American Flag  Official website of the Department of Homeland Security

Framework Specialty Areas


The Framework lists and defines 31 common types of cybersecurity work. These 31 common types of work are known as Specialty Areas. Specialty Areas in a given Category are typically more similar to one another than to Specialty Areas in other Categories.

All Source Intelligence


Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications.

Collection Operations


Executes collection using appropriate strategies and within the priorities established through the collection management process.

Computer Network Defense Analysis


Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.

Computer Network Defense Infrastructure Support


Tests, implements, deploys, maintains, reviews and administers the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. Monitors network to actively remediate unauthorized activities.

Customer Service and Technical Support


Addresses problems, installs, configures, troubleshoots, and provides maintenance and training in response to customer requirements or inquiries (e.g., tiered-level customer support).

Cyber Operations


Performs activities to gather evidence on criminal or foreign intelligence entities in order to mitigate possible or real-time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.

Cyber Operations Planning


Performs in-depth joint targeting and cyber planning process. Gathers information and develops detailed Operational Plans and Orders supporting requirements. Conducts strategic and operational-level planning across the full range of operations for integrated information and cyberspace operations.

Data Administration


Develops and administers databases and/or data management systems that allow for the storage, query, and utilization of data.

Digital Forensics


Collects, processes, preserves, analyzes, and presents computer-related evidence in support of network vulnerability mitigation, and/or criminal, fraud, counterintelligence or law enforcement investigations.

Education and Training


Conducts training of personnel within pertinent subject domain. Develop, plan, coordinate, deliver and/or evaluate training courses, methods, and techniques as appropriate.

Exploitation Analysis


Analyzes collected information to identify vulnerabilities and potential for exploitation.

Incident Response


Responds to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize survival of life, preservation of property, and information security. Investigates and analyzes all relevant response activities.

Information Assurance Compliance


Oversees, evaluates, and supports the documentation, validation, and accreditation processes necessary to assure that new IT systems meet the organization's information assurance and security requirements. Ensures appropriate treatment of risk, compliance, and assurance from internal and external perspectives.

Information Systems Security Operations (Information Systems Security Officer)


Oversees the information assurance program of an information system in or outside the network environment; may include procurement duties (e.g., ISSO).

Investigation


Applies tactics, techniques, and procedures for a full range of investigative tools and processes to include but not limited to interview and interrogation techniques, surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of prosecution versus intelligence gathering.

Knowledge Management


Manages and administers processes and tools that enable the organization to identify, document, and access intellectual capital and information content.

Legal Advice and Advocacy


Provides legally sound advice and recommendations to leadership and staff on a variety of relevant topics within the pertinent subject domain. Advocates legal and policy changes, and makes a case on behalf of client via a wide range of written and oral work products, including legal briefs and proceedings.

Network Services


Installs, configures, tests, operates, maintains, and manages networks and their firewalls, including hardware (e.g., hubs, bridges, switches, multiplexers, routers, cables, proxy servers, and protective distributor systems) and software that permit the sharing and transmission of all spectrum transmissions of information to support the security of information and information systems.

Security Program Management (Chief Information Security Officer)


Manages information security (e.g., information security) implications within the organization, specific program, or other area of responsibility, to include strategic, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and other resources (e.g., CISO).

Software Assurance and Security Engineering


Develops and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs following software assurance best practices.

Strategic Planning and Policy Development


Applies knowledge of priorities to define an entity

System Administration


Installs, configures, troubleshoots, and maintains server configurations (hardware and software) to ensure their confidentiality, integrity, and availability. Also manages accounts, firewalls, and patches. Responsible for access control, passwords, and account creation and administration.

Systems Development


Works on the development phases of the systems development lifecycle.

Systems Requirements Planning


Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions. Provides guidance to customers about applicability of information systems to meet business needs.

Systems Security Analysis


Conducts the integration/testing, operations, and maintenance of systems security.

Systems Security Architecture


Develops system concepts and works on the capabilities phases of the systems development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into system and security designs and processes.

Targets


Applies current knowledge of one or more regions, countries, non-state entities, and/or technologies.

Technology Research and Development


Conducts technology assessment and integration processes; provides and supports a prototype capability and/or evaluates its utility.

Test and Evaluation


Develops and conducts tests of systems to evaluate compliance with specifications and requirements by applying principles and methods for cost-effective planning, evaluating, verifying, and validating of technical, functional, and performance characteristics (including interoperability) of systems or elements of systems incorporating IT.

Threat Analysis


Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities.

Vulnerability Assessment and Management


Vulnerability Assessment and Management - Conducts assessments of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations.