Cyberspace Effects
Personnel who plan, support, and execute cyberspace capabilities where the primary purpose is to externally defend or conduct force projection in or through cyberspace.
Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
52 | Knowledge of human-computer interaction principles. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
1056 | Knowledge of operations security. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2009 | Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives. |
Task |
2032 | Apply expertise in policy and processes to facilitate the development, negotiation, and internal staffing of plans and/or memorandums of agreement. |
Task |
2052 | Assess target vulnerabilities and/or operational capabilities to determine course of action. |
Task |
2073 | Provide input to the identification of cyber-related success criteria. |
Task |
2130 | Develop, review and implement all levels of planning guidance in support of cyber operations. |
Task |
2159 | Contribute to crisis action planning for cyber operations. |
Task |
2180 | Coordinate with intelligence and cyber defense partners to obtain relevant essential information. |
Task |
2192 | Use intelligence estimates to counter potential target actions. |
Task |
2265 | Develop and maintain deliberate and/or crisis plans. |
Task |
2266 | Develop and review specific cyber operations guidance for integration into broader planning activities. |
Task |
2272 | Develop cyber operations plans and guidance to ensure that execution and resource allocation decisions align with organization objectives. |
Task |
2308 | Develop or participate in the development of standards for providing, requesting, and/or obtaining support from external partners to synchronize cyber operations. |
Task |
2310 | Develop potential courses of action. |
Task |
2327 | Develop, implement, and recommend changes to appropriate planning procedures and policies. |
Task |
2331 | Devise, document, and validate cyber operation strategy, and planning documents. |
Task |
2365 | Ensure operational planning efforts are effectively transitioned to current operations. |
Task |
2416 | Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives. |
Task |
2422 | Gather and analyze data (e.g., measures of effectiveness) to determine effectiveness, and provide reporting for follow-on activities. |
Task |
2424 | Incorporate cyber operations and communications security support plans into organization objectives. |
Task |
2524 | Integrate cyber planning/targeting efforts with other organizations. |
Task |
2528 | Interpret environment preparations assessments to determine a course of action. |
Task |
2529 | Issue requests for information. |
Task |
2530 | Knowledge and understanding of operational design. |
Knowledge |
2531 | Knowledge of organizational planning concepts. |
Knowledge |
2564 | Maintain situational awareness to determine if changes to the operating environment require review of the plan. |
Task |
2590 | Monitor and evaluate integrated cyber operations to identify opportunities to meet organization objectives. |
Task |
2626 | Provide subject matter expertise to planning efforts with internal and external cyber operations partners. |
Task |
2702 | Prepare for and provide subject matter expertise to exercises. |
Task |
2746 | Provide input for the development and refinement of the cyber operations objectives, priorities, strategies, plans, and programs. |
Task |
2752 | Provide input to the administrative and logistical elements of an operational support plan. |
Task |
2761 | Provide planning support between internal and external partners. |
Task |
2778 | Recommend refinement, adaption, termination, and execution of operational plans as appropriate. |
Task |
2816 | Review, approve, prioritize, and submit operational requirements for research, development, and/or acquisition of cyber capabilities. |
Task |
2837 | Submit or respond to requests for deconfliction of cyber operations. |
Task |
2888 | Document lessons learned that convey the results of events and/or exercises. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3003 | Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment. |
Ability |
3011 | Ability to apply critical reading/thinking skills. |
Ability |
3015 | Ability to apply approved planning development and staffing processes. |
Ability |
3021 | Ability to collaborate effectively with others. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3033 | Ability to coordinate cyber operations with other organization functions or support activities. |
Ability |
3040 | Ability to develop or recommend planning solutions to problems and situations for which no precedent exists. |
Ability |
3041 | Ability to effectively collaborate via virtual teams. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3057 | Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives. |
Ability |
3060 | Ability to interpret and understand complex and rapidly evolving concepts. |
Ability |
3066 | Ability to participate as a member of planning teams, coordination groups, and task forces as necessary. |
Ability |
3076 | Ability to tailor technical and planning information to a customer’s level of understanding. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3098 | Knowledge of virtualization products (Vmware, Virtual PC). |
Knowledge |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3107 | Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.). |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3155 | Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3159 | Knowledge of cyber operations support or enabling processes. |
Knowledge |
3173 | Knowledge of operational effectiveness assessment. |
Knowledge |
3177 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3194 | Knowledge of crisis action planning and time sensitive planning procedures. |
Knowledge |
3211 | Knowledge of cyber laws and legal considerations and their effect on cyber planning. |
Knowledge |
3215 | Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber attack) principles, capabilities, limitations, and effects. |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3235 | Knowledge of deconfliction processes and procedures. |
Knowledge |
3257 | Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities. |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3264 | Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization. |
Knowledge |
3268 | Knowledge of staff management, assignment, and allocation processes. |
Knowledge |
3274 | Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects. |
Knowledge |
3275 | Knowledge of fundamental cyber concepts, principles, limitations, and effects. |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3326 | Knowledge of information security concepts, facilitating technologies and methods. |
Knowledge |
3358 | Knowledge of organizational hierarchy and cyber decision making processes. |
Knowledge |
3374 | Knowledge of malware. |
Knowledge |
3388 | Knowledge of crisis action planning for cyber operations. |
Knowledge |
3391 | Knowledge of objectives, situation, operational environment, and the status and disposition of internal and external partner collection capabilities available to support planning. |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3444 | Knowledge of planning activity initiation. |
Knowledge |
3445 | Knowledge of planning timelines adaptive, crisis action, and time-sensitive planning. |
Knowledge |
3459 | Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization. |
Knowledge |
3539 | Knowledge of telecommunications fundamentals. |
Knowledge |
3543 | Knowledge of the basic structure, architecture, and design of modern communication networks. |
Knowledge |
3545 | Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3554 | Knowledge of the critical information requirements and how they’re used in planning. |
Knowledge |
3561 | Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
Knowledge |
3570 | Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements. |
Knowledge |
3585 | Knowledge of accepted organization planning systems. |
Knowledge |
3591 | Knowledge of organization objectives, leadership priorities, and decision-making risks. |
Knowledge |
3601 | Knowledge of the outputs of course of action and exercise analysis. |
Knowledge |
3605 | Knowledge of the information environment. |
Knowledge |
3606 | Knowledge of the process used to assess the performance and impact of operations. |
Knowledge |
3609 | Knowledge of the range of cyber operations and their underlying intelligence support needs, topics, and focus areas. |
Knowledge |
3610 | Knowledge of the relationships between end states, objectives, effects, lines of operation, etc. |
Knowledge |
3613 | Knowledge of the role of network operations in supporting and facilitating other organization operations. |
Knowledge |
3616 | Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3630 | Knowledge of the ways in which targets or threats use the Internet. |
Knowledge |
3639 | Knowledge of organization cyber operations programs, strategies, and resources. |
Knowledge |
3651 | Knowledge of what constitutes a “threat” to a network. |
Knowledge |
3659 | Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3665 | Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures. |
Skill |
3681 | Skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action. |
Skill |
3685 | Skill in applying crisis planning procedures. |
Skill |
3747 | Skill in developing and executing comprehensive cyber operations assessment programs for assessing and validating operational performance characteristics. |
Skill |
3766 | Skill in documenting and communicating complex technical and programmatic information. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3844 | Skill in preparing and presenting briefings. |
Skill |
3845 | Skill in preparing plans and related correspondence. |
Skill |
3879 | Skill in reviewing and editing plans. |
Skill |
3938 | Skill in utilizing feedback in order to improve processes, products, and services. |
Skill |
3946 | Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). |
