{"help": "https://data.gov.au/data/api/3/action/help_show?name=datastore_search", "success": true, "result": {"include_total": true, "limit": 100, "records_format": "objects", "resource_id": "ddbbe6a9-6498-4ed6-bff3-418c49d97a31", "total_estimation_threshold": null, "records": [{"_id":1,"id":"Information_Systems_Security_Manager_SFIA5","name":"Information Systems Security Manager","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Information Systems Security Manager","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cybersecurity Management","alias":null,"description":"Responsible for the cybersecurity of a program, organization, system, or enclave.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:5,sfia-skills:8:INAS:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":2,"id":"Information_Systems_Security_Manager_SFIA6","name":"Senior Information Systems Security Manager","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Information Systems Security Manager","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cybersecurity Management","alias":null,"description":"Responsible for the cybersecurity of a program, organization, system, or enclave.","classifications":"SFIA6","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:6,sfia-skills:8:INAS:6,sfia_behaviours-skills:8:AUTO:6,sfia_behaviours-skills:8:INFL:6,sfia_behaviours-skills:8:COMP:6,sfia_behaviours-skills:8:BUSS:6,sfia_behaviours-skills:8:KNLG:6","desirable_skills":null,"knowledge_items":null},{"_id":3,"id":"Executive_Cyber_Leadership_SFIA7","name":"Executive Cyber Leadership","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Executive Cyber Leadership","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Executive Cyber Leadership","alias":null,"description":"Executes decision-making authorities and establishes vision and direction for an organization's cyber and cyber-related resources and/or operations.","classifications":"SFIA7","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:7,sfia-skills:8:BURM:7,sfia-skills:8:INAS:7,sfia_behaviours-skills:8:AUTO:7,sfia_behaviours-skills:8:INFL:7,sfia_behaviours-skills:8:COMP:7,sfia_behaviours-skills:8:BUSS:7,sfia_behaviours-skills:8:KNLG:7","desirable_skills":null,"knowledge_items":null},{"_id":4,"id":"Communications_Security_(COMSEC)_Manager_SFIA5","name":"Communications Security (COMSEC) Manager","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Communications Security (COMSEC) Manager","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cybersecurity Management","alias":null,"description":"Individual who manages the Communications Security (COMSEC) resources of an organization (CNSSI 4009) or key custodian for a Crypto Key Management System (CKMS).","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:INAS:5,sfia-skills:8:VUAS:5,sfia-skills:8:SCAD:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":5,"id":"Communications_Security_(COMSEC)_Manager_SFIA6","name":"Senior Communications Security (COMSEC) Manager","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Communications Security (COMSEC) Manager","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cybersecurity Management","alias":null,"description":"Individual who manages the Communications Security (COMSEC) resources of an organization (CNSSI 4009) or key custodian for a Crypto Key Management System (CKMS).","classifications":"SFIA6","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:INAS:6,sfia-skills:8:VUAS:3,sfia-skills:8:SCAD:6,sfia_behaviours-skills:8:AUTO:6,sfia_behaviours-skills:8:INFL:6,sfia_behaviours-skills:8:COMP:6,sfia_behaviours-skills:8:BUSS:6,sfia_behaviours-skills:8:KNLG:6","desirable_skills":null,"knowledge_items":null},{"_id":6,"id":"Cyber_Policy_and_Strategy_Planner_SFIA6","name":"Cyber Policy and Strategy Planner","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Policy and Strategy Planner","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Strategic Planning and Policy","alias":null,"description":"Develops and maintains cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance.","classifications":"SFIA6","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:6,sfia-skills:8:INAS:6,sfia-skills:8:OCDV:6,sfia-skills:8:WFPL:6,sfia_behaviours-skills:8:AUTO:6,sfia_behaviours-skills:8:INFL:6,sfia_behaviours-skills:8:COMP:6,sfia_behaviours-skills:8:BUSS:6,sfia_behaviours-skills:8:KNLG:6","desirable_skills":null,"knowledge_items":null},{"_id":7,"id":"Research_&_Development_Specialist_SFIA3","name":"Junior Research & Development Specialist","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Research & Development Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Technology R&D","alias":null,"description":"Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VURE:3,sfia-skills:8:RSCH:3,sfia-skills:8:EMRG:4,sfia-skills:8:TECH:4,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":8,"id":"Research_&_Development_Specialist_SFIA4","name":"Research & Development Specialist","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Research & Development Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Technology R&D","alias":null,"description":"Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VURE:4,sfia-skills:8:RSCH:4,sfia-skills:8:EMRG:4,sfia-skills:8:TECH:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":9,"id":"Research_&_Development_Specialist_SFIA5","name":"Senior Research & Development Specialist","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Research & Development Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Technology R&D","alias":null,"description":"Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VURE:5,sfia-skills:8:RSCH:5,sfia-skills:8:EMRG:5,sfia-skills:8:TECH:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":10,"id":"Secure_Software_Assessor_SFIA3","name":"Junior Secure Software Assessor","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Secure Software Assessor","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Software Development","alias":null,"description":"Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VUAS:3,sfia-skills:8:PENT:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":11,"id":"Secure_Software_Assessor_SFIA4","name":"Secure Software Assessor","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Secure Software Assessor","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Software Development","alias":null,"description":"Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VUAS:4,sfia-skills:8:PENT:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":12,"id":"Secure_Software_Assessor_SFIA5","name":"Senior Secure Software Assessor","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Secure