In addition to evaluating each candidate's relative ability, as demonstrated by quality and breadth of experience, the following factors will provide the basis for competitively evaluating each candidate:
• Skill in supervising technical staff and accomplishing work through their and their staff’s efforts.
• Skill in collecting data from a variety of computer network defense resources.
• Skill in conducting open-source research for troubleshooting client-level problems.
• Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
• Skill in configuring and utilizing network protection components (e.g., firewalls, Virtual Private Networks [VPNs], network access control [NAC] devices, network Intrusion Detection Systems [IDSs]).
• Skill in detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort).
• Skill in identifying common encoding techniques (e.g., Exclusive Disjunction [XOR], American Standard Code for Information Interchange [ASCII], Unicode, Base64, Uuencode, Uniform Resource Locator [URL] encode).
• Skill in network mapping and recreating network topologies.
• Skill in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
• Knowledge of collection management processes, capabilities, and limitations.
• Knowledge of common adversary tactics, techniques, and procedures (TTPs) in assigned area of responsibility (e.g., historical country-specific TTPs, emerging capabilities).
• Knowledge of common network tools (e.g., ping, traceroute, nslookup).
• Knowledge of computer network defense (CND) and vulnerability assessment tools, including open-source tools, and their capabilities.
• Knowledge of computer network defense (CND) policies, procedures, and regulations.
• Knowledge of content development.
• Knowledge of cryptology.
• Knowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
• Knowledge of Intrusion Detection System (IDS) tools and applications.
Please refer to the Duty Statement for additional Desirable Qualifications.