Skip to main content

Assessing Aptitude and Talent for Cyber Operations

  • Conference paper
  • First Online:
Book cover Advances in Human Factors in Cybersecurity

Abstract

In a world of rapidly evolving technology, it is an increasingly complex task to protect the integrity of information and security of infrastructural systems. Doing so demands a skilled workforce, which can only be assured with careful testing and selection of cyber operations specialists. We are conducting research to develop a cyber aptitude testing battery to improve selection and placement processes, but one of the biggest challenges lies in concisely characterizing the space of work roles. In this paper, we review some prior approaches to defining cyber work roles and describe our current approach to doing so at a more detailed level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. The National Cybersecurity Workforce Framework, National Initiative for Cybersecurity Education (NICE), http://csrc.nist.gov/nice/framework/

  2. Homeland Security Advisory Council Cyberskills Task Force Report: Fall 2012, https://www.dhs.gov/sites/default/files/publications/HSAC%20CyberSkills%20Report%20-%20Final.pdf

  3. Yen, J., Zhong, C., Liu, P.: Cognitive process. In: Kott, A., et al. (eds.) Cyber Defense and Situational Awareness, pp. 119–144. Springer, Switzerland (2014)

    Google Scholar 

  4. Zhong, C., Yen, J., Liu, P., Erbacher, R., Etoty, R., Garneau, C.: An integrated computer-aided cognitive task analysis method for tracing cyber-attack analysis processes. In: HotSoS ‘15, ACM, Urbana, IL (2015)

    Google Scholar 

  5. Campbell, S.G., O’Rourke, P., Bunting, M.F.: Identifying dimensions of cyber aptitude: the design of the cyber aptitude and talent assessment. In: Proceedings of the Human Factors and Ergonomics Society 59th Annual Meeting, SAGE Publications, California, pp. 721–725 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lelyn D. Saner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Saner, L.D., Campbell, S., Bradley, P., Michael, E., Pandza, N., Bunting, M. (2016). Assessing Aptitude and Talent for Cyber Operations. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing, vol 501. Springer, Cham. https://doi.org/10.1007/978-3-319-41932-9_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41932-9_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41931-2

  • Online ISBN: 978-3-319-41932-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics