Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NICE Framework Work Role Videos

 Design and Development | Implementation and Operation | Oversight and Governance | Protection and Defense | Cyberspace Intelligence | Cyberspace Effects | Investigation 

The NICE Workforce Framework for Cybersecurity (NICE Framework) establishes a standard approach and common language for describing cybersecurity work and learner capabilities. It uses a modular, building-blocks approach based on Task, Knowledge, and Skill (TKS) statements to describe cybersecurity work and what someone needs to know or be able to do to perform that work. These statements are then used to define Work Roles and Competency Areas. Work Roles describe an area of work for which an individual or team is responsible or accountable. Work Roles are not synonymous with job titles or occupations, and a single job may comprise multiple roles. 

This video library provides links to videos depicting a day in the life of cybersecurity practitioners who have a range of Work Roles.

NICE Framework Work Role Categories
Credit: NICE

 

Oversight and Governance NICE Framework Work Role Category
Credit: NICE

 

Communications Security Image
Credit: Shutterstock

Communications Security (COMSEC) Management

[OG-WRL-001]

Responsible for managing the Communications Security (COMSEC) resources of an organization.

RUYS – COMSEC, US AF Cyber Security 

Cybersecurity Plan Image
Credit: NICE

Cybersecurity Policy and Planning

[OG-WRL-002]

Responsible for developing and maintaining cybersecurity plans, strategy, and policy to support and align with organizational cybersecurity initiatives and regulatory compliance.

The Master Guide to building a cybersecurity policies and procedures manual for an SEC RIA

Group of Diverse Hands Together Joining Concept
Credit: Shutterstock/Rawpixel.com

Cybersecurity Workforce Management

[OG-WRL-003]

Responsible for developing cybersecurity workforce plans, assessments, strategies, and guidance, including cybersecurity-related staff training, education, and hiring processes. Makes adjustments in response to or in anticipation of changes to cybersecurity-related policy, technology, and staffing needs and requirements. Authors mandated workforce planning strategies to maintain compliance with legislation, regulation, and policy.

 

 

Curriculum Developer Image
Credit: Shutterstock/dotshock

Cybersecurity Curriculum Development

[OG-WRL-004]

Responsible for developing, planning, coordinating, and evaluating cybersecurity awareness, training, or education content, methods, and techniques based on instructional needs and requirements.

Cybersecurity Curriculum Developer Shelly Anderson, Intel

Cyber Instructor
Credit: Shutterstock/REDPIXEL.PL

Cybersecurity Instruction

[OG-WRL-005]

Responsible for developing and conducting cybersecurity awareness, training, or education. 

Cyber Security Instructor
Kelly Handerhan, Cybrary

mallet Image
Credit: Shutterstock/Illus_man

Cybersecurity Legal Advice

[OG-WRL-006]

Responsible for providing cybersecurity legal advice and recommendations, including monitoring related legislation and regulations.

Cyber Law Advocate
Pavan Duggal, CyberLaw Asia

 

Executive Cyber Leader Image
Credit: Shutterstock/Blue Planet Studio

Executive Cybersecurity Leadership

[OG-WRL-007]

Responsible for establishing vision and direction for an organization's cybersecurity operations and resources and their impact on digital and physical spaces. Possesses authority to make and execute decisions that impact an organization broadly, including policy approval and stakeholder engagement.

Principal Threat Analyst Lesly Carhart, Dragos

Lock tech image
Credit: Shutterstock/wk1003mike

Privacy Compliance

[OG-WRL-008]

Responsible for developing and overseeing an organization’s privacy compliance program and staff, including establishing and managing privacy-related governance, policy, and incident response needs.

IT Compliance Manager
Kejuanna Thomas, GE Healthcare

Product Support Manager_CCAW
Credit: Shutterstock/Natali _ Mis

Product Support Management

[OG-WRL-009]

Responsible for planning, estimating costs, budgeting, developing, implementing, and managing product support strategies in order to field and maintain the readiness and operational capability of systems and components.

Product Support Specialist
Various, TPP

 

ProgramManager_CCAW
Credit: Shutterstock/Korn

Program Management

[OG-WRL-010]

Responsible for leading, coordinating, and the overall success of a defined program. Includes communicating about the program and ensuring alignment with agency or organizational priorities.

Program Manager, Various, Google

IT Program Manager Image
Credit: Shutterstock/Andrey_Popov

Secure Project Management

[OG-WRL-011]

Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.

Program Manager Kasey Champion, Microsoft

Security Control Assessor_CCAW
Credit: Shutterstock/Chan2545

Security Control Assessment 

[OG-WRL-012]

Responsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness. 

Product Marketing Manager, Chris Kirsch, Metasploit

 

Systems Authorization Image
Credit: Shutterstock

Systems Authorization

[OG-WRL-013]

Responsible for operating an information system at an acceptable level of risk to organizational operations, organizational assets, individuals, other organizations, and the nation.

Building Smarter Authorization Systems with Sam Scott

InfoSysSecMgr
Credit: Shutterstock/NicoElNino

Systems Security Management

[OG-WRL-014]

Responsible for managing the cybersecurity of a program, organization, system, or enclave. 

Computer & Information, Systems Manager
CareerOneStop

Money Image
Credit: Shutterstock/MVelishchuk

Technology Portfolio Management

[OG-WRL-015]

Responsible for managing a portfolio of technology investments that align with the overall needs of mission and enterprise priorities.

IT Professor, Joe Peppard, Cranfield School of Mgmt

 

PDF cyber Image
Credit: Shutterstock/Illus_man

Technology Program Auditing

[OG-WRL-016]

Responsible for conducting evaluations of technology programs or their individual components to determine compliance with published standards. 

Cybersecurity Instructor, Grant Collins, Cybercademy

 

 

 


 

Design and Development NICE Framework  Work Role Category
Credit: NICE

 

Security Architect Image_CCAW
Credit: Shutterstock/Metamorworks

Cybersecurity Architecture 

[DD-WRL-001]

Responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.

Security Architect, Peter Vincent, IBM

Enterprise Architect Puzzle Image_CCAW
Credit: Shutterstock/metamorworks

Enterprise Architecture

 [DD-WRL-002]

Responsible for developing and maintaining business, systems, and information processes to support enterprise mission needs. Develops technology rules and requirements that describe baseline and target architectures. 

Chief Enterprise Architect​Claude Sam-Foh, FSC of Ontario

SoftwareDeveloper_CCAW
Credit: Shutterstock

Secure Software Development

[DD-WRL-003]

Responsible for developing, creating, modifying, and maintaining computer applications, software, or specialized utility programs.

Software Engineer Ustav Pandey, Microsoft

 

Security Control Assessor_CCAW
Credit: Shutterstock/Chan2545

Secure Systems Development

[DD-WRL-004]

Responsible for the secure design, development, and testing of systems and the evaluation of system security throughout the systems development life cycle.

Chief Security Officer, Larry Knafo, BlackRock
Product Marketing Manager, Chris Kirsch, Metasploit

Security Software Assessor_CCAW
Credit: Shutterstock/faithie

Software Security Assessment

[DD-WRL-005]

Responsible for analyzing the security of new or existing computer applications, software, or specialized utility programs and delivering actionable results.

Software Quality Assurance, Engineer & Tester, CareerOneStop

Computer Image
Credit: Shutterstock/Song_about_summer

Systems Requirements Planning

[DD-WRL-006]

Responsible for consulting with internal and external customers to evaluate and translate functional requirements and integrate security policies into technical solutions. 

Principal Consultant, Process Impact​
Karl Wiegers, Enfocus Solutions

 

Chain Image_CCAW
Credit: Shutterstock/Iaroslav Neliubov

Systems Testing and Evaluation

[DD-WRL-007]

Responsible for planning, preparing, and executing system tests; evaluating test results against specifications and requirements; and reporting test results and findings.

System Test Engineer​Domonic Nunley, Progressive

RandDSpecialist_CCAW
Credit: Shutterstock/Gorodenkoff

Technology Research and Development

[DD-WRL-008]

Responsible for conducting software and systems engineering and software systems research to develop new capabilities with fully integrated cybersecurity. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems. 

Security Research Manager​, Tod Beardsley, Rapid 7

 

 


 

Implementation and Operation NICE Framework Work Role Category
Credit: NICE

 

Data Analyst_CCAW
Credit: Shutterstock/Blackboard

Data Analysis 

[IO-WRL-001] 

Responsible for analyzing data from multiple disparate sources to provide cybersecurity and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes. 

Data Analyst
The Career Force

DatabaseAdministrator_CCAW
Credit: Shutterstock/Sashkin

Database Administration

[IO-WRL-002] 

Responsible for administering databases and data management systems that allow for the secure storage, query, protection, and utilization of data. 

