Cyber Job Description: Cyber Defense Infrastructure Support
A Cyber Defense Infrastructure support tech’s job is to test, implement, deploy, maintain, review, and administer the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. A CDI monitors the network to actively remediate unauthorized activities.
Below is a sampling of the abilities, tasks and responsibilities for the Cyber Defense Infrastructure support specialty:
Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Coordinate with Cyber Defense Analysts to manage and administer the updating of rules (e.g., intrusion detection/protection systems, antivirus, and content blacklists) for specialized cyber defense applications.
Perform system administration on specialized cyber defense applications and systems (e.g., antivirus, audit and remediation).
Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.
Build, install, configure, and test dedicated cyber defense hardware.
Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure.
Administer test bed(s), and test and evaluate applications, hardware infrastructure, rules/signatures, access controls, and configurations.
Create, edit, and manage network access control lists on specialized firewalls and intrusion prevention systems.
Identify potential conflicts with implementation of any cyber defense tools.
Implement Risk Management Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for dedicated cyber defense systems within the enterprise, and document and maintain records for them.
As a rule the certifications, education, and training recommendations for entry level employment are more flexible than mid-level and leadership level employment.
Recommended Certifications: Certifications addressing authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, system security, network infrastructure, access control, cryptography, assessments and audits, organizational security.
Recommended Education: A minimum of an AS degree in the following areas is helpful, but not always a requirement: Computer science, cybersecurity, information technology, software engineering, information systems, computer engineering.