DoD Cybersecurity Jobs

DoD Cybersecurity Jobs

For DoD Cybersecurity Jobs, the DoD Cyber Workforce Framework (DCWF) establishes the authoritative lexicon based on the work an individual is performing, not their position titles, occupational series, or designator. The DCWF describes the work performed by the full spectrum of the cyber workforce as defined in DoD Directive (DoDD) 8140.01. The DCWF leverages the original National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF) and the DoD Joint Cyberspace Training and Certification Standards (JCT&CS).

DoD components, agencies, and field activities hire civilian cybersecurity professionals in these work communities — Cybersecurity, Cyberspace Intelligence, Cyber IT, Cyberspace Effects, and Cyberspace Support.

In viewing each of these work communities and their associated work roles, look for the corresponding DoD Civilian or private sector job titles to see how your skill sets fit within this 21st Century framework for DoD Cybersecurity Jobs.

Click the work role title to see the core and additional Knowledge, Skills, Abilities, and Tasks (KSAT) for each work role.

DoD Cybersecurity Jobs Workforce Element: Cyberspace Effects

Personnel who plan, support, and execute cyberspace capabilities where the primary purpose is to externally defend or conduct force projection in or through cyberspace.

Cybersecurity Work Role What Does This Job Do? Example DoD Civilian or Private Sector Titles
Mission Assessment Specialist (112)
Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness. Intelligence Specialist
Exploitation Analyst (121)
Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks. Intelligence Analyst
Counterintelligence Analyst
Intelligence Research Analyst
Target Developer (131) Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation. Intelligence Analyst
Counterintelligence Analyst
Intelligence Research Analyst
Target Network Analyst (132)
Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks and the applications on them. Intelligence Analyst
Counterintelligence Analyst
Intelligence Research Analyst
Threat Analyst
Warning Analyst (141)
Develops unique cyber indicators to maintain constant awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber warning assessments. Intelligence Analyst
Counterintelligence Analyst
Intelligence Research Analyst
Cyber Operations Planner (332) Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions. Intelligence Operations Specialist
Information Security (INFOSEC)
Host Analyst (463) Has knowledge of various system configurations and performs analysis using built-in tools and capabilities. Has knowledge of system services and the security and configuration, as well as knowledge of file systems, permissions, and operation system configurations. Intelligence Operations Specialist
Information Security (INFOSEC)
DoD Cybersecurity Jobs Workforce Element: Cyberspace Enablers (Support) Acquisition

For all Cyberspace Support Communities, these are personnel who perform work roles to support or facilitate the functions of cyber IT, cybersecurity, cyberspace effects, or intelligence workforce (cyberspace) work roles. This includes actions to support acquisition, training and leadership activities.

