Systems Analysis Specialty Area Qualification Matrix *

Associated Work Roles

  • Systems Security Analyst (461)

Note: This page presents the qualification requirements at the Specialty Area level, a summary category one level above work roles. Until the qualification requirements for the Work Roles are released, please refer to the Specialty Area qualification table below for information. This table will be updated to reflect the specific Work Role requirements when the information is available.

Specialty Area Framework Category: Operate and Maintain

Specialty Areas responsible for providing the support, administration, and maintenance necessary to ensure effective and efficient information technology (IT) system performance and security.

Systems Analysis Description

Conducts and documents the systems integration, testing, operations, maintenance, and security of an information environment. Coordinates threat and mitigation strategies across the enterprise.

Example Job/Billet Titles

  • IA Security Officer
  • Information Systems Security Officer (ISSO)
  • Network Security Vulnerability Technician (NSVT)
  • Security Administrator

Master Tasks and KSAs

Detailed information on the Tasks and Knowledge, Skills and Abilities (KSAs) associated with each Navy Specialty Area can be found in the Master Task & KSA List spreadsheet on the NAVIFOR website (requires credentials/CAC to access) or on the DoD Cyber Exchange website.

Initial Training

Initial training qualification for a specialty area is generally met by a High School diploma or equivalent and completion of Navy "A" school (for Navy enlisted).

Minimum Credential Requirement

You must meet one of the education, training, or certification requirements in the Qualifications Table below. See “Understanding Qualifications” on the Qualifications Table for more information on the order of precedence for the minimum credential requirement.

Qualifying Degrees

The Qualifications Table below includes college degrees in the Education section. For example, "Bachelor degree from accredited University." To view a list of degree programs that are acceptable for this Specialty Area, click List of Qualifying Degrees below or the Information icon in the Qualifications Table.

Worksheet View

Click the button to toggle in and out of the worksheet view for the qualifications table. Turning the worksheet view on will allow you to mark requirements and qualifications for your proficiency level, and then print a printer-friendly version of the matrix worksheet.

Note: The Qualification Matrix information on this page will be in a different order when printed to reduce the number of pages needed.

View Proficiency Level(s)

MilGears logo For personalized information on how your education, training and credential history stacks up against the requirements for this and other work roles in the Navy, visit the Cyber IT/CSWF Tool on the MilGears website.



Qualifications Table

All qualifications have not been met.
 
Basic Intermediate Advanced
N/A not entry level position Associate Degree from accredited University Bachelor Degree from accredited University
  CNSSI 4011-Information Systems Security (INFOSEC) Professionals/4012-Senior Systems Managers Graduate Degree from accredited University
    CNSSI/NTSSI 4015-Systems Certifiers/4016-Risk Analysts
OR
 
N/A not entry level position AQD GA1-Information Professional - Basic NETW 4001 Security Plus
  AQD GA2-Information Professional - Intermediate SSC 6209-Network Operations and Technology
  AQD GA3-Information Professional - Advanced  
  AQD GA5-Information Dominance Warfare - Strike Group Tactical Action Officer  
  AQD GA6-Information Professional - Knowledge Management Officer  
  AQD GA7-Information Dominance Warfare - Information Assurance Officer  
  AQD GA8-Information Dominance Warfare - Chief Information Officer  
  AQD GA9-Information Dominance Warfare - Individual Augmentee  
  CYBR2400 Cyber Operator Training Course  
  NEC 741A Information System Security Manager  
  NEC 742A Network Security Vulnerability Technician  
  NEC H08A Advanced Network Analyst  
  NETW 4001 Security Plus  
  SSC 6202-Modeling and Simulation  
  SSC 6203-Computer Science and Systems Design  
  SSC 6206-Space Systems Operations  
OR
AND
 
N/A W/O privileged access- NAVEDTRA 43469 Watchstation 304 - Information Assurance Manager W/O privileged access- NAVEDTRA 43469 Watchstation 304 - Information Assurance Manager
  W/O privileged access-NAVEDTRA 43355-1 - Navy Networks With privileged access- NAVEDTRA 43469 Watchstation 303 - Information Assurance Technician Level III
  With privileged access- NAVEDTRA 43469 Watchstation 302 - Information Assurance Technician Level II  

Note: The Qualification Matrix information on this page will be in a different order when printed to reduce the number of pages needed.

*If you have recommendations for degrees, qualifications, NECs or credentials for this matrix, direct them to NAVIFOR (requires credentials/CAC to access). Questions and recommendations regarding the Cyber IT/CSWF model, matrix, policies, implementation guidelines, and compliance should be directed to: Navy_CSWF_Program_Helpline@navy.mil

This is an official U.S. Navy websiteUpdated: January 29, 2021
TOP

Basic

Foundational understanding of computer systems and related cybersecurity software and hardware components. Ability to apply simple concepts and routine processes with frequent and specific guidance. Ability to perform successfully in routine, structured situations, or more complex situations with supervision.

