Cyberspace Effects

Cyberspace Effects

Personnel who plan, support, and execute cyberspace capabilities where the primary purpose is to externally defend or conduct force projection in or through cyberspace.



Below are the associated Work Roles. Click the arrow to expand/collapse the Work Role information and view the associated Core and Additional KSATs (Knowledge, Skills, Abilties, and Tasks). Items denoted by a * are CORE KSATs for every Work Role, while other CORE KSATs vary by Work Role. Click on the other blue links to further explore the information.
Cyber Operations Planner Work Role ID: 332 (NIST: CO-PL-002) Workforce Element: Cyberspace Effects

Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions.

Core KSATs

KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
52

Knowledge of human-computer interaction principles.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
1056

Knowledge of operations security.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2009

Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives.

Task
2032

Apply expertise in policy and processes to facilitate the development, negotiation, and internal staffing of plans and/or memorandums of agreement.

Task
2052

Assess target vulnerabilities and/or operational capabilities to determine course of action.

Task
2073

Provide input to the identification of cyber-related success criteria.

Task
2130

Develop, review and implement all levels of planning guidance in support of cyber operations.

Task
2159

Contribute to crisis action planning for cyber operations.

Task
2180

Coordinate with intelligence and cyber defense partners to obtain relevant essential information.

Task
2192

Use intelligence estimates to counter potential target actions.

Task
2265

Develop and maintain deliberate and/or crisis plans.

Task
2266

Develop and review specific cyber operations guidance for integration into broader planning activities.

Task
2272

Develop cyber operations plans and guidance to ensure that execution and resource allocation decisions align with organization objectives.

Task
2308

Develop or participate in the development of standards for providing, requesting, and/or obtaining support from external partners to synchronize cyber operations.

Task
2310

Develop potential courses of action.

Task
2327

Develop, implement, and recommend changes to appropriate planning procedures and policies.

Task
2331

Devise, document, and validate cyber operation strategy, and planning documents.

Task
2365

Ensure operational planning efforts are effectively transitioned to current operations.

Task
2416

Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives.

Task
2422

Gather and analyze data (e.g., measures of effectiveness) to determine effectiveness, and provide reporting for follow-on activities.

Task
2424

Incorporate cyber operations and communications security support plans into organization objectives.

Task
2524

Integrate cyber planning/targeting efforts with other organizations.

Task
2528

Interpret environment preparations assessments to determine a course of action.

Task
2529

Issue requests for information.

Task
2530

Knowledge and understanding of operational design.

Knowledge
2531

Knowledge of organizational planning concepts.

Knowledge
2564

Maintain situational awareness to determine if changes to the operating environment require review of the plan.

Task
2590

Monitor and evaluate integrated cyber operations to identify opportunities to meet organization objectives.

Task
2626

Provide subject matter expertise to planning efforts with internal and external cyber operations partners.

Task
2702

Prepare for and provide subject matter expertise to exercises.

Task
2746

Provide input for the development and refinement of the cyber operations objectives, priorities, strategies, plans, and programs.

Task
2752

Provide input to the administrative and logistical elements of an operational support plan.

Task
2761

Provide planning support between internal and external partners.

Task
2778

Recommend refinement, adaption, termination, and execution of operational plans as appropriate.

Task
2816

Review, approve, prioritize, and submit operational requirements for research, development, and/or acquisition of cyber capabilities.

Task
2837

Submit or respond to requests for deconfliction of cyber operations.

Task
2888

Document lessons learned that convey the results of events and/or exercises.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3003

Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment.

Ability
3011

Ability to apply critical reading/thinking skills.

Ability
3015

Ability to apply approved planning development and staffing processes.

Ability
3021

Ability to collaborate effectively with others.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3033

Ability to coordinate cyber operations with other organization functions or support activities.

Ability
3040

Ability to develop or recommend planning solutions to problems and situations for which no precedent exists.

Ability
3041

Ability to effectively collaborate via virtual teams.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3057

Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.

Ability
3060

Ability to interpret and understand complex and rapidly evolving concepts.

Ability
3066

Ability to participate as a member of planning teams, coordination groups, and task forces as necessary.

Ability
3076

Ability to tailor technical and planning information to a customer’s level of understanding.

Ability
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3098

Knowledge of virtualization products (Vmware, Virtual PC).

Knowledge
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3107

Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.).

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3155

Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3159

Knowledge of cyber operations support or enabling processes.

Knowledge
3173

Knowledge of operational effectiveness assessment.

Knowledge
3177

Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3194

Knowledge of crisis action planning and time sensitive planning procedures.

Knowledge
3211

Knowledge of cyber laws and legal considerations and their effect on cyber planning.

Knowledge
3215

Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber attack) principles, capabilities, limitations, and effects.

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3235

Knowledge of deconfliction processes and procedures.

Knowledge
3257

Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities.

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3264

Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization.

Knowledge
3268

Knowledge of staff management, assignment, and allocation processes.

Knowledge
3274

Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects.

Knowledge
3275

Knowledge of fundamental cyber concepts, principles, limitations, and effects.

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3326

Knowledge of information security concepts, facilitating technologies and methods.

Knowledge
3358

Knowledge of organizational hierarchy and cyber decision making processes.

Knowledge
3374

Knowledge of malware.

Knowledge
3388

Knowledge of crisis action planning for cyber operations.

Knowledge
3391

Knowledge of objectives, situation, operational environment, and the status and disposition of internal and external partner collection capabilities available to support planning.

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3444

Knowledge of planning activity initiation.

Knowledge
3445

Knowledge of planning timelines adaptive, crisis action, and time-sensitive planning.

Knowledge
3459

Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization.

Knowledge
3539

Knowledge of telecommunications fundamentals.

Knowledge
3543

Knowledge of the basic structure, architecture, and design of modern communication networks.

Knowledge
3545

Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3554

Knowledge of the critical information requirements and how they’re used in planning.

