Page: List

Education Framework Search
Education Framework Search
Search By Keyword(s)
 
 
Education Create & List Record Buttons
Green Buttons Create Records
 
Cyan Buttons List Records
Type Framework Workforce Category Specialty Area Work Role Task Knowledge Description Skill Ability
 
Education Framework List: Specialty Area
Framework Name Description Show
NICE All-Source Analysis Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications. Show
NICE Customer Service and Technical Support Addresses problems; installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered-level customer support). Typically provides initial incident information to the Incident Response (IR) Specialty. Show
NICE Cyber Defense Analysis Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. Show
NICE Cyber Defense Infrastructure Support Tests, implements, deploys, maintains, reviews, and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities. Show
NICE Cybersecurity Management Oversees the cybersecurity program of an information system or network, including managing information security implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, requirements, policy enforcement, emergency planning, security awareness, and other resources. Show
NICE Data Administration Develops and administers databases and/or data management systems that allow for the storage, query, protection, and utilization of data. Show
NICE Executive Cyber Leadership Supervises, manages, and/or leads work and workers performing cyber and cyber-related and/or cyber operations work. Show
NICE Exploitation Analysis Analyzes collected information to identify vulnerabilities and potential for exploitation. Show
NICE Incident Response Responds to crises or urgent situations within the pertinent domain to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities. Show
NICE Knowledge Management Manages and administers processes and tools that enable the organization to identify, document, and access intellectual capital and information content. Show
NICE Language Analysis Applies language, cultural, and technical expertise to support information collection, analysis, and other cybersecurity activities. Show
NICE Legal Advice and Advocacy Provides legally sound advice and recommendations to leadership and staff on a variety of relevant topics within the pertinent subject domain. Advocates legal and policy changes, and makes a case on behalf of client via a wide range of written and oral work products, including legal briefs and proceedings. Show
NICE Network Services Installs, configures, tests, operates, maintains, and manages networks and their firewalls, including hardware (e.g., hubs, bridges, switches, multiplexers, routers, cables, proxy servers, and protective distributor systems) and software that permit the sharing and transmission of all spectrum transmissions of information to support the security of information and information systems. Show
NICE Program/Project Management and Acquisition Applies knowledge of data, information, processes, organizational interactions, skills, and analytical expertise, as well as systems, networks, and information exchange capabilities to manage acquisition programs. Executes duties governing hardware, software, and information system acquisition programs and other program management policies. Provides direct support for acquisitions that use information technology (IT) (including National Security Systems), applying IT-related laws and policies, and provides IT-related guidance throughout the total acquisition life cycle. Show
NICE Risk Management Oversees, evaluates, and supports the documentation, validation, assessment, and authorization processes necessary to assure that existing and new information technology (IT) systems meet the organization's cybersecurity and risk requirements. Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives. Show
NICE Software Development Develops and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs following software assurance best practices. Show
NICE Strategic Planning and Policy Develops policies and plans and/or advocates for changes in policy that support organizational cyberspace initiatives or required changes/enhancements. Show
NICE Systems Administration Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Manages accounts, firewalls, and patches. Responsible for access control, passwords, and account creation and administration. Show
NICE Systems Analysis Studies an organization's current computer systems and procedures, and designs information systems solutions to help the organization operate more securely, efficiently, and effectively. Brings business and information technology (IT) together by understanding the needs and limitations of both. Show
NICE Systems Architecture Develops system concepts and works on the capabilities phases of the systems development life cycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes. Show
NICE Systems Development Works on the development phases of the systems development life cycle. Show
NICE Systems Requirements Planning Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions. Provides guidance to customers about applicability of information systems to meet business needs. Show
NICE Targets Applies current knowledge of one or more regions, countries, non-state entities, and/or technologies. Show
NICE Technology R&D Conducts technology assessment and integration processes; provides and supports a prototype capability and/or evaluates its utility. Show
NICE Test and Evaluation Develops and conducts tests of systems to evaluate compliance with specifications and requirements by applying principles and methods for cost- effective planning, evaluating, verifying, and validating of technical, functional, and performance characteristics (including interoperability) of systems or elements of systems incorporating IT. Show
NICE Threat Analysis Identifies and assesses the capabilities and activities of cybersecurity criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities. Show
NICE Training, Education, and Awareness Conducts training of personnel within pertinent subject domain. Develops, plans, coordinates, delivers and/or evaluates training courses, methods, and techniques as appropriate. Show
NICE Vulnerability Assessment and Management Conducts assessments of threats and vulnerabilities; determines deviations from acceptable configurations, enterprise or local policy; assesses the level of risk; and develops and/or recommends appropriate mitigation countermeasures in operational and nonoperational situations. Show