Cybersecurity Work Role What Does This Job Do? Example DoD Civilian or Private Sector Titles
Program Manager (801)
Leads, coordinates, communicates, integrates and is accountable for the overall success of the program, ensuring alignment with critical agency priorities. Program Manager
Management Analysis Officer
Management Analyst
Management and Program Analysis Officer
Management and Program Analyst
Program Analysis Officer
Program Analyst
IT Project Management
IT Specialist (Security)
IT Project Manager (802)
Work that involves directly managing information technology projects to provide a unique service or product. IT Program Management Specialist
IT Project Management
IT Specialist (Security)
Product Support Manager (803)
Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components. Program Manager
Management Analysis Officer
Management Analyst
Management and Program Analysis Officer
Management and Program Analyst
Program Analysis Officer
Program Analyst
Telecommunications Specialist (Communications Acquisition)
Engineering Technician (Electrical)
Industrial Engineering Technician
Procurement Analyst
Property Disposal Specialist
Property Disposal Officer
Property Disposal Clerk
Property Disposal Technician
Supply Management Officer
Supply Management Specialist
Supply Systems Analyst
Enterprise Resource Planner
IT Specialist (Security)
IT Investment / Portfolio Manager (804)
Manages a portfolio of IT capabilities that align with the overall needs of mission and business enterprise priorities. Telecommunications Specialist (Communications Acquisition)
Financial Administration and Program Specialist
Financial Specialist
Accountant
Accounting Officer
Cost Accountant
Staff Accountant
System Accountant
Budget Analyst
Engineering Technician (Electrical)
Industrial Engineering Technician
Contract Specialist
Contract Negotiator
Contract Administrator
Contract Termination Specialist
Contract Price / Cost Analyst
Purchasing Agent
Procurement Clerk
Procurement Technician
Supply Management Officer
Supply Management Specialist
Supply Systems Analyst
Enterprise Resource Planner
IT Specialist (Security)
IT Program Auditor (805)
Conducts evaluations of an IT program or its individual components, to determine compliance with published standards. Auditor
General Inspection, Investigation, Enforcement, and Compliance Specialist
Compliance Inspection and Support Specialist
Information Security (INFOSEC)
IT Auditor
IT Specialist
IT Specialist (Security)
DoD Cybersecurity Jobs Workforce Element: Cyberspace Enablers (Support) Leadership
Cybersecurity Work Role What Does This Job Do? Example DoD Civilian or Private Sector Titles
Privacy Compliance Manager (732)
Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance needs of privacy and security executives and their teams. Government Information Specialist
Compliance Product Officer
Privacy Officer and Compliance Manager
Privacy Compliance Manager
Privacy and Compliance Officer
Cyber Workforce Developer and Manager (751)
Develops cyberspace workforce plans, strategies and guidance to support cyberspace workforce manpower, personnel, training and education requirements and to address changes to cyberspace policy, doctrine, materiel, force structure, and education and training requirements. Information Security (INFOSEC)
IT Specialist
IT Specialist (Security)
Cyber Policy and Strategy Planner (752)
Develops cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and initiatives. Emergency Management Specialist
Government Information Specialist
Program Manager
Management Analysis Officer
Management Analyst
Management and Program Analysis Officer
Management and Program Analyst
Program Analysis Officer
Program Analyst
Telecommunications Specialist (Plans & Policy)
Computer Scientist
IT Specialist
Information Security (INFOSEC)
Chief Information Security Officer
IT Policy and Planning Analyst
IT Specialist (Policy and Planning)
IT Specialist (Security)
Executive Cyber Leader (901)
Executes decision making authorities and establishes vision and direction for an organization’s cyber and cyber-related resources and/or operations. Emergency Management Specialist
Information Security (INFOSEC)
Chief Information Security Officer
IT Specialist
IT Specialist (Security)
DoD Cybersecurity Jobs Workforce Element: Cyberspace Enablers (Support) Legal / Law Enforcement
Cybersecurity Work Role What Does This Job Do? Example DoD Civilian or Private Sector Title
Forensics Analyst (211)
Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents. Security Specialist (ADP)
Security Specialist (Crypto)
General Inspection, Investigation, Enforcement, and Compliance Specialist
Computer Forensic Analyst
Investigative Analyst
Investigator
Information Security (INFOSEC)
IT Specialist
IT Specialist (Security)
Cyber Crime Investigator (221)
Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques. Criminal Investigator
Information Security (INFOSEC)
IT Specialist
IT Specialist (Security)
Cyber Legal Advisor (731)
Provides legal advice and recommendations on relevant topics related to cyber law. General Attorney
Paralegal Specialist
Legal Instruments Examiner
Legal Assistant
Claims Assistant
Claims Examiner
IT Specialist
IT Specialist (Security)
DoD Cybersecurity Jobs Workforce Element: Cyberspace Enablers (Support) Training & Education
Cybersecurity Work Role What Does This Job Do? Example DoD Civilian or Private Sector Title
Cyber Instructional Curriculum Developer (711)
Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs. Security Specialist (ADP)
Security Specialist (Crypto)
Intelligence Analyst
Counterintelligence Analyst
Intelligence Operations Specialist
Intelligence Research Analyst
Intelligence Specialist
Threat Analyst
Human Resources Specialist (Information Systems)
Management Analysis Officer
Management Analyst
Management and Program Analysis Officer
Management and Program Analyst
Program Analysis Officer
Program Analyst
Computer Engineer (Simulations)
Computer Scientist
Information Security (INFOSEC)
IT Specialist
IT Specialist (Security)
Cyber Instructor (712)
Develops and conducts training or education of personnel within cyber domain. Information Security (INFOSEC)
IT Specialist
IT Specialist (Security)
DoD Cybersecurity Workforce Element Jobs: Cyber IT

