Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
*Certification Declaration
Certification Declaration
Each certification is mapped to the NICE Framework, which organizes cybersecurity into seven high-level Categories, each comprised of several specialty areas, work roles, knowledge, skills, abilities, and tasks. These seven high-level Categories are aligned directly to the CCE® Program’s certification Concentration Areas. Candidates often prepare for an exam by using a variety of resources that familiarize them with the authoritative sources and the exam’s concentration area.
Third-party products and services, including course instructors have helped many candidates to close knowledge and skill gaps. The CCE® Program does not endorse any particular provider and encourages candidates to use a variety of tools and resources that will enhance their understanding of relevant principles and the exam’s concentration area.
NICE Framework Category
CCE® Concentration Area:
Securely Provision (SP)
NICE Specialty Area:
Technology R&D (TRD)
NICE Work Role ID:
SP-TRD-001
OPM Code | DCWF Code:
661
KSA-T
Below are the Knowledge, Skills, Abilities and Tasks (KSA-T) identified as being required to perform this work role.
ID & Description
- K001 – Knowledge of computer networking concepts and protocols, and network security methodologies.
- K0002 – Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
- K0003 – Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
- K0004 – Knowledge of cybersecurity and privacy principles.
- K0005 – Knowledge of cyber threats and vulnerabilities.
- K0006 – Knowledge of specific operational impacts of cybersecurity lapses.
- K0009 – Knowledge of application vulnerabilities.
- K0019 – Knowledge of cryptography and cryptographic key management concepts
- K0059 – Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
- K0090 – Knowledge of system life cycle management principles, including software security and usability.
- K0126 – Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161)
- K0169 – Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.
- K0170 – Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations.
- K0171 – Knowledge of hardware reverse engineering techniques.
- K0172 – Knowledge of middleware (e.g., enterprise service bus and message queuing).
- K0174 – Knowledge of networking protocols.
- K0175 – Knowledge of software reverse engineering techniques.
- K0176 – Knowledge of Extensible Markup Language (XML) schemas.
- K0179 – Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- K0202 – Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing).
- K0209 – Knowledge of covert communication techniques.
- K0267 – Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
- K0268 – Knowledge of forensic footprint identification.
- K0269 – Knowledge of mobile communications architecture.
- K0271 – Knowledge of operating system structures and internals (e.g., process management, directory structure, installed applications).
- K0272 – Knowledge of network analysis tools used to identify software communications vulnerabilities.
- K0288 – Knowledge of industry standard security models.
- K0296 – Knowledge of capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.
- K0310 – Knowledge of hacking methodologies.
- K0314 – Knowledge of industry technologies potential cybersecurity vulnerabilities.
- K0321 – Knowledge of engineering concepts as applied to computer architecture and associated computer hardware/software.
- K0342 – Knowledge of penetration testing principles, tools, and techniques.
- K0499 – Knowledge of operations security.
ID & Description
- S0005 – Skill in applying and incorporating information technologies into proposed solutions.
- S0017 – Skill in creating and utilizing mathematical or statistical models.
- S0072 – Skill in using scientific rules and methods to solve problems.
- S0140 – Skill in applying the systems engineering process.
- S0148 – Skill in designing the integration of technology processes and solutions, including legacy systems and modern programming languages.
- S0172 – Skill in applying secure coding techniques.
ID & Description
- A0001 – Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.
- A0018 – Ability to prepare and present briefings.
- A0019 – Ability to produce technical documentation.
- A0170 – Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
ID & Description
- T0064 – Review and validate data mining and data warehousing programs, processes, and requirements.
- T0249 – Research current technology to understand capabilities of required system or network.
- T0250 – Identify cyber capabilities strategies for custom hardware and software development based on mission requirements.
- T0283 – Collaborate with stakeholders to identify and/or develop appropriate solutions technology.
- T0284 – Design and develop new tools/technologies as related to cybersecurity.
- T0327 – Evaluate network infrastructure vulnerabilities to enhance capabilities being developed.
- T0329 – Follow software and systems engineering life cycle standards and processes.
- T0409 – Troubleshoot prototype design and process issues throughout the product design, development, and pre-launch phases.
- T0410 – Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate vulnerabilities.
- T0411 – Identify and/or develop reverse engineering tools to enhance capabilities and detect vulnerabilities.
