American Flag  Official website of the Department of Homeland Security


Every cybersecurity role requires an individual to perform certain duties, or Tasks. These Tasks are examples of the type of work that would be assigned to a professional working in one of the Framework’s Specialty Areas.

Records: 456 | [-] | Showing 31-60 | [+]

ViewAssess and design key management functions (as related to IA)
ViewAssess and/or validate criminal or counterintelligence evidence
ViewAssess policy needs and collaborate with stakeholders to develop policies to govern IT activities
ViewAssess the effectiveness of information protection measures utilized by system(s)
ViewAssess threats to and vulnerabilities of computer system(s) to develop a security risk profile
ViewAssist in identifying, prioritizing, and coordinating the protection of critical Computer Network Defense infrastructure and key resources
ViewAssist in the execution of disaster recovery continuity of operations plans
ViewAssist in the gathering and preservation of evidence used in the prosecution of computer crimes
ViewAssist with the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems, and processes)
ViewAssure successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals
ViewBuild, test, and modify product prototypes using working models or theoretical models
ViewCapture security controls used during the requirements phase to integrate security within the process, to identify key security objectives, and to maximize software security while minimizing disruption to plans and schedules
ViewCharacterize and analyze network traffic to identify anomalous activity and potential threats to network resources
ViewCheck server availability, functionality, integrity, and efficiency
ViewCollaborate and liaise with other organizations to maintain situational awareness, stay ahead of future threats and leverage best practices
ViewCollaborate with organizational managers to support organizational objectives
ViewCollaborate with stakeholders to establish the enterprise continuity of operations program, strategy, and mission assurance
ViewCollaborate with stakeholders to identify and/or develop appropriate solutions technology
ViewCollaborate with system developers and users to select appropriate design solutions or ensure the compatibility of system components
ViewCollect and analyze intrusion artifacts (e.g., source code, malware, and trojans) and use discovered data to enable mitigation of potential Computer Network Defense incidents within the enterprise
ViewCollect and maintain data needed to meet system IA reporting
ViewCollect intrusion artifacts (e.g., source code, malware, and trojans) and use discovered data to enable mitigation of potential Computer Network Defense incidents within the enterprise
ViewCollect, analyze, assess, and report threat intelligence
ViewCommunicate the value of IT security throughout all levels of the organization stakeholders
ViewCompile and write documentation of program development and subsequent revisions, inserting comments in the coded instructions so others can understand the program
ViewConduct analysis of log files, evidence, and other information in order to determine best methods for identifying the perpetrator(s) of a network intrusion
ViewConduct and/or support authorized penetration testing on enterprise network assets
ViewConduct continuous analysis to identify network and system vulnerabilities
ViewConduct cursory binary analysis
ViewConduct framing of allegations to determine proper identification of law, regulatory or policy/guidance of violation
Back to Top