Personnel who design, build, configure, operate, and maintain IT, networks, and capabilities. This includes actions to prioritize, implement, evaluate, and dispose of IT as well as information resource management; and the management, storage, transmission, and display of data and information.

Cybersecurity Work Role What Does This Job Do? Example DoD Civilian or Private Sector Titles
Technical Support Specialist (411)
Provides technical support to customers who need assistance utilizing client level hardware and software in accordance with established or approved organizational process components. (i.e., Master Incident Management Plan, when applicable). Security Specialist (ADP)
Security Specialist (Crypto)
Human Resources Specialist (Information Systems)
Computer Operator
Telecommunications Equipment Operator
Electronics Technician
Information Security (INFOSEC)
Customer Support
Customer Support Specialist
Help Desk Representative
IT Specialist
Maintenance Specialist
Technical Support Specialist
IT Specialist (Customer Support)
IT Specialist (Security)
Database Administrator (421)
Administers databases and/or data management systems that allow for the storage, query, and utilization of data. Security Specialist (ADP)
Security Specialist (Crypto)
Computer Scientist
Information Security (INFOSEC)
Data Administrator
Data Architect
Data Management
Data Storage Specialist
Data Warehouse Specialist
Database Administrator
IT Specialist
Site Administrator
Web Operations Specialist
Webmaster
Website Administrator
IT Specialist (Applications Software)
IT Specialist (Data Management)
IT Specialist (Security)
Knowledge Manager (431)
Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content. Government Information Specialist
Management Analysis Officer
Management Analyst
Management and Program Analysis Officer
Management and Program Analyst
Program Analysis Officer
Program Analyst
Telecommunications Specialist (RF Spectrum Management)
Computer Engineer (Data Systems)
Computer Scientist
Information Security (INFOSEC)
Business Analyst
Data Management
Data Storage Specialist
Data Warehouse Specialist
IT Specialist
IT Specialist (Data Management)
IT Specialist (Security)
Network Operations Specialist (441)
Plans, implements, and operates network services/systems, to include hardware and virtual environments. Security Specialist (ADP)
Security Specialist (Crypto)
Telecommunications Equipment Operator
Telecommunications Specialist (Data Transmission)
Computer Scientist
Information Security (INFOSEC)
Internet Developer
Internet Specialist
IT Specialist
LAN / WAN Administrator
Network Administrator
Network Analyst
Network Designer
Network Engineer
Network Security Officer
Network Services
IT Specialist (Internet)
IT Specialist (Network Services)
IT Specialist (Security)
System Administrator (451)
Installs, configures, troubleshoots, and maintains hardware, software, and administers system accounts. Security Specialist (ADP)
Security Specialist (Crypto)
Telecommunications Specialist (Telecom Management)
Telecommunications Specialist (Telecom Operations)
Computer Scientist
Information Security (INFOSEC)
Database Adminstrator
IT Specialist
LAN / WAN Administrator
Site Administrator
Systems Administration
Systems Adminstrator
UNIX / Windows Systems Administrator
Web Operations Specialist
Webmaster
Website Administrator
IT Specialist (Applications Software)
IT Specialist (Operating Systems)
IT Specialist (Security)
IT Specialist (Systems Administrator)
Systems Developer (632)
Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle. Telecommunications Specialist (Deployment Planning)
Engineering Technician (Electrical)
Electrial Engineer
Computer Engineer
Computer Engineer (Data Systems)
Computer Engineer (Embedded Systems)
Computer Engineer (Networks)
Computer Scientist
Information Security (INFOSEC)
Applications Developer
Database Developer
Internet Developer
IT Specialist
Network Designer
Network Engineer
Programmer
Programmer Analyst
Software Developer
Software Engineer
Systems Engineer
Systems Software Engineer
Systems Software Programmer
Web Developer
IT Specialist (Security)
Systems Requirements Planner (641)
Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions. Emergency Management Specialist
Management Analysis Officer
Management Analyst
Management and Program Analysis Officer
Management and Program Analyst
Program Analysis Officer
Program Analyst
Telecommunications Specialist (Telecom Requirements)
Electrical Engineer
Computer Engineer
Computer Engineer (Data Systems)
Computer Engineer (Embedded Systems)
Computer Engineer (Networks)
General Mathematician and Statistician
Operations Research Analyst
Mathematician
Mathematical Statistician
Computer Scientist
Information Security (INFOSEC)
Business Analyst
Enterprise Resource Planner
IT Specialist
Network Designer
Network Engineer
Programmer
Programmer Analyst
Solutions Architect
Web Developer
Web Manager
IT Specialist (Enterprise Architecture)
IT Specialist (Security)
Enterprise Architect (651)
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures. Electrical Engineer
Computer Engineer
Computer Engineer (Data Systems)
Computer Engineer (Embedded Systems)
Computer Engineer (Networks)
Computer Scientist
Information Security (INFOSEC)
Chief Enterprise Architect
Data Architect
Enterprise Architect
Information Technology Architect
Internet Architect
IT Specialist
Network Designer
Senior Enterprise Architect
Solutions Architect
IT Specialist (Enterprise Architecture)
IT Specialist (Security)
Research & Development Specialist (661)
Conducts software and systems engineering and software systems research in order to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems. Telecommunications Specialist (Test & Evaluation)
Engineering Technician (Electrical)
Electrical Engineer
Computer Engineer
Computer Engineer (Data Systems)
Computer Engineer (Embedded Systems)
Computer Engineer (Networks)
Computer Engineer (Simulations)
General Mathematician and Statistician
Operations Research Analyst
Mathematician
Mathematical Statistician
Computer Scientist
Information Security (INFOSEC)
IT Specialist
Network Designer
Network Engineer
Programmer
Programmer Analyst
Software Engineer
Systems Engineer
Systems Programmer
Systems Software Engineer
Systems Software Programmer
Web Developer
IT Specialist (Security)
System Testing and Evaluation Specialist (671)
Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.
Telecommunications Specialist (Test & Evaluation)
Auditor
Engineering Technician (Electrial)
Electrical Engineer
Computer Engineer
Computer Engineer (Data Systems)
Computer Engineer (Embedded Systems)
Computer Engineer (Networks)
Computer Engineer (Simulations)
Electronics Engineer
Electronics Technician
General Mathematician and Statistician
Operations Research Analyst
Mathematician
Mathematical Statistician
Computer Scientist
Information Security (INFOSEC)
IT Auditor
IT Specialist
Network Designer
Network Engineer
Programmer
Programmer Analyst
Software Engineer
Software Quality Assurance Specialist
Systems Engineer
Systems Programmer
Systems Software Engineer
Systems Software Programmer
Web Developer
IT Specialist (Security)
DoD Cybersecurity Workforce Element Jobs: Cyberspace Intelligence

