Target Analyst Reporter
The Target Analyst Reporter (TAR) provides synthesized products to customers by researching, analyzing, and reporting intelligence via appropriate reporting vehicles in response to customer requirements and IAW missions of SIGINT, cybersecurity, and cyberspace operations. They prioritize, assess, evaluate, and report information obtained from SIGINT collection, cyber surveillance, and reconnaissance operations sources. The TAR enhances reporting with collateral information as required, maintains awareness of internal and external customer requirements, and collaborates with other collectors and analysts to refine collection and reporting requirements. The TAR shares target-related information and provides feedback to customers as appropriate. The TAR develops working aids and provides database updates on target activity to enhance and build target knowledge and improve collection. The TAR performs quality control and product-release functions.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
6935 | * Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS). |
Knowledge |
6938 | * Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
4396 | Knowledge of basic cloud-based technologies and concepts. |
Knowledge |
4421 | Knowledge of Critical Intelligence Communication (CRITIC) identification and reporting process. |
Knowledge |
4423 | Knowledge of cryptologic and SIGINT reporting and dissemination procedures. |
Knowledge |
4460 | Knowledge of how and when to request assistance from the Cryptanalysis and Signals Analysis and/or CNO. |
Knowledge |
4470 | Knowledge of intelligence sources and their characteristics. |
Knowledge |
4491 | Knowledge of methods, tools, sources, and techniques used to research, integrate and summarize information pertaining to target. |
Knowledge |
4523 | Knowledge of quality review process and procedures. |
Knowledge |
4570 | Knowledge of the overall mission of the Cyber Mission Forces (CMF). |
Knowledge |
4578 | Knowledge of the specific missions for CMF (i.e., Cyber Mission Teams (CMT), National Mission Teams (NMT), Combat Support Team (CST), National Support Team (NST), Cyber Protection Team (CPT). |
Knowledge |
4582 | Knowledge of the U.S. Cryptologic Systems authorities, responsibilities, and contributions to the cyberspace operations mission. |
Knowledge |
4612 | Skill in conducting derivative classification IAW organization standards/Policy |
Skill |
4613 | Skill in conducting quality review of serialized reports and reporting for time-sensitive USCYBERCOM operations. |
Skill |
4619 | Skill in developing and maintaining target profiles. |
Skill |
4625 | Skill in drafting serialized reports to support time-sensitive USCYBERCOM operations. |
Skill |
4626 | Skill in drafting serialized reports to the quality level meeting release standards. |
Skill |
4629 | Skill in executing post publication processes IAW organization standards/Policy |
Skill |
4651 | Skill in providing feedback to enhance future collection and analysis. |
Skill |
4656 | Skill in recognizing exploitation opportunities. |
Skill |
4657 | Skill in recognizing targeting opportunities and essential information. |
Skill |
4662 | Skill in releasing serialized and time-sensitive reports. |
Skill |
8010 | Apply analytic techniques to validate information or data in reporting. |
Task |
8011 | Apply and/or develop analytic techniques to provide better intelligence. |
Task |
8013 | Apply customer requirements to the analysis process. |
Task |
8022 | Assist in the mitigation of collection gaps. |
Task |
8023 | Assist planners in the development of courses of action |
Task |
8038 | Conduct pre and post publication actions |
Task |
8063 | Develop analytical techniques to gain more target information. |
Task |
8065 | Develop and maintain target profiles using appropriate corporate tools and databases (e.g. Target associations, activities, communication infrastructures, etc.). |
Task |
8081 | Document and disseminate analytic findings. |
Task |
8090 | Enable targeting offices to find new sources of collection. |
Task |
8100 | Evaluate the strengths and weaknesses of the intelligence source. |
Task |
8101 | Evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
8108 | Identify and facilitate partner relationships to enhance mission capabilities |
Task |
8128 | Lead work role working groups/planning and development forums |
Task |
8137 | Manipulate information in mission relevant databases (e.g., converting data, generating reports). |
Task |
8138 | Mitigate collection gaps |
Task |
8145 | Perform network analysis to support new or continued collection. |
Task |
8149 | Perform quality review and provide feedback on the materials delivered on which analysis and reporting is conducted. |
Task |
8155 | Prioritize reporting based on SIGINT reporting instructions or other mission reporting priorities. |
Task |
8157 | Produce digital network intelligence against specific named target sets. |
Task |
8173 | Provide intel target recommendations which meet leadership objectives. |
Task |
8176 | Provide SME support for the development and implementation of exercises. |
Task |
8191 | Select, build, and develop query strategies against appropriate collection databases. |
Task |
8203 | Understand hacker TTPs and methodologies. |
Task |
8204 | Understand network components and their functionality to enable analysis and target development. |
Task |
8205 | Understand technologies used by a given target |
Task |
8213 | Verify and validate that network graphics are accurate and comply with reporting policy. |
Task |