3253

3253 (NIST ID: K0427)

Knowledge

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Items denoted by a * are CORE KSATs for every Work Role, while other CORE KSATs vary by Work Role.


Core KSAT for the following Work Roles

No Work Roles with Core KSAT 3253

Additional KSAT for the following Work Roles

All-Source Analyst (Additional) ID: 111 (NIST ID: AN-ASA-001) Workforce Element: Intelligence (Cyberspace)

Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.

All-Source Collection Manager (Additional) ID: 311 (NIST ID: CO-CL-001) Workforce Element: Intelligence (Cyberspace)

Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to meet leadership’s intent. Determines capabilities of available collection assets, identifies new collection capabilities; and constructs and disseminates collection plans. Monitors execution of tasked collection to ensure effective execution of the collection plan.

All-Source Collection Requirements Manager (Additional) ID: 312 (NIST ID: CO-CL-002) Workforce Element: Intelligence (Cyberspace)

Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of collection requirements. Evaluates performance of collection assets and collection operations.

Cyber Intelligence Planner (Additional) ID: 331 (NIST ID: CO-PL-001) Workforce Element: Intelligence (Cyberspace)

Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.

Cyberspace Operator (Additional) ID: 322 (NIST ID: N/A) Workforce Element: Cyberspace Effects

Cyberspace Operators use a wide range of software applications for network navigation, tactical forensic analysis, surveillance and reconnaissance, and executing on-net operations in support of offensive cyberspace operations when directed.

Exploitation Analyst (Additional) ID: 121 (NIST ID: AN-XA-001) Workforce Element: Cyberspace Effects

Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

Host Analyst (Additional) ID: 463 (NIST ID: N/A) Workforce Element: Cyberspace Effects

A Host Analyst (HA) will have knowledge of various system configurations encountered. This work role also performs analysis using built-in tools and capabilities. A Host Analyst will have knowledge of system services and the security and configuration of them, as well as knowledge of file systems, permissions, and operation system configurations. The Host Analyst conducts analysis using built-in tools and capabilities.