Software Assessor","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Software Development","alias":null,"description":"Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VUAS:5,sfia-skills:8:PENT:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":13,"id":"Information_Systems_Security_Developer_SFIA3","name":"Junior Information Systems Security Developer","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Information Systems Security Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Development","alias":null,"description":"Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:3,sfia-skills:8:VUAS:3,sfia-skills:8:COPL:3,sfia-skills:8:DESN:3,sfia-skills:8:TEST:3,sfia-skills:8:PENT:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":14,"id":"Information_Systems_Security_Developer_SFIA4","name":"Information Systems Security Developer","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Information Systems Security Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Development","alias":null,"description":"Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:4,sfia-skills:8:VUAS:4,sfia-skills:8:COPL:4,sfia-skills:8:ARCH:4,sfia-skills:8:DESN:4,sfia-skills:8:TEST:4,sfia-skills:8:PENT:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":15,"id":"Information_Systems_Security_Developer_SFIA5","name":"Senior Information Systems Security Developer","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Information Systems Security Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Development","alias":null,"description":"Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:5,sfia-skills:8:VUAS:5,sfia-skills:8:COPL:5,sfia-skills:8:ARCH:5,sfia-skills:8:DESN:5,sfia-skills:8:TEST:5,sfia-skills:8:PENT:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":16,"id":"Systems_Security_Analyst_SFIA3","name":"Junior Systems Security Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Systems Security Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Analysis","alias":null,"description":"Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:3,sfia-skills:8:INAS:3,sfia-skills:8:VUAS:3,sfia-skills:8:TEST:3,sfia-skills:8:PENT:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":17,"id":"Systems_Security_Analyst_SFIA4","name":"Systems Security Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Systems Security Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Analysis","alias":null,"description":"Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:4,sfia-skills:8:INAS:4,sfia-skills:8:VUAS:4,sfia-skills:8:TEST:4,sfia-skills:8:PENT:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":18,"id":"Systems_Security_Analyst_SFIA5","name":"Senior Systems Security Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Systems Security Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Analysis","alias":null,"description":"Responsible for the analysis and development of the integration, testing, operations, and maintenance of systems security.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:5,sfia-skills:8:INAS:5,sfia-skills:8:VUAS:5,sfia-skills:8:TEST:5,sfia-skills:8:PENT:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":19,"id":"Cyber_Defense_Analyst_SFIA3","name":"Junior Cyber Defense Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Defense Analysis","alias":null,"description":"Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:3,sfia-skills:8:PENT:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":20,"id":"Cyber_Defense_Analyst_SFIA4","name":"Cyber Defense Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Defense Analysis","alias":null,"description":"Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:4,sfia-skills:8:PENT:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":21,"id":"Cyber_Defense_Analyst_SFIA5","name":"Senior Cyber Defense Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Defense Analysis","alias":null,"description":"Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:5,sfia-skills:8:PENT:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":22,"id":"Cyber_Defense_Infrastructure_Support_Specialist_SFIA1","name":"Entry-level Cyber Defense Infrastructure Support Specialist","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Infrastructure Support Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Defense Infrastructure","alias":null,"description":"Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.","classifications":"SFIA1","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCAD:1,sfia-skills:8:ITOP:1,sfia-skills:8:HSIN:1,sfia-skills:8:NTAS:2,sfia_behaviours-skills:8:AUTO:1,sfia_behaviours-skills:8:INFL:1,sfia_behaviours-skills:8:COMP:1,sfia_behaviours-skills:8:BUSS:1,sfia_behaviours-skills:8:KNLG:1","desirable_skills":null,"knowledge_items":null},{"_id":23,"id":"Cyber_Defense_Infrastructure_Support_Specialist_SFIA2","name":"Associate Cyber Defense Infrastructure Support Specialist","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Infrastructure Support Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Defense Infrastructure","alias":null,"description":"Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.","classifications":"SFIA2","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCAD:2,sfia-skills:8:ITOP:2,sfia-skills:8:HSIN:2,sfia-skills:8:NTAS:2,sfia_behaviours-skills:8:AUTO:2,sfia_behaviours-skills:8:INFL:2,sfia_behaviours-skills:8:COMP:2,sfia_behaviours-skills:8:BUSS:2,sfia_behaviours-skills:8:KNLG:2","desirable_skills":null,"knowledge_items":null},{"_id":24,"id":"Cyber_Defense_Infrastructure_Support_Specialist_SFIA3","name":"Junior Cyber Defense Infrastructure Support Specialist","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Infrastructure Support Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Defense Infrastructure","alias":null,"description":"Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCAD:3,sfia-skills:8:ITOP:3,sfia-skills:8:HSIN:3,sfia-skills:8:NTAS:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":25,"id":"Cyber_Defense_Infrastructure_Support_Specialist_SFIA4","name":"Cyber Defense Infrastructure Support Specialist","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Infrastructure Support Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Defense Infrastructure","alias":null,"description":"Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCAD:4,sfia-skills:8:ITOP:4,sfia-skills:8:HSIN:4,sfia-skills:8:NTAS:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":26,"id":"Cyber_Defense_Infrastructure_Support_Specialist_SFIA5","name":"Senior Cyber Defense Infrastructure Support Specialist","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Infrastructure