Personnel who collect, process, analyze, and disseminate information from all sources of intelligence on foreign actors’ cyberspace programs, intentions, capabilities, research and development, and operational activities.

Cybersecurity Work Role What Does This Job Do? Example DoD Civilian or Private Sector Title
All-Source Analyst (111)
Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations. Intelligence Analyst
Counterintelligence Analyst
Intelligence Operations Specialist
Intelligence Research Analyst
Intelligence Specialist
Threat Analyst
All-Source Collection Manager (311)
Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to meet leadership’s intent. Determines capabilities of available collection assets, identifies new collection capabilities; and constructs and disseminates collection plans. Monitors execution of tasked collection to ensure effective execution of the collection plan. Intelligence Analyst
Counterintelligence Analyst
Intelligence Operations Specialist
Intelligence Research Analyst
Intelligence Specialist
Threat Analyst
All-Source Collection Requirements Manager (312)
Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of collection requirements. Evaluates performance of collection assets and collection operations. Intelligence Analyst
Counterintelligence Analyst
Intelligence Operations Specialist
Intelligence Research Analyst
Intelligence Specialist
Threat Analyst
Cyber Intel Planner (331)
Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace. Intelligence Operations Specialist
Information Security (INFOSEC)
Multi-Disciplined Language Analyst (151)
Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate intelligence information derived from language, voice and/or graphic material. Creates, and maintains language specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects. Intelligence Analyst
Counterintelligence Analyst
Intelligence Research Analyst
DoD Cybersecurity Workforce Element Jobs: Cybersecurity

