NIST NICE Workforce Framework for Cybersecurity WiCyS Video Album Volunteer Application

1.Full Name:(Required.)
2.WiCyS Member ID:(Required.)
3.Contact email:(Required.)
4.Organization's Name:(Required.)
5.Job title:(Required.)
6.LinkedIn profile:
7.Willing to participate in a 3-5-minute video?(Required.)
8.Please identify maximum FIVE (at least ONE) NIST NICE Work Roles that match with YOUR current job roles to some extent.

Review work roles here: https://www.nist.gov/system/files/documents/2017/04/04/national_cybersecurity_workforce_framework_03_2013_version1_0_interactive.pdf
Considerably Match
Moderately Match
Somewhat Match
Securely Provision: Research and Development Specialist (Technology R&D)
Securely Provision: Systems Requirements Planner (Systems Requirements Planning)
Securely Provision: Information Systems Security Developer (Systems Development)
Operate and Maintain: Data Analyst (Data Administration)
Operate and Maintain: Knowledge Manager (Knowledge Management)
Operate and Maintain: Technical Support Specialist (Customer Service and Technical Support)
Operate and Maintain: Network Operations Specialist (Network Services)
Operate and Maintain: Systems Security Analyst (Systems Analysis)
Oversee and Govern: Cyber Legal Advisor (Legal Advice and Advocacy)
Oversee and Govern: Cyber Instructional Curriculum Developer (Train, Education, and Awareness)
Oversee and Govern: Communication Security Manager (Cybersecurity Management)
Oversee and Govern: Cyber Policy and Strategic Planner (Strategic Planning and Policy)
Oversee and Govern: Executive Cyber Leadership (Executive Cyber Leadership)
Oversee and Govern: Program Manager (Program/Project Management and Acquisition)
Oversee and Govern: IT Project Manager (Program/Project Management and Acquisition)
Oversee and Govern: IT Investment/Portfolio Manager (Program/Project Management and Acquisition)
Protect and Defend: Cyber Defense Analyst (Cyber Defense Analysis)
Protect and Defend: Cyber Defense Infrastructure Support Specialist (Cyber Defense Infrastructure Support)
Protect and Defend: Cyber Defense Incident Responder (Incident Response)
Protect and Defend: Vulnerability Assessment Analysist (Vulnerability Assessment and Management)
Analyze: Threat/Warning Analyst (Threat Analysis)
Analyze: Exploitation Analyst (Exploitation Analysis)
Analyze: Mission Assessment Specialist (All-Source Analysis)
Analyze: Target Developer (Targets)
Analyze: Target Network Analyst (Targets)
Analyze: Multi-Disciplined Language Analyst (Language Analysis)
Collect and Operate: All Source-Collection Manager (Collection Operations)
Collect and Operate: All Source-Collection Requirements Manager (Collection Operations)
Collect and Operate: Cyber Intel Planner (Cyber Operational Planning)
Collect and Operate: Cyber Ops Planner (Cyber Operational Planning)
Collect and Operate: Partner Integration Planner (Cyber Operational Planning)
Collect and Operate: Cyber Operator (Cyber Operations)
Investigate: Cyber Crime Investigator (Cyber Investigation)
Investigate: Law Enforcement/Counterintelligence Forensics Analyst (Digital Forensics)
Investigate: Cyber Defense Forensics Analyst (Digital Forensics)
Current Progress,
0 of 8 answered