SGC Job Analysis Questionnaire - R2G13 - Incident Response

 

 

You have completed 0% of this survey
0%
100%

For the role of Incident Response in the Smartgrid Cybersecurity environment, please indicate how frequently each task below would be performed by a person at the listed level of expertise, and how important is it that this task be completed by a person with the listed level of expertise.
*Report the attack TTPs used in the last 6mo against the organization (Task ID: R2-9610)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*Develop working theories of the attack and look for correlated evidence to support or reject the working theories. (Task ID: R2-9181)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*Document the incident response activities to determine positive and negative results from actions and security controls. These should be the starting point for Lessons Learned discussions and follow-on preparation activities. (Task ID: R2-9202)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*Review known intrustion TTPs and observables to assist in profiling log events and capture event information that may relate to known signatures. (Task ID: R2-9129)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*Understand how phishing attacks can adversely impact web-based management applications. (Task ID: R2-9304)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*Verify log analysis findings through alternate means such as local log storage or affected system state/configuration (Task ID: R2-9119)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*Document process and analysis improvements. (Task ID: R2-9130)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*Define how systems were initially compromised and how the attack progressed and what observables were available for detection and response (Task ID: R2-9634)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*Develop mitigations based on incidents analyzed and recommend improvements in security capabilities or tools as appropriate (Task ID: R2-9633)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*Identify security incidents that require training or awareness for users and security staff (Task ID: R2-9632)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*Implement lessons learned from the analysis of material incidents (Task ID: R2-9635)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*Test the security staff and deployed solutions against scenarios developed from incidents with significant lessons learned (Task ID: R2-9636)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*maintain chain of custody and integrity of log files if to be used by law enforcement at a later date (Task ID: R2-9114)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)
 
*Develop a chain of custody and consider forensic images if needed as the investigation progresses (Task ID: R2-9197)
  Frequency   Importance
  Never Rarely Sometimes Often Always   Unimportant Low Moderately Very Extremely
Novice (Apprentice)  
Intermediate (Journeyman)  
Expert
(Master)