Personnel who secure, defend, and preserve data, networks, net-centric capabilities, and other designated systems by ensuring appropriate security controls and measures are in place, and taking internal defense actions. This includes access to system controls, monitoring, administration, and integration of cybersecurity into all aspects of engineering and acquisition of cyberspace capabilities.

Cybersecurity Work Role What Does This Job Do? Example DoD Civilian or Private Sector Titles
Cyber Defense Forensics Analyst (212)
Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. Information Security (INFOSEC)
IT Specialist
IT Specialist (Security)
Cyber Defense Analyst (511)
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Security Specialist (ADP)
Security Specialist (Crypto)
Emergency Management Specialist
Management Analysis Officer
Management Analyst
Management and Program Analysis Officer
Management and Program Analyst
Program Analysis Officer
Program Analyst
Telecommunications Specialist (Traffic Analysis)
Operations Research Analyst
Computer Scientist
General Inspection, Investigation, Enforcement, and Compliance Specialist
Computer Forensic Analyst
Information Security (INFOSEC)
IT Specialist
Network Administrator
Network Analyst
Network Designer
Network Engineer
IT Specialist (Security)
Cyber Defense Infrastructure Support Specialist (521)
Tests, implements, deploys, maintains, and administers the infrastructure hardware and software Security Specialist (ADP)
Security Specialist (Crypto)
Emergency Management Specialist
Telecommunications Equipment Operator
Computer Scientist
General Inspection, Investigation, Enforcement, and Compliance Specialist
Computer Forensic Analyst
Information Security (INFOSEC)
IT Specialist
Network Administrator
Network Analyst
Network Designer
Network Engineer
IT Specialist (Security)
Cyber Defense Incident Responder (531)
Investigates, analyzes, and responds to cyber incidents within the network environment or enclave. Security Specialist (ADP)
Security Specialist (Crypto)
Emergency Management Specialist
Computer Scientist
General Inspection, Investigation, Enforcement, and Compliance Specialist
Computer Forensic Analyst
Investigative Analyst
Investigator
Criminal Investigator
Information Security (INFOSEC)
IT Specialist
Network Administrator
Network Analyst
Network Engineer
IT Specialist (Security)
Vulnerability Assessment Analyst (541)
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. Security Specialist (ADP)
Security Specialist (Crypto)
Emergency Management Specialist
Auditor
Computer Scientist
General Inspection, Investigation, Enforcement, and Compliance Specialist
Computer Forensic Analyst
Information Security (INFOSEC)
Information Assurance Analyst
Information Assurance Specialist
Information Systems Security Analyst
Information Systems Security Officer
Information Systems Security Specialist
IT Auditor
IT Specialist
Network Administrator
Network Analyst
Network Engineer
Programmer
Programmer Analyst
IT Specialist (Security)
Authorizing Official / Designating Representative (611)
Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation. Security Specialist (ADP)
Security Specialist (Crypto)
Management Analysis Officer
Management Analyst
Management and Program Analysis Officer
Management and Program Analyst
Program Analysis Officer
Program Analyst
General Mathematician and Statistician
Operations Research Analyst
Computer Scientist
General Inspection, Investigation, Enforcement, and Compliance Specialist
Compliance Inspection and Support Specialist
Information Security (INFOSEC)
Business Analyst
Information Assurance Analyst
Information Assurance Specialist
Information Systems Security Analyst
Information Systems Security Officer
Information Systems Security Specialist
IT Specialist
IT Specialist (Security)
Security Control Assessor (612)
Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST 800-37). Security Specialist (ADP)
Security Specialist (Crypto)
Management Analysis Officer
Management Analyst
Management and Program Analysis Officer
