Prioritizes risks and develops approaches to prevent, mitigate and manage risks by incorporating threat analysis to a given system or platform.
Specifies, designs, builds, and tests cyber resiliency design characteristics as well as, and in close relationship with, security design characteristics; including where and how the relevant cyber resiliency design principles are applied and how that application relates to relevant security design principles.
Recognizes the underlying issues to problems where there is not a solution set to lean upon; creatively leverages people, processes, and technology and others’ lessons learned in an efficient manner to develop novel solutions.
Develops and deploys secure systems by looking at systems and products from a threat actor’s perspective in order to gain access or influence its operations via abuse cases.
Persuasively expresses ideas and information as a means to guide others towards a desired way of thinking, a key outcome, or a successful change transition resulting in adoption.
Understands customer mission and proposes actionable, viable solutions in support of offensive or defensive Cyber operations; collaborates with internal and external stakeholders to achieve mutual goals.
Demonstrates a broad understanding of multiple technology environments along with relevant domain knowledge (e.g. Traditional and Non-traditional Technologies, Platforms, etc.) and leverages this knowledge to improve one’s performance in design/engineering/testing and other relevant job duties
Applies awareness of the software development cycle and order in which it is executed according to business requirements to incorporate security into standard software development processes.
Conducts activities, tactics, practices, techniques, and deliverables associated with writing and modifying programs that support cyber mission operations. Designs, codes, tests, deploys, and maintains complex program solutions, and maintains detailed documentation.
Defines, develops, and verifies that the security relevant requirements are fully defined in the system test plan.
Enforces security requirements throughout the planning, creation, testing, and deployment process to ensure system confidentiality, integrity and availability
Analyzes the pros and cons of alternative design options and assist in the selection of such alternative based on overall system characteristics and performance