Digital Network Exploitation Analyst

Digital Network Exploitation Analyst Work Role ID: 122 (NIST: N/A) Workforce Element: Cyberspace Effects

The DNEA analyzes intercepted intelligence information for metadata and content. They use this data to reconstruct and document target networks to judge the intelligence value and maintain target continuity. DNEAs understand and analyze target implementation of communication technologies and digital network systems. They discover methods and suggest strategies to exploit specific target networks, computer systems, or specific hardware and/or software.


Items denoted by a * are CORE KSATs for every Work Role, while other CORE KSATs vary by Work Role.

Core KSATs

KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs

KSAT ID Description KSAT
244

Ability to determine the validity of technology trend data.

Ability
282

Knowledge of emerging computer-based technology that has potential for exploitation by adversaries.

Knowledge
321A

Knowledge of industry technologies and how differences affect exploitation/vulnerabilities.

Knowledge
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
915

Knowledge of front-end collection systems, including traffic collection, filtering, and selection.

Knowledge
959

Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.

Task
1056

Knowledge of operations security.

Knowledge
1107

Identify and analyze anomalies in network traffic using metadata (e.g., CENTAUR).

Task
1112

Reconstruct a malicious attack or activity based off network traffic.

Task
2001

Accurately characterize targets.

Task
2059

Provide expertise to course of action development.

Task
2066

Provide expertise to the development of measures of effectiveness and measures of performance.

Task
2072

Perform analysis for target infrastructure exploitation activities.

Task
2081

Classify documents in accordance with classification guidelines.

Task
2087

Collaborate with intelligence analysts/targeting organizations involved in related areas.

Task
2099

Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets.

Task
2101

Identify and conduct analysis of target communications to identify information essential to support operations.

Task
2102

Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access.

Task
2127

Conduct quality control in order to determine validity and relevance of information gathered about networks.

Task
2134

Conduct target research and analysis.

Task
2194

Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.

Task
2195

Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology.

Task
2235

Determine how identified factors affect the tasking, collection, processing, exploitation and dissemination architecture’s form and function.

Task
2236

Determine if information meets reporting requirements.

Task
2243

Determine what technologies are used by a given target.

Task
2251

Apply analytic techniques to gain more target information.

Task
2289

Develop measures of effectiveness and measures of performance.

Task
2356

Engage customers to understand customers’ intelligence needs and wants.

Task
2373

Establish alternative processing, exploitation and dissemination pathways to address identified issues or problems.

Task
2393

Generate and evaluate the effectiveness of network analysis strategies.

Task
2400

Examine intercept-related metadata and content with an understanding of targeting significance.

Task
2427

Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.)

Task
2429

Generate requests for information.

Task
2434

Identify threat tactics, and methodologies.

Task
2441

Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.

Task
2453

Identify collection gaps and potential collection strategies against targets.

Task
2458

Identify critical target elements.

Task
2459

Identify intelligence gaps and shortfalls.

Task
2469

Identify network components and their functionality to enable analysis and target development.

Task
2515

Initiate requests to guide tasking and assist with collection management.

Task
2542

Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications.

Task
2568

Make recommendations to guide collection in support of customer requirements.

Task
2608

Monitor target networks to provide indications and warning of target communications changes or processing failures.

Task
2621

Provide SME and support to planning/developmental forums and working groups as appropriate.

Task
2628A

Provide subject matter expertise to development of exercises.

Task
2628

Participate in exercises.

Task
2639

Perform content and/or metadata analysis to meet organization objectives.

Task
2714

Produce network reconstructions.

Task
2719

Profile targets and their activities.

Task
2770

Provide time sensitive targeting support.

Task
2779

Review appropriate information sources to determine validity and relevance of information gathered.

Task
2781

Reconstruct networks in diagram or report format.

Task
2798

Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources.

Task
2818

Sanitize and minimize information to protect sources and methods.

Task
2840

Support identification and documentation of collateral effects.

Task
2894

Collaborate across internal and/or external organizational lines to enhance collection, analysis and dissemination.