Skill |
3967 | Skill to anticipate key target or threat activities which are likely to prompt a leadership decision. |
Skill |
4023 | Skill to graphically depict decision support materials containing intelligence and partner capability estimates. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
2058 | Assist and advise inter-agency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives. |
Task |
2160 | Contribute to the development of the organization’s decision support tools if necessary. |
Task |
2237 | Determine indicators (e.g., measures of effectiveness) that are best suited to specific cyber operation objectives. |
Task |
2368 | Ensure that intelligence planning activities are integrated and synchronized with operational planning timelines. |
Task |
2386 | Evaluate intelligence estimates to support the planning cycle. |
Task |
2459A | Identify cyber intelligence gaps and shortfalls. |
Task |
2558 | Maintain relationships with internal and external partners involved in cyber planning or related areas. |
Task |
2561 | Maintain situational awareness of cyber-related intelligence requirements and associated tasking. |
Task |
2562 | Maintain situational awareness of partner capabilities and activities. |
Task |
2624 | Conduct long-range, strategic planning efforts with internal and external partners in cyber activities. |
Task |
3054 | Ability to identify external partners with common cyber operations interests. |
Ability |
3114 | Knowledge of all forms of intelligence support needs, topics, and focus areas. |
Knowledge |
3271 | Knowledge of internal and external partner cyber operations capabilities and tools. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3342 | Knowledge of intelligence support to planning, execution, and assessment. |
Knowledge |
3356 | Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations. |
Knowledge |
3419 | Knowledge of organization or partner exploitation of digital networks. |
Knowledge |
3463 | Knowledge of required intelligence planning products associated with cyber operational planning. |
Knowledge |
3489 | Knowledge of organizational structures and associated intelligence capabilities. |
Knowledge |
3571 | Knowledge of the organizational planning and staffing process. |
Knowledge |
3572 | Knowledge of organization decision support tools and/or methods. |
Knowledge |
3607 | Knowledge of the processes to synchronize operational assessment procedures with the critical information requirement process. |
Knowledge |
3615 | Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
Knowledge |
3638 | Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations. |
Knowledge |
3976 | Skill to apply the process used to assess the performance and impact of cyber operations. |
Skill |
3998 | Skill to craft indicators of operational progress/success. |
Skill |
4008 | Skill to distinguish between notional and actual resources and their applicability to the plan under development. |
Skill |
4058 | Skill to synchronize operational assessment procedures with the critical information requirement process. |
Skill |
Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2194 | Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities. |
Task |
2400 | Examine intercept-related metadata and content with an understanding of targeting significance. |
Task |
2718 | Profile network or system administrators and their activities. |
Task |
3021 | Ability to collaborate effectively with others. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3103A | Ability to identify/describe target vulnerability. |
Ability |
3103 | Ability to identify/describe techniques/methods for conducting technical exploitation of the target. |
Ability |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3107 | Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.). |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3179 | Knowledge of common networking devices and their configurations. |
Knowledge |
3191 | Knowledge of concepts for operating systems (e.g., Linux, Unix). |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3289 | Knowledge of how hubs, switches, routers work together in the design of a network. |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3346 | Knowledge of Internet and routing protocols. |
Knowledge |
3407 | Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3410 | Knowledge of network topology. |
Knowledge |
3513 | Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems. |
Knowledge |
3543 | Knowledge of the basic structure, architecture, and design of modern communication networks. |
Knowledge |
3801 | Skill in identifying the devices that work at each level of protocol models. |
Skill |
3867 | Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information). |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
345 | Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies. |
Knowledge |
363 | Skill in identifying gaps in technical capabilities. |
Skill |
912 | Knowledge of collection management processes, capabilities, and limitations. |
Knowledge |
915 | Knowledge of front-end collection systems, including traffic collection, filtering, and selection. |
Knowledge |
2029A | Apply and utilize authorized cyber capabilities to enable access to targeted networks. |
Task |
2033 | Apply cyber collection, environment preparation and engagement expertise to enable new exploitation and/or continued collection operations, or in support of customer requirements. |
Task |
2040 | Apply and obey applicable statutes, laws, regulations and policies. |
Task |
2072 | Perform analysis for target infrastructure exploitation activities. |
Task |
2090 | Collaborate with other internal and external partner organizations on target access and operational issues. |
Task |
2095 | Communicate new developments, breakthroughs, challenges and lessons learned to leadership, and internal and external customers. |
Task |
2102 | Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access. |
Task |
2114 | Conduct independent in-depth target and technical analysis including target-specific information (e.g., cultural, organizational, political) that results in access. |
Task |
2419 | Collaborate with developers, conveying target and technical knowledge in tool requirements submissions, to enhance tool development. |
Task |
2461 | Identify gaps in our understanding of target technology and developing innovative collection approaches. |
Task |
2490 | Identify, locate, and track targets via geospatial analysis techniques. |
Task |
2534 | Lead or enable exploitation operations in support of organization objectives and target requirements. |
Task |
2542 | Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications. |
Task |
2608 | Monitor target networks to provide indications and warning of target communications changes or processing failures. |
Task |
2714 | Produce network reconstructions. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3055B | Knowledge of basic implants. |
Knowledge |
3055A | Ability to select the appropriate implant to achieve operational goals. |
Ability |
3101 | Ability to expand network access by conducting target analysis and collection in order to identify targets of interest. |
Ability |
3113 | Knowledge of target intelligence gathering and operational preparation techniques and life cycles. |
Knowledge |
3139 | Knowledge of basic principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis). |
Knowledge |
3146 | Knowledge of both internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3155 | Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3166 | Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies. |
Knowledge |
3181 | Knowledge of common reporting databases and tools. |
Knowledge |
3201 | Knowledge of all relevant reporting and dissemination procedures. |
Knowledge |
3226 | Knowledge of data flow process for terminal or environment collection. |
Knowledge |
3256 | Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.). |
Knowledge |
3261 | Knowledge of evasion strategies and techniques. |
Knowledge |
3296 | Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http). |
Knowledge |
3349 | Knowledge of intrusion sets. |
Knowledge |
3367 | Knowledge of all applicable statutes, laws, regulations and policies governing cyber targeting and exploitation. |
Knowledge |
3386 | Knowledge of midpoint collection (process, objectives, organization, targets, etc.). |
Knowledge |
3432 | Knowledge of identification and reporting processes. |
Knowledge |
3454 | Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, Panda, Kaspersky) and how differences affect exploitation/vulnerabilities. |
Knowledge |
3474 | Knowledge of scripting |
Knowledge |
3505 | Knowledge of strategies and tools for target research. |
Knowledge |
3525 | Knowledge of organizational and partner policies, tools, capabilities, and procedures. |
Knowledge |
3542 | Knowledge of the basic structure, architecture, and design of converged applications. |
Knowledge |
3622 | Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives. |
Knowledge |
3637 | Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications). |
Knowledge |
3678 | Skill in analyzing traffic to identify network devices. |
Skill |
3715 | Skill in creating and extracting important information from packet captures. |
Skill |
3718A | Skill in creating collection requirements in support of data acquisition activities. |
Skill |
3718 | Skill in creating plans in support of remote operations. |
Skill |
3726 | Skill in depicting source or collateral data on a network map. |
Skill |
3741 | Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments. |
Skill |
3774 | Skill in evaluating accesses for intelligence value. |
Skill |
3803 | Skill in identifying, locating, and tracking targets via geospatial analysis techniques |
Skill |
3810 | Skill in interpreting compiled and interpretive programming languages. |
Skill |
3812 | Skill in interpreting metadata and content as applied by collection systems. |
Skill |
3814 | Skill in using trace route tools and interpreting the results as they apply to network analysis and reconstruction. |
Skill |
3818 | Skill in generating operation plans in support of mission and target requirements. |
Skill |
3828 | Skill in navigating network visualization software. |
Skill |
3837 | Skill in performing data fusion from existing intelligence for enabling new and continued collection. |
Skill |
3860 | Skill in recognizing and interpreting malicious network activity in traffic. |
Skill |
3863 | Skill in recognizing midpoint opportunities and essential information. |
Skill |
3874 | Skill in researching vulnerabilities and exploits utilized in traffic. |
Skill |
3894 | Skill in target development in direct support of collection operations. |
Skill |
3913 | Skill in using databases to identify target-relevant information. |
Skill |
3923 | Skill in using non-attributable networks. |
Skill |
3950 | Skill in writing (and submitting) requirements to meet gaps in technical capabilities. |
Skill |
Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
52 | Knowledge of human-computer interaction principles. |
Knowledge |
87 | Knowledge of network traffic analysis methods. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2063 | Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. |
Task |
2108 | Conduct end-of-operations assessments. |
Task |
2115 | Conduct in-depth research and analysis. |
Task |
2121 | Conduct nodal analysis. |
Task |
2134 | Conduct target research and analysis. |
Task |
2289 | Develop measures of effectiveness and measures of performance. |
Task |
2378 | Estimate operational effects generated through cyber activities. |
Task |
2379A | Identify threat vulnerabilities. |
Task |
2429 | Generate requests for information. |
Task |
2593 | Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets. |
Task |
2594 | Monitor and report on validated threat activities. |
Task |
2603 | Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements. |
Task |
2730 | Provide analyses and support for effectiveness assessment. |
Task |
2745 | Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations. |
Task |
2747 | Provide input and assist in post-action effectiveness assessments. |
Task |
2748 | Provide input and assist in the development of plans and guidance. |
Task |
3002 | Ability to focus research efforts to meet the customer’s decision-making needs. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3047 | Ability to function effectively in a dynamic, fast-paced environment. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3073 | Ability to recognize and mitigate cognitive biases which may affect analysis. |
Ability |
3077 | Ability to think critically. |
Ability |
3078A | Ability to think like threat actors. |
Ability |
3079 | Ability to understand objectives and effects. |
Ability |
3098 | Knowledge of virtualization products (Vmware, Virtual PC). |
Knowledge |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3107 | Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.). |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3177 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3253 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3374 | Knowledge of malware. |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3539 | Knowledge of telecommunications fundamentals. |
Knowledge |
3543 | Knowledge of the basic structure, architecture, and design of modern communication networks. |
Knowledge |
3545 | Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3561 | Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
Knowledge |
3651 | Knowledge of what constitutes a “threat” to a network. |
Knowledge |
3691 | Skill in assessing and/or estimating effects generated during and after cyber operations. |
Skill |
3756 | Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Skill |
3770 | Skill in evaluating available capabilities against desired effects in order to provide effective courses of action. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3788 | Skill in identifying alternative analytical interpretations in order to minimize unanticipated outcomes. |
Skill |
3794 | Skill in identifying cyber threats which may jeopardize organization and/or partner interests. |
Skill |
3844 | Skill in preparing and presenting briefings. |
Skill |
3851 | Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships. |
Skill |
3878 | Skill in reviewing and editing assessment products. |
Skill |
3893 | Skill in tailoring analysis to the necessary levels (e.g., classification and organizational). |
Skill |
3921 | Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches. |
Skill |
3946 | Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
2059 | Provide expertise to course of action development. |
Task |
2060 | Provide subject matter expertise to the development of a common operational picture. |
Task |
2061 | Provide subject matter expertise to the development of cyber operations specific indicators. |
Task |
2066 | Provide expertise to the development of measures of effectiveness and measures of performance. |
Task |
2068 | Assist in the identification of intelligence collection shortfalls. |
Task |
