Apprentices progress at their own pace – they demonstrate
competency in skills and knowledge through assessment tests,
but are not required to complete a specific number of hours.
competency in skills and knowledge through assessment tests,
but are not required to complete a specific number of hours.
Cyber Security Support Technician
Step It Up America
Documents
View Original Document
Individual state requirements may vary. Please contact your local apprenticeship office to ensure this version is suitable to your state’s requirements.
Work Process Content
On the Job Training
Anonymous
44
Skills
Develop security policies and protocols; assists in enforcing company compliance with network security policies and protocols
9
Develop security policies and protocols; assists in enforcing company compliance with network security policies and protocols
9
- Locates (in Intranet, employee handbook or security protocols) organizational policies intended to maintain security and minimize risk and explains their use
- Provides guidance to employees on how to access networks, set passwords, reduce security threats and provide defensive measures associated with searches, software downloads, email, Internet, add-ons, software coding and transferred files
- Ensures that password characteristics are explained and enforced and that updates are required and enforced based on appropriate time intervals
- Explains company or organization's policies regarding the storage, use and transfer of sensitive data, including intellectual property and personally identifiable information. Identifies data life cycle, data storage facilities, technologies and describes business continuity risks
- Assigns individuals to the appropriate permission or access level to control access to certain web IP addresses, information and the ability to download programs and transfer data to various locations
- Assists employees in the use of technologies that restrict or allow for remote access to the organization's information technology network
- Develops security compliance policies and protocols for external services (i.e., Cloud service providers, software services, external data centers)
- Complies with incident response and handling methodologies
- Articulates the business need or mission of the organization as it pertains to the use of IT systems and the storage of sensitive data
Provides technical support to users or customers
8
Provides technical support to users or customers
8
- Manages inventory of IT resources
- Diagnoses and resolves customer-reported system incidents
- Installs and configures hardware, software and peripheral equipment for system users
- Monitors client-level computer system performance
- Tests computer system performance
- Troubleshoots system hardware and software
- Administers accounts, network rights, and access to systems and equipment
- Implements security measures for uses in system and ensures that system designs incorporate security configuration guidelines
Installs, configures, tests, operates, maintains and manages networks and their firewalls including hardware and software that permit sharing and transmission of information
11
Installs, configures, tests, operates, maintains and manages networks and their firewalls including hardware and software that permit sharing and transmission of information
11
- Collaborates with system developers and users to assist in the selection of appropriate design solutions to ensure the compatibility of system components
- Installs, replaces, configures and optimizes network hubs, routers and switches
- Assists in network backup and recovery procedures
- Diagnoses network connectivity problems
- Modifies network infrastructure to serve new purposes or improve workflow
- Integrates new systems into existing network architecture
- Patches network vulnerabilities to ensure information is safeguarded against outside parties
- Repairs network connectivity problems
- Tests and maintains network infrastructure including software and hardware devices
- Establishes adequate access controls based on principles of least privilege and need-to-know
- Implements security measures for users in system and ensures that system designs incorporate security configuration guidelines
Installs, configures, troubleshoots and maintains server configurations to ensure their confidentiality, integrity and availability; also manages accounts, firewalls, configuration, patch and vulnerability management. Is responsible for access control, security configuration and administration
16
Installs, configures, troubleshoots and maintains server configurations to ensure their confidentiality, integrity and availability; also manages accounts, firewalls, configuration, patch and vulnerability management. Is responsible for access control, security configuration and administration
16
- Checks system hardware availability, functionality, integrity and efficiency
- Conducts functional and connectivity testing to ensure continuing operability
- Conducts periodic server maintenance including cleaning (physically and electronically), disk checks, system configuration and monitoring, data downloads, backups and testing
- Assists in the development of group policies and access control lists to ensure compatibility with organizational standards, business rules and needs
- Documents compliance with or changes to system administration standard operating procedures
- Installs server fixes, updates and enhancements
- Maintains baseline system security according to organizational policies
- Manages accounts, network rights and access to systems and equipment
- Monitors and maintains server configuration
- Supports network components
- Diagnoses faulty system/server hardware; seeks appropriate support or assistance to perform server repairs
- Verifies data redundancy and system recovery procedures
- Assists in the coordination or installation of new or modified hardware, operating systems and other baseline software
- Provides ongoing optimization and problem-solving support
- Resolves hardware/software interface and interoperability problems
- Establishes adequate access controls based on principles of least privilege, role based access controls (RBAC) and need-to-know
Related Instruction Content
Training Provider(s):
680
RI hours
Configuring tools and technologies to detect, mitigate and prevent potential threats - Installs and maintains cyber security detection, monitoring and threat management software
