461 Systems Security Analyst Career Pathway
461 Systems Security Analyst Career Pathway
CLEARED
For Open Publication
Dec 21, 2020
Department of Defense
OFFICE OF PREPUBLICATION AND SECURITY REVIEW
Endorsed By:
November 2020
1
Table of Contents
CAREER PATHWAY SYSTEMS SECURITY ANALYST (461) ....................................................................... 1
1 461-SYSTEMS SECURITY ANALYST .......................................................................................................... 3
1.1 Work Role Overview ............................................................................................................................................... 3
1.2 Core Tasks.................................................................................................................................................................... 6
1.3 Core Knowledge, Skills, and Abilities ............................................................................................................... 8
1.4 Core Competencies................................................................................................................................................ 12
1.5 Suggested Qualifications / Capability Indicators ..................................................................................... 15
2 APPENDIX: 461-SYSTEMS SECURITY ANALYST TASK ANALYSIS AND KSA MAPPING ..........16
2.1 Key to Reading the Task Analysis and KSA Mapping .............................................................................. 16
2.2 461-Systems Security Analyst Task Analysis and KSA Mapping ....................................................... 17
2
1 461-SYSTEMS SECURITY ANALYST
NICE Role Responsible for the analysis and development of the integration, testing, operations, and
Description maintenance of systems security.
Personnel performing the 461-Systems Security Analyst work role are most commonly aligned to
the following Occupational Series (Top 5 shown):
OPM
- 2210-Information Technology – 79%
Occupational - 0080-Security Administration – 6%
Series - 1550-Computer Science – 4%
- 0343-Management and Program Analysis – 3%
- 0854-Computer Engineering – 2%
Personnel performing the 461-Systems Security Analyst work role are most commonly paired
with the following complimentary Work Roles (Top 5 shown):
Personnel performing the 461-Systems Security Analyst work role may unofficially or
alternatively be called:
3
Personnel performing the 461-Systems Security Analyst work role are most commonly found
within the following grades on the General Schedule*.
- ☐ GS-4 – redacted**
- ☐ GS-5 – redacted**
- ☐ GS-7 – redacted**
- ☒ GS-9 – 3%
Distribution of
- ☐ GS-10 – redacted**
GS-Levels - ☒ GS-11 – 8%
- ☒ GS-12 – 23%
- ☒ GS-13 – 30%
- ☒ GS-14 – 13%
- ☒ GS-15 – 3%
*21% of all 461s are in non-GS pay plans and excluded from this section
**Percentages less than 3% have been redacted
The following work roles are examples of possible roles an individual may perform prior to
transitioning into the 461-Systems Security Analyst work role:
- 422-Data Analyst
On Ramps - 441-Network Operations Specialist
- 451-System Administrator
- 612-Security Control Assessor
- 621-Software Developer
- 671-System Testing and Evaluation Specialist
The following work roles are examples of common transitions an individual may pursue after having
performed the 461-Systems Security Analyst work role. This is not an exhaustive list, nor does it consider
learning and development opportunities an individual may pursue to prepare themselves for performing
alternate work roles:
*Note: Leveraging the knowledge, skills, abilities, and tasks of the 461-Systems Security Analyst
work role, individuals may prepare themselves to transition into one or more of the following
cross-functional work roles:
5
1.2 CORE TASKS
The table below provides a list of tasks that represent the Core, or baseline, expectations for
performance in the 461-Systems Security Analyst work role, as well as additional tasks that those in this
role may be expected to perform.
Table 2. 461-Systems Security Analyst Core Tasks
Core or
Task ID Task Description
Additional
T0469 Analyze and report organizational security posture trends. Core
T0470 Analyze and report system security posture trends. Core
T0016 Apply security policies to meet security objectives of the system. Core
Assess adequate access controls based on principles of least privilege and need-to-
T0475 Core
know.
Assess all the configuration management (change configuration/release
T0344 Core
management) processes.
T0309 Assess the effectiveness of security controls. Core
Develop procedures and test fail-over for system operations transfer to an alternate
T0462 Core
site based on system availability requirements.
Ensure all systems security operations and maintenance activities are properly
T0085 Core
documented and updated as necessary.
Ensure cybersecurity-enabled products or other compensating security control
T0088 Core
technologies reduce identified risk to an acceptable level.
Implement security measures to resolve vulnerabilities, mitigate risks and
T0485 Core
recommend security changes to system or system components as needed.
Implement system security measures in accordance with established procedures to
T0489 Core
ensure confidentiality, integrity, availability, authentication, and non-repudiation.