Database Administrator, Laura Herschel, USAA

Computer Graphic_CCAW
Credit: Shutterstock/Ramcreative

Knowledge Management

[IO-WRL-003]

Responsible for managing and administering processes and tools to identify, document, and access an organization’s intellectual capital. 

Knowledge Manager KnowledgeMT

 

Network Operation Specialist CCAW Image
Credit: Shutterstock/Vasin Lee

Network Operations

[IO-WRL-004]

Responsible for planning, implementing, and operating network services and systems, including hardware and virtual environments. 

Computer Network Architect CareerOneStop

System Administrator CCAW
Credit: Shutterstock/metamorworks

Systems Administration

[IO-WRL-005] 

Responsible for setting up and maintaining a system or specific components of a system in adherence with organizational security policies and procedures. Includes hardware and software installation, configuration, and updates; user account management; backup and recovery management; and security control implementation. 

System Administrator CareerOneStop

System Security Analyst_CCAW Image
Credit: Shutterstock/LeoWolfert

Systems Security Analysis

[IO-WRL-006] 

Responsible for developing and analyzing the integration, testing, operations, and maintenance of systems security. Prepares, performs, and manages the security aspects of implementing and operating a system. 

Information Security Analyst CareerOneStop

 

TechSupSpecialist_CCAW
Credit: Shutterstock/Iaremenko Sergii

Technical Support 

[IO-WRL-007] 

Responsible for providing technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational policies and processes. 

Computer User & Network Support Specialist The Career Force

 

 

 


 

Protection and Defense NICE Framework Work Role Category
Credit: NICE

 

Cyber Meeting Picture
Credit: Shutterstock/Gorodenkoff

Defensive Cybersecurity

[PD-WRL-001]

Responsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.

Cyber Security Analyst, James Weston, Inmarsat

Record Player Image
Credit: Shutterstock/Torin55

Digital Forensics

[PD-WRL-002]

Responsible for analyzing digital evidence from computer security incidents to derive useful information in support of system and network vulnerability mitigation.

Forensic Technology Director
Davin Teo, Alvarez & Marsal

Computer Cyber Image
Credit: Shutterstock/ESB Professional

Incident Response

[PD-WRL-003]

Responsible for investigating, analyzing, and responding to network cybersecurity incidents.

Managing Consultant
Keatron Evans, KM Cyber Security

 

Cyber Digital Image
Credit: Shutterstock/kubais

Incident Response

[PD-WRL-004]

Responsible for testing, implementing, deploying, maintaining, and administering infrastructure hardware and software for cybersecurity. 

Cybersecurity Instructor
Emilio Aguero, Digital Byte Computing

Insider Threat Analysis Image
Credit: Shutterstock

Insider Threat Analysis

[PD-WRL-005]

Responsible for identifying and assessing the capabilities and activities of cybersecurity insider threats; produces findings to help initialize and support law enforcement and counterintelligence activities and investigations.

Facilitating Insider Threat Analysis Using OCTAVE

Cyber Person Image
Credit: Shutterstock/Gorodenkoff

Threat Analysis

[PD-WRL-006]

Responsible for collecting, processing, analyzing, and disseminating cybersecurity threat assessments. Develops cybersecurity indicators to maintain awareness of the status of the highly dynamic operating environment.

Cyber Threat Intelligence Analyst Jessica Lee, Chevron

 

Cyber computer Image
Credit: Shutterstock/Hernan E. Schmidt

Vulnerability Analysis

[PD-WRL-007]

Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.

Vulnerability Verification Specialist
Lauren McCaslin, WhiteHat Security

 

 

 


 

Investigation NICE Framework Work Role Category
Credit: NICE

 

Cyber Eye Image
Credit: Shutterstock/Carlos Amarillo

Cybercrime Investigation

[IN-WRL-001]

Responsible for investigating cyberspace intrusion incidents and crimes. Applies tactics, techniques, and procedures for a full range of investigative tools and processes and appropriately balances the benefits of prosecution versus intelligence gathering.

Cyber Crime Investigator, Alain Stevens, Pacta

Cyber Fingerprint Image
Credit: Shutterstock/whiteMocca

Digital Evidence Analysis

[IN-WRL-002]

Responsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques.