- T0413 – Develop data management capabilities (e.g., cloud-based, centralized cryptographic key management) to include support to the mobile workforce.
- T0547 – Research and evaluate available technologies and standards to meet customer requirements.
- Knowledge
-
ID & Description
- K001 – Knowledge of computer networking concepts and protocols, and network security methodologies.
- K0002 – Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
- K0003 – Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
- K0004 – Knowledge of cybersecurity and privacy principles.
- K0005 – Knowledge of cyber threats and vulnerabilities.
- K0006 – Knowledge of specific operational impacts of cybersecurity lapses.
- K0009 – Knowledge of application vulnerabilities.
- K0019 – Knowledge of cryptography and cryptographic key management concepts
- K0059 – Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
- K0090 – Knowledge of system life cycle management principles, including software security and usability.
- K0126 – Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161)
- K0169 – Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.
- K0170 – Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations.
- K0171 – Knowledge of hardware reverse engineering techniques.
- K0172 – Knowledge of middleware (e.g., enterprise service bus and message queuing).
- K0174 – Knowledge of networking protocols.
- K0175 – Knowledge of software reverse engineering techniques.
- K0176 – Knowledge of Extensible Markup Language (XML) schemas.
- K0179 – Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- K0202 – Knowledge of the application firewall concepts and functions (e.g., Single point of authentication/audit/policy enforcement, message scanning for malicious content, data anonymization for PCI and PII compliance, data loss protection scanning, accelerated cryptographic operations, SSL security, REST/JSON processing).
- K0209 – Knowledge of covert communication techniques.
- K0267 – Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
- K0268 – Knowledge of forensic footprint identification.
- K0269 – Knowledge of mobile communications architecture.
- K0271 – Knowledge of operating system structures and internals (e.g., process management, directory structure, installed applications).
- K0272 – Knowledge of network analysis tools used to identify software communications vulnerabilities.
- K0288 – Knowledge of industry standard security models.
- K0296 – Knowledge of capabilities, applications, and potential vulnerabilities of network equipment including hubs, routers, switches, bridges, servers, transmission media, and related hardware.
- K0310 – Knowledge of hacking methodologies.
- K0314 – Knowledge of industry technologies potential cybersecurity vulnerabilities.
- K0321 – Knowledge of engineering concepts as applied to computer architecture and associated computer hardware/software.
- K0342 – Knowledge of penetration testing principles, tools, and techniques.
- K0499 – Knowledge of operations security.
- Skills
-
ID & Description
- S0005 – Skill in applying and incorporating information technologies into proposed solutions.
- S0017 – Skill in creating and utilizing mathematical or statistical models.
- S0072 – Skill in using scientific rules and methods to solve problems.
- S0140 – Skill in applying the systems engineering process.
- S0148 – Skill in designing the integration of technology processes and solutions, including legacy systems and modern programming languages.
- S0172 – Skill in applying secure coding techniques.
- Abilities
-
ID & Description
- A0001 – Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.
- A0018 – Ability to prepare and present briefings.
- A0019 – Ability to produce technical documentation.
- A0170 – Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
- Tasks
-
ID & Description
- T0064 – Review and validate data mining and data warehousing programs, processes, and requirements.
- T0249 – Research current technology to understand capabilities of required system or network.
- T0250 – Identify cyber capabilities strategies for custom hardware and software development based on mission requirements.
- T0283 – Collaborate with stakeholders to identify and/or develop appropriate solutions technology.
- T0284 – Design and develop new tools/technologies as related to cybersecurity.
- T0327 – Evaluate network infrastructure vulnerabilities to enhance capabilities being developed.
- T0329 – Follow software and systems engineering life cycle standards and processes.
- T0409 – Troubleshoot prototype design and process issues throughout the product design, development, and pre-launch phases.
- T0410 – Identify functional- and security-related features to find opportunities for new capability development to exploit or mitigate vulnerabilities.
- T0411 – Identify and/or develop reverse engineering tools to enhance capabilities and detect vulnerabilities.
- T0413 – Develop data management capabilities (e.g., cloud-based, centralized cryptographic key management) to include support to the mobile workforce.
- T0547 – Research and evaluate available technologies and standards to meet customer requirements.