Mitigate/correct security deficiencies identified during security/certification testing
T0499 and/or recommend risk acceptance for the appropriate senior leader or authorized Core
representative.
Plan and recommend modifications or adjustments based on exercise results or
T0187 Core
system environment.
Properly document all systems security implementation, operations and
T0194 Core
maintenance activities and update as necessary.
Provides cybersecurity recommendations to leadership based on significant threats
T0526 Core
and vulnerabilities.
Verify and update security documentation reflecting the application/system security
T0243 Core
design features.
T0508 Verify minimum security requirements are in place for all applications. Core
Apply security policies to applications that interface with one another, such as
T0015 Additional
Business-to-Business (B2B) applications.
Apply service oriented security architecture principles to meet organization's
T0017 Additional
confidentiality, integrity, and availability requirements.
Assess and monitor cybersecurity related to system implementation and testing
T0504 Additional
practices.
6
Core or
Task ID Task Description
Additional
Ensure application of security patches for commercial products integrated into
T0086 system design meet the timelines dictated by the management authority for the Additional
intended operational environment.
T0477 Ensure the execution of disaster recovery and continuity of operations. Additional
Ensure the integration and implementation of Cross-Domain Solutions (CDS) in a
T0492 Additional
secure environment.
T0123 Implement specific cybersecurity countermeasures for systems and/or applications. Additional
Integrate automated capabilities for updating or patching system software where
practical and develop processes and procedures for manual updating and patching
T0128 Additional
of system software based on current and projected patch timeline requirements for
the operational environment of the system.
T0169 Perform cybersecurity testing of developed applications and/or systems. Additional
Perform security reviews, identify gaps in security architecture, and develop a
T0177 Additional
security risk management plan.
Provide advice and input for Disaster Recovery, Contingency, and Continuity of
T0548 Additional
Operations Plans.
T0202 Provide cybersecurity guidance to leadership. Additional
Provide input to the Risk Management Framework process activities and related
T0205 documentation (e.g., system life-cycle support plans, concept of operations, Additional
operational procedures, and maintenance training materials).
Work with stakeholders to resolve computer security incidents and vulnerability
T0545 Additional
compliance.
7
1.3 CORE KNOWLEDGE, SKILLS, AND ABILITIES
The table below provides a ranking of KSAs that represent the Core, or baseline, expectations for
performance in the 461-Systems Security Analyst work role, as well as additional KSAs that those in this
role may be expected to demonstrate.
Table 3. 461-Systems Security Analyst Core Knowledge, Skills, and Abilities
KSA Importance to
Description Competency
ID Work Role
Foundational
Information
K0004 Knowledge of cybersecurity and privacy principles. to All Work
Systems/Network Security
Roles
Foundational
Knowledge of computer networking concepts and protocols, and network
K0001 Infrastructure Design to All Work
security methodologies.
Roles
Foundational
Knowledge of laws, regulations, policies, and ethics as they relate to Legal, Government, and
K0003 to All Work
cybersecurity and privacy. Jurisprudence
Roles
Foundational
Knowledge of risk management processes (e.g., methods for assessing and
K0002 Risk Management to All Work
mitigating risk).
Roles
Foundational
K0005 Knowledge of cyber threats and vulnerabilities. Vulnerabilities Assessment to All Work
Roles
Foundational
K0006 Knowledge of specific operational impacts of cybersecurity lapses. Vulnerabilities Assessment to All Work
Roles
Skill in assessing security controls based on cybersecurity principles and Computer Network
S0147 Core
tenets. (e.g., CIS CSC, NIST SP 800-53, Cybersecurity Framework, etc.). Defense
Knowledge of Personally Identifiable Information (PII) data security Data Privacy and
K0260 Core
standards. Protection
S0031 Skill in developing and applying security system access controls. Identity Management Core
8
KSA Importance to
Description Competency
ID Work Role
Information
K0075 Knowledge of security system design tools, methods, and techniques. Core
Systems/Network Security
Information
K0276 Knowledge of security management. Core
Systems/Network Security
9
KSA Importance to
Description Competency
ID Work Role
S0024 Skill in designing the integration of hardware and software solutions. Systems Integration Core
K0339 Knowledge of how to use network analysis tools to identify vulnerabilities. Vulnerabilities Assessment Core
S0036 Skill in evaluating the adequacy of security designs. Vulnerabilities Assessment Core
Database Management
K0024 Knowledge of database systems. Additional
Systems
K0019 Knowledge of cryptography and cryptographic key management concepts Encryption Additional
K0063 Knowledge of parallel and distributed computing concepts. Enterprise Architecture Additional
10
KSA Importance to
Description Competency
ID Work Role
K0281 Knowledge of information technology (IT) service catalogues. Operations Support Additional
Third Party
Knowledge of how to evaluate the trustworthiness of the supplier and/or
K0266 Oversight/Acquisition Additional
product.