Support Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Defense Infrastructure","alias":null,"description":"Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCAD:5,sfia-skills:8:ITOP:5,sfia-skills:8:HSIN:5,sfia-skills:8:NTAS:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":27,"id":"Cyber_Defense_Incident_Responder_SFIA2","name":"Associate Cyber Defense Incident Responder","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Incident Responder","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Incident Response","alias":null,"description":"Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.","classifications":"SFIA2","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:USUP:2,sfia-skills:8:SCAD:2,sfia-skills:8:COPL:2,sfia_behaviours-skills:8:AUTO:2,sfia_behaviours-skills:8:INFL:2,sfia_behaviours-skills:8:COMP:2,sfia_behaviours-skills:8:BUSS:2,sfia_behaviours-skills:8:KNLG:2","desirable_skills":null,"knowledge_items":null},{"_id":28,"id":"Cyber_Defense_Incident_Responder_SFIA3","name":"Junior Cyber Defense Incident Responder","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Incident Responder","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Incident Response","alias":null,"description":"Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:USUP:3,sfia-skills:8:SCAD:3,sfia-skills:8:COPL:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":29,"id":"Cyber_Defense_Incident_Responder_SFIA4","name":"Cyber Defense Incident Responder","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Incident Responder","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Incident Response","alias":null,"description":"Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:USUP:4,sfia-skills:8:SCAD:4,sfia-skills:8:COPL:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":30,"id":"Cyber_Defense_Incident_Responder_SFIA5","name":"Senior Cyber Defense Incident Responder","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Incident Responder","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Incident Response","alias":null,"description":"Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:USUP:5,sfia-skills:8:SCAD:5,sfia-skills:8:COPL:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":31,"id":"Vulnerability_Assessment_Analyst_SFIA2","name":"Associate Vulnerability Assessment Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Vulnerability Assessment Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Vulnerability Assessment and Management","alias":null,"description":"Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.","classifications":"SFIA2","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VUAS:2,sfia-skills:8:PENT:3,sfia-skills:8:MEAS:3,sfia_behaviours-skills:8:AUTO:2,sfia_behaviours-skills:8:INFL:2,sfia_behaviours-skills:8:COMP:2,sfia_behaviours-skills:8:BUSS:2,sfia_behaviours-skills:8:KNLG:2","desirable_skills":null,"knowledge_items":null},{"_id":32,"id":"Vulnerability_Assessment_Analyst_SFIA3","name":"Junior Vulnerability Assessment Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Vulnerability Assessment Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Vulnerability Assessment and Management","alias":null,"description":"Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VUAS:3,sfia-skills:8:PENT:3,sfia-skills:8:MEAS:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":33,"id":"Vulnerability_Assessment_Analyst_SFIA4","name":"Vulnerability Assessment Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Vulnerability Assessment Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Vulnerability Assessment and Management","alias":null,"description":"Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VUAS:4,sfia-skills:8:PENT:4,sfia-skills:8:MEAS:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":34,"id":"Vulnerability_Assessment_Analyst_SFIA5","name":"Senior Vulnerability Assessment Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Vulnerability Assessment Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Vulnerability Assessment and Management","alias":null,"description":"Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VUAS:5,sfia-skills:8:PENT:5,sfia-skills:8:MEAS:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":35,"id":"Threat/Warning_Analyst_SFIA3","name":"Junior Threat/Warning Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Threat/Warning Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Threat Analysis","alias":null,"description":"Develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber threat/warning assessments.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:3,sfia-skills:8:VISL:3,sfia-skills:8:SCAD:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":36,"id":"Threat/Warning_Analyst_SFIA4","name":"Threat/Warning Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Threat/Warning Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Threat Analysis","alias":null,"description":"Develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber threat/warning assessments.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:4,sfia-skills:8:VISL:4,sfia-skills:8:SCAD:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":37,"id":"Threat/Warning_Analyst_SFIA5","name":"Senior Threat/Warning Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Threat/Warning Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Threat Analysis","alias":null,"description":"Develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber threat/warning assessments.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:5,sfia-skills:8:VISL:5,sfia-skills:8:SCAD:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":38,"id":"Exploitation_Analyst_SFIA3","name":"Junior Exploitation Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Exploitation Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Exploitation Analysis","alias":null,"description":"Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:3,sfia-skills:8:PENT:3,sfia-skills:8:VURE:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":39,"id":"Exploitation_Analyst_SFIA4","name":"Exploitation Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Exploitation Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Exploitation Analysis","alias":null,"description":"Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:4,sfia-skills:8:PENT:4,sfia-skills:8:VURE:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":40,"id":"Exploitation_Analyst_SFIA5","name":"Senior Exploitation Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Exploitation Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Exploitation