16
Configuring tools and technologies to detect, mitigate and prevent potential threats - Installs and maintains cyber security detection, monitoring and threat management software
16
Configuring tools and technologies to detect, mitigate and prevent potential threats - Coordinates with network administrators to administer the updating of rules and signatures for intrusion/detection protection systems, anti-virus and network black and white list
16
Configuring tools and technologies to detect, mitigate and prevent potential threats - Coordinates with network administrators to administer the updating of rules and signatures for intrusion/detection protection systems, anti-virus and network black and white list
16
Configuring tools and technologies to detect, mitigate and prevent potential threats - Manages IP addresses based on current threat environment
16
Configuring tools and technologies to detect, mitigate and prevent potential threats - Manages IP addresses based on current threat environment
16
Configuring tools and technologies to detect, mitigate and prevent potential threats - Ensures application of security patches for commercial products integrated into system design
16
Configuring tools and technologies to detect, mitigate and prevent potential threats - Ensures application of security patches for commercial products integrated into system design
16
Configuring tools and technologies to detect, mitigate and prevent potential threats - Uses computer network defense tools for continual monitoring and analysis of system activity to identify malicious activity
16
Configuring tools and technologies to detect, mitigate and prevent potential threats - Uses computer network defense tools for continual monitoring and analysis of system activity to identify malicious activity
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Applies security policies to meet security objectives of the system
24
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Applies security policies to meet security objectives of the system
24
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Performs system administration to ensure current defense applications are in place, including on Virtual Private Network devices
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Performs system administration to ensure current defense applications are in place, including on Virtual Private Network devices
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Ensures that data back up and restoration systems are functional and consistent with company's document retention policy and business continuity needs
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Ensures that data back up and restoration systems are functional and consistent with company's document retention policy and business continuity needs
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Identifies potential conflicts with implementation of any computer network defense tools. Performs tool signature testing and optimization
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Identifies potential conflicts with implementation of any computer network defense tools. Performs tool signature testing and optimization
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Installs, manages and updates intrusion detection system
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Installs, manages and updates intrusion detection system
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Performs technical and non-technical risk and vulnerability assessments of relevant technology focus areas
24
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Performs technical and non-technical risk and vulnerability assessments of relevant technology focus areas
24
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Conducts authorized penetration testing (Wi-Fi, network perimeter, application security, cloud, mobile devices) and assesses results
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Conducts authorized penetration testing (Wi-Fi, network perimeter, application security, cloud, mobile devices) and assesses results
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Documents systems security operations and maintenance activities
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Documents systems security operations and maintenance activities
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Communicates potential risks or vulnerabilities to manager. Collaborates with others to recommend vulnerability corrections
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Communicates potential risks or vulnerabilities to manager. Collaborates with others to recommend vulnerability corrections
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Identifies information technology security program implications of new technologies or technology upgrades
16
Assesses and mitigates system network, business continuity and related security risks and vulnerabilities - Identifies information technology security program implications of new technologies or technology upgrades
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Identifies organizational trends with regard to the security posture of systems; identifies unusual patterns or activities
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Identifies organizational trends with regard to the security posture of systems; identifies unusual patterns or activities
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Characterizes and analyzes network traffic to identify anomalous activity and potential threats; performs computer network defense trend analysis and reporting
24
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Characterizes and analyzes network traffic to identify anomalous activity and potential threats; performs computer network defense trend analysis and reporting
24
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Receives and analyzes network alerts from various sources within the enterprise and determines possible causes of such alerts
24
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Receives and analyzes network alerts from various sources within the enterprise and determines possible causes of such alerts
24
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Runs tests to detect real or potential threats, viruses, malware, etc.
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Runs tests to detect real or potential threats, viruses, malware, etc.