Management
K0297 Knowledge of countermeasure design for identified security risks. Threat Analysis Additional
11
1.4 CORE COMPETENCIES
The table below is a compilation of competencies aligned to the 461-Systems Security Analyst work role,
and their associated importance. Listed competencies are collections of three or more similar
Knowledge, Skills, or Abilities aligned to the Work Role. These competencies originate from the NICE
Framework Competency Pivot Tool.
Table 4. 461-Systems Security Analyst Core Competencies
Information C022 KSAs that relate to the - Knowledge of cybersecurity and privacy Core
Assurance methods and procedures principles and organizational requirements
that protect information (relevant to confidentiality, integrity, availability,
systems and data by authentication, non-repudiation).
ensuring their availability, - Knowledge of security models (e.g., Bell-
authentication, LaPadula model, Biba integrity model, Clark-
confidentiality, and Wilson integrity model).
integrity. - Skill to apply cybersecurity and privacy principles
to organizational requirements (relevant to
confidentiality, integrity, availability,
authentication, non-repudiation).
- Ability to apply cybersecurity and privacy
principles to organizational requirements
(relevant to confidentiality, integrity, availability,
authentication, non-repudiation).
12
Technical Com Importanc
Definition Work Role Related KSAs
Competency p ID e
Information C024 KSAs that relate to the - Knowledge of cybersecurity and privacy Core
Systems / methods, tools, and principles.
Network procedures, including - Knowledge of information technology (IT)
Security development of security principles and methods (e.g., firewalls,
information security plans demilitarized zones, encryption).
to prevent information - Knowledge of security system design tools,
methods, and techniques.
systems vulnerabilities and
- Knowledge of security management.
to provide or restore
- Knowledge of network security architecture
security of information
concepts including topology, protocols,
systems and network
components, and principles (e.g., application of
services.
defense-in-depth).
This area contains KSAs
- Knowledge of installation, integration, and
that relate to the
optimization of system components.
principles, methods, and - Skill in designing the integration of hardware
Systems
C049 procedures for installing, and software solutions. Core
Integration
integrating, and optimizing - Knowledge of human-computer interaction
information systems principles.
components. - Knowledge of the systems engineering process.
Vulnerabilities C057 KSAs that relate to the - Knowledge of cyber threats and vulnerabilities. Core
Assessment principles, methods, and - Knowledge of specific operational impacts of
tools for assessing cybersecurity lapses.
vulnerabilities and - Knowledge of how to use network analysis tools
developing or to identify vulnerabilities.
recommending appropriate - Skill in evaluating the adequacy of security
designs.
mitigation
- Skill in assessing security systems designs.
countermeasures.
- Skill in recognizing vulnerabilities in security
systems. (e.g., vulnerability and compliance
scanning).
- Knowledge of vulnerability information
dissemination sources (e.g., alerts, advisories,
errata, and bulletins).
- Ability to conduct vulnerability scans and
recognize vulnerabilities in security systems.
13
Technical Com Importanc
Definition Work Role Related KSAs
Competency p ID e
Infrastructure C026 KSAs that relate to the - Knowledge of computer networking concepts Additional
Design architecture and typology and protocols, and network security
of software, hardware, and methodologies.
networks, including LANS, - Knowledge of how traffic flows across the
WANS, and network (e.g., Transmission Control Protocol
telecommunications [TCP] and Internet Protocol [IP], Open System
Interconnection Model [OSI], Information
systems, their components
Technology Infrastructure Library, current
and associated protocols
version [ITIL]).
and standards, and how - Knowledge of embedded systems.
they operate and integrate - Knowledge of network design processes, to
with one another and with include understanding of security objectives,
associated controlling operational objectives, and trade-offs.
software.
14
1.5 SUGGESTED QUALIFICATIONS / CAPABILITY INDICATORS
Table 5. 461-Systems Security Analyst Suggested Qualifications / Capability Indicators
For indicators of capability for the 461-Systems Security Analyst work role, please see Draft NISTR 8193 -
National Initiative for Cybersecurity Education (NICE) Framework Work Role Capability Indicators.
Section to be populated with updated DoD-8140 Qualification Matrix for 461-Systems Security Analyst.
