Information Security Analyst Tier 1

Competency-based occupation
Onet code: 15-1122.00

1

Years

35

Skills
Classroom Instruction Topics
  • Information and Communication Technology Essentials
  • Systems and Network Administration
  • Computer Network Fundamentals
  • Routing and Switching Essentials
  • Information and Network Security
  • Principles of Cybersecurity Analysis
  • Python Programming in Cybersecurity
  • Computer Forensics Fundamentals
On-the-job Training
  • On the Job Training - Principles and Practices
    • Apply security fundamentals
    • Apply security best practices
  • On the Job Training - Cybersecurity Fundamentals
    • Perform network and wireless intrusion detection
    • Perform security activity monitoring
    • Execute incident response processes
    • Perform scans of databases, web applications, anti-virus and others
  • On the Job Training - Tools and Technologies
    • Use various cybersecurity tools and technologies
    • Perform Application maintenance and troubleshooting
    • Run, review and analyze application reports
  • Foundational Competencies - Principles and Practices
    • Demonstrate knowledge of Security best practices
    • Demonstrate knowledge of organizational security offerings
    • Demonstrate knowledge of basic security fundamentals
  • Foundational Competencies - Security Fundamentals
    • Demonstrate knowledge and ability to conduct network intrusion detection
    • Demonstrate knowledge and ability to conduct wireless intrusion detection
    • Demonstrate ability to perform security activity monitoring
    • Demonstrate ability to initiate incident response processes
    • Demonstrate ability to maintain and troubleshoot applications
    • Demonstrate ability to perform scans of databases, web and mobile applications
  • Foundational Performance Criteria - Demonstrate knowledge of Security best practices
    • Demonstrate understanding of information security principles as they relate to system and network security
    • Demonstrate knowledge of MSS tools and security applications (e.g., log & event monitoring, Security information and Event Management (SIEM), etc.)
  • Foundational Performance Criteria - Demonstrate knowledge of Security Fundamentals
    • Demonstrate knowledge of TCP/IP, ports, protocols, and system functions
    • Demonstrate knowledge of how security should be a multi-layered approach
  • Foundational Performance Criteria - Demonstrate knowledge and ability to conduct network intrusion detection
    • Demonstrate ability to verify appliance functionality to ensure log data is being collected and forwarded to the Security Information and Event Management (SIEM) application
    • Demonstrate ability to analyze event reports
    • Demonstrate ability to initiate Incident response processes
  • Foundational Performance Criteria - Demonstrate knowledge and ability to conduct wireless instruction detection
    • Demonstrate knowledge of how enterprise wireless networks are architected
    • Demonstrate knowledge of how wireless encryption and authentication
  • Foundational Performance Criteria - Demonstrate ability to perform Security Activity Monitoring
    • Initiate Incident Response Processes in the event of an incident or investigation
  • Foundational Performance Criteria - Demonstrate ability to initiate and conduct incident response
    • Demonstrate knowledge of the Incident Response Process
    • Demonstrate the ability to be a team member during an incident response
  • Foundational Performance Criteria - Demonstrate ability to maintain and troubleshoot applications
    • Demonstrate ability to troubleshoot applications and related tools
    • Demonstrate ability to remediate vulnerabilities identified during scans - patching
    • Demonstrate ability to create, review and analyze reports
  • Foundational Performance Criteria - Demonstrate ability to perform scans of databases, web applications, anti-virus and other
    • Demonstrate knowledge of vulnerability scanning
    • Demonstrate ability to configure and initiate automated scans for networks, and applications
calendar.svg
Get on our calendar
Not sure if WorkHands is right for you? Chat with our team today
sendEmail.svg
Send us an email
We'll get back to you shortly