Analysis","alias":null,"description":"Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:5,sfia-skills:8:PENT:5,sfia-skills:8:VURE:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":41,"id":"All-Source_Analyst_SFIA3","name":"Junior All-Source Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"All-Source Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"All-Source Analysis","alias":null,"description":"Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:3,sfia-skills:8:SCAD:3,sfia-skills:8:VURE:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":42,"id":"All-Source_Analyst_SFIA4","name":"All-Source Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"All-Source Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"All-Source Analysis","alias":null,"description":"Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:4,sfia-skills:8:SCAD:4,sfia-skills:8:VURE:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":43,"id":"All-Source_Analyst_SFIA5","name":"Senior All-Source Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"All-Source Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"All-Source Analysis","alias":null,"description":"Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:5,sfia-skills:8:SCAD:5,sfia-skills:8:VURE:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":44,"id":"Mission_Assessment_Specialist_SFIA4","name":"Mission Assessment Specialist","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Mission Assessment Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"All-Source Analysis","alias":null,"description":"Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:MEAS:4,sfia-skills:8:SCTY:4,sfia-skills:8:INAS:4,sfia-skills:8:THIN:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":45,"id":"Mission_Assessment_Specialist_SFIA5","name":"Senior Mission Assessment Specialist","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Mission Assessment Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"All-Source Analysis","alias":null,"description":"Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:MEAS:5,sfia-skills:8:SCTY:5,sfia-skills:8:INAS:5,sfia-skills:8:THIN:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":46,"id":"Target_Developer_SFIA3","name":"Junior Target Developer","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Target Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Targets","alias":null,"description":"Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VURE:3,sfia-skills:8:THIN:3,sfia-skills:8:KNOW:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":47,"id":"Target_Developer_SFIA4","name":"Target Developer","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Target Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Targets","alias":null,"description":"Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VURE:4,sfia-skills:8:THIN:4,sfia-skills:8:KNOW:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":48,"id":"Target_Developer_SFIA5","name":"Senior Target Developer","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Target Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Targets","alias":null,"description":"Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:VURE:5,sfia-skills:8:THIN:5,sfia-skills:8:KNOW:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":49,"id":"Target_Network_Analyst_SFIA3","name":"Junior Target Network Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Target Network Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Targets","alias":null,"description":"Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks, and the applications on them.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:KNOW:3,sfia-skills:8:DATS:3,sfia-skills:8:PENT:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":50,"id":"Target_Network_Analyst_SFIA4","name":"Target Network Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Target Network Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Targets","alias":null,"description":"Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks, and the applications on them.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:KNOW:4,sfia-skills:8:DATS:4,sfia-skills:8:PENT:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":51,"id":"Target_Network_Analyst_SFIA5","name":"Senior Target Network Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Target Network Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Targets","alias":null,"description":"Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks, and the applications on them.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:KNOW:5,sfia-skills:8:DATS:5,sfia-skills:8:PENT:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":52,"id":"Multi-disciplined_Language_Analyst_SFIA4","name":"Multi-disciplined Language Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Multi-disciplined Language Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Language Analysis","alias":null,"description":"Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate intelligence information derived from language, voice and/or graphic material. Creates and maintains language-specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:TECH:4,sfia-skills:8:KNOW:4,sfia-skills:8:VUAS:4,sfia-skills:8:THIN:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":53,"id":"Multi-disciplined_Language_Analyst_SFIA5","name":"Senior Multi-disciplined Language Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Multi-disciplined Language Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Language Analysis","alias":null,"description":"Applies language and culture expertise with target/threat and technical knowledge to process, analyze, and/or disseminate intelligence information derived from language, voice and/or graphic material. Creates and maintains language-specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:TECH:5,sfia-skills:8:KNOW:5,sfia-skills:8:VUAS:5,sfia-skills:8:THIN:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":54,"id":"Cyber_Intel_Planner_SFIA5","name":"Cyber Intel Planner","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Intel Planner","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Operational Planning","alias":null,"description":"Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:5,sfia-skills:8:DEMM:5,sfia-skills:8:ITSP:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":55,"id":"Cyber_Intel_Planner_SFIA6","name":"Senior Cyber Intel Planner","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Intel Planner","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Operational Planning","alias":null,"description":"Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.","classifications":"SFIA6","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:6,sfia-skills:8:DEMM:6,sfia-skills:8:ITSP:6,sfia_behaviours-skills:8:AUTO:6,sfia_behaviours-skills:8:INFL:6,sfia_behaviours-skills:8:COMP:6,sfia_behaviours-skills:8:BUSS:6,sfia_behaviours-skills:8:KNLG:6","desirable_skills":null,"knowledge_items":null},{"_id":56,"id":"Cyber_Ops_Planner_SFIA5","name":"Cyber