detection technologies to detect host and network-based intrusions.
Skill in determining the normal operational state for security systems and how that state is
S0010
affected by change.
Skill in developing, testing and implementing network infrastructure contingency and
S0011
recovery plans.
S0012 Skill in evaluating the adequacy of security designs.
Skill in preserving evidence integrity according to standard operating procedures or national
S0013
standards.
S0014 Skill in tuning sensors.
S0016 Skill in using virtual private network devices and its encryption.
S0023 Skill in effectively recognizing and categorizing types of vulnerabilities and associated attacks.
S0037 Skill in conducting application vulnerability assessments and understanding their results.
Skill in using public key infrastructure encryption and digital signature capabilities within
S0038
applications.
S0039 Skill in applying security models.
S0040 Skill in assessing security controls based on cybersecurity principles and tenets.
S0048 Skill in effectively performing root cause analysis for cybersecurity issues.
S0049 Skill in safely and effectively conducting research using deep web.
S0051 Skill in effectively preparing and presenting briefings in a clear and concise manner.
S1008 Skill in determining the security control requirements of information systems and networks.
S1014 Skill in performing format conversions to create a standard representation of the data.
Skill in designing the integration of technology processes and solutions, including legacy
S1025
systems and modern programming languages.
Skill in developing applications that can log and handle errors, exceptions and application
S1026
faults and logging.
S1027 Skill in the use of design modeling.
S1030 Skill in identifying the sources, characteristics and uses of the organization’s data assets.
S1034 Skill in designing and developing automated analytic software, techniques and algorithms.
S2002 Skill in using network management tools to analyze network traffic patterns.
S2003 Skill in developing and executing technical training programs and curricula.
S2007 Skill in developing technical delivery capabilities through training and exercising.
S2010 Skill in writing about facts and ideas in a clear, convincing and organized manner.
Skill in identifying measures or indicators of system performance and the actions needed to
S2500
improve or correct performance as necessary.
S2501 Skill in applying appropriate cybersecurity controls.
S2504 Skill in managing test assets and resources to ensure effective completion of test events.
S2506 Skill in reviewing logs to identify evidence of intrusions and other suspicious behavior.
Skill in troubleshooting and diagnosing cybersecurity defense infrastructure anomalies and
S2507
determining the root cause.
S2508 Skill in using HR IT systems.
S2510 Skill in understanding network systems management principles, models, methods and tools.
S2514 Skill in analyzing an organization's communication networks through the eyes of an attacker.
S2517 Skill in identifying gaps and limitations in cyber threat intelligence provision.
Skill in identifying cybersecurity issues that may have an impact on the organization’s
S2518
objectives.
S2519 Skill in identifying potential leads that may assist in a cybercrime investigation.
S2521 Skill in identifying devices that work at each level of protocol models.
S2522 Skill in using geospatial analysis techniques to identify and locate threats’ sources.
S2546 Skill in analyzing and assessing reporting from internal and external partners.
Skill in creating and maintaining cybersecurity policies aligned with the organization's privacy
S3000
objectives.
S3001 Skill in negotiating vendor agreements.
Skill in using tools, techniques and procedures to remotely exploit and establish persistence
S4508
on a target.
S4509 Skill in writing custom code to bypass security controls.
S5001 Skill in identifying and extracting data of forensic interest in diverse media.
S5002 Skill in identifying, modifying and manipulating applicable operating system components.
Skill in collecting, processing, packaging, transporting and storing electronic evidence to
S5003
avoid alteration, loss, physical damage, or destruction of data.
S5004 Skill in setting up a forensic workstation.
S5011 Skill in interpreting debugger results to ascertain attacker's tactics, techniques and procedures.
S5017 Skill in reverse engineering to identify function and ownership of remote tools.
S5506 Skill in identifying a network's characteristics when viewed through the eyes of an attacker.
S5511 Skill in recognizing denial and deception techniques when used by attackers or cybercriminals.
Skill in recognizing opportunities and information that will assist in developing a cyber
S5512
strategy or investigation.
S5513 Skill in recognizing relevance of information to a cybersecurity strategy or investigation.
Skill in recognizing significant changes in an attacker or suspected cyber-criminal's
S5514
communication patterns.
Skill in reviewing and editing cyber threat intelligence products from various sources to
S5515
support decision-making on cybersecurity matters.
S5516 Skill in constructing simple and complex queries.
S5518 Skill in using multiple search engines and tools in conducting open-source searches.
S5519 Skill in using network analysis and reconstruction tools and interpreting their results.
Skill in utilizing virtual collaborative workspaces and tools in line with organizational
S5520
cybersecurity policies.
Skill in writing, reviewing and editing cybersecurity assessment products using information
S5521
derived from multiple sources.
Skill in prioritizing filling an organization's knowledge gaps in line with its cybersecurity
S5522
strategy, vulnerabilities and main threats.
S5523 Skill to monitor a threat or vulnerability situation and environmental factors.
Skill in accurately assessing the implication of successful attacks on third parties including
S5524
suppliers and others with similar environments or cybersecurity solutions.
S6000 Skill in design modeling and building use cases in IT and ICS/OT environments.
S6001 Skill in writing test plans for IT and ICS/OT environments.
Skill in designing multi-level and cross domain security solutions applicable to IT and ICS/
S6002
OT environments.
A0001 Ability to analyze vulnerability and configuration data to identify cybersecurity issues.
A0002 Ability to communicate cybersecurity concepts and practices in an effective manner.
A0003 Ability to conduct vulnerability scans and determine vulnerabilities from the results.
A0004 Ability to prepare and present cybersecurity briefings to management and other staff.
A0005 Ability to produce technical documentation at an appropriate level for the audience.
A0006
Ability to develop strategy, policy and related documentation to support business strategy and
maintain compliance with legislative, regulatory and contractual obligations.
A0007 Ability to develop, update and maintain cybersecurity related documentation.
A0008 Ability to identify basic and common cybersecurity related coding flaws at a high level.
Ability to apply network security architecture concepts including topology, protocols,
A0009
components and principles.
A0010 Ability to apply secure system design tools, methods and techniques.
A0011 Ability to apply automated systems analysis and design tools.
Ability to ensure cybersecurity practices are applied at all stages in the acquisition or divestment
A0012
process.
A0013 Ability to design architectures and frameworks in line with security policies.
A0014 Ability to source all data used in intelligence, assessment and planning activities.
A0015 Ability to demonstrate critical comprehension of documentation.
A0016 Ability to determine whether information is reliable, valid and relevant.
A0017 Ability to use experience to understand poorly written policies.
Ability to focus research efforts to address cybersecurity requirements and meet the
A0018
organization's decision-making needs.
A0019 Ability to function in a collaborative environment to leverage analytical and technical expertise.
A0020 Ability to identify gaps in threat intelligence and other cybersecurity information gathering.
Ability to understand and relate legislative, regulatory and contractual requirements to the
A0021
cybersecurity objectives of the organization.
Ability to recognize and mitigate deception in information obtained and provide appropriate
A0022
reporting and analysis.
A0023 Ability to select appropriate mitigation techniques within the organization's goals and policies.
Ability to communicate technical and planning information at the same level as a stakeholder's
A0024
understanding.
A0025 Ability to apply critical thinking.
Ability to use awareness of changes to information privacy laws to influence organizational
A0026
adaptation and compliance.
Ability to maintain awareness of changes to information privacy technologies to influence
A0027
organizational adaptation and compliance.
Ability to develop, identify or procure relevant training that delivers a topic at the appropriate
A0028
level for the trainee.
A0029 Ability to effectively and efficiently prioritize cybersecurity resources.
A0030 Ability to align business and security strategies for the benefit of the organization.
Ability to recognize organizational challenges from a business, management and technological
A0031
perspective.
A0032 Ability to relate basic cybersecurity concepts to the impact they may have on an organization.
Ability to effectively communicate insights relating to an organization’s threat environment to
A0033
improve its risk management posture.
A0034 Ability to assess and respond effectively to cyber incidents in cloud environment.
Ability to bring required stakeholders into an organization-wide group to consider all cyber
A0041
risks which may affect the organization.
Ability to work with the organization's leadership to determine the organization's risk posture
A0042
based on the aggregated risk from its operations and its use of systems.
Ability to work with cybersecurity staff to provide effective advice and guidance to the
A0043
organization's leadership on a range of cybersecurity matters.
Ability to identify critical information systems which have limited technical cybersecurity
A0044
controls.
Ability to recognize how changes to systems, environment or cybersecurity controls change
A0045
residual risks in relation to risk appetite.
A0046 Ability to perform advanced analysis and reverse engineering of suspect source code.
Ability to apply the organization's chosen framework for describing, analyzing and
A0500
documenting its IT architecture.
A0501 Ability to employ best practice when implementing cybersecurity controls within a system.
A0502 Ability to develop and maintain architecture to support an organization's goals and objectives.
A1002 Ability to build complex data structures and high-level programming languages.
A2006 Ability to assess and forecast staffing requirements to meet organizational objectives.
A2010 Ability to design training in line with organizational standards and policies.
A2500 Ability to determine and understand the validity of technology trend data.
A2502 Ability to answer cybersecurity related questions in a clear and concise manner.
A2504 Ability to communicate cybersecurity related material clearly and concisely when writing.
A2508 Ability to collect, verify and validate cybersecurity related test data.
Ability to identify relationships between two or more cybersecurity related data sources that
A2509
may initially appear unrelated.
Ability to leverage cybersecurity best practices from external organizations when dealing with
A2510
cybersecurity incidents.
A2511 Ability to determine relevance and meaning of data and cybersecurity test results.
A2513 Ability to collaborate effectively within virtual teams and matrix management.
Ability to evaluate, analyze and synthesize large quantities of data into high quality, fused
A2514
reports.
Ability to target and expand network access by conducting appropriate analysis and collection
A2515
of relevant data.
A2516 Ability to function effectively in a dynamic, fast-paced environment which changes frequently.
A2523 Ability to recognize and mitigate against cognitive biases which may adversely impact analysis.
Ability to understand organizational objectives and the effects of cybersecurity controls on
A2524
those objectives.
A2525 Ability to utilize multiple information sources to inform cybersecurity related actions.
Ability to work across departments and business units to implement an organization’s privacy
A2526
principles and programs.
Ability to work across departments and business units to ensure an organization's privacy and
A2527
cybersecurity objectives are aligned.
Ability to ensure cybersecurity related activities are reported to appropriate stakeholders
A2528
within an organization.
Ability to recognize and explain the importance of auditing the application of cybersecurity
A2529
policies.
Ability to effectively communicate complex technical problems from a cybersecurity
A2530
perspective.
Ability to monitor and assess the potential impact of emerging technologies on legislation,
A3000
regulations and cybersecurity policies and related documentation.
Ability to determine whether a cybersecurity incident violates a privacy principle or law which
A3001
would require specific legal action.
A3002 Ability to author an appropriate privacy disclosure statement based on current laws.
A5001 Ability to conduct forensic analysis in and for all operating systems used by an organization.
A5002 Ability to find and navigate the dark web to locate markets and forums.
A5003 Ability to examine digital media on all operating system platforms used by an organization.









