All Positions

Cybersecurity

Computer Network Defense Analyst

Position QualificationSingle Type

About This Position

The CNDAnalyst: Not Specified 1.Usesdefensivemeasuresandinformationcollectedfromavarietyofsourcesto identify,analyzeandreporteventsthatoccurormaypossiblyoccurwithinthe network 2.Protectsinformation,informationsystemsandnetworksfromthreats

Training Requirements

Completionofthefollowing: NIMSTraining Programdefinesanationalbaselinetoguideandpromote NIMS 1.IS-100:Introductionto Incident Command System,ICS-100 training.Itprovidesrecommendationstoassist AHJsindevelopingtheirowntraining 2.IS-200:Basic Incident Command Systemfor Initial Response,ICS-200 plans,tailoredtotheirspecificneeds 3.IS-700:An Introductiontothe National Incident Management System 4.IS-800:National Response Framework,An Introduction 5.Computerdefenseinprevention,detectionandresponsetrainingasthe Agency Having Jurisdiction(AHJ)determines 1.4-SEPTEMBER2025 COMPUTERNETWORKDEFENSEANALYST 1OF6 Position Qualificationfor Cybersecurity Cybersecurity COMPONENT SINGLETYPE NOTES

Experience

AHJ-validatedknowledge,skillsandabilitiesdemonstratedinthefollowingareas: Theknowledge,skillsandabilitiesalignwiththe National Initiativefor Cyber 1.CNDin-depthprinciples Education(NICE),National Cybersecurity Workforce Framework 2.CNDandvulnerabilityassessmenttools,includingopen-sourcetools,andtheir capabilities 3.Encryption 4.Databackup,typesofbackupsandrecoveryconceptsandtools 5.Hostandnetworkaccesscontrols 6.Intrusion Detection System(IDS)toolsandapplications 7.Incidentresponseandhandlingmethodologies 8.Informationassurance(IA)principlesandorganizationalneedsthatarerelevant toconfidentiality,integrity,availability,authenticationandnon-repudiation 9.Intrusiondetectionmethodologiesandtechniquesfordetectinghost-and network-basedintrusionsviaintrusiondetectiontechnologies 10.Networkprotocols 11.Networktrafficanalysismethods 12.Newandemerginginformationtechnology(IT)andinformationsecurity technologies 13.Trafficflowpatternsacrossthenetwork 14.Penetrationtestingprinciples,toolsandtechniques 15.Policy-basedandriskadaptiveaccesscontrols 16.Programminglanguagestructuresandlogicforcurrentproductionplatforms 17.Systemandapplicationsecuritythreatsandvulnerabilities 18.Securitymanagement 19.Contentdevelopment 20.CNDserviceproviderreportingstructureandprocesses 21.Virtual Private Network(VPN)security 22.Networkattackandtherelationshiptoboththreatsandvulnerabilities 23.Commonadversarytactics,techniquesandprocedures(TTP)inassignedarea ofresponsibility 24.Commonnetworktools 25.Defense-in-

FEMA RTLT Standard

Computer Network Defense Analyst

ID: 13-509-1251

Do you serve in this role?

Grey Sky documents and verifies your service against the FEMA standard. Start your record today.

Tell Your Story