Protect & Defend

These operations roles are integral to the security of digital systems and data management applications.

Click on the Cybersecurity Role Title to learn more about the knowledge, skills, tasks and competency requirements for each.

Core Cybersecurity Roles

Adjacent Roles

None

X