Ops Planner","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Ops Planner","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Operational Planning","alias":null,"description":"Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCAD:5,sfia-skills:8:THIN:5,sfia-skills:8:SUPP:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":57,"id":"Cyber_Ops_Planner_SFIA6","name":"Senior Cyber Ops Planner","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Ops Planner","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Operational Planning","alias":null,"description":"Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions.","classifications":"SFIA6","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCAD:6,sfia-skills:8:THIN:6,sfia-skills:8:SUPP:6,sfia_behaviours-skills:8:AUTO:6,sfia_behaviours-skills:8:INFL:6,sfia_behaviours-skills:8:COMP:6,sfia_behaviours-skills:8:BUSS:6,sfia_behaviours-skills:8:KNLG:6","desirable_skills":null,"knowledge_items":null},{"_id":58,"id":"Partner_Integration_Planner_SFIA5","name":"Partner Integration Planner","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Partner Integration Planner","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Operational Planning","alias":null,"description":"Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:RLMT:5,sfia-skills:8:SCTY:5,sfia-skills:8:KNOW:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":59,"id":"Partner_Integration_Planner_SFIA6","name":"Senior Partner Integration Planner","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Partner Integration Planner","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Operational Planning","alias":null,"description":"Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.","classifications":"SFIA6","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:RLMT:6,sfia-skills:8:SCTY:6,sfia-skills:8:KNOW:6,sfia_behaviours-skills:8:AUTO:6,sfia_behaviours-skills:8:INFL:6,sfia_behaviours-skills:8:COMP:6,sfia_behaviours-skills:8:BUSS:6,sfia_behaviours-skills:8:KNLG:6","desirable_skills":null,"knowledge_items":null},{"_id":60,"id":"Cyber_Operator_SFIA3","name":"Junior Cyber Operator","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Operator","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Operations","alias":null,"description":"Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executes on-net operations.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:3,sfia-skills:8:DGFS:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":61,"id":"Cyber_Operator_SFIA4","name":"Cyber Operator","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Operator","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Operations","alias":null,"description":"Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executes on-net operations.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:4,sfia-skills:8:DGFS:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":62,"id":"Cyber_Operator_SFIA5","name":"Senior Cyber Operator","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Operator","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Operations","alias":null,"description":"Conducts collection, processing, and/or geolocation of systems to exploit, locate, and/or track targets of interest. Performs network navigation, tactical forensic analysis, and, when directed, executes on-net operations.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:THIN:5,sfia-skills:8:DGFS:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":63,"id":"Cyber_Crime_Investigator_SFIA3","name":"Junior Cyber Crime Investigator","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Crime Investigator","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Investigation","alias":null,"description":"Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:DGFS:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":64,"id":"Cyber_Crime_Investigator_SFIA4","name":"Cyber Crime Investigator","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Crime Investigator","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Investigation","alias":null,"description":"Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:DGFS:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":65,"id":"Cyber_Crime_Investigator_SFIA5","name":"Senior Cyber Crime Investigator","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Crime Investigator","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Cyber Investigation","alias":null,"description":"Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:DGFS:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":66,"id":"Law_Enforcement_/Counterintelligence_Forensics_Analyst_SFIA3","name":"Junior Law Enforcement /Counterintelligence Forensics Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Law Enforcement /Counterintelligence Forensics Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Digital Forensics","alias":null,"description":"Conducts detailed investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:DGFS:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":67,"id":"Law_Enforcement_/Counterintelligence_Forensics_Analyst_SFIA4","name":"Law Enforcement /Counterintelligence Forensics Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Law Enforcement /Counterintelligence Forensics Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Digital Forensics","alias":null,"description":"Conducts detailed investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:DGFS:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":68,"id":"Law_Enforcement_/Counterintelligence_Forensics_Analyst_SFIA5","name":"Senior Law Enforcement /Counterintelligence Forensics Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Law Enforcement /Counterintelligence Forensics Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Digital Forensics","alias":null,"description":"Conducts detailed investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:DGFS:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":69,"id":"Cyber_Defense_Forensics_Analyst_SFIA3","name":"Junior Cyber Defense Forensics Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Forensics Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Digital Forensics","alias":null,"description":"Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:DGFS:3,sfia-skills:8:PENT:3,sfia-skills:8:VUAS:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":70,"id":"Cyber_Defense_Forensics_Analyst_SFIA4","name":"Cyber Defense