Knowledge
3561

Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

Knowledge
3570

Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements.

Knowledge
3585

Knowledge of accepted organization planning systems.

Knowledge
3591

Knowledge of organization objectives, leadership priorities, and decision-making risks.

Knowledge
3601

Knowledge of the outputs of course of action and exercise analysis.

Knowledge
3605

Knowledge of the information environment.

Knowledge
3606

Knowledge of the process used to assess the performance and impact of operations.

Knowledge
3609

Knowledge of the range of cyber operations and their underlying intelligence support needs, topics, and focus areas.

Knowledge
3610

Knowledge of the relationships between end states, objectives, effects, lines of operation, etc.

Knowledge
3613

Knowledge of the role of network operations in supporting and facilitating other organization operations.

Knowledge
3616

Knowledge of the structure, architecture, and design of modern digital and telephony networks.

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3630

Knowledge of the ways in which targets or threats use the Internet.

Knowledge
3639

Knowledge of organization cyber operations programs, strategies, and resources.

Knowledge
3651

Knowledge of what constitutes a “threat” to a network.

Knowledge
3659

Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.

Knowledge
3665

Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures.

Skill
3681

Skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action.

Skill
3685

Skill in applying crisis planning procedures.

Skill
3747

Skill in developing and executing comprehensive cyber operations assessment programs for assessing and validating operational performance characteristics.

Skill
3766

Skill in documenting and communicating complex technical and programmatic information.

Skill
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3844

Skill in preparing and presenting briefings.

Skill
3845

Skill in preparing plans and related correspondence.

Skill
3879

Skill in reviewing and editing plans.

Skill
3938

Skill in utilizing feedback in order to improve processes, products, and services.

Skill
3946

Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).

Skill
3967

Skill to anticipate key target or threat activities which are likely to prompt a leadership decision.

Skill
4023

Skill to graphically depict decision support materials containing intelligence and partner capability estimates.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs

KSAT ID Description KSAT
2058

Assist and advise inter-agency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives.

Task
2160

Contribute to the development of the organization’s decision support tools if necessary.

Task
2237

Determine indicators (e.g., measures of effectiveness) that are best suited to specific cyber operation objectives.

Task
2368

Ensure that intelligence planning activities are integrated and synchronized with operational planning timelines.

Task
2386

Evaluate intelligence estimates to support the planning cycle.

Task
2459A

Identify cyber intelligence gaps and shortfalls.

Task
2558

Maintain relationships with internal and external partners involved in cyber planning or related areas.

Task
2561

Maintain situational awareness of cyber-related intelligence requirements and associated tasking.

Task
2562

Maintain situational awareness of partner capabilities and activities.

Task
2624

Conduct long-range, strategic planning efforts with internal and external partners in cyber activities.

Task
3054

Ability to identify external partners with common cyber operations interests.

Ability
3114

Knowledge of all forms of intelligence support needs, topics, and focus areas.

Knowledge
3271

Knowledge of internal and external partner cyber operations capabilities and tools.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3342

Knowledge of intelligence support to planning, execution, and assessment.

Knowledge
3356

Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations.

Knowledge
3419

Knowledge of organization or partner exploitation of digital networks.

Knowledge
3463

Knowledge of required intelligence planning products associated with cyber operational planning.

Knowledge
3489

Knowledge of organizational structures and associated intelligence capabilities.

Knowledge
3571

Knowledge of the organizational planning and staffing process.

Knowledge
3572

Knowledge of organization decision support tools and/or methods.

Knowledge
3607

Knowledge of the processes to synchronize operational assessment procedures with the critical information requirement process.

Knowledge
3615

Knowledge of the structure and intent of organization specific plans, guidance and authorizations.

Knowledge
3638

Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations.

Knowledge
3976

Skill to apply the process used to assess the performance and impact of cyber operations.

Skill
3998

Skill to craft indicators of operational progress/success.

Skill
4008

Skill to distinguish between notional and actual resources and their applicability to the plan under development.

Skill
4058

Skill to synchronize operational assessment procedures with the critical information requirement process.

Skill
Exploitation Analyst Work Role ID: 121 (NIST: AN-XA-001) Workforce Element: Cyberspace Effects

Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

Core KSATs

KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2194

Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.

Task
2400

Examine intercept-related metadata and content with an understanding of targeting significance.

Task
2718

Profile network or system administrators and their activities.

Task
3021

Ability to collaborate effectively with others.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3103A

Ability to identify/describe target vulnerability.

Ability
3103

Ability to identify/describe techniques/methods for conducting technical exploitation of the target.

Ability
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3107

Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.).

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3179

Knowledge of common networking devices and their configurations.

Knowledge
3191

Knowledge of concepts for operating systems (e.g., Linux, Unix).

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3289

Knowledge of how hubs, switches, routers work together in the design of a network.

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3346

Knowledge of Internet and routing protocols.

Knowledge
3407

Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3410

Knowledge of network topology.

Knowledge
3513

Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems.

Knowledge
3543

Knowledge of the basic structure, architecture, and design of modern communication networks.

Knowledge
3801

Skill in identifying the devices that work at each level of protocol models.

Skill
3867

Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information).

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs

KSAT ID Description KSAT
345

Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies.

Knowledge
363

Skill in identifying gaps in technical capabilities.

Skill
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
915

Knowledge of front-end collection systems, including traffic collection, filtering, and selection.

Knowledge
2029A

Apply and utilize authorized cyber capabilities to enable access to targeted networks.

Task
2033

Apply cyber collection, environment preparation and engagement expertise to enable new exploitation and/or continued collection operations, or in support of customer requirements.

Task
2040

Apply and obey applicable statutes, laws, regulations and policies.

Task
2072

Perform analysis for target infrastructure exploitation activities.

Task
2090

Collaborate with other internal and external partner organizations on target access and operational issues.

Task
2095

Communicate new developments, breakthroughs, challenges and lessons learned to leadership, and internal and external customers.

