Vulnerability Assessment and Management Specialty Area Qualification Matrix *
Associated Work Roles
- Vulnerability Assessment Analyst (541)
Note: This page presents the qualification requirements at the Specialty Area level, a summary category one level above work roles. Until the qualification requirements for the Work Roles are released, please refer to the Specialty Area qualification table below for information. This table will be updated to reflect the specific Work Role requirements when the information is available.
Specialty Area Framework Category: Protect and Defend
Specialty Areas responsible for identifying, analyzing, and mitigating threats to internal information technology (IT) systems or networks.
Vulnerability Assessment and Management Description
Conducts threat and vulnerability assessments and determines deviations from acceptable configurations or policies. Assesses the level of risk and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations.
Example Job/Billet Titles
- Blue Team Technician
- Close Access Technician
- CNDSP AU
- Network Security Vulnerability Technician (NSVT)
- Penetration Tester
Master Tasks and KSAs
Detailed information on the Tasks and Knowledge, Skills and Abilities (KSAs) associated with each Navy Specialty Area can be found in the Master Task & KSA List spreadsheet on the NAVIFOR website (requires credentials/CAC to access) or on the DoD Cyber Exchange website.
Initial Training
Initial training qualification for a specialty area is generally met by a High School diploma or equivalent and completion of Navy "A" school (for Navy enlisted).
Minimum Credential Requirement
You must meet one of the education, training, or certification requirements in the Qualifications Table below. See “Understanding Qualifications” on the Qualifications Table for more information on the order of precedence for the minimum credential requirement.
Qualifying Degrees
The Qualifications Table below includes college degrees in the Education section. For example, "Bachelor degree from accredited University." To view a list of degree programs that are acceptable for this Specialty Area, click List of Qualifying Degrees below or the Information icon in the Qualifications Table.
List of Qualifying Degrees
Degree Program | Degree Area Examples |
---|---|
Computer Applications |
|
Computer Engineering |
|
Computer Forensics |
|
Computer Information Systems |
|
Computer Network Systems |
|
Computer Science |
|
Cyber Security |
|
Data Communication Systems Technology |
|
Educational Technology |
|
Electrical Engineering |
|
Engineering |
|
Engineering Management |
|
Engineering Physics |
|
Engineering Technology |
|
Industrial Engineering |
|
Information Assurance |
|
Information Management |
|
Information System Management |
|
Information Systems |
|
Information Systems Administration |
|
Information Systems and Cybersecurity |
|
Information Systems Security |
|
Information Systems Technology |
|
Information Technology |
|
Information Technology - Computer Network Systems |
|
Information Technology - Software Applications & Programming |
|
Information Technology - Web Development |
|
Library and Information Science |
|
Mathematics |
|
Mathematics and Computer Science |
|
Mechanical Engineering |
|
Medical Technology |
|
Military Art and Science |
|
Mobile Communications Technology |
|
Network and Communications Management |
|
Network Systems Administration |
|
Physics |
|
Quality Assurance |
|
Real-Time Interactive Simulation |
|
Research |
|
Science |
|
Software Applications Development |
|
Software Development |
|
Software Development Technology |
|
Software Engineering |
|
Software Engineering Technology |
|
Statistics |
|
Systems Engineering |
|
Technology |
|
Qualifications Table
Basic | Intermediate | Advanced |
---|---|---|
Associate Degree from accredited University | Bachelor Degree from accredited University | Graduate Degree from accredited University |
CYBR1010 CNE Bootcamp | CYBR1010 CNE Bootcamp | CYBR2100 Certified Ethical Hacker |
Intermediate Cyber Core (ICC) | CYBR1100 Network Traffic Analysis | NEC 741A Information System Security Manager |
NEC 746A Information Systems Technician (IAT II) | CYBR2100 Certified Ethical Hacker | |
NEC H09A CANES AN/USQ-208(V) System Administrator/Maintainer | CYBR2400 Cyber Operator Training Course | |
NEC H10A Basic Cyber Analyst/Operator | CYBR4005 Comp Forensics Invest and Response | |
Intermediate Cyber Core (ICC) | ||
NEC 742A Network Security Vulnerability Technician | ||
NEC H08A Advanced Network Analyst | ||
NEC H10A Basic Cyber Analyst/Operator | ||
NETW 4001 Security Plus |
JQR Incident Handling CORE (301) | JQR Incident Handling CORE (301) | JQR Incident Handling QC Analyst (306) |
JQR Incident Handling TECH (302) | JQR Incident Handling TECH (302) | JQR Incident Handling Trends Analyst (305) |
JQR Information Assurance Vulnerabilities Management (VAAP - Vulnerability Analysis and Assistance Program) | JQR Information Assurance Vulnerabilities Management (VAAP - Vulnerability Analysis and Assistance Program) | With privileged access- NAVEDTRA 43469 Watchstation 303 - Information Assurance Technician Level III |
With privileged access- NAVEDTRA 43469 Watchstation 301 - Information Assurance Technician Level I | With privileged access- NAVEDTRA 43469 Watchstation 302 - Information Assurance Technician Level II |
*If you have recommendations for degrees, qualifications, NECs or credentials for this matrix, direct them to NAVIFOR (requires credentials/CAC to access). Questions and recommendations regarding the Cyber IT/CSWF model, matrix, policies, implementation guidelines, and compliance should be directed to: Navy_CSWF_Program_Helpline@navy.mil