Forensics Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Forensics Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Digital Forensics","alias":null,"description":"Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:DGFS:4,sfia-skills:8:PENT:4,sfia-skills:8:VUAS:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":71,"id":"Cyber_Defense_Forensics_Analyst_SFIA5","name":"Senior Cyber Defense Forensics Analyst","job_family":"Infosec/Cybersecurity","job_family_function":null,"job_family_role":"Cyber Defense Forensics Analyst","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Digital Forensics","alias":null,"description":"Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:DGFS:5,sfia-skills:8:PENT:5,sfia-skills:8:VUAS:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":72,"id":"Enterprise_Architect_SFIA5","name":"Enterprise Architect","job_family":"Architecture","job_family_function":null,"job_family_role":"Enterprise Architect","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Architecture","alias":null,"description":"Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:STPL:5,sfia-skills:8:REQM:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":73,"id":"Enterprise_Architect_SFIA6","name":"Principal Enterprise Architect","job_family":"Architecture","job_family_function":null,"job_family_role":"Enterprise Architect","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Architecture","alias":null,"description":"Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.","classifications":"SFIA6","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:STPL:6,sfia-skills:8:REQM:6,sfia_behaviours-skills:8:AUTO:6,sfia_behaviours-skills:8:INFL:6,sfia_behaviours-skills:8:COMP:6,sfia_behaviours-skills:8:BUSS:6,sfia_behaviours-skills:8:KNLG:6","desirable_skills":null,"knowledge_items":null},{"_id":74,"id":"Security_Architect_SFIA4","name":"Security Architect","job_family":"Architecture","job_family_function":null,"job_family_role":"Security Architect","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Architecture","alias":null,"description":"Ensures that the stakeholder security requirements necessary to protect the organization's mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:4,sfia-skills:8:STPL:5,sfia-skills:8:ARCH:4,sfia-skills:8:REQM:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":75,"id":"Security_Architect_SFIA5","name":"Senior Security Architect","job_family":"Architecture","job_family_function":null,"job_family_role":"Security Architect","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Architecture","alias":null,"description":"Ensures that the stakeholder security requirements necessary to protect the organization's mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:5,sfia-skills:8:STPL:5,sfia-skills:8:ARCH:5,sfia-skills:8:REQM:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":76,"id":"Security_Architect_SFIA6","name":"Principal Security Architect","job_family":"Architecture","job_family_function":null,"job_family_role":"Security Architect","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Architecture","alias":null,"description":"Ensures that the stakeholder security requirements necessary to protect the organization's mission and business processes are adequately addressed in all aspects of enterprise architecture including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes.","classifications":"SFIA6","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCTY:6,sfia-skills:8:STPL:6,sfia-skills:8:ARCH:6,sfia-skills:8:REQM:6,sfia_behaviours-skills:8:AUTO:6,sfia_behaviours-skills:8:INFL:6,sfia_behaviours-skills:8:COMP:6,sfia_behaviours-skills:8:BUSS:6,sfia_behaviours-skills:8:KNLG:6","desirable_skills":null,"knowledge_items":null},{"_id":77,"id":"Software_Developer_SFIA2","name":"Junior Software Developer","job_family":"Systems/software engineering","job_family_function":null,"job_family_role":"Software Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Software Development","alias":null,"description":"Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.","classifications":"SFIA2","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:PROG:2,sfia-skills:8:TEST:2,sfia-skills:8:PORT:3,sfia-skills:8:RESD:2,sfia-skills:8:SINT:2,sfia_behaviours-skills:8:AUTO:2,sfia_behaviours-skills:8:INFL:2,sfia_behaviours-skills:8:COMP:2,sfia_behaviours-skills:8:BUSS:2,sfia_behaviours-skills:8:KNLG:2","desirable_skills":null,"knowledge_items":null},{"_id":78,"id":"Software_Developer_SFIA3","name":"Software Developer","job_family":"Systems/software engineering","job_family_function":null,"job_family_role":"Software Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Software Development","alias":null,"description":"Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:PROG:3,sfia-skills:8:TEST:3,sfia-skills:8:PORT:3,sfia-skills:8:RESD:3,sfia-skills:8:SINT:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":79,"id":"Software_Developer_SFIA4","name":"Senior Software Developer","job_family":"Systems/software engineering","job_family_function":null,"job_family_role":"Software Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Software Development","alias":null,"description":"Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:PROG:4,sfia-skills:8:TEST:4,sfia-skills:8:PORT:4,sfia-skills:8:RESD:4,sfia-skills:8:SINT:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":80,"id":"Software_Developer_SFIA5","name":"Lead Software Developer","job_family":"Systems/software engineering","job_family_function":null,"job_family_role":"Software Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Software Development","alias":null,"description":"Develops, creates, maintains, and writes/codes new (or modifies existing) computer applications, software, or specialized utility programs.