Management and Program Analyst
Program Analysis Officer
Program Analyst
Auditor
General Mathematician and Statistician
Operations Research Analyst
Computer Scientist
General Inspection, Investigation, Enforcement, and Compliance Specialist
Compliance Inspection and Support Specialist
Information Security (INFOSEC)
Business Analyst
Information Assurance Analyst
Information Assurance Specialist
Information Systems Security Analyst
Information Systems Security Officer
Information Systems Security Specialist
IT Auditor
IT Specialist
IT Specialist (Security)
Secure Software Assessor (622)
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results. Security Specialist (ADP)
Security Specialist (Crypto)
Management Analysis Officer
Management Analyst
Management and Program Analysis Officer
Management and Program Analyst
Program Analysis Officer
Program Analyst
Auditor
General Mathematician and Statistician
Operations Research Analyst
Computer Scientist
General Inspection, Investigation, Enforcement, and Compliance Specialist
Compliance Inspection and Support Specialist
Information Security (INFOSEC)
Business Analyst
Information Assurance Analyst
Information Assurance Specialist
Information Systems Security Analyst
Information Systems Security Officer
Information Systems Security Specialist
IT Auditor
IT Specialist
IT Specialist (Security)
Information Systems Security Developer (631)
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle. Telecommunications Specialist (Deployment Planning)
Electrical Engineer
Computer Engineer
Computer Engineer (Data Systems)
Computer Engineer (Embedded Systems)
Computer Engineer (Networks)
Computer Scientist
Information Security (INFOSEC)
Applications Developer
Database Developer
Internet Developer
IT Specialist
Network Designer
Network Engineer
Programmer
Programmer Analyst
Software Developer
Software Engineer
Systems Engineer
Systems Software Engineer
Systems Software Programmer
Web Developer
IT Specialist (Security)
Security Architect (652)
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes. Electrical Engineer
Computer Engineer
Computer Engineer (Data Systems)
Computer Engineer (Embedded Systems)
Computer Engineer (Networks)
Computer Scientist
Information Security (INFOSEC)
Chief Enterprise Architect
Data Architect
Enterprise Architect
Information Technology Architect
Internet Architect
IT Specialist
Network Designer
Senior Enterprise Architect
Solutions Architect
IT Specialist (Enterprise Architecture)
IT Specialist (Security)
Information Systems Security Manager (722)
Responsible for the cybersecurity of a program, organization, system, or enclave. Security Specialist (ADP)
Security Specialist (Crypto)
Human Resources Specialist (Information Systems)
Telecommunications Specialist
Computer Scientist
General Inspection, Investigation, Enforcement, and Compliance Specialist
Compliance Inspection and Support Specialist
Information Security (INFOSEC)
Chief Information Security Officer
Information Assurance Analyst
Information Assurance Specialist
Information Systems Security Analyst
Information Systems Security Officer
Information Systems Security Specialist
IT Auditor
IT Specialist
IT Specialist (Security)
COMSEC Manager (723)
Manages the Communications Security (COMSEC) resources of an organization. Security Specialist
Security Specialist (ADP)
Security Specialist (Crypto)
Telecommunications Specialist
Telecommunications Specialist (Communications Acquisition)
Telecommunications Specialist (Data Transmission)
Telecommunications Specialist (Deployment Planning)
Telecommunications Specialist (Plans & Policy)
Telecommunications Specialist (RF Spectrum Management)
Telecommunications Specialist (Telecom Management)
Telecommunications Specialist (Telecom Operations)
Telecommunications Specialist (Telecom Requirements)
Telecommunications Specialist (Test & Evaluation)
Telecommunications Specialist (Traffic Analysis)
Engineering Technician (Electrical)
Electronics Engineer
Electronics Technician
IT Specialist
IT Specialist (Security)