Task
2102

Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access.

Task
2114

Conduct independent in-depth target and technical analysis including target-specific information (e.g., cultural, organizational, political) that results in access.

Task
2419

Collaborate with developers, conveying target and technical knowledge in tool requirements submissions, to enhance tool development.

Task
2461

Identify gaps in our understanding of target technology and developing innovative collection approaches.

Task
2490

Identify, locate, and track targets via geospatial analysis techniques.

Task
2534

Lead or enable exploitation operations in support of organization objectives and target requirements.

Task
2542

Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications.

Task
2608

Monitor target networks to provide indications and warning of target communications changes or processing failures.

Task
2714

Produce network reconstructions.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3039

Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Ability
3043

Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.

Ability
3055B

Knowledge of basic implants.

Knowledge
3055A

Ability to select the appropriate implant to achieve operational goals.

Ability
3101

Ability to expand network access by conducting target analysis and collection in order to identify targets of interest.

Ability
3113

Knowledge of target intelligence gathering and operational preparation techniques and life cycles.

Knowledge
3139

Knowledge of basic principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis).

Knowledge
3146

Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3155

Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3166

Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.

Knowledge
3181

Knowledge of common reporting databases and tools.

Knowledge
3201

Knowledge of all relevant reporting and dissemination procedures.

Knowledge
3226

Knowledge of data flow process for terminal or environment collection.

Knowledge
3256

Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.).

Knowledge
3261

Knowledge of evasion strategies and techniques.

Knowledge
3296

Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).

Knowledge
3349

Knowledge of intrusion sets.

Knowledge
3367

Knowledge of all applicable statutes, laws, regulations and policies governing cyber targeting and exploitation.

Knowledge
3386

Knowledge of midpoint collection (process, objectives, organization, targets, etc.).

Knowledge
3432

Knowledge of identification and reporting processes.

Knowledge
3454

Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, Panda, Kaspersky) and how differences affect exploitation/vulnerabilities.

Knowledge
3474

Knowledge of scripting

Knowledge
3505

Knowledge of strategies and tools for target research.

Knowledge
3525

Knowledge of organizational and partner policies, tools, capabilities, and procedures.

Knowledge
3542

Knowledge of the basic structure, architecture, and design of converged applications.

Knowledge
3622

Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives.

Knowledge
3637

Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).

Knowledge
3678

Skill in analyzing traffic to identify network devices.

Skill
3715

Skill in creating and extracting important information from packet captures.

Skill
3718A

Skill in creating collection requirements in support of data acquisition activities.

Skill
3718

Skill in creating plans in support of remote operations.

Skill
3726

Skill in depicting source or collateral data on a network map.

Skill
3741

Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments.

Skill
3774

Skill in evaluating accesses for intelligence value.

Skill
3803

Skill in identifying, locating, and tracking targets via geospatial analysis techniques

Skill
3810

Skill in interpreting compiled and interpretive programming languages.

Skill
3812

Skill in interpreting metadata and content as applied by collection systems.

Skill
3814

Skill in using trace route tools and interpreting the results as they apply to network analysis and reconstruction.

Skill
3818

Skill in generating operation plans in support of mission and target requirements.

Skill
3828

Skill in navigating network visualization software.

Skill
3837

Skill in performing data fusion from existing intelligence for enabling new and continued collection.

Skill
3860

Skill in recognizing and interpreting malicious network activity in traffic.

Skill
3863

Skill in recognizing midpoint opportunities and essential information.

Skill
3874

Skill in researching vulnerabilities and exploits utilized in traffic.

Skill
3894

Skill in target development in direct support of collection operations.

Skill
3913

Skill in using databases to identify target-relevant information.

Skill
3923

Skill in using non-attributable networks.

Skill
3950

Skill in writing (and submitting) requirements to meet gaps in technical capabilities.

Skill
Mission Assessment Specialist Work Role ID: 112 (NIST: AN-AN-002) Workforce Element: Cyberspace Effects

Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness.

Core KSATs

KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
52

Knowledge of human-computer interaction principles.

Knowledge
87

Knowledge of network traffic analysis methods.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2063

Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.

Task
2108

Conduct end-of-operations assessments.

Task
2115

Conduct in-depth research and analysis.

Task
2121

Conduct nodal analysis.

Task
2134

Conduct target research and analysis.

Task
2289

Develop measures of effectiveness and measures of performance.

Task
2378

Estimate operational effects generated through cyber activities.

Task
2379A

Identify threat vulnerabilities.

Task
2429

Generate requests for information.

Task
2593

Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.

Task
2594

Monitor and report on validated threat activities.

Task
2603

Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements.

Task
2730

Provide analyses and support for effectiveness assessment.

Task
2745

Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.

Task
2747

Provide input and assist in post-action effectiveness assessments.

Task
2748

Provide input and assist in the development of plans and guidance.

Task
3002

Ability to focus research efforts to meet the customer’s decision-making needs.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3039

Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3047

Ability to function effectively in a dynamic, fast-paced environment.

Ability
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3073

Ability to recognize and mitigate cognitive biases which may affect analysis.

Ability
3077

Ability to think critically.

Ability
3078A

Ability to think like threat actors.

Ability
3079

Ability to understand objectives and effects.

Ability
3098

Knowledge of virtualization products (Vmware, Virtual PC).

Knowledge
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3107

Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.).

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3177

Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3253

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3298

Knowledge of how to extract, analyze, and use metadata.

Knowledge
3374

Knowledge of malware.

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3539

Knowledge of telecommunications fundamentals.

Knowledge
3543

Knowledge of the basic structure, architecture, and design of modern communication networks.

Knowledge
3545

Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3561

Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

Knowledge
3651

Knowledge of what constitutes a “threat” to a network.

Knowledge
3691

Skill in assessing and/or estimating effects generated during and after cyber operations.

Skill
3756

Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Skill
3770

Skill in evaluating available capabilities against desired effects in order to provide effective courses of action.