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:PROG:5,sfia-skills:8:TEST:5,sfia-skills:8:PORT:5,sfia-skills:8:RESD:5,sfia-skills:8:SINT:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":81,"id":"Systems_Requirements_Planner_SFIA3","name":"Systems Requirements Planner","job_family":"Systems/software engineering","job_family_function":null,"job_family_role":"Systems Requirements Planner","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Requirements Planning ","alias":null,"description":"Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:REQM:3,sfia-skills:8:UNAN:3,sfia-skills:8:ARCH:4,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":82,"id":"Systems_Requirements_Planner_SFIA4","name":"Senior Systems Requirements Planner","job_family":"Systems/software engineering","job_family_function":null,"job_family_role":"Systems Requirements Planner","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Requirements Planning ","alias":null,"description":"Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:REQM:4,sfia-skills:8:UNAN:4,sfia-skills:8:ARCH:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":83,"id":"Systems_Requirements_Planner_SFIA5","name":"Lead Systems Requirements Planner","job_family":"Systems/software engineering","job_family_function":null,"job_family_role":"Systems Requirements Planner","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Requirements Planning ","alias":null,"description":"Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:REQM:5,sfia-skills:8:UNAN:5,sfia-skills:8:ARCH:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":84,"id":"System_Testing_and_Evaluation_Specialist_SFIA3","name":"System Testing and Evaluation Specialist","job_family":"Systems/software engineering","job_family_function":null,"job_family_role":"System Testing and Evaluation Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Test and Evaluation","alias":null,"description":"Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:TEST:3,sfia-skills:8:QUAS:3,sfia-skills:8:PENT:3,sfia-skills:8:USEV:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":85,"id":"System_Testing_and_Evaluation_Specialist_SFIA4","name":"Senior System Testing and Evaluation Specialist","job_family":"Systems/software engineering","job_family_function":null,"job_family_role":"System Testing and Evaluation Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Test and Evaluation","alias":null,"description":"Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements as well as analyze/report test results.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:TEST:4,sfia-skills:8:QUAS:4,sfia-skills:8:PENT:4,sfia-skills:8:USEV:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":86,"id":"Systems_Developer_SFIA3","name":"Systems Developer","job_family":"Systems/software engineering","job_family_function":null,"job_family_role":"Systems Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Development","alias":null,"description":"Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:ARCH:4,sfia-skills:8:RESD:3,sfia-skills:8:DESN:3,sfia-skills:8:HWDE:3,sfia-skills:8:NTDS:3,sfia-skills:8:SWDN:3,sfia-skills:8:TEST:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":87,"id":"Systems_Developer_SFIA4","name":"Senior Systems Developer","job_family":"Systems/software engineering","job_family_function":null,"job_family_role":"Systems Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Development","alias":null,"description":"Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:ARCH:4,sfia-skills:8:RESD:4,sfia-skills:8:DESN:4,sfia-skills:8:HWDE:4,sfia-skills:8:NTDS:4,sfia-skills:8:SWDN:4,sfia-skills:8:TEST:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":88,"id":"Systems_Developer_SFIA5","name":"Lead Systems Developer","job_family":"Systems/software engineering","job_family_function":null,"job_family_role":"Systems Developer","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Development","alias":null,"description":"Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.","classifications":"SFIA5","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:ARCH:5,sfia-skills:8:RESD:5,sfia-skills:8:DESN:5,sfia-skills:8:HWDE:5,sfia-skills:8:NTDS:5,sfia-skills:8:SWDN:5,sfia-skills:8:TEST:5,sfia_behaviours-skills:8:AUTO:5,sfia_behaviours-skills:8:INFL:5,sfia_behaviours-skills:8:COMP:5,sfia_behaviours-skills:8:BUSS:5,sfia_behaviours-skills:8:KNLG:5","desirable_skills":null,"knowledge_items":null},{"_id":89,"id":"Technical_Support_Specialist_SFIA2","name":"Junior Technical Support Specialist","job_family":"Operations","job_family_function":null,"job_family_role":"Technical Support Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Customer Service and Technical Support","alias":null,"description":"Provides technical support to customers who need assistance utilizing client level hardware and software in accordance with established or approved organizational process components. (i.e., Master Incident Management Plan, when applicable).","classifications":"SFIA2","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:PBMG:3,sfia-skills:8:SCAD:2,sfia-skills:8:VUAS:2,sfia-skills:8:SYSP:3,sfia-skills:8:NTAS:2,sfia-skills:8:HSIN:2,sfia-skills:8:ITOP:2,sfia_behaviours-skills:8:AUTO:2,sfia_behaviours-skills:8:INFL:2,sfia_behaviours-skills:8:COMP:2,sfia_behaviours-skills:8:BUSS:2,sfia_behaviours-skills:8:KNLG:2","desirable_skills":null,"knowledge_items":null},{"_id":90,"id":"Technical_Support_Specialist_SFIA3","name":"Technical Support Specialist","job_family":"Operations","job_family_function":null,"job_family_role":"Technical Support Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Customer Service and Technical Support","alias":null,"description":"Provides technical support to customers who need assistance utilizing client level hardware and software in accordance with established or approved organizational process components. (i.e., Master Incident Management Plan, when applicable).","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:PBMG:3,sfia-skills:8:SCAD:3,sfia-skills:8:VUAS:3,sfia-skills:8:SYSP:3,sfia-skills:8:NTAS:3,sfia-skills:8:HSIN:3,sfia-skills:8:ITOP:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":91,"id":"Technical_Support_Specialist_SFIA4","name":"Senior Technical Support Specialist","job_family":"Operations","job_family_function":null,"job_family_role":"Technical Support Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Customer Service and Technical Support","alias":null,"description":"Provides technical support to customers who need assistance utilizing client level hardware and software in accordance with established or approved organizational process components. (i.e., Master Incident Management Plan, when applicable).","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:PBMG:4,sfia-skills:8:SCAD:4,sfia-skills:8:VUAS:4,sfia-skills:8:SYSP:4,sfia-skills:8:NTAS:4,sfia-skills:8:HSIN:4,sfia-skills:8:ITOP:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":92,"id":"System_Administrator_SFIA1","name":"Associate System Administrator","job_family":"Operations","job_family_function":null,"job_family_role":"System Administrator","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Administration","alias":null,"description":"Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).","classifications":"SFIA1","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCAD:1,sfia-skills:8:ITOP:1,sfia-skills:8:HSIN:1,sfia-skills:8:SYSP:3,sfia-skills:8:TEST:1,sfia-skills:8:PBMG:3,sfia_behaviours-skills:8:AUTO:1,sfia_behaviours-skills:8:INFL:1,sfia_behaviours-skills:8:COMP:1,sfia_behaviours-skills:8:BUSS:1,sfia_behaviours-skills:8:KNLG:1","desirable_skills":null,"knowledge_items":null},{"_id":93,"id":"System_Administrator_SFIA2","name":"Junior