

T0135: Lead and oversee information security budget, staffing, and contracting.T0134: Lead and align information technology (IT) security priorities with the security strategy.T0130: Interface with external organizations (e.g., public affairs, law enforcement, Command or Component Inspector General) to ensure appropriate and accurate dissemination of incident and other Computer Network Defense information.T0066: Develop and maintain strategic plans.T0025: Communicate the value of information technology (IT) security throughout all levels of the organization stakeholders.T0006: Advocate organization's official position in legal and legislative proceedings.T0004: Advise senior management (e.g., CIO) on cost/benefit analysis of information security programs, policies, processes, systems, and elements.T0002: Acquire necessary resources, including financial resources, to conduct an effective enterprise continuity of operations program.T0001: Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals and objectives and reduce overall organizational risk.K0628: Knowledge of cyber competitions as a way of developing skills by providing hands-on experience in simulated, real-world situations.Open Web Application Security Project Top 10 list) K0624: Knowledge of Application Security Risks (e.g.K0314: Knowledge of industry technologies’ potential cybersecurity vulnerabilities.K0296: Knowledge of capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.K0147: Knowledge of emerging security issues, risks, and vulnerabilities.K0106: Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities.K0070: Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).K0009: Knowledge of application vulnerabilities.K0006: Knowledge of specific operational impacts of cybersecurity lapses.K0005: Knowledge of cyber threats and vulnerabilities.K0004: Knowledge of cybersecurity and privacy principles.K0003: Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.K0002: Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).K0001: Knowledge of computer networking concepts and protocols, and network security methodologies.A0130: Ability to ensure that senior officials within the organization provide information security for the information and systems that support the operations and assets under their control.A0129: Ability to ensure information security management processes are integrated with strategic and operational planning processes.


A0070: Ability to apply critical reading/thinking skills.A0033: Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities.
