The DCWF defines seven broad job categories including 33 specialty areas and 54 work roles. Cyber personnel categories and additional work roles were added from the NICE framework.
These are the 7 job categories shared by both frameworks:
Security Provision: May include jobs such as architecture, engineering, operations that include information assurance compliance, software, security engineering, system development, research, etc.
Operate/Maintain: This may include customer service, tech support, data administration, knowledge management, network service and security analysis.
Protect/Defend: This involves defense against cyberattacks, defense analysis, incident reporting, vulnerability assessment and related areas.
Analyze: This pertains to different types of network analysis, resource intelligence, exploitation analysis, threat analysis, etc.
Operate/Collect: This is defined as applicable to cyber operations and planning, collection operations, planning and implementation.
Oversight and Development: This pertains to the legal consequences of conducting operations in the digital realm, with emphasis on planning, education and awareness.
Investigate: This is relevant to investigations and forensics work as it relates to online security or related issues.
In comparison, DoD 8570.01-m only includes four broad job categories:
Information Assurance Technical (IAT)
Information Assurance Management (IAM)
Information Assurance Security Architecture and Engineering (IASAE)
Cyber Security Service Provider (CSSP)
More Info: a+ certification jobs with no experience
These are the 7 job categories shared by both frameworks:
Security Provision: May include jobs such as architecture, engineering, operations that include information assurance compliance, software, security engineering, system development, research, etc.
Operate/Maintain: This may include customer service, tech support, data administration, knowledge management, network service and security analysis.
Protect/Defend: This involves defense against cyberattacks, defense analysis, incident reporting, vulnerability assessment and related areas.
Analyze: This pertains to different types of network analysis, resource intelligence, exploitation analysis, threat analysis, etc.
Operate/Collect: This is defined as applicable to cyber operations and planning, collection operations, planning and implementation.
Oversight and Development: This pertains to the legal consequences of conducting operations in the digital realm, with emphasis on planning, education and awareness.
Investigate: This is relevant to investigations and forensics work as it relates to online security or related issues.
In comparison, DoD 8570.01-m only includes four broad job categories:
Information Assurance Technical (IAT)
Information Assurance Management (IAM)
Information Assurance Security Architecture and Engineering (IASAE)
Cyber Security Service Provider (CSSP)
More Info: a+ certification jobs with no experience
No comments:
Post a Comment