15
2 APPENDIX: 461-SYSTEMS SECURITY ANALYST TASK
ANALYSIS AND KSA MAPPING
Table 7. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
16
2.2 461-SYSTEMS SECURITY ANALYST TASK ANALYSIS AND KSA MAPPING
Table 9. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
Knowledge of Personally Identifiable Information (PII) data security Data Privacy and
K0260
standards. Protection
Database
K0024 Knowledge of database systems. Management
Systems
Identity
S0031 Skill in developing and applying security system access controls.
Management
Knowledge of cybersecurity and privacy principles and organizational
Information
K0044 requirements (relevant to confidentiality, integrity, availability,
Assurance
authentication, non-repudiation).
Skill to apply cybersecurity and privacy principles to organizational
Information
S0367 requirements (relevant to confidentiality, integrity, availability,
Assurance
authentication, non-repudiation).
Ability to apply cybersecurity and privacy principles to organizational
Information
A0123 requirements (relevant to confidentiality, integrity, availability,
Assurance
authentication, non-repudiation).
Knowledge of an organization's information classification program and Information
K0287
procedures for information compromise. Management
17
KSA ID Description Competency
Information
Knowledge of information technology (IT) security principles and
K0049 Systems/Network
methods (e.g., firewalls, demilitarized zones, encryption).
Security
Information
K0075 Knowledge of security system design tools, methods, and techniques. Systems/Network
Security
Information
K0276 Knowledge of security management. Systems/Network
Security
Knowledge of how traffic flows across the network (e.g., Transmission
Control Protocol [TCP] and Internet Protocol [IP], Open System Infrastructure
K0061
Interconnection Model [OSI], Information Technology Infrastructure Design
Library, current version [ITIL]).
Knowledge of laws, policies, procedures, or governance relevant to Legal, Government,
K0267
cybersecurity for critical infrastructures. and Jurisprudence
Vulnerabilities
S0036 Skill in evaluating the adequacy of security designs.
Assessment
18
Table 10. T0470 Task Analysis
Table 11. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
19
Table 12. T0016 Task Analysis
Intermediate Apply, [manage, and implement] security policies to meet security objectives of the system.
Approve and oversee the application of security policies to meet security objectives of the
Advanced
system.
Table 13. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
20
Table 14. T0475 Task Analysis
Intermediate Assess adequate access controls based on principles of least privilege and need-to-know.
Review and approve the assessment of access controls based on principles of least privilege
Advanced
and need-to-know.
Table 15. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
Knowledge of Personally Identifiable Information (PII) data security Data Privacy and
K0260
standards. Protection
Database
K0024 Knowledge of database systems. Management
Systems
Knowledge of network access, identity, and access management (e.g., Identity
K0056
public key infrastructure, Oauth, OpenID, SAML, SPML). Management
Knowledge of cybersecurity and privacy principles and organizational
Information
K0044 requirements (relevant to confidentiality, integrity, availability,
Assurance
authentication, non-repudiation).
Skill to apply cybersecurity and privacy principles to organizational
Information
S0367 requirements (relevant to confidentiality, integrity, availability,
Assurance
authentication, non-repudiation).
Ability to apply cybersecurity and privacy principles to organizational
Information
A0123 requirements (relevant to confidentiality, integrity, availability,
Assurance
authentication, non-repudiation).
System
K0275 Knowledge of configuration management techniques.
Administration
21
Table 16. T0344 Task Analysis
Table 17. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
22
Table 18. T0309 Task Analysis
Table 19. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
23
Table 20. T0462 Task Analysis
Table 21. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
24
Table 22. T0085 Task Analysis
Table 23. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
25
Table 24. T0088 Task Analysis
Table 25. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
26
Table 26. T0485 Task Analysis
Table 27. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
27
Table 28. T0489 Task Analysis
Table 29. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
28
Table 30. T0499 Task Analysis
Table 31. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
29
Table 32. T0187 Task Analysis
Table 33. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
30
Table 34. T0194 Task Analysis
Table 35. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
31
Table 36. T0526 Task Analysis
Table 37. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
32
KSA ID Description Competency
Skill in recognizing vulnerabilities in security systems. (e.g., vulnerability Vulnerabilities
S0167
and compliance scanning). Assessment
Knowledge of vulnerability information dissemination sources (e.g., Vulnerabilities
K0040
alerts, advisories, errata, and bulletins). Assessment
33
Table 38. T0243 Task Analysis
Table 39. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
34
Table 40. T0508 Task Analysis
Table 41. Primary Knowledge, Skills, and Abilities Required to Perform the above Task
35