2075 | Brief threat and/or target current situations. |
Task |
2087 | Collaborate with intelligence analysts/targeting organizations involved in related areas. |
Task |
2288 | Develop information requirements necessary for answering priority information requests. |
Task |
2292 | Develop munitions effectiveness assessment or operational assessment materials. |
Task |
2356 | Engage customers to understand customers’ intelligence needs and wants. |
Task |
2379 | Evaluate threat decision-making processes. |
Task |
2459 | Identify intelligence gaps and shortfalls. |
Task |
2617 | Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). |
Task |
2621 | Provide SME and support to planning/developmental forums and working groups as appropriate. |
Task |
2735 | Provide current intelligence support to critical internal/external stakeholders as appropriate. |
Task |
2738 | Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations. |
Task |
2757 | Provide effectiveness support to designated exercises, and/or time sensitive operations. |
Task |
2767 | Provide target recommendations which meet leadership objectives. |
Task |
2881 | Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3019 | Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes. |
Ability |
3041 | Ability to effectively collaborate via virtual teams. |
Ability |
3042 | Ability to evaluate information for reliability, validity, and relevance. |
Ability |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3052 | Ability to identify intelligence gaps. |
Ability |
3074 | Ability to recognize and mitigate deception in reporting and analysis. |
Ability |
3081 | Ability to utilize multiple intelligence sources across all intelligence disciplines. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3159 | Knowledge of cyber operations support or enabling processes. |
Knowledge |
3205 | Knowledge of current computer-based intrusion sets. |
Knowledge |
3210 | Knowledge of cyber laws and their effect on Cyber planning. |
Knowledge |
3271 | Knowledge of internal and external partner cyber operations capabilities and tools. |
Knowledge |
3274 | Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects. |
Knowledge |
3277 | Knowledge of general SCADA system components. |
Knowledge |
3286 | Knowledge of host-based security products and how they affect exploitation and vulnerability. |
Knowledge |
3334 | Knowledge of intelligence confidence levels. |
Knowledge |
3342 | Knowledge of intelligence support to planning, execution, and assessment. |
Knowledge |
3343 | Knowledge of cyber intelligence/information collection capabilities and repositories. |
Knowledge |
3358 | Knowledge of organizational hierarchy and cyber decision making processes. |
Knowledge |
3419 | Knowledge of organization or partner exploitation of digital networks. |
Knowledge |
3460 | Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions. |
Knowledge |
3504 | Knowledge of threat and/or target systems. |
Knowledge |
3533 | Knowledge of target vetting and validation procedures. |
Knowledge |
3584 | Knowledge of intelligence preparation of the environment and similar processes. |
Knowledge |
3587 | Knowledge of targeting cycles. |
Knowledge |
3615 | Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
Knowledge |
3630 | Knowledge of the ways in which targets or threats use the Internet. |
Knowledge |
3659 | Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3704 | Skill in conducting non-attributable research. |
Skill |
3724 | Skill in defining and characterizing all pertinent aspects of the operational environment. |
Skill |
3793 | Skill in identifying critical target elements, to include critical target elements for the cyber domain. |
Skill |
3876 | Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources. |
Skill |
3907 | Skill in using targeting databases and software packages. |
Skill |
3910 | Skill in using Boolean operators to construct simple and complex queries. |
Skill |
3920 | Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.). |
Skill |
3938 | Skill in utilizing feedback in order to improve processes, products, and services. |
Skill |
3953A | Skill in providing analysis to aid writing phased after action reports. |
Skill |
Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
1056 | Knowledge of operations security. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2032 | Apply expertise in policy and processes to facilitate the development, negotiation, and internal staffing of plans and/or memorandums of agreement. |
Task |
2058 | Assist and advise inter-agency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives. |
Task |
2091 | Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials). |
Task |
2162 | Contribute to the development, staffing, and coordination of cyber operations policies, performance standards, plans and approval packages with appropriate internal and/or external decision makers. |
Task |
2180 | Coordinate with intelligence and cyber defense partners to obtain relevant essential information. |
Task |