Digital Forensics Investigator, EC-Council

 

 


 

Cyberspace Intelligence NICE Framework Work Role Category
Credit: NICE

 

World Ball Image
Credit: Shutterstock/NPFire

All-Source Analysis

[CI-WRL-001]

Responsible for analyzing data and information from one or multiple sources to conduct preparation of the operational environment, respond to requests for information, and submit intelligence collection and production requirements in support of intelligence planning and operations.

Intelligence Analyst
U.S. Army

Person in Cyber
Credit: Shutterstock/metamorworks

All-Source Collection Management

[CI-WRL-002]

Responsible for identifying intelligence collection authorities and environment; incorporating priority information requirements into intelligence collection management; and developing concepts to meet leadership's intent. Determines capabilities of available intelligence collection assets; constructs and disseminates intelligence collection plans; and monitors execution of intelligence collection tasks to ensure effective execution of collection plans.

Collection Management Officer Various, CIA

All-Source Collection Requirements Management Image
Credit: Shutterstock

All-Source Collection Requirements Management

[CI-WRL-003]

Responsible for evaluating intelligence collection operations and developing effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of intelligence collection requirements. Evaluates performance of intelligence collection assets and operations.

 

Face Cyber Image
Credit: Shutterstock/whiteMocca

Cyber Intelligence Planning

[CI-WRL-004]

Responsible for developing intelligence plans to satisfy cyber operation requirements. Identifies, validates, and levies requirements for intelligence collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.

Cyber Threat Intelligence Researcher
Anita Bielicka, Orpheus Cyber

Cyber World Image
Credit: Shutterstock/Krunja

Multi-Disciplined Language Analysis

[CI-WRL-005]

Responsible for applying language and cultural expertise with target, threat, and technical knowledge to process, analyze, and disseminate intelligence information derived from language, voice, and/or graphic materials. Creates and maintains language-specific databases and working aids to support cyber action execution and ensure critical knowledge sharing. Provides subject matter expertise in foreign language-intensive or interdisciplinary projects.

Cryptologic Language Analyst U.S. Air Force

 

 


 

Cyberspace Effects NICE Framework Work Role Category
Credit: NICE

 

Cyber operation Image
Credit: Shutterstock/Gorodenkoff

Cyberspace Operations

[CE-WRL-001]

Responsible for gathering evidence on criminal or foreign intelligence entities to mitigate and protect against possible or real-time threats. Conducts collection, processing, and geolocation of systems to exploit, locate, and track targets. Performs network navigation and tactical forensic analysis and executes on-net operations when directed

Cyber Operations Specialist, Various, U.S. Army

Cyber Operations Planning Image
Credit: Shutterstock

Cyber Operations Planning

[CE-WRL-002]

Responsible for developing cybersecurity operations plans; participating in targeting selection, validation, and synchronization; and enabling integration during the execution of cyber actions.

Lock Cyber Image
Credit: Shutterstock/LuckyStep

Exploitation Analysis

[CE-WRL-003]

Responsible for identifying access and intelligence collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

Signals Acquisition / Exploitation Analyst U.S. Army

 

Mission Assessment Image
Credit: Shutterstock

Mission Assessment 

[CE-WRL-004]

Responsible for developing assessment plans and performance measures; conducting strategic and operational effectiveness assessments for cyber events; determining whether systems perform as expected; and providing input to the determination of operational effectiveness.

Partner Integration Planning Image
Credit: Shutterstock

Partner Integration Planning

[CE-WRL-005]

Responsible for advancing cooperation across organizational or national borders between cyber operations partners. Provides guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.

Target Analysis Image
Credit: Shutterstock

Target Analysis

[CE-WRL-006]

Responsible for conducting target development at the system, component, and entity levels. Builds and maintains electronic target folders to include inputs from environment preparation and/or internal or external intelligence sources. Coordinates with partner target working groups and intelligence community members, and presents candidate targets for vetting and validation. Assesses and reports on damage resulting from the application of military force and coordinates federal support as required.

 

Travel image
Credit: Shutterstock/Golden Sikorka

Target Network Analysis

[CE-WRL-007]

Responsible for conducting advanced analysis of collection and open-source data to ensure target continuity; profiling targets and their activities; and developing techniques to gain target information. Determines how targets communicate, move, operate, and live based on knowledge of target technologies, digital networks, and applications.

Computer Network Architect, CareerOneStop

 

 


View additional Videos and Interviews

View NICE Framework in Focus Interviews

Created May 6, 2021, Updated September 6, 2024