Records: 456 | [-] | Showing 31-60 | [+]
View | Assess and design key management functions (as related to IA) |
|
View | Assess and/or validate criminal or counterintelligence evidence |
|
View | Assess policy needs and collaborate with stakeholders to develop policies to govern IT activities |
|
View | Assess the effectiveness of information protection measures utilized by system(s) |
|
View | Assess threats to and vulnerabilities of computer system(s) to develop a security risk profile |
|
View | Assist in identifying, prioritizing, and coordinating the protection of critical Computer Network Defense infrastructure and key resources |
|
View | Assist in the execution of disaster recovery continuity of operations plans |
|
View | Assist in the gathering and preservation of evidence used in the prosecution of computer crimes |
|
View | Assist with the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems, and processes) |
|
View | Assure successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals |
|
View | Build, test, and modify product prototypes using working models or theoretical models |
|
View | Capture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules |
|
View | Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources |
|
View | Check server availability, functionality, integrity, and efficiency |
|
View | Collaborate and liaise with other organizations to maintain situational awareness, stay ahead of future threats and leverage best practices |
|
View | Collaborate with organizational managers to support organizational objectives |
|
View | Collaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance |
|
View | Collaborate with stakeholders to identify and/or develop appropriate solutions technology |
|
View | Collaborate with system developers and users to select appropriate design solutions or ensure the compatibility of system components |
|
View | Collect and analyze intrusion artifacts (e.g., source code, malware, and trojans) and use discovered data to enable mitigation of potential Computer Network Defense incidents within the enterprise |
|
View | Collect and maintain data needed to meet system IA reporting |
|
View | Collect intrusion artifacts (e.g., source code, malware, and trojans) and use discovered data to enable mitigation of potential Computer Network Defense incidents within the enterprise |
|
View | Collect, analyze, assess, and report threat intelligence |
|
View | Communicate the value of IT security throughout all levels of the organization stakeholders |
|
View | Compile and write documentation of program development and subsequent revisions, inserting comments in the coded instructions so others can understand the program |
|
View | Conduct analysis of log files, evidence, and other information in order to determine best methods for identifying the perpetrator(s) of a network intrusion |
|
View | Conduct and/or support authorized penetration testing on enterprise network assets |
|
View | Conduct continuous analysis to identify network and system vulnerabilities |
|
View | Conduct cursory binary analysis |
|
View | Conduct framing of allegations to determine proper identification of law, regulatory or policy/guidance of violation |
|