2308 | Develop or participate in the development of standards for providing, requesting, and/or obtaining support from external partners to synchronize cyber operations. |
Task |
2322 | Develop strategy and processes for partner planning, operations, and capability development. |
Task |
2416 | Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives. |
Task |
2417 | Facilitate the sharing of “best practices” and “lessons learned” throughout the cyber operations community. |
Task |
2443 | Identify and manage security cooperation priorities with external partners. |
Task |
2513 | Inform external partners of the potential effects of new or revised policy and guidance on cyber operations partnering activities. |
Task |
2524 | Integrate cyber planning/targeting efforts with other organizations. |
Task |
2531 | Knowledge of organizational planning concepts. |
Knowledge |
2558 | Maintain relationships with internal and external partners involved in cyber planning or related areas. |
Task |
2618 | Contribute to the review and refinement of policy, to include assessments of the consequences of endorsing or not endorsing such policy. |
Task |
2619 | Provide subject matter expertise to planning teams, coordination groups, and task forces as necessary. |
Task |
2624 | Conduct long-range, strategic planning efforts with internal and external partners in cyber activities. |
Task |
2626 | Provide subject matter expertise to planning efforts with internal and external cyber operations partners. |
Task |
2702 | Prepare for and provide subject matter expertise to exercises. |
Task |
2761 | Provide planning support between internal and external partners. |
Task |
2822 | Serve as a conduit of information from partner teams by identifying subject matter experts who can assist in the investigation of complex or unusual situations. |
Task |
2823 | Serve as a liaison with external partners. |
Task |
2843 | Synchronize cyber international engagement activities and associated resource requirements as appropriate. |
Task |
2888 | Document lessons learned that convey the results of events and/or exercises. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3003 | Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment. |
Ability |
3011 | Ability to apply critical reading/thinking skills. |
Ability |
3015 | Ability to apply approved planning development and staffing processes. |
Ability |
3021 | Ability to collaborate effectively with others. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3033 | Ability to coordinate cyber operations with other organization functions or support activities. |
Ability |
3040 | Ability to develop or recommend planning solutions to problems and situations for which no precedent exists. |
Ability |
3041 | Ability to effectively collaborate via virtual teams. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3054 | Ability to identify external partners with common cyber operations interests. |
Ability |
3057 | Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives. |
Ability |
3060 | Ability to interpret and understand complex and rapidly evolving concepts. |
Ability |
3066 | Ability to participate as a member of planning teams, coordination groups, and task forces as necessary. |
Ability |
3076 | Ability to tailor technical and planning information to a customer’s level of understanding. |
Ability |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3177 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3215 | Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber attack) principles, capabilities, limitations, and effects. |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3271 | Knowledge of internal and external partner cyber operations capabilities and tools. |
Knowledge |
3274 | Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects. |
Knowledge |
3275 | Knowledge of fundamental cyber concepts, principles, limitations, and effects. |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3326 | Knowledge of information security concepts, facilitating technologies and methods. |
Knowledge |
3358 | Knowledge of organizational hierarchy and cyber decision making processes. |
Knowledge |
3388 | Knowledge of crisis action planning for cyber operations. |
Knowledge |
3489 | Knowledge of organizational structures and associated intelligence capabilities. |
Knowledge |
3570 | Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements. |
Knowledge |
3616 | Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
Knowledge |
3681 | Skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action. |
Skill |
3685 | Skill in applying crisis planning procedures. |
Skill |
3766 | Skill in documenting and communicating complex technical and programmatic information. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3844 | Skill in preparing and presenting briefings. |
Skill |
3845 | Skill in preparing plans and related correspondence. |
Skill |
3938 | Skill in utilizing feedback in order to improve processes, products, and services. |
Skill |
3946 | Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). |
Skill |
