Flagship Kansas

Association

Network Security Analyst

Competency-based occupation
Onet code: 15-1212.00

2

Years

20

Skills
Classroom Instruction Topics
  • The code of human interaction and effective communication
  • The art of persuasion
  • Mastering team dynamics
  • Sharpen your critical thinking
  • Self-awareness and emotional intelligence
  • Resilience
  • Manage time
  • Receive feedback without getting defensive
  • Digital Group Communications
  • Email etiquette
  • Proper Introductions
  • Principles of digital citizenship like authenticity, respect, humility
  • Communicating with large groups of people
  • Verbal communication in 1:1 settings
  • Introduction to the technology stack
  • Introduction to tools and platforms
  • Introduction to Security
  • Threat Management
  • Threats and Attacks
  • Endpoint Application Development
  • Mobile Device Security
  • Information Technology Project Management/Encryption & Hashing
  • Introduction to Digital crime/Forensics
  • The Basics
  • Keys and Protocols
  • Networking Threats
  • Network Applications
  • Cloud and Virtualization
  • Wireless Networks
  • Authentication
  • Incidents
  • Risk Management
  • OSI Layers, Ports, and Protocols
  • Network Components & Topologies
  • Network Topologies, Types, and Technologies
  • WAN Technologies
  • Logical and Physical Topologies
  • Identifying Topologies
  • Discovering Network Components and Locations
  • Deploying Appropriate Cable Solutions
  • IP Addressing
  • Ethernet Switching
  • IP Routing and Forwarding
  • Identifying TCP/IP Misconfigurations
  • Network Devices
  • Ports, Protocols, and Network Services
  • Virtualization and Network Storage
  • Cloud Concepts and Purposes
  • Device Placement and Configuration
  • Network Device Locations
  • Advance Network Devices
  • Routing, Bandwidth, and Switching
  • Defining Dynamic Routing Protocols
  • Identifying Network Descriptions
  • Wireless Technologies, Configurations, and Security
  • Identifying Antenna Types
  • Matching Wireless Standards & Maximum Speeds
  • Defining Security Standards
  • Ensuring Network Availability
  • Network Diagrams and Documentation
  • Business Continuity and Disaster Recovery
  • Defining Redundancy Protocols
  • Basic Wireless Network Security
  • Security Concepts and Attacks
  • Defining Network Attacks
  • Scanning, Monitoring, and Patching
  • Remote Access Methods
  • Physical Security and Network Attacks
  • Troubleshooting Methodology
  • Networking & Cabling Problems
  • Identifying Network Testing Tools
  • Defining Physical Layer Issues
  • Wired Connectivity and Performance Issues
  • Tools, Commands, and Performance
On-the-job Training
  • Develop computer or information security policies or procedures
    • Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. Understands and executes routine company processes.
  • Update knowledge about emerging industry or technology trends.
    • Monitor current reports of computer viruses to determine when to update virus protection systems. Understands technologies and platforms utilized to complete investigations.
  • Implement security measures for computer or information systems.
    • Encrypt data transmissions or erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
    • Modify computer security files to incorporate new software, correct errors, or change individual access status.
    • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
    • Maintain permanent fleet cryptologic and carry-on direct support systems required in special land, sea surface and subsurface operations
    • Become efficient in multiple Security Information and Event Management (SIEM) software. Understand use of  SEIM  solutions to detect incidents through signature and anomaly-based detection technologies.
    • Understand the different areas within an alarm and what warrants deeming an event as malicious or non-malicious activity.
  • Test computer system operations to ensure proper functioning.
    • Perform risk assessments and execute tests of data processing system to ensure functioning of data processing activities and security measures. Understand various platforms and their uses.
  • Collaborate with others to resolve information technology issues.
    • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. Provide appropriate customer service for customer needs.
  • Document operational procedures.
    • Document computer security and emergency measures policies, procedures, and tests. Understand processes for handling internal outages and the escalation flow when such events occur.
  • Troubleshoot issues with computer applications or systems.
    • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes.
    • Consult with customers or other departments on security events or technical issues, such as outages or compromise.
  • Coordinate project activities with other personnel or departments.
    • Coordinate implementation of computer system plan with establishment personnel and outside vendors. Uses client/customer requirements to determine investigation requirements.
  • Monitor the security of digital information.
    • Monitor use of data files and regulate access to safeguard information in computer files. Create cases based on host impacted, host origin, location, types of attach, executable files etc…Review repeat alarms create service requests and elevate to proper analyst.
    • Monitor functioning of equipment to ensure system operates in conformance with specifications.
  • Train others in computer interface or software use.
    • Provide customer training, as appropriate, to attain necessary information to address customer concerns. Train users and promote security awareness to ensure system security and to improve server and network efficiency.
  • Demonstrate an understanding of end-to-end Security Operations Center (SOC) workflow.
    • Understand organizational hierarchy and workflow for the Security Operations Center (SOC). Includes SOC procedures, technologies, and processes to collect, triage, report, respond, and document the incident.
  • Full service case load with supervision
    • Acclimate to full customer load. Mentor will be available to field questions and issues. Mentor will validate quality of performance of duties. Review cases and investigations to validate that they meet requirements and service level agreements. Remedial training as required.
  • Business Acumen/Employability Skills
    • Understand business mission and goals; Apply effective people and project management skills; Apply critical-thinking skills to solve problems; Plan and prioritize work to manage time; Working cooperatively and give full attention to what others are saying to effectively communicate.
calendar.svg
Get on our calendar
Not sure if WorkHands is right for you? Chat with our team today
sendEmail.svg
Send us an email
We'll get back to you shortly