Mapping SFIA skills to NICE work roles

Provides an additional dimension to the comprehensive list of NICE Work roles. Helps SFIA users adopt NICE work roles.

NICE Cybersecurity Workforce Framework Work Roles.

  • you can explore the detail behind these work roles on the NICE website
  • NICE use a more granular approach to skills
  • NICE also list cybersecurity-related tasks, knowledge and abilities.

Actions for SFIA 8 review

Create a broadly agreed mapping of SFIA skills to NICE cyber security workforce roles.

Identify potential improvements to SFIA to support his mapping.

Consider alternatives for presenting this information and describing use cases for this mapping.


This is a work in progress which is being developed as part of SFIA 8 consultation. 

It will be updated during the SFIA 8 consultation.

Register here to receive updates.

Category - Securely Provision

Specialty Area NICE Work Role NICE Work Role Definition Indicative SFIA Skills
Risk Management
Authorizing Official/Designating Representative Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009). Information governance IRMG
Information security SCTY
Security Control Assessor Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST SP 800-37). Information security SCTY
Conformance review CORE
Information assurnace INAS
Business risk management BURM
Software Development
Software Developer Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs. Programming/software development PROG
Testing TEST
Systems integration and build SINT
Secure Software Assessor Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results. Conformance review CORE
Penetration testing PENT
Systems Architecture
Enterprise Architect Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures. Enterprise and business architecture STPL
Strategic planning ITSP
Enterprise IT governance GOVN
Requirements definition and management REQM
Security Architect Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes. Information security SCTY
Enterprise and business architecture STPL
Strategic planning ITSP
Enterprise IT governance GOVN
Requirements definition and management REQM
Technology R&D Research & Development Specialist Conducts software and systems engineering and software systems research in order to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.

Emerging technology monitoring EMRG

Research RSCH

Technical specialism TECH

Systems Requirements Planning Requirements Planner Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions. Requirements definition and management REQM
Solution architecture ARCH
Test and Evaluation Testing and Evaluation Specialist Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results. Testing TEST
Quality assurance QUAS
Penetration testing PENT
Systems Development
Information Systems Security Developer Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle. Information security SCTY
Solution architecture ARCH
Systems design DESN
Testing TEST
Systems Developer Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle. Solution architecture ARCH
Systems design DESN
Testing TEST

Category - Operate and Maintain

Specialty Area NICE Work Role NICE Work Role Definition Indicative SFIA Skills
Database Administration
Database Administrator Administers databases and/or data management systems that allow for the storage, query, and utilization of data. Database administration DBAD
Data Analyst Examines data from multiple disparate sources with the goal of providing new insight. Designs and implements custom algorithms, flow processes and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes. Data modelling and design DTAN
Requirements definition and management REQM
Database design DBDS
Programming/software development PROG
Knowledge Management Knowledge Manager Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content. Knowledge management KNOW
Customer Service and Technical Support Technical Support Specialist Provides technical support to customers who need assistance utilizing client level hardware and software in accordance with established or approved organizational process components. (i.e., Master Incident Management Plan, when applicable). Problem management PBMG
Incident management USUP
System software SYSP
Network support NTAS
System software SYSP
Systems installation/decommissioning HSIN
IT infrastucture ITOP
Network Services Network Operations Specialist Plans, implements, and operates network services/systems, to include hardware and virtual environments. System software SYSP
Network support NTAS
Systems installation/decommissioning HSIN
Testing TEST
Systems Administration System Administrator Installs, configures, troubleshoots, and maintains hardware, software, and administers system accounts. Security administration SCAD
IT infrastucture ITOP
Systems installation/decommissioning HSIN
System software SYSP
Testing TEST
Problem management PBMG
Systems Analysis Systems Security Analyst Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security. Information security SCTY
Testing TEST
Penetration testing PENT

Category - Oversee and Govern

Specialty Area NICE Work Role NICE Work Role Definition Indicative SFIA Skills
Legal Advice and Advocacy
Cyber Legal Advisor Provides legal advice and recommendations on relevant topics related to cyber law. tbc
Privacy Compliance Manager Develops and oversees privacy compliance program and privacy program staff, supporting privacy compliance needs of privacy and security executives and their teams. Information security SCTY
Information assurance INAS
Conformance review CORE
Testing TEST
Training, Education, and Awareness
Cyber Instructional Curriculum Developer Develops, plans, coordinates, and evaluates cyber training/education courses, methods, and techniques based on instructional needs. Learning design and development TMCR
Information content authoring INCA
Cyber Instructor Develops and conducts training or education of personnel within cyber domain. Learning delivery ETDL
Learning design and development TMCR
Information content authoring INCA
Cybersecurity Management
Information Systems Security Manager Responsible for the cybersecurity of a program, organization, system, or enclave. Information security SCTY
Systems development management DLMG
COMSEC Manager Manages the Communications Security (COMSEC) resources of an organization (CNSSI No. 4009). Incident management USUP
Security administration SCAD
Strategic Planning and Policy
Cyber Workforce Developer and Manager Develop cyberspace workforce plans, strategies and guidance to support cyberspace workforce manpower, personnel, training and education requirements and to address changes to cyberspace policy, doctrine, materiel, force structure, and education and training requirements. Resourcing RESC
Professional development PSDV
Organisation design and implementation ORDI
Cyber Policy and Strategy Planner Develops cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and initiatives. Information security SCTY
Strategic planning ITSP
Executive Cyber Leadership Executive Cyber Leadership Executes decision making authorities and establishes vision and direction for an organization's cyber and cyber-related resources and/or operations. Information security SCTY
Business risk management BURM
Information assurance INAS
Acquisition and Program/Project Management
Program Manager Leads, coordinates, communicates, integrates and is accountable for the overall success of the program, ensuring alignment with critical agency priorities. Programme management PGMG
Quality management QUMG
Relationship management RLMT
Benefits management BENM
Change implementation planning and management CIPM
Supplier management SUPP
IT Project Manager Directly manages information technology projects to provide a unique service or product. Project management PRMG
Requirements definition and management REQM
Quality management QUMG
Product Support Manager Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components. Customer service support CSMG
Requirements definition and management REQM
Quality management QUMG
IT Investment/Portfolio Manager Manages a portfolio of IT capabilities that align with the overall needs of mission and business enterprise priorities. Portfolio management POMG
Quality management QUMG
Relationship management RLMT
IT Program Auditor Conducts evaluations of an IT program or its individual components, to determine compliance with published standards. Conformance review CORE
Testing TEST
Business risk management BURM
Information security SCTY

Category - Protect and Defend

Specialty Area NICE Work Role NICE Work Role Definition Indicative SFIA Skills
Cyber Defense Analysis Cyber Defense Analyst Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. Analytics INAN
Knowledge management KNOW
Cyber Defense Infrastructure Cyber Defense Infrastructure Support Specialist Tests, implements, deploys, maintains, and administers the infrastructure hardware and software. Security administration SCAD
IT infrastucture ITOP
Systems installation/decommissioning HSIN
SINT
Incident Response Cyber Defense Incident Responder Investigates, analyzes, and responds to cyber incidents within the network environment or enclave. Incident management USUP
Analytics INAN
Security administration SCAD
Vulnerability Assessment and Management Vulnerability Analyst Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities. Penetration testing PENT
Conformance review CORE
Configuration management CFMG
Quality assurance QUAS
Measurement MEAS
Testing TEST

Category - Analyze

Specialty Area NICE Work Role NICE Work Role Definition Indicative SFIA Skills
Threat Analysis Warnings Analyst Develops unique cyber indicators to maintain constant awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber warning assessments. Incident management USUP
Analytics INAN
Security administration SCAD
Exploitation Analysis Exploitation Analyst Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks. tbc
All-Source Analysis
All-Source Analyst Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations. Analytics INAN
Demand management DEMM
Information content authoring INCA
Mission Assessment Specialist Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness. Measurement MEAS
Methods and tools METL
Strategic planning ITSP
Business process testing BPTS
Testing TEST
Conformance review CORE
Quality assurance QUAS
Targets
Target Developer Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation. Relationship management RLMT
Analytics INAN
Knowledge management KNOW
Target Analyst Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks and the applications on them. Analytics INAN
Penetration testing PENT
Language Analysis Language Analyst Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate intelligence information derived from language, voice and/or graphic material. Creates, and maintains language specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects. Analytics INAN
Data management DATM
DBAD
Knowledge management KNOW

Category - Operate and Collect

Specialty Area NICE Work Role NICE Work Role Definition Indicative SFIA Skills
Collection Operations
All Source-Collection Manager Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to meet leadership's intent. Determines capabilities of available collection assets, identifies new collection capabilities; and constructs and disseminates collection plans. Monitors execution of tasked collection to ensure effective execution of the collection plan. Business process testing BPTS
Business process improvement BPRE
All Source-Collection Requirements Evaluation Manager Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of collection requirements. Evaluates performance of collection assets and collection operations. Business process testing BPTS
Business analysis BUAN
Cyber Operational Planning
Cyber Intel Planner Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace. tbc
Cyber Operations Planner Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions. Relationship management RLMT
Methods and tools METL
Strategic planning ITSP
Partner Integration Planner Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions. Relationship management RLMT
Technical specialism TECH
Cyber Operations Cyber Operator Conducts collection, processing, and/or geolocation of systems in order to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executing on-net operations. Penetration testing PENT
Digital forensics DGFS

Category - Investigate

Specialty Area NICE Work Role NICE Work Role Definition Indicative SFIA Skills
Cyber Investigation Cyber Crime Investigator Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques. Digital forensics DGFS
Digital Forensics
Forensics Analyst Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents. Digital forensics DGFS
Cyber Defense Forensics Analyst Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. Digital forensics DGFS
Penetration testing PENT