System Administrator","job_family":"Operations","job_family_function":null,"job_family_role":"System Administrator","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Administration","alias":null,"description":"Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).","classifications":"SFIA2","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCAD:2,sfia-skills:8:ITOP:2,sfia-skills:8:HSIN:2,sfia-skills:8:SYSP:3,sfia-skills:8:TEST:2,sfia-skills:8:PBMG:3,sfia_behaviours-skills:8:AUTO:2,sfia_behaviours-skills:8:INFL:2,sfia_behaviours-skills:8:COMP:2,sfia_behaviours-skills:8:BUSS:2,sfia_behaviours-skills:8:KNLG:2","desirable_skills":null,"knowledge_items":null},{"_id":94,"id":"System_Administrator_SFIA3","name":"System Administrator","job_family":"Operations","job_family_function":null,"job_family_role":"System Administrator","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Administration","alias":null,"description":"Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCAD:3,sfia-skills:8:ITOP:3,sfia-skills:8:HSIN:3,sfia-skills:8:SYSP:3,sfia-skills:8:TEST:3,sfia-skills:8:PBMG:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":95,"id":"System_Administrator_SFIA4","name":"Senior System Administrator","job_family":"Operations","job_family_function":null,"job_family_role":"System Administrator","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Systems Administration","alias":null,"description":"Responsible for setting up and maintaining a system or specific components of a system (e.g. for example, installing, configuring, and updating hardware and software; establishing and managing user accounts; overseeing or conducting backup and recovery tasks; implementing operational and technical security controls; and adhering to organizational security policies and procedures).","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SCAD:4,sfia-skills:8:ITOP:4,sfia-skills:8:HSIN:4,sfia-skills:8:SYSP:4,sfia-skills:8:TEST:4,sfia-skills:8:PBMG:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":96,"id":"Network_Operations_Specialist_SFIA2","name":"Junior Network Operations Specialist","job_family":"Operations ","job_family_function":null,"job_family_role":"Network Operations Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Network Services","alias":null,"description":"Plans, implements, and operates network services/systems, to include hardware and virtual environments.","classifications":"SFIA2","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SYSP:3,sfia-skills:8:NTAS:2,sfia-skills:8:HSIN:2,sfia-skills:8:TEST:2,sfia_behaviours-skills:8:AUTO:2,sfia_behaviours-skills:8:INFL:2,sfia_behaviours-skills:8:COMP:2,sfia_behaviours-skills:8:BUSS:2,sfia_behaviours-skills:8:KNLG:2","desirable_skills":null,"knowledge_items":null},{"_id":97,"id":"Network_Operations_Specialist_SFIA3","name":"Network Operations Specialist","job_family":"Operations ","job_family_function":null,"job_family_role":"Network Operations Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Network Services","alias":null,"description":"Plans, implements, and operates network services/systems, to include hardware and virtual environments.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SYSP:3,sfia-skills:8:NTAS:3,sfia-skills:8:HSIN:3,sfia-skills:8:TEST:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":98,"id":"Network_Operations_Specialist_SFIA4","name":"Senior Network Operations Specialist","job_family":"Operations ","job_family_function":null,"job_family_role":"Network Operations Specialist","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Network Services","alias":null,"description":"Plans, implements, and operates network services/systems, to include hardware and virtual environments.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SYSP:4,sfia-skills:8:NTAS:4,sfia-skills:8:HSIN:4,sfia-skills:8:TEST:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null},{"_id":99,"id":"Product_Support_Manager_SFIA3","name":"Product Support Manager","job_family":"Product management","job_family_function":null,"job_family_role":"Product Support Manager","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Acquisition and Program/Project Management","alias":null,"description":"Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components.","classifications":"SFIA3","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SLMO:3,sfia-skills:8:BUSA:3,sfia-skills:8:FEAS:3,sfia-skills:8:REQM:3,sfia_behaviours-skills:8:AUTO:3,sfia_behaviours-skills:8:INFL:3,sfia_behaviours-skills:8:COMP:3,sfia_behaviours-skills:8:BUSS:3,sfia_behaviours-skills:8:KNLG:3","desirable_skills":null,"knowledge_items":null},{"_id":100,"id":"Product_Support_Manager_SFIA4","name":"Senior Product Support Manager","job_family":"Product management","job_family_function":null,"job_family_role":"Product Support Manager","aps_job_code":null,"profile_link":null,"demand":null,"interests":null,"learning_link":null,"discipline":"Acquisition and Program/Project Management","alias":null,"description":"Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components.","classifications":"SFIA4","knowledge":null,"influence":null,"experience":null,"critical_skills":"sfia-skills:8:SLMO:4,sfia-skills:8:BUSA:4,sfia-skills:8:FEAS:4,sfia-skills:8:REQM:4,sfia_behaviours-skills:8:AUTO:4,sfia_behaviours-skills:8:INFL:4,sfia_behaviours-skills:8:COMP:4,sfia_behaviours-skills:8:BUSS:4,sfia_behaviours-skills:8:KNLG:4","desirable_skills":null,"knowledge_items":null}], "fields": [{"id": "_id", "type": "int"}, {"id": "id", "type": "text"}, {"id": "name", "type": "text"}, {"id": "job_family", "type": "text"}, {"id": "job_family_function", "type": "text"}, {"id": "job_family_role", "type": "text"}, {"id": "aps_job_code", "type": "text"}, {"id": "profile_link", "type": "text"}, {"id": "demand", "type": "text"}, {"id": "interests", "type": "text"}, {"id": "learning_link", "type": "text"}, {"id": "discipline", "type": "text"}, {"id": "alias", "type": "text"}, {"id": "description", "type": "text"}, {"id": "classifications", "type": "text"}, {"id": "knowledge", "type": "text"}, {"id": "influence", "type": "text"}, {"id": "experience", "type": "text"}, {"id": "critical_skills", "type": "text"}, {"id": "desirable_skills", "type": "text"}, {"id": "knowledge_items", "type": "text"}], "_links": {"start": "/api/action/datastore_search?resource_id=ddbbe6a9-6498-4ed6-bff3-418c49d97a31", "next": "/api/action/datastore_search?resource_id=ddbbe6a9-6498-4ed6-bff3-418c49d97a31&offset=100"}, "total": 144, "total_was_estimated": false}}