Flagship Kansas

Association

Cyber Defense Incident Responder

Competency-based occupation
Onet code: 15-1299.05

1

Years

26

Skills

445h

Related instruction
Classroom Instruction Topics
  • Online CompTIA Advanced Security Practitioner (CASP)
  • SSCP Systems Security Certified Practitioner
  • Certified Information Systems Security Professional (CISSP)
  • Agile Fundamentals: Including Scrum and Kanban - 2022
  • Digital Forensics Masterclass | Forensic Science 2022 DFMC+TM
  • Hacking Techniques for IT Professionals 2.0 Complete Course
  • Cyber Security Risk Management
  • Developing an IT Strategy
  • Data Security strategy for organizations
  • Information Systems Auditor Cryptography: Learn All Encryption Algorithm (2022)
  • SSCP Certification (Systems Security Certified Practitioner)
  • Python for Offensive PenTesting: A Complete Practical Course
  • Corporate & Strategic Communication Skills for Managers
  • Coaching and Mentor Skills
  • The Complete Management Skills Certification Course
  • Information Privacy (FOIA, PII, HIPPA, ECPA) 3
  • Business Acumen
  • Computer Network Defense
  • Incident Management (Threats and Attacks)
  • Information Systems / Network Security
  • Infrastructure Design
  • Computer Systems Analysis/Enterprise Security
  • Threat Analysis
  • Vulnerabilities Assessment
  • Computer Systems Networking and Telecommunications
  • Computer/Information Technology Administration and Management
  • Computer and Information Sciences and Support Services
  • Information Technology Project Management
  • Introduction to Digital Crime/Forensics
  • Introduction to Ethical Hacking
  • Introduction to Penetration testing/Python
  • Security and Risk Management
  • Asset Management
  • Security and Architecture and Engineering
  • Identity and Access management
  • Software Development security
  • Security Assessment and testing
  • Security Operations
  • Communication and Network Security
On-the-job Training
  • Manage information technology projects or system activities.
    • Coordinate monitoring of networks or systems for security breaches or intrusions.
    • Coordinate vulnerability assessments or analysis of information security systems.
    • Oversee development of plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure or to meet emergency data processing needs.
    • Oversee performance of risk assessment or execution of system tests to ensure the functioning of data processing activities or security measures.
  • Develop software or computer applications.
    • Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
    • Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
  • Install computer software.
    • Develop or implement software tools to assist in the detection, prevention, and analysis of security threats.
    • Develop or install software, such as firewalls and data encryption programs, to protect sensitive information.
  • Analyze security of systems, network, or data.
    • Python use, identify security system weaknesses using penetration tests.
  • Coordinate reporting or editing activities.
    • Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
  • Develop operating strategies, plans, or procedures.
    • Develop response and recovery strategies for security breaches: Intrusion detection methodologies and techniques for detecting host and network-based intrusions; Protect a network against malware; Damage assessments; Secure network communications; Use of security event correlation tools; Identify, capture, contain, and report malware
  • Develop performance metrics or standards related to information technology
    • Develop information security standards and best practices. Business continuity and disaster recovery continuity of operations plans
  • Establish work standards.
    • Develop information security standards and best practices.
  • Evaluate potential of products, technologies, or resources.
    • Identify or implement solutions to information security problems.
  • Evaluate utility of software or hardware technologies
    • Assess the quality of security controls using performance indicators; Review Organizational Processes against security controls
  • Implement security measures for computer or information systems.
    • Identify or implement solutions to information security problems: Intrusion detection; Host and network-based intrusions; Protect a network against malware; Secure network communications; Identity and Access management and technologies; Adjust for cloud considerations
  • Investigate illegal or suspicious activities.
    • Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage.
  • Monitor processes for compliance with standards.
    • Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
  • Provide technical guidance to other personnel.
    • Provide technical support to computer users for installation and use of security products.
  • Read documents to gather technical information
    • Review security assessments for computing environments or check for compliance with cybersecurity standards and regulations.
  • Recommend changes to improve computer or information systems.
    • Recommend information security enhancements to management. Recognize and categorize types of vulnerabilities and associated attacks.
  • Supervise information technology personnel.
    • Train staff on and oversee the use of information security standards, policies, and best practices.
  • Test computer system operations to ensure proper functioning.
    • Scan networks using vulnerability assessment tools to identify vulnerabilities.
  • Train personnel in technical or scientific procedures
    • Train staff on and oversee the use of information security standards, policies, and best practices.
  • Troubleshoot issues with computer applications or systems.
    • Troubleshoot security and network problems.
  • Write reports or evaluations
    • Write reports regarding investigations of information security breaches or network evaluations.
calendar.svg
Get on our calendar
Not sure if WorkHands is right for you? Chat with our team today
sendEmail.svg
Send us an email
We'll get back to you shortly