Skill
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3788

Skill in identifying alternative analytical interpretations in order to minimize unanticipated outcomes.

Skill
3794

Skill in identifying cyber threats which may jeopardize organization and/or partner interests.

Skill
3844

Skill in preparing and presenting briefings.

Skill
3851

Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.

Skill
3878

Skill in reviewing and editing assessment products.

Skill
3893

Skill in tailoring analysis to the necessary levels (e.g., classification and organizational).

Skill
3921

Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.

Skill
3946

Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs

KSAT ID Description KSAT
2059

Provide expertise to course of action development.

Task
2060

Provide subject matter expertise to the development of a common operational picture.

Task
2061

Provide subject matter expertise to the development of cyber operations specific indicators.

Task
2066

Provide expertise to the development of measures of effectiveness and measures of performance.

Task
2068

Assist in the identification of intelligence collection shortfalls.

Task
2075

Brief threat and/or target current situations.

Task
2087

Collaborate with intelligence analysts/targeting organizations involved in related areas.

Task
2288

Develop information requirements necessary for answering priority information requests.

Task
2292

Develop munitions effectiveness assessment or operational assessment materials.

Task
2356

Engage customers to understand customers’ intelligence needs and wants.

Task
2379

Evaluate threat decision-making processes.

Task
2459

Identify intelligence gaps and shortfalls.

Task
2617

Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).

Task
2621

Provide SME and support to planning/developmental forums and working groups as appropriate.

Task
2735

Provide current intelligence support to critical internal/external stakeholders as appropriate.

Task
2738

Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.

Task
2757

Provide effectiveness support to designated exercises, and/or time sensitive operations.

Task
2767

Provide target recommendations which meet leadership objectives.

Task
2881

Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3019

Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.

Ability
3041

Ability to effectively collaborate via virtual teams.

Ability
3042

Ability to evaluate information for reliability, validity, and relevance.

Ability
3043

Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.

Ability
3052

Ability to identify intelligence gaps.

Ability
3074

Ability to recognize and mitigate deception in reporting and analysis.

Ability
3081

Ability to utilize multiple intelligence sources across all intelligence disciplines.

Ability
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3159

Knowledge of cyber operations support or enabling processes.

Knowledge
3205

Knowledge of current computer-based intrusion sets.

Knowledge
3210

Knowledge of cyber laws and their effect on Cyber planning.

Knowledge
3271

Knowledge of internal and external partner cyber operations capabilities and tools.

Knowledge
3274

Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects.

Knowledge
3277

Knowledge of general SCADA system components.

Knowledge
3286

Knowledge of host-based security products and how they affect exploitation and vulnerability.

Knowledge
3334

Knowledge of intelligence confidence levels.

Knowledge
3342

Knowledge of intelligence support to planning, execution, and assessment.

Knowledge
3343

Knowledge of cyber intelligence/information collection capabilities and repositories.

Knowledge
3358

Knowledge of organizational hierarchy and cyber decision making processes.

Knowledge
3419

Knowledge of organization or partner exploitation of digital networks.

Knowledge
3460

Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions.

Knowledge
3504

Knowledge of threat and/or target systems.

Knowledge
3533

Knowledge of target vetting and validation procedures.

Knowledge
3584

Knowledge of intelligence preparation of the environment and similar processes.

Knowledge
3587

Knowledge of targeting cycles.

Knowledge
3615

Knowledge of the structure and intent of organization specific plans, guidance and authorizations.

Knowledge
3630

Knowledge of the ways in which targets or threats use the Internet.

Knowledge
3659

Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.

Knowledge
3704

Skill in conducting non-attributable research.

Skill
3724

Skill in defining and characterizing all pertinent aspects of the operational environment.

Skill
3793

Skill in identifying critical target elements, to include critical target elements for the cyber domain.

Skill
3876

Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources.

Skill
3907

Skill in using targeting databases and software packages.

Skill
3910

Skill in using Boolean operators to construct simple and complex queries.

Skill
3920

Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).

Skill
3938

Skill in utilizing feedback in order to improve processes, products, and services.

Skill
3953A

Skill in providing analysis to aid writing phased after action reports.

Skill
Partner Integration Planner Work Role ID: 333 (NIST: CO-PL-003) Workforce Element: Cyberspace Effects

Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.

Core KSATs

KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
1056

Knowledge of operations security.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2032

Apply expertise in policy and processes to facilitate the development, negotiation, and internal staffing of plans and/or memorandums of agreement.

Task
2058

Assist and advise inter-agency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives.

Task
2091

Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials).

Task
2162

Contribute to the development, staffing, and coordination of cyber operations policies, performance standards, plans and approval packages with appropriate internal and/or external decision makers.

Task
2180

Coordinate with intelligence and cyber defense partners to obtain relevant essential information.

Task
2308

Develop or participate in the development of standards for providing, requesting, and/or obtaining support from external partners to synchronize cyber operations.

Task
2322

Develop strategy and processes for partner planning, operations, and capability development.

Task
2416

Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives.

Task
2417

Facilitate the sharing of “best practices” and “lessons learned” throughout the cyber operations community.

Task
2443

Identify and manage security cooperation priorities with external partners.

Task
2513

Inform external partners of the potential effects of new or revised policy and guidance on cyber operations partnering activities.

Task
2524

Integrate cyber planning/targeting efforts with other organizations.

Task
2531

Knowledge of organizational planning concepts.

Knowledge
2558

Maintain relationships with internal and external partners involved in cyber planning or related areas.

Task
2618

Contribute to the review and refinement of policy, to include assessments of the consequences of endorsing or not endorsing such policy.

Task
2619

Provide subject matter expertise to planning teams, coordination groups, and task forces as necessary.

Task
2624

Conduct long-range, strategic planning efforts with internal and external partners in cyber activities.

Task
2626

Provide subject matter expertise to planning efforts with internal and external cyber operations partners.