Intermediate

Working knowledge and application of Information Security and security operational characteristics for a variety of computer platforms, networks, software applications, and Operating Systems. Extensive knowledge of basic concepts and processes and experience applying these with only periodic high-level guidance. Ability to perform successfully in non-routine and sometimes complicated situations.

Advanced

Application and mastery of Information Security, plans, and functions; responsible for the management of complex projects, and initiatives with large scope. An in-depth understanding of complex concepts and processes, and experience applying these with little or no guidance. Ability to provide guidance to others and to perform successfully in complex, unstructured situations.

Click link to go to Certified Information Systems Security Professional (CISSP) COOL Snapshot page.

The International Information Systems Security Certification Consortium, Inc. (ISC 2), Certified Information Systems Security Professional (CISSP) is an advanced skill level certification for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles. Candidates must have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Earning a four-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience.

Click link to go to GIAC Security Essentials Certification (GSEC) COOL Snapshot page.

The Global Information Assurance Certification (GIAC), Security Essentials (GSEC) is an intermediate level certification that verifies a practitioner's knowledge of information security beyond basic terminology and concepts. GSECs are qualified to perform security-related hands-on IT systems roles. There are no prerequisites for the GSEC certification. Candidates must pass a written exam.

Click link to go to Systems Security Certified Practitioner (SSCP) COOL Snapshot page.

The International Information Systems Security Certification Consortium, Inc. (ISC)², Systems Security Certified Practitioner (SSCP) is an intermediate skill level certification for individuals involved in network and systems security administration responsible for developing the information security policies, standards, and procedures. Candidates manage implementation across various hardware and software programs in their organization. The SSCP is targeted toward those working towards positions such as Network Security Engineers, Security Systems Analysts, or Security Administrators. It is also appropriate for personnel in other non-security disciplines that require an understanding of security but do not have information security as a primary part of their job description, including information systems auditors; application programmers; system, network and database administrators; business unit representatives, and systems analysts. Candidates must meet work experienve requirements to be eligible for the SSCP exam. Candidates must pass a written exam.

Click link to go to CompTIA Security+ ce COOL Snapshot page.

Computing Technology Industry Association (CompTIA), Security+ ce certification designates knowledgeable professionals in the field of IT security. Security+ ce is an entry-level certification that demonstrates a candidates knowledge and skills required to install and configure systems to secure applications, networks, and devices; perform threat analysis and respond with appropriate mitigation techniques; participate in risk mitigation activities; and operate with an awareness of applicable policies, laws, and regulations. The successful candidate will perform these tasks to support the principles of confidentiality, integrity, and availability. It is recommended that candidates hold the Network+ and two years of experience in IT administration with a security focus.

Click link to go to GIAC Security Leadership Certification (GSLC) COOL Snapshot page.

The Global Information Assurance Certification (GIAC), Security Leadership Certification (GSLC) is an advanced skill level certification for information security, information technology and security professionals with leadership responsibilities. GSLCs understand governance and technical controls focused on protecting, detecting, and responding to security issues. GSLCs display knowledge of data, network, host, application, and user controls along with fundamental management topics that pertain to the security lifecycle. There are no prerequisites for the GSLC certification. Candidates must pass a written exam.

 

 

Click link to go to Certified Information Security Manager (CISM) COOL Snapshot page.

The Certified Information Security Manager (CISM) is an advanced certification for the individual who designs, builds, and manages an enterprises information security. CISM focuses on information risk management as the basis of information security. It also includes material on broader issues such as how to govern information security as well as on practical issues such as developing and managing an information security program and managing incidents. This certification is targeted toward experienced information security managers and those who have information security management responsibilities. Five or more years of information security work experience, with a minimum of three years of information security management work experience is required.

Click link to go to Certified Authorization Professional (CAP) COOL Snapshot page.

The International Information Systems Security Certification Consortium Inc. (ISC 2), Certified Authorization Professional (CAP) is ideal for IT, information security and information assurance practitioners and contractors seeking to prove their understanding of the RMF. It is evidence candidates have the advanced knowledge and technical ability to formalize processes to assess risk and establish security documentation. Candidates must pass a written exam and have at least two years of cumulative, paid work experience in one or more of the seven domains of the (ISC)² CAP Common Body of Knowledge (CBK).

Click link to go to CompTIA Advanced Security Practitioner (CASP+) COOL Snapshot page.

The Computing Technology Industry Association (CompTIA), CompTIA Advanced Security Practitioner (CASP+) certification is for professionals with advanced-level cybersecurity skills and knowledge. CASP+ practitioners demonstrate skills in risk management, enterprise security architecture, research, development and collaboration, technical integration of enterprise security and enterprise security operations. Candidates must pass an exam that includes written and performance-based questions.