Task
2897

Conduct analysis of target communications to identify essential information in support of organization objectives.

Task
2902

Evaluate and interpret metadata to look for patterns, anomalies, or events, thereby optimizing targeting, analysis and processing.

Task
2905

Identify target communications within the global network.

Task
2906

Maintain awareness of target communication tools, techniques, and the characteristics of target communication networks (e.g., capacity, functionality, paths, critical nodes) and their potential implications for targeting, collection, and analysis.

Task
2909

Provide feedback to collection managers to enhance future collection and analysis.

Task
2912

Perform or support technical network analysis and mapping.

Task
2919

Perform social network analysis and document as appropriate.

Task
2922

Tip critical or time-sensitive information to appropriate customers.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3002

Ability to focus research efforts to meet the customer’s decision-making needs.

Ability
3020

Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information.

Ability
3021

Ability to collaborate effectively with others.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3039

Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Ability
3043

Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3047

Ability to function effectively in a dynamic, fast-paced environment.

Ability
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3052

Ability to identify intelligence gaps.

Ability
3073

Ability to recognize and mitigate cognitive biases which may affect analysis.

Ability
3074

Ability to recognize and mitigate deception in reporting and analysis.

Ability
3077

Ability to think critically.

Ability
3078

Knowledge of target methods and procedures.

Knowledge
3081

Ability to utilize multiple intelligence sources across all intelligence disciplines.

Ability
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3113

Knowledge of target intelligence gathering and operational preparation techniques and life cycles.

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3146

Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3158

Knowledge of cyber operation objectives, policies, and legalities.

Knowledge
3166

Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.

Knowledge
3172

Knowledge of collection sources including conventional and non-conventional sources.

Knowledge
3174

Knowledge of the intelligence requirements development and request for information processes.

Knowledge
3179

Knowledge of common networking devices and their configurations.

Knowledge
3181

Knowledge of common reporting databases and tools.

Knowledge
3219

Knowledge of cyber operations.

Knowledge
3237

Knowledge of denial and deception techniques.

Knowledge
3242

Knowledge of document classification procedures, policy, resources, and personnel.

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3277

Knowledge of general SCADA system components.

Knowledge
3288

Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless).

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3296

Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).

Knowledge
3298

Knowledge of how to extract, analyze, and use metadata.

Knowledge
3324

Knowledge of information and collateral intelligence sources.

Knowledge
3338

Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions.

Knowledge
3346

Knowledge of Internet and routing protocols.

Knowledge
3348

Knowledge of intrusion detection systems and signature development.

Knowledge
3372

Knowledge of malware analysis and characteristics.

Knowledge
3382

Knowledge of methods to integrate and summarize information from any potential sources.

Knowledge
3386

Knowledge of midpoint collection (process, objectives, organization, targets, etc.).

Knowledge
3407

Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3418

Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors).

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3450

Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure.

Knowledge
3505

Knowledge of strategies and tools for target research.

Knowledge
3534

Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference.

Knowledge
3542

Knowledge of the basic structure, architecture, and design of converged applications.

Knowledge
3564

Knowledge of the data flow from collection origin to repositories and tools.

Knowledge
3582

Knowledge of the intelligence frameworks, processes, and related systems.

Knowledge
3595

Knowledge of the organization, roles and responsibilities of higher, lower and adjacent sub-elements.

Knowledge
3603

Knowledge of the principal methods, procedures, and techniques of gathering information and producing intelligence.

Knowledge
3608

Knowledge of the purpose and contribution of target templates.

Knowledge
3616

Knowledge of the structure, architecture, and design of modern digital and telephony networks.

Knowledge
3617

Knowledge of the structure, architecture, and design of modern wireless communications systems.

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3637

Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).

Knowledge
3664

Skill in identifying how a target communicates.

Skill
3667

Skill in analyzing a target’s communication networks.

Skill
3671

Skill in analyzing essential network data (e.g., router configuration files, routing protocols).

Skill
3678

Skill in analyzing traffic to identify network devices.

Skill
3689

Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses).

Skill
3692

Skill in assessing the applicability of available analytical tools to various situations.