4008 | Skill to distinguish between notional and actual resources and their applicability to the plan under development. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
2059 | Provide expertise to course of action development. |
Task |
2159 | Contribute to crisis action planning for cyber operations. |
Task |
2309 | Develop or shape international cyber engagement strategies, policies, and activities to meet organization objectives. |
Task |
2327 | Develop, implement, and recommend changes to appropriate planning procedures and policies. |
Task |
2328 | Develop, maintain, and assess cyber cooperation security agreements with external partners. |
Task |
2590 | Monitor and evaluate integrated cyber operations to identify opportunities to meet organization objectives. |
Task |
2630 | Propose policy which governs interactions with external coordination groups. |
Task |
2736 | Provide cyber focused guidance and advice on intelligence support plan inputs. |
Task |
2746 | Provide input for the development and refinement of the cyber operations objectives, priorities, strategies, plans, and programs. |
Task |
2837 | Submit or respond to requests for deconfliction of cyber operations. |
Task |
2844 | Synchronize cyber portions of security cooperation plans. |
Task |
3155 | Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3159 | Knowledge of cyber operations support or enabling processes. |
Knowledge |
3211 | Knowledge of cyber laws and legal considerations and their effect on cyber planning. |
Knowledge |
3235 | Knowledge of deconfliction processes and procedures. |
Knowledge |
3257 | Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities. |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3264 | Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization. |
Knowledge |
3356 | Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations. |
Knowledge |
3419 | Knowledge of organization or partner exploitation of digital networks. |
Knowledge |
3585 | Knowledge of accepted organization planning systems. |
Knowledge |
3591 | Knowledge of organization objectives, leadership priorities, and decision-making risks. |
Knowledge |
3615 | Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3638 | Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations. |
Knowledge |
3639 | Knowledge of organization cyber operations programs, strategies, and resources. |
Knowledge |
Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
1056 | Knowledge of operations security. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2001 | Accurately characterize targets. |
Task |
2076 | Build and maintain electronic target folders. |
Task |
2087 | Collaborate with intelligence analysts/targeting organizations involved in related areas. |
Task |
2089 | Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas. |
Task |
2121 | Conduct nodal analysis. |
Task |
2134 | Conduct target research and analysis. |
Task |
2170 | Coordinate target vetting with appropriate partners. |
Task |
2249 | Develop all-source intelligence targeting materials. |
Task |
2289 | Develop measures of effectiveness and measures of performance. |
Task |
2429 | Generate requests for information. |
Task |
2458 | Identify critical target elements. |
Task |
2728 | Provide aim point and re-engagement recommendations. |
Task |
2768 | Provide targeting products and targeting support as designated. |
Task |
2770 | Provide time sensitive targeting support. |
Task |
2779 | Review appropriate information sources to determine validity and relevance of information gathered. |
Task |
2818 | Sanitize and minimize information to protect sources and methods. |
Task |
2840 | Support identification and documentation of collateral effects. |
Task |
2882 | Work closely with planners, analysts, and collection managers to identify intelligence gaps and ensure intelligence requirements are accurate and up-to-date. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3002 | Ability to focus research efforts to meet the customer’s decision-making needs. |
Ability |
3020 | Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3047 | Ability to function effectively in a dynamic, fast-paced environment. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3052 | Ability to identify intelligence gaps. |
Ability |
3073 | Ability to recognize and mitigate cognitive biases which may affect analysis. |
Ability |
3074 | Ability to recognize and mitigate deception in reporting and analysis. |
Ability |
3077 | Ability to think critically. |
Ability |
3078 | Knowledge of target methods and procedures. |
Knowledge |
3081 | Ability to utilize multiple intelligence sources across all intelligence disciplines. |
Ability |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3161 | Knowledge of collateral damage and estimating impact(s). |
Knowledge |
3197 | Knowledge of criticality and vulnerability factors (e.g., value, recuperation, cushion, countermeasures) for target selection and applicability to the cyber domain. |
Knowledge |
3250 | Knowledge of dynamic and deliberate targeting. |
Knowledge