Cyber Defense Infrastructure Support
Cyber Job Description: Cyber Defense Infrastructure Support
A Cyber Defense Infrastructure support tech’s job is to test, implement, deploy, maintain, review, and administer the infrastructure hardware and software that are required to effectively manage the computer network defense service provider network and resources. A CDI monitors the network to actively remediate unauthorized activities.
Below is a sampling of the abilities, tasks and responsibilities for the Cyber Defense Infrastructure support specialty:
- Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- Coordinate with Cyber Defense Analysts to manage and administer the updating of rules (e.g., intrusion detection/protection systems, antivirus, and content blacklists) for specialized cyber defense applications.
- Perform system administration on specialized cyber defense applications and systems (e.g., antivirus, audit and remediation).
- Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.
- Build, install, configure, and test dedicated cyber defense hardware.
- Assist in assessing the impact of implementing and sustaining a dedicated cyber defense infrastructure.
- Administer test bed(s), and test and evaluate applications, hardware infrastructure, rules/signatures, access controls, and configurations.
- Create, edit, and manage network access control lists on specialized firewalls and intrusion prevention systems.
- Identify potential conflicts with implementation of any cyber defense tools.
- Implement Risk Management Framework (RMF)/Security Assessment and Authorization (SA&A) requirements for dedicated cyber defense systems within the enterprise, and document and maintain records for them.
Visit the National Initiative for Cybersecurity Careers and Studies website for an exhaustive list of the tasks and responsibilities.
As a rule the certifications, education, and training recommendations for entry level employment are more flexible than mid-level and leadership level employment.
Recommended Certifications: Certifications addressing authentication, security testing, intrusion detection/prevention, incident response and recovery, attacks and countermeasures, cryptography, malicious code countermeasures, system security, network infrastructure, access control, cryptography, assessments and audits, organizational security.
Recommended Education: A minimum of an AS degree in the following areas is helpful, but not always a requirement: Computer science, cybersecurity, information technology, software engineering, information systems, computer engineering.
Recommended Training: System administrator, basic cyber analyst/operator training, security essentials, intermediate cyber, hunt methodologies.
Be sure to visit the NICCS website to learn more about getting the proper certifications and training needed to be successful in the Cybersecurity Career Field.
To learn more about becoming a Cyber Warrior, check out the College Recon Guide to Cybersecurity Careers.