Skill
3708

Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis.

Skill
3726

Skill in depicting source or collateral data on a network map.

Skill
3742

Skill in determining the physical location of network devices.

Skill
3765

Skill in disseminating items of highest intelligence value in a timely manner.

Skill
3771

Skill in evaluating data sources for relevance, reliability, and objectivity.

Skill
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3773

Skill in evaluating information to recognize relevance, priority, etc.

Skill
3774

Skill in evaluating accesses for intelligence value.

Skill
3778

Skill in exploiting/querying organizational and/or partner collection databases.

Skill
3787

Skill in identifying a target’s communications networks.

Skill
3797

Skill in identifying leads for target development.

Skill
3803

Skill in identifying, locating, and tracking targets via geospatial analysis techniques

Skill
3810

Skill in interpreting compiled and interpretive programming languages.

Skill
3812

Skill in interpreting metadata and content as applied by collection systems.

Skill
3814

Skill in using trace route tools and interpreting the results as they apply to network analysis and reconstruction.

Skill
3822

Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results.

Skill
3828

Skill in navigating network visualization software.

Skill
3860

Skill in recognizing and interpreting malicious network activity in traffic.

Skill
3864

Skill in recognizing relevance of information.

Skill
3865

Skill in recognizing significant changes in a target’s communication patterns.

Skill
3866

Skill in recognizing technical information that may be used for leads for metadata analysis.

Skill
3867A

Skill in recognizing technical information that may be used for target development including intelligence development.

Skill
3873

Skill in researching essential information.

Skill
3874

Skill in researching vulnerabilities and exploits utilized in traffic.

Skill
3885

Skill in fusion analysis

Skill
3889

Skill in survey, collection, and analysis of wireless LAN metadata.

Skill
3890

Skill in synthesizing, analyzing, and prioritizing meaning across data sets.

Skill
3895

Skill in target network anomaly identification (e.g., intrusions, dataflow or processing, target implementation of new technologies).

Skill
3908

Skill in using research methods including multiple, different sources to reconstruct a target network.

Skill
3915

Skill in using geospatial data and applying geospatial resources.

Skill
3923

Skill in using non-attributable networks.

Skill
3951

Skill in writing about facts and ideas in a clear, convincing, and organized manner.

Skill
4072

Knowledge of collection systems, capabilities, and processes.

Knowledge
4073

Knowledge of the feedback cycle in collection processes.

Knowledge
4078

Knowledge of target or threat cyber actors and procedures.

Knowledge
4079

Knowledge of basic cyber operations activity concepts (e.g., foot printing, scanning and enumeration, penetration testing, white/black listing).

Knowledge
4085

Knowledge of approved intelligence dissemination processes.

Knowledge
4086

Knowledge of relevant laws, regulations, and policies.

Knowledge
4088

Knowledge of target communication profiles and their key elements (e.g., target associations, activities, communication infrastructure).

Knowledge
4089

Knowledge of target communication tools and techniques.

Knowledge
4090

Knowledge of the characteristics of targeted communication networks (e.g., capacity, functionality, paths, critical nodes).

Knowledge
4094

Knowledge of networking and internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.).

Knowledge
4095

Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML).

Knowledge
4097

Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network.

Knowledge
4099

Knowledge of customer information needs.

Knowledge
4106

Knowledge of analytic tools and techniques.

Knowledge
4118

Skill in identifying a target’s network characteristics.

Skill
4121

Skill in assessing a target’s frame of reference (e.g., motivation, technical capability, organizational structure, sensitivities).

Skill
4123

Skill in conducting research using all available sources.

Skill
4125

Skill in complying with the legal restrictions for targeted information.

Skill
4128

Skill in developing intelligence reports.

Skill
4129

Skill in evaluating and interpreting metadata.

Skill
4134

Skill in identifying intelligence gaps and limitations.

Skill
4141

Skill in providing analysis on target-related matters (e.g., language, cultural, communications).

Skill
4160

Skill in interpreting traceroute results, as they apply to network analysis and reconstruction.

Skill
4165

Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption).

