3253

3253 (NIST ID: K0427)

Knowledge

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Items denoted by a * are CORE KSATs for every Work Role, while other CORE KSATs vary by Work Role.


Core KSAT for the following Work Roles

No Work Roles with Core KSAT 3253

Additional KSAT for the following Work Roles

All-Source Analyst (Additional) ID: 111 (NIST ID: AN-ASA-001) Workforce Element: Intelligence (Cyberspace)

Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.

All-Source Collection Manager (Additional) ID: 311 (NIST ID: CO-CL-001) Workforce Element: Intelligence (Cyberspace)

Identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to meet leadership’s intent. Determines capabilities of available collection assets, identifies new collection capabilities; and constructs and disseminates collection plans. Monitors execution of tasked collection to ensure effective execution of the collection plan.

All-Source Collection Requirements Manager (Additional) ID: 312 (NIST ID: CO-CL-002) Workforce Element: Intelligence (Cyberspace)

Evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of collection requirements. Evaluates performance of collection assets and collection operations.

Cyber Intelligence Planner (Additional) ID: 331 (NIST ID: CO-PL-001) Workforce Element: Intelligence (Cyberspace)

Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.