Software Development (DEV) NICE Specialty Area
NICE Work Role Name:
Software Developer
NICE Work Role ID:
SP-DEV-001
NICE Category:
Securely Provision (SP)
		NICE Work Role Description:
Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.
- 
Cybersecurity Enterprise Engineering and Architecture (SP151)
 - 
Cybersecurity Enterprise Engineering and Architecture - SP (SP151-SP)
 - 
Securing Coding - Intersystems (SP250)
 - 
Securing Web Apps, Applications, and Servers (SP143)
 - 
Software Assurance Fundamentals (SP107)
 - 
Software Developer (SP101-RBT)
 
Knowledge
- K0001 - Knowledge of computer networking concepts and protocols, and network security methodologies.
 - K0002 - Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
 - K0003 - Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
 - K0004 - Knowledge of cybersecurity and privacy principles.
 - K0005 - Knowledge of cyber threats and vulnerabilities.
 - K0006 - Knowledge of specific operational impacts of cybersecurity lapses.
 - K0013 - Knowledge of cyber defense and vulnerability assessment tools and their capabilities.
 - K0019 - Knowledge of cryptography and cryptographic key management concepts.
 - K0027 - Knowledge of organization’s enterprise information security architecture.
 - K0028 - Knowledge of organization’s evaluation and validation requirements.
 - K0037 - Knowledge of Security Assessment and Authorization process.
 - K0038 - Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
 - K0040 - Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
 - K0044 - Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
 - K0048 - Knowledge of Risk Management Framework (RMF) requirements.
 - K0049 - Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
 - K0054 - Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities.
 - K0059 - Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
 - K0070 - Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
 - K0084 - Knowledge of structured analysis principles and methods.
 - K0089 - Knowledge of systems diagnostic tools and fault identification techniques.
 - K0101 - Knowledge of the organization’s enterprise information technology (IT) goals and objectives.
 - K0126 - Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161).
 - K0146 - Knowledge of the organization’s core business/mission processes.
 - K0168 - Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures.
 - K0169 - Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.
 - K0170 - Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations.
 - K0179 - Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
 - K0199 - Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zachman, Federal Enterprise Architecture [FEA]).
 - K0203 - Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
 - K0260 - Knowledge of Personally Identifiable Information (PII) data security standards.
 - K0261 - Knowledge of Payment Card Industry (PCI) data security standards.
 - K0262 - Knowledge of Personal Health Information (PHI) data security standards.
 - K0267 - Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
 - K0295 - Knowledge of confidentiality, integrity, and availability principles.
 - K0322 - Knowledge of embedded systems.
 - K0342 - Knowledge of penetration testing principles, tools, and techniques.
 - K0622 - Knowledge of controls related to the use, processing, storage, and transmission of data.
 - K0624 - Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list).
 
Skills
- S0034 - Skill in discerning the protection needs (i.e., security controls) of information systems and networks.
 - S0367 - Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
 
Abilities
- A0028 - Ability to assess and forecast manpower requirements to meet organizational objectives.
 - A0033 - Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities.
 - A0077 - Ability to coordinate cyber operations with other organization functions or support activities.
 - A0090 - Ability to identify external partners with common cyber operations interests.
 - A0094 - Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.
 - A0111 - Ability to work across departments and business units to implement organization’s privacy principles and programs, and align privacy objectives with security objectives.
 - A0117 - Ability to relate strategy, business, and technology in the context of organizational dynamics.
 - A0118 - Ability to understand technology, management, and leadership issues related to organization processes and problem solving.
 - A0119 - Ability to understand the basic concepts and issues related to cyber and its organizational impact.
 - A0123 - Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
 - A0170 - Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
 
Tasks
- T0145 - Manage and approve Accreditation Packages (e.g., ISO/IEC 15026-2).
 - T0221 - Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network.
 - T0371 - Establish acceptable limits for the software application, network, or system.
 - T0495 - Manage Accreditation Packages (e.g., ISO/IEC 15026-2).
 
NICE Work Role Name:
Secure Software Assessor
NICE Work Role ID:
SP-DEV-002
NICE Category:
Securely Provision (SP)
		NICE Work Role Description:
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
- 
Cybersecurity Tools and Analysis (PR210)
 - 
Ethical Hacking and Penetration Testing (PR133)
 - 
PhP Hacker (PR150)
 - 
Risk Management Framework (RMF) for Federal Systems Security Controls Assessor (SCA) - SP (SP202-SP)
 - 
Secure Software Assessor (SP202-RBT)
 - 
Securing Coding - Intersystems (SP250)
 - 
Securing Web Apps, Applications, and Servers (SP143)
 - 
Software Assurance Fundamentals (SP107)
 - 
Software Assurance in Practice (SP207)
 - 
Software Assurance Overview - Intersystem - WBT (SP001-WBT)
 