Task
2702

Prepare for and provide subject matter expertise to exercises.

Task
2761

Provide planning support between internal and external partners.

Task
2822

Serve as a conduit of information from partner teams by identifying subject matter experts who can assist in the investigation of complex or unusual situations.

Task
2823

Serve as a liaison with external partners.

Task
2843

Synchronize cyber international engagement activities and associated resource requirements as appropriate.

Task
2888

Document lessons learned that convey the results of events and/or exercises.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3003

Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment.

Ability
3011

Ability to apply critical reading/thinking skills.

Ability
3015

Ability to apply approved planning development and staffing processes.

Ability
3021

Ability to collaborate effectively with others.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3033

Ability to coordinate cyber operations with other organization functions or support activities.

Ability
3040

Ability to develop or recommend planning solutions to problems and situations for which no precedent exists.

Ability
3041

Ability to effectively collaborate via virtual teams.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3054

Ability to identify external partners with common cyber operations interests.

Ability
3057

Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.

Ability
3060

Ability to interpret and understand complex and rapidly evolving concepts.

Ability
3066

Ability to participate as a member of planning teams, coordination groups, and task forces as necessary.

Ability
3076

Ability to tailor technical and planning information to a customer’s level of understanding.

Ability
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3177

Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3215

Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber attack) principles, capabilities, limitations, and effects.

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3271

Knowledge of internal and external partner cyber operations capabilities and tools.

Knowledge
3274

Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects.

Knowledge
3275

Knowledge of fundamental cyber concepts, principles, limitations, and effects.

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3326

Knowledge of information security concepts, facilitating technologies and methods.

Knowledge
3358

Knowledge of organizational hierarchy and cyber decision making processes.

Knowledge
3388

Knowledge of crisis action planning for cyber operations.

Knowledge
3489

Knowledge of organizational structures and associated intelligence capabilities.

Knowledge
3570

Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements.

Knowledge
3616

Knowledge of the structure, architecture, and design of modern digital and telephony networks.

Knowledge
3681

Skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action.

Skill
3685

Skill in applying crisis planning procedures.

Skill
3766

Skill in documenting and communicating complex technical and programmatic information.

Skill
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3844

Skill in preparing and presenting briefings.

Skill
3845

Skill in preparing plans and related correspondence.

Skill
3938

Skill in utilizing feedback in order to improve processes, products, and services.

Skill
3946

Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).

Skill
4008

Skill to distinguish between notional and actual resources and their applicability to the plan under development.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs

KSAT ID Description KSAT
2059

Provide expertise to course of action development.

Task
2159

Contribute to crisis action planning for cyber operations.

Task
2309

Develop or shape international cyber engagement strategies, policies, and activities to meet organization objectives.

Task
2327

Develop, implement, and recommend changes to appropriate planning procedures and policies.

Task
2328

Develop, maintain, and assess cyber cooperation security agreements with external partners.

Task
2590

Monitor and evaluate integrated cyber operations to identify opportunities to meet organization objectives.

Task
2630

Propose policy which governs interactions with external coordination groups.

Task
2736

Provide cyber focused guidance and advice on intelligence support plan inputs.

Task
2746

Provide input for the development and refinement of the cyber operations objectives, priorities, strategies, plans, and programs.

Task
2837

Submit or respond to requests for deconfliction of cyber operations.

Task
2844

Synchronize cyber portions of security cooperation plans.

Task
3155

Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3159

Knowledge of cyber operations support or enabling processes.

Knowledge
3211

Knowledge of cyber laws and legal considerations and their effect on cyber planning.

Knowledge
3235

Knowledge of deconfliction processes and procedures.

Knowledge
3257

Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities.

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3264

Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization.

Knowledge
3356

Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations.

Knowledge
3419

Knowledge of organization or partner exploitation of digital networks.

Knowledge
3585

Knowledge of accepted organization planning systems.

Knowledge
3591

Knowledge of organization objectives, leadership priorities, and decision-making risks.

Knowledge
3615

Knowledge of the structure and intent of organization specific plans, guidance and authorizations.

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3638

Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations.

Knowledge
3639

Knowledge of organization cyber operations programs, strategies, and resources.

Knowledge
Target Developer Work Role ID: 131 (NIST: AN-TD-001) Workforce Element: Cyberspace Effects

Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation.

Core KSATs

KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
1056

Knowledge of operations security.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2001

Accurately characterize targets.

Task
2076

Build and maintain electronic target folders.

Task
2087

Collaborate with intelligence analysts/targeting organizations involved in related areas.

Task
2089

Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.

Task
2121

Conduct nodal analysis.

Task
2134

Conduct target research and analysis.

Task
2170

Coordinate target vetting with appropriate partners.

Task
2249

Develop all-source intelligence targeting materials.

Task
2289

Develop measures of effectiveness and measures of performance.

Task
2429

Generate requests for information.

Task
2458

Identify critical target elements.

Task
2728

Provide aim point and re-engagement recommendations.

Task
2768

Provide targeting products and targeting support as designated.

Task
2770

Provide time sensitive targeting support.

Task
2779

Review appropriate information sources to determine validity and relevance of information gathered.

Task
2818

Sanitize and minimize information to protect sources and methods.

Task
2840

Support identification and documentation of collateral effects.

Task
2882

Work closely with planners, analysts, and collection managers to identify intelligence gaps and ensure intelligence requirements are accurate and up-to-date.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3002

Ability to focus research efforts to meet the customer’s decision-making needs.

Ability
3020

Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3039

Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Ability
3043

Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3047

Ability to function effectively in a dynamic, fast-paced environment.

Ability
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3052

Ability to identify intelligence gaps.

Ability
3073

Ability to recognize and mitigate cognitive biases which may affect analysis.

Ability
3074

Ability to recognize and mitigate deception in reporting and analysis.

Ability
3077

Ability to think critically.

Ability
3078

Knowledge of target methods and procedures.

Knowledge
3081

Ability to utilize multiple intelligence sources across all intelligence disciplines.

Ability
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3161

Knowledge of collateral damage and estimating impact(s).

Knowledge
3197

Knowledge of criticality and vulnerability factors (e.g., value, recuperation, cushion, countermeasures) for target selection and applicability to the cyber domain.

Knowledge
3250

Knowledge of dynamic and deliberate targeting.

Knowledge
3271

Knowledge of internal and external partner cyber operations capabilities and tools.

Knowledge
3281

Knowledge of governing authorities for targeting.

Knowledge
3334

Knowledge of intelligence confidence levels.

Knowledge
3335

Knowledge of intelligence disciplines.

Knowledge
3342

Knowledge of intelligence support to planning, execution, and assessment.

Knowledge
3368

Knowledge of legal considerations in targeting.

Knowledge
3504

Knowledge of threat and/or target systems.

Knowledge
3527

Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.).

Knowledge
3528

Knowledge of specific target identifiers, and their usage.

Knowledge
3530

Knowledge of target list development (i.e. RTL, JTL, CTL, etc.).

Knowledge
3533

Knowledge of target vetting and validation procedures.

Knowledge
3584

Knowledge of intelligence preparation of the environment and similar processes.

Knowledge
3587

Knowledge of targeting cycles.

Knowledge
3691

Skill in assessing and/or estimating effects generated during and after cyber operations.

Skill
3788

Skill in identifying alternative analytical interpretations in order to minimize unanticipated outcomes.

Skill
3793

Skill in identifying critical target elements, to include critical target elements for the cyber domain.

Skill
3842

Skill in performing target system analysis.

Skill
3844

Skill in preparing and presenting briefings.

Skill
3851

Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.

Skill
3880

Skill in reviewing and editing target materials.

Skill
3885

Skill in fusion analysis

Skill
3893

Skill in tailoring analysis to the necessary levels (e.g., classification and organizational).

Skill
3907

Skill in using targeting databases and software packages.

Skill
3910

Skill in using Boolean operators to construct simple and complex queries.

Skill
3920

Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).

Skill
3938

Skill in utilizing feedback in order to improve processes, products, and services.

Skill
3946

Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs

KSAT ID Description KSAT
52

Knowledge of human-computer interaction principles.

Knowledge
87

Knowledge of network traffic analysis methods.

Knowledge
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
912

Knowledge of collection management processes, capabilities, and limitations.

Knowledge
2059

Provide expertise to course of action development.

Task
2066

Provide expertise to the development of measures of effectiveness and measures of performance.

Task
2195

Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology.

Task
2243

Determine what technologies are used by a given target.

Task
2292

Develop munitions effectiveness assessment or operational assessment materials.

Task
2378

Estimate operational effects generated through cyber activities.

Task
2382

Evaluate available capabilities against desired effects in order to recommend efficient solutions.

Task
2441

Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.

Task
2515

Initiate requests to guide tasking and assist with collection management.

Task
2565

Maintain target lists (i.e., RTL, JTL, CTL, etc.).

Task
2677

Perform targeting automation activities.

Task
2685

Develop website characterizations.

Task
2716

Produce target system analysis products.

Task
2730

Provide analyses and support for effectiveness assessment.

Task
2749

Provide input for targeting effectiveness assessments for leadership acceptance.

Task
2760

Provide operations and re-engagement recommendations.

Task
2767

Provide target recommendations which meet leadership objectives.

Task
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3107

Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.).

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3155

Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3158

Knowledge of cyber operation objectives, policies, and legalities.

Knowledge
3173

Knowledge of operational effectiveness assessment.

Knowledge
3177

Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3253

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3274

Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects.

Knowledge
3277

Knowledge of general SCADA system components.

Knowledge
3286

Knowledge of host-based security products and how they affect exploitation and vulnerability.

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3298

Knowledge of how to extract, analyze, and use metadata.

Knowledge
3337

Knowledge of intelligence production processes.

Knowledge
3343

Knowledge of cyber intelligence/information collection capabilities and repositories.

Knowledge
3349

Knowledge of intrusion sets.

Knowledge
3367

Knowledge of all applicable statutes, laws, regulations and policies governing cyber targeting and exploitation.

Knowledge
3372

Knowledge of malware analysis and characteristics.

Knowledge
3419

Knowledge of organization or partner exploitation of digital networks.

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3446

Knowledge of analytical constructs and their use in assessing the operational environment.

Knowledge
3529

Knowledge of target estimated repair and recuperation times.

Knowledge
3535

Knowledge of TCP/IP networking protocols.

Knowledge
3539

Knowledge of telecommunications fundamentals.

Knowledge
3543

Knowledge of the basic structure, architecture, and design of modern communication networks.

Knowledge
3545

Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3561

Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

Knowledge
3593

Knowledge of internal and external partner intelligence processes and the development of information requirements and essential information.

Knowledge
3615

Knowledge of the structure and intent of organization specific plans, guidance and authorizations.

Knowledge
3630

Knowledge of the ways in which targets or threats use the Internet.

Knowledge
3659

Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.

Knowledge
3689

Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses).

Skill
3699

Skill in conducting research using deep web.

Skill
3704

Skill in conducting non-attributable research.

Skill
3724

Skill in defining and characterizing all pertinent aspects of the operational environment.

Skill
3737

Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects.

Skill
3742

Skill in determining the physical location of network devices.

Skill
3770

Skill in evaluating available capabilities against desired effects in order to provide effective courses of action.

Skill
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3794

Skill in identifying cyber threats which may jeopardize organization and/or partner interests.

Skill
3915

Skill in using geospatial data and applying geospatial resources.

Skill
3921

Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.

Skill
3953

Skill in writing effectiveness reports.

Skill
Target Network Analyst Work Role ID: 132 (NIST: AN-TD-002) Workforce Element: Cyberspace Effects

Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks and the applications on them.

Core KSATs

KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2081

Classify documents in accordance with classification guidelines.

Task
2089

Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.

Task
2099

Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets.

Task
2121

Conduct nodal analysis.

Task
2127

Conduct quality control in order to determine validity and relevance of information gathered about networks.

Task
2134

Conduct target research and analysis.

Task
2243

Determine what technologies are used by a given target.

Task
2251

Apply analytic techniques to gain more target information.

Task
2427

Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.)

Task
2441

Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.

Task
2469

Identify network components and their functionality to enable analysis and target development.

Task
2639

Perform content and/or metadata analysis to meet organization objectives.

Task
2719

Profile targets and their activities.

Task
2779

Review appropriate information sources to determine validity and relevance of information gathered.

Task
2781

Reconstruct networks in diagram or report format.

Task
2798

Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3002

Ability to focus research efforts to meet the customer’s decision-making needs.

Ability
3020

Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3039

Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Ability
3043

Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.

Ability
3044

Ability to exercise judgment when policies are not well-defined.

Ability
3047

Ability to function effectively in a dynamic, fast-paced environment.

Ability
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3052

Ability to identify intelligence gaps.

Ability
3077

Ability to think critically.

Ability
3078

Knowledge of target methods and procedures.

Knowledge
3081

Ability to utilize multiple intelligence sources across all intelligence disciplines.

Ability
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3113

Knowledge of target intelligence gathering and operational preparation techniques and life cycles.

Knowledge
3172

Knowledge of collection sources including conventional and non-conventional sources.

Knowledge
3177

Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3298

Knowledge of how to extract, analyze, and use metadata.

Knowledge
3382

Knowledge of methods to integrate and summarize information from any potential sources.

Knowledge
3407

Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3418

Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors).

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3450

Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure.

Knowledge
3564

Knowledge of the data flow from collection origin to repositories and tools.

Knowledge
3608

Knowledge of the purpose and contribution of target templates.

Knowledge
3616

Knowledge of the structure, architecture, and design of modern digital and telephony networks.

Knowledge
3617

Knowledge of the structure, architecture, and design of modern wireless communications systems.

Knowledge
3664

Skill in identifying how a target communicates.

Skill
3667

Skill in analyzing a target’s communication networks.

Skill
3670

Skill in analyzing terminal or environment collection data.

Skill
3671

Skill in analyzing essential network data (e.g., router configuration files, routing protocols).

Skill
3674

Skill in analyzing midpoint collection data.

Skill
3689

Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses).

Skill
3692

Skill in assessing the applicability of available analytical tools to various situations.

Skill
3704

Skill in conducting non-attributable research.

Skill
3708

Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis.

Skill
3724

Skill in defining and characterizing all pertinent aspects of the operational environment.

Skill
3742

Skill in determining the physical location of network devices.

Skill
3771

Skill in evaluating data sources for relevance, reliability, and objectivity.

Skill
3773

Skill in evaluating information to recognize relevance, priority, etc.

Skill
3778

Skill in exploiting/querying organizational and/or partner collection databases.

Skill
3787

Skill in identifying a target’s communications networks.

Skill
3793

Skill in identifying critical target elements, to include critical target elements for the cyber domain.

Skill
3797

Skill in identifying leads for target development.

Skill
3831

Skill in number normalization.

Skill
3842

Skill in performing target system analysis.

Skill
3851

Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.

Skill
3861

Skill in recognizing denial and deception techniques of the target.

Skill
3864

Skill in recognizing relevance of information.

Skill
3865

Skill in recognizing significant changes in a target’s communication patterns.

Skill
3866

Skill in recognizing technical information that may be used for leads for metadata analysis.

Skill
3873

Skill in researching essential information.

Skill
3880

Skill in reviewing and editing target materials.

Skill
3885

Skill in fusion analysis

Skill
3895

Skill in target network anomaly identification (e.g., intrusions, dataflow or processing, target implementation of new technologies).

Skill
3908

Skill in using research methods including multiple, different sources to reconstruct a target network.

Skill
3915

Skill in using geospatial data and applying geospatial resources.

Skill
3951

Skill in writing about facts and ideas in a clear, convincing, and organized manner.

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs

KSAT ID Description KSAT
2059

Provide expertise to course of action development.

Task
2101

Identify and conduct analysis of target communications to identify information essential to support operations.

Task
2393

Generate and evaluate the effectiveness of network analysis strategies.

Task
2429

Generate requests for information.

Task
2453

Identify collection gaps and potential collection strategies against targets.

Task
2568

Make recommendations to guide collection in support of customer requirements.

Task
2628A

Provide subject matter expertise to development of exercises.

Task
2767

Provide target recommendations which meet leadership objectives.

Task
3073

Ability to recognize and mitigate cognitive biases which may affect analysis.

Ability
3074

Ability to recognize and mitigate deception in reporting and analysis.

Ability
3107

Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.).

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3155

Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.

Knowledge
3158

Knowledge of cyber operation objectives, policies, and legalities.

Knowledge
3237

Knowledge of denial and deception techniques.

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3274

Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects.

Knowledge
3281

Knowledge of governing authorities for targeting.

Knowledge
3286

Knowledge of host-based security products and how they affect exploitation and vulnerability.

Knowledge
3288

Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless).

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3338

Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions.

Knowledge
3348

Knowledge of intrusion detection systems and signature development.

Knowledge
3349

Knowledge of intrusion sets.

Knowledge
3372

Knowledge of malware analysis and characteristics.

Knowledge
3534

Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference.

Knowledge
3542

Knowledge of the basic structure, architecture, and design of converged applications.

Knowledge
3627

Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.

Knowledge
3699

Skill in conducting research using deep web.

Skill
3737

Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects.

Skill
3794

Skill in identifying cyber threats which may jeopardize organization and/or partner interests.

Skill
3822

Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results.

Skill
3890

Skill in synthesizing, analyzing, and prioritizing meaning across data sets.