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Assists in researching cost-effective security controls to mitigate risks
8
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Assists in researching cost-effective security controls to mitigate risks
8
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Helps perform damage assessments in the event of an attack
8
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Helps perform damage assessments in the event of an attack
8
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Monitors network data to identify unusual activity, trends, unauthorized devices or other potential vulnerabilities
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Monitors network data to identify unusual activity, trends, unauthorized devices or other potential vulnerabilities
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Documents and escalates incidents that may cause immediate or long-term impact to the environment
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Documents and escalates incidents that may cause immediate or long-term impact to the environment
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Provides timely detection, identification and alerts of possible attacks and intrusions, anomalous activities, and distinguish these incidents and events from normal baseline activities
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Provides timely detection, identification and alerts of possible attacks and intrusions, anomalous activities, and distinguish these incidents and events from normal baseline activities
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Uses network monitoring tools to capture and analyze network traffic associated with malicious activity
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Uses network monitoring tools to capture and analyze network traffic associated with malicious activity
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Performs intrusion analysis
8
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Performs intrusion analysis
8
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Sets containment blockers to align with company policy regarding computer use and web access
16
Reviews network utilization data to identify unusual patterns, suspicious activity or signs of potential threats - Sets containment blockers to align with company policy regarding computer use and web access
16
Responds to cyber intrusions and attacks and provides defensive strategies - Assists in the development of appropriate courses of action in response to identified anomalous network activity
24
Responds to cyber intrusions and attacks and provides defensive strategies - Assists in the development of appropriate courses of action in response to identified anomalous network activity
24
Responds to cyber intrusions and attacks and provides defensive strategies - Triages systems operations impact: malware, worms, man-in-the-middle attack, denial of service, rootkits, keystroke loggers, SQL injection and cross-site scripting
24
Responds to cyber intrusions and attacks and provides defensive strategies - Triages systems operations impact: malware, worms, man-in-the-middle attack, denial of service, rootkits, keystroke loggers, SQL injection and cross-site scripting
24
Responds to cyber intrusions and attacks and provides defensive strategies - Reconstructs a malicious attack or activity based on network traffic
24
Responds to cyber intrusions and attacks and provides defensive strategies - Reconstructs a malicious attack or activity based on network traffic
24
Responds to cyber intrusions and attacks and provides defensive strategies - Correlates incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation
24
Responds to cyber intrusions and attacks and provides defensive strategies - Correlates incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation
24
Responds to cyber intrusions and attacks and provides defensive strategies - Monitors external data sources to maintain currency of Computer Network Defense threat condition and determines which security issues may have an impact on the enterprise. Performs file signature analysis
16
Responds to cyber intrusions and attacks and provides defensive strategies - Monitors external data sources to maintain currency of Computer Network Defense threat condition and determines which security issues may have an impact on the enterprise. Performs file signature analysis
16
Responds to cyber intrusions and attacks and provides defensive strategies - Performs analysis of log files from a variety of sources to identify threats to network security; performs file signature analysis
16
Responds to cyber intrusions and attacks and provides defensive strategies - Performs analysis of log files from a variety of sources to identify threats to network security; performs file signature analysis
16
Responds to cyber intrusions and attacks and provides defensive strategies - Performs computer network defense incident triage to include determining scope, urgency and potential impact; identifies the specific vulnerability; provides training recommendations; and makes recommendations that enable expeditious remediation
16
Responds to cyber intrusions and attacks and provides defensive strategies - Performs computer network defense incident triage to include determining scope, urgency and potential impact; identifies the specific vulnerability; provides training recommendations; and makes recommendations that enable expeditious remediation
16
Responds to cyber intrusions and attacks and provides defensive strategies - Receives and analyzes network alerts from various sources within the enterprise and determines possible causes of such alerts
24
Responds to cyber intrusions and attacks and provides defensive strategies - Receives and analyzes network alerts from various sources within the enterprise and determines possible causes of such alerts
24
Responds to cyber intrusions and attacks and provides defensive strategies - Tracks and documents computer network defense incidents from initial detection through final resolution
24
Responds to cyber intrusions and attacks and provides defensive strategies - Tracks and documents computer network defense incidents from initial detection through final resolution
24
Responds to cyber intrusions and attacks and provides defensive strategies - Collects intrusion artifacts and uses discovered data to enable mitigation of potential computer network defense (CND) incidents
24
Responds to cyber intrusions and attacks and provides defensive strategies - Collects intrusion artifacts and uses discovered data to enable mitigation of potential computer network defense (CND) incidents
24
Responds to cyber intrusions and attacks and provides defensive strategies - Performs virus scanning on digital media
24
Responds to cyber intrusions and attacks and provides defensive strategies - Performs virus scanning on digital media
24