Knowledge
- K0001 - Knowledge of computer networking concepts and protocols, and network security methodologies.
 - K0002 - Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
 - K0003 - Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
 - K0004 - Knowledge of cybersecurity and privacy principles.
 - K0005 - Knowledge of cyber threats and vulnerabilities.
 - K0006 - Knowledge of specific operational impacts of cybersecurity lapses.
 - K0007 - Knowledge of authentication, authorization, and access control methods.
 - K0008 - Knowledge of applicable business processes and operations of customer organizations.
 - K0009 - Knowledge of application vulnerabilities.
 - K0010 - Knowledge of communication methods, principles, and concepts that support the network infrastructure.
 - K0011 - Knowledge of capabilities and applications of network equipment including routers, switches, bridges, servers, transmission media, and related hardware.
 - K0013 - Knowledge of cyber defense and vulnerability assessment tools and their capabilities.
 - K0018 - Knowledge of encryption algorithms
 - K0019 - Knowledge of cryptography and cryptographic key management concepts
 - K0018 - Knowledge of encryption algorithms
 - K0021 - Knowledge of data backup and recovery.
 - K0024 - Knowledge of database systems.
 - K0026 - Knowledge of business continuity and disaster recovery continuity of operations plans.
 - K0027 - Knowledge of organization’s enterprise information security architecture.
 - K0028 - Knowledge of organization’s evaluation and validation requirements.
 - K0029 - Knowledge of organization’s Local and Wide Area Network connections.
 - K0037 - Knowledge of Security Assessment and Authorization process.
 - K0038 - Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
 - K0040 - Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
 - K0044 - Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
 - K0048 - Knowledge of Risk Management Framework (RMF) requirements.
 - K0049 - Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
 - K0054 - Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities.
 - K0056 - Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
 - K0059 - Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
 - K0070 - Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
 - K0084 - Knowledge of structured analysis principles and methods.
 - K0089 - Knowledge of systems diagnostic tools and fault identification techniques.
 - K0098 - Knowledge of the cyber defense Service Provider reporting structure and processes within one’s own organization.
 - K0100 - Knowledge of the enterprise information technology (IT) architecture.
 - K0101 - Knowledge of the organization’s enterprise information technology (IT) goals and objectives.
 - K0126 - Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161)
 - K0146 - Knowledge of the organization’s core business/mission processes.
 - K0168 - Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures.
 - K0169 - Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.
 - K0170 - Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations.
 - K0179 - Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
 - K0199 - Knowledge of security architecture concepts and enterprise architecture reference models (e.g., Zachman, Federal Enterprise Architecture [FEA]).
 - K0203 - Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
 - K0260 - Knowledge of Personally Identifiable Information (PII) data security standards.
 - K0261 - Knowledge of Payment Card Industry (PCI) data security standards.
 - K0262 - Knowledge of Personal Health Information (PHI) data security standards.
 - K0267 - Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
 - K0287 - Knowledge of an organization’s information classification program and procedures for information compromise.
 - K0322 - Knowledge of embedded systems.
 - K0342 - Knowledge of penetration testing principles, tools, and techniques.
 - K0622 - Knowledge of controls related to the use, processing, storage, and transmission of data.
 - K0624 - Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list)
 
Skills
- S0001 - Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
 - S0006 - Skill in applying confidentiality, integrity, and availability principles.
 - S0027 - Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
 - S0034 - Skill in discerning the protection needs (i.e., security controls) of information systems and networks.
 - S0038 - Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.
 - S0073 - Skill in using virtual machines. (e.g., Microsoft Hyper-V, VMWare vSphere, Citrix XenDesktop/Server, Amazon Elastic Compute Cloud, etc.).
 - S0078 - Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
 - S0097 - Skill in applying security controls.
 - S0100 - Skill in utilizing or developing learning activities (e.g., scenarios, instructional games, interactive exercises).
 - S0110 - Skill in identifying Test & Evaluation infrastructure (people, ranges, tools, instrumentation) requirements.
 - S0111 - Skill in interfacing with customers.
 - S0112 - Skill in managing test assets, test resources, and test personnel to ensure effective completion of test events.
 - S0115 - Skill in preparing Test & Evaluation reports.
 - S0120 - Skill in reviewing logs to identify evidence of past intrusions.
 - S0124 - Skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution.
 - S0128 - Skill in using manpower and personnel IT systems.
 - S0134 - Skill in conducting reviews of systems.
 - S0135 - Skill in secure test plan design (e. g. unit, integration, system, acceptance).
 - S0136 - Skill in network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
 - S0137 - Skill in conducting application vulnerability assessments.
 - S0138 - Skill in using Public-Key Infrastructure (PKI) encryption and digital signature capabilities into applications (e.g., S/MIME email, SSL traffic).
 - S0141 - Skill in assessing security systems designs.
 - S0145 - Skill in integrating and applying policies that meet system security objectives.
 - S0147 - Skill in assessing security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, NIST SP 800-53, Cybersecurity Framework, etc.).
 - S0171 - Skill in performing impact/risk assessments.
 - S0172 - Skill in applying secure coding techniques.
 - S0173 - Skill in using security event correlation tools.
 - S0174 - Skill in using code analysis tools.
 - S0175 - Skill in performing root cause analysis.
 - S0176 - Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures.
 - S0177 - Skill in analyzing a target’s communication networks.
 - S0184 - Skill in analyzing traffic to identify network devices.
 - S0232 - Skill in identifying intelligence gaps and limitations.
 - S0233 - Skill in identifying language issues that may have an impact on organization objectives.
 - S0234 - Skill in identifying leads for target development.
 - S0235 - Skill in identifying non-target regional languages and dialects.
 - S0236 - Skill in identifying the devices that work at each level of protocol models.
 - S0237 - Skill in identifying, locating, and tracking targets via geospatial analysis techniques.
 - S0238 - Skill in information prioritization as it relates to operations.
 - S0239 - Skill in interpreting compiled and interpretive programming languages.
 - S0240 - Skill in interpreting metadata and content as applied by collection systems.
 - S0241 - Skill in interpreting traceroute results, as they apply to network analysis and reconstruction.
 - S0242 - Skill in interpreting vulnerability scanner results to identify vulnerabilities.
 - S0243 - Skill in knowledge management, including technical documentation techniques (e.g., Wiki page).
 - S0244 - Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results.
 - S0248 - Skill in performing target system analysis.
 - S0249 - Skill in preparing and presenting briefings.
 - S0250 - Skill in preparing plans and related correspondence.
 - S0251 - Skill in prioritizing target language material.
 - S0252 - Skill in processing collected data for follow-on analysis.
 - S0254 - Skill in providing analysis to aid writing phased after action reports.
 - S0271 - Skill in reviewing and editing assessment products.
 - S0273 - Skill in reviewing and editing plans.
 - S0278 - Skill in tailoring analysis to the necessary levels (e.g., classification and organizational).
 - S0279 - Skill in target development in direct support of collection operations.
 - S0280 - Skill in target network anomaly identification (e.g., intrusions, dataflow or processing, target implementation of new technologies).
 - S0281 - Skill in technical writing.
 - S0296 - Skill in utilizing feedback to improve processes, products, and services.
 - S0304 - Skill to access information on current assets available, usage.
 - S0305 - Skill to access the databases where plans/directives/guidance are maintained.
 - S0306 - Skill to analyze strategic guidance for issues requiring clarification and/or additional guidance.
 - S0307 - Skill to analyze target or threat sources of strength and morale.
 - S0325 - Skill to develop a collection plan that clearly shows the discipline that can be used to collect the information needed.
 - S0329 - Skill to evaluate requests for information to determine if response information exists.
 - S0332 - Skill to extract information from available tools and applications associated with collection requirements and collection operations management.
 - S0367 - Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
 - S0370 - Skill to use cyber defense Service Provider reporting structure and processes within one’s own organization.
 - S0374 - Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.
 
Abilities
- A0028 - Ability to assess and forecast manpower requirements to meet organizational objectives.
 - A0033 - Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities.
 - A0077 - Ability to coordinate cyber operations with other organization functions or support activities.
 - A0090 - Ability to identify external partners with common cyber operations interests.
 - A0094 - Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.
 - A0111 - Ability to work across departments and business units to implement organization’s privacy principles and programs, and align privacy objectives with security objectives.
 - A0117 - Ability to relate strategy, business, and technology in the context of organizational dynamics.
 - A0118 - Ability to understand technology, management, and leadership issues related to organization processes and problem solving.
 - A0119 - Ability to understand the basic concepts and issues related to cyber and its organizational impact.
 - A0123 - Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
 - A0170 - Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
 
Tasks
- T0145 - Manage and approve Accreditation Packages (e.g., ISO/IEC 15026-2).
 - T0184 - Plan and conduct security authorization reviews and assurance case development for initial installation of systems and networks.
 - T0221 - Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network.
 - T0244 - Verify that application software/network/system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations.
 - T0251 - Develop security compliance processes and/or audits for external services (e.g., cloud service providers, data centers).
 - T0371 - Establish acceptable limits for the software application, network, or system.
 - T0495 - Manage Accreditation Packages (e.g., ISO/IEC 15026-2).
 - T0177 - Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
 - T0178 - Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy.
 - T0181 - Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.
 - T0205 - Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).
 - T0243 - Verify and update security documentation reflecting the application/system security design features.
 - T0255 - Participate in Risk Governance process to provide security risks, mitigations, and input on other technical risk.
 - T0264 - Ensure that plans of actions and milestones or remediation plans are in place for vulnerabilities identified during risk assessments, audits, inspections, etc.
 - T0265 - Assure successful implementation and functionality of security requirements and appropriate information technology (IT) policies and procedures that are consistent with the organization’s mission and goals.
 - T0268 - Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.
 - T0272 - Ensure that security design and cybersecurity development activities are properly documented (providing a functional description of security implementation) and updated as necessary.
 - T0275 - Support necessary compliance activities (e.g., ensure that system security configuration guidelines are followed, compliance monitoring occurs).
 - T0277 - Ensure that all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.
 - T0309 - Assess the effectiveness of security controls.
 - T0344 - Assess all the configuration management (change configuration/release management) processes.
 