Knowledge
4166

Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types.

Knowledge
4396

Knowledge of basic cloud-based technologies and concepts.

Knowledge
4399

Knowledge of basic Embedded Systems concepts.

Knowledge
4401

Knowledge of basic reconnaissance activity concepts and techniques (foot printing, scanning and enumeration).

Knowledge
4420

Knowledge of Critical Intelligence Communication (CRITIC) identification and reporting process.

Knowledge
4423

Knowledge of cryptologic and SIGINT reporting and dissemination procedures.

Knowledge
4428

Knowledge of cybersecurity concepts and principles.

Knowledge
4431

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
4460

Knowledge of how and when to request assistance from the Cryptanalysis and Signals Analysis and/or CNO.

Knowledge
4470

Knowledge of intelligence sources and their characteristics.

Knowledge
4490

Knowledge of methods, tools, sources, and techniques used to research, integrate and summarize all-source information pertaining to target.

Knowledge
4523

Knowledge of quality review process and procedures.

Knowledge
4533

Knowledge of SIGINT laws and directives.

Knowledge
4539

Knowledge of structured response frameworks (e.g. MITRE ATT&CK, Lockheed Martin Kill Chain, Diamond Model).

Knowledge
4570

Knowledge of the overall mission of the Cyber Mission Forces (CMF).

Knowledge
4578

Knowledge of the specific missions for CMF (i.e., Cyber Mission Teams (CMT), National Mission Teams (NMT), Combat Support Team (CST), National Support Team (NST), Cyber Protection Team (CPT).

Knowledge
4582

Knowledge of the U.S. SIGNIT System (USSS) authorities, responsibilities, and contributions to the cyberspace operations mission.

Knowledge
4601

Skill in analyzing endpoint collection data.

Skill
4620

Skill in developing and maintaining target profiles.

Skill
4631

Skill in geolocating targets.

Skill
4643

Skill in operational use of raw collection databases.

Skill
4645

Skill in performing data fusion from all-source intelligence for geospatial analysis.

Skill
4646

Skill in performing data fusion from all-source intelligence for network analysis and reconstruction (e.g., Single Table Inheritance (STIs), network maps).

Skill
4647

Skill in performing data fusion from all-source intelligence.

Skill
4651

Skill in providing feedback to enhance future collection and analysis.

Skill
4656

Skill in recognizing exploitation opportunities.

Skill
4659

Skill in recognizing the value of survey data.

Skill
4667

Skill in selector normalization.

Skill
4669

Skill in targeting (e.g., selectors).

Skill
8011

Apply and/or develop analytic techniques to provide better intelligence.

Task
8013

Apply customer requirements to the analysis process.

Task
8023

Assist planners in the development of courses of action

Task
8063

Develop analytical techniques to gain more target information.

Task
8064

Develop and lead exercises

Task
8065

Develop and maintain target profiles using appropriate corporate tools and databases (e.g. Target associations, activities, communication infrastructures, etc.).

Task
8081

Document and disseminate analytic findings.

Task
8090

Enable targeting offices to find new sources of collection.

Task
8100

Evaluate the strengths and weaknesses of the intelligence source.

Task
8101

Evaluate threat critical capabilities, requirements, and vulnerabilities.

Task
8102

Facilitate collaboration with customers, Intelligence and targeting organizations involved in related cyber areas.

Task
8108

Identify and facilitate partner relationships to enhance mission capabilities

Task
8128

Lead work role working groups/planning and development forums

Task
8137

Manipulate information in mission relevant databases (e.g., converting data, generating reports).

Task
8138

Mitigate collection gaps

Task
8145

Perform network analysis to support new or continued collection.

Task
8157

Produce digital network intelligence against specific named target sets.

Task
8164

Provide expertise in support of operational effects generated through cyber activities.

Task
8173

Provide intel target recommendations which meet leadership objectives.

Task
8191

Select, build, and develop query strategies against appropriate collection databases.

Task
8205

Understand technologies used by a given target

Task
8206

Understand TTPs and methodologies to enable access ops or access vector opportunities.

Task