Skill
Warning Analyst Work Role ID: 141 (NIST: AN-TA-001) Workforce Element: Cyberspace Effects

Develops unique cyber indicators to maintain constant awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber warning assessments.

Core KSATs

KSAT ID Description KSAT
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
52

Knowledge of human-computer interaction principles.

Knowledge
87

Knowledge of network traffic analysis methods.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
264

Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).

Knowledge
1056

Knowledge of operations security.

Knowledge
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
2060A

Maintain a common intelligence picture.

Task
2087

Collaborate with intelligence analysts/targeting organizations involved in related areas.

Task
2115

Conduct in-depth research and analysis.

Task
2288

Develop information requirements necessary for answering priority information requests.

Task
2379B

Identify threats to Blue Force vulnerabilities.

Task
2429

Generate requests for information.

Task
2434

Identify threat tactics, and methodologies.

Task
2459

Identify intelligence gaps and shortfalls.

Task
2593

Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.

Task
2594

Monitor and report on validated threat activities.

Task
2602

Monitor open source websites for hostile content directed towards organizational or partner interests.

Task
2603

Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements.

Task
2617

Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).

Task
2735

Provide current intelligence support to critical internal/external stakeholders as appropriate.

Task
2754

Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.

Task
2771

Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.

Task
2789

Report intelligence-derived significant network events and intrusions.

Task
2881

Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date.

Task
3001

Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.

Ability
3002

Ability to focus research efforts to meet the customer’s decision-making needs.

Ability
3019

Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.

Ability
3022

Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

Ability
3039

Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Ability
3041

Ability to effectively collaborate via virtual teams.

Ability
3042

Ability to evaluate information for reliability, validity, and relevance.

Ability
3047

Ability to function effectively in a dynamic, fast-paced environment.

Ability
3048

Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.

Ability
3073

Ability to recognize and mitigate cognitive biases which may affect analysis.

Ability
3074

Ability to recognize and mitigate deception in reporting and analysis.

Ability
3077

Ability to think critically.

Ability
3078A

Ability to think like threat actors.

Ability
3081

Ability to utilize multiple intelligence sources across all intelligence disciplines.

Ability
3095

Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).

Knowledge
3098

Knowledge of virtualization products (Vmware, Virtual PC).

Knowledge
3106

Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).

Knowledge
3107

Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.).

Knowledge
3129

Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).

Knowledge
3137

Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).

Knowledge
3154

Knowledge of classification and control markings standards, policies and procedures.

Knowledge
3177

Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).

Knowledge
3188

Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).

Knowledge
3205

Knowledge of current computer-based intrusion sets.

Knowledge
3218

Knowledge of cyber operations terminology/lexicon.

Knowledge
3225

Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).

Knowledge
3253

Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).

Knowledge
3262

Knowledge of evolving/emerging communications technologies.

Knowledge
3274

Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects.

Knowledge
3291

Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).

Knowledge
3292

Knowledge of how modern digital and telephony networks impact cyber operations.

Knowledge
3293

Knowledge of how modern wireless communications systems impact cyber operations.

Knowledge
3298

Knowledge of how to extract, analyze, and use metadata.

Knowledge
3335

Knowledge of intelligence disciplines.

Knowledge
3343

Knowledge of cyber intelligence/information collection capabilities and repositories.

Knowledge
3358

Knowledge of organizational hierarchy and cyber decision making processes.

Knowledge
3374

Knowledge of malware.

Knowledge
3441

Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.

Knowledge
3539

Knowledge of telecommunications fundamentals.

Knowledge
3543

Knowledge of the basic structure, architecture, and design of modern communication networks.

Knowledge
3545

Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).

Knowledge
3561

Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.

Knowledge
3651

Knowledge of what constitutes a “threat” to a network.

Knowledge
3659

Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.

Knowledge
3699

Skill in conducting research using deep web.

Skill
3704

Skill in conducting non-attributable research.

Skill
3756

Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.

Skill
3772

Skill in evaluating information for reliability, validity, and relevance.

Skill
3788

Skill in identifying alternative analytical interpretations in order to minimize unanticipated outcomes.

Skill
3793

Skill in identifying critical target elements, to include critical target elements for the cyber domain.

Skill
3794

Skill in identifying cyber threats which may jeopardize organization and/or partner interests.

Skill
3851

Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.

Skill
3876

Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources.

Skill
3893

Skill in tailoring analysis to the necessary levels (e.g., classification and organizational).

Skill
3910

Skill in using Boolean operators to construct simple and complex queries.

Skill
3921

Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.

Skill
3938

Skill in utilizing feedback in order to improve processes, products, and services.

Skill
3946

Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).

Skill
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge

Additional KSATs

KSAT ID Description KSAT
2028

Answer requests for information.

Task
2060

Provide subject matter expertise to the development of a common operational picture.

Task
2061

Provide subject matter expertise to the development of cyber operations specific indicators.

Task
2063

Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.

Task
2068

Assist in the identification of intelligence collection shortfalls.

Task
2075

Brief threat and/or target current situations.

Task
2121

Conduct nodal analysis.

Task
2379

Evaluate threat decision-making processes.

Task
2621

Provide SME and support to planning/developmental forums and working groups as appropriate.

Task
2738

Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.

Task
2745

Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.

Task
3043

Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.

Ability
3052

Ability to identify intelligence gaps.

Ability
3277

Knowledge of general SCADA system components.

Knowledge
3286

Knowledge of host-based security products and how they affect exploitation and vulnerability.

Knowledge
3342

Knowledge of intelligence support to planning, execution, and assessment.

Knowledge
3460

Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions.

Knowledge
3504

Knowledge of threat and/or target systems.

Knowledge
3584

Knowledge of intelligence preparation of the environment and similar processes.

Knowledge
3630

Knowledge of the ways in which targets or threats use the Internet.

Knowledge
3724

Skill in defining and characterizing all pertinent aspects of the operational environment.

Skill
3844

Skill in preparing and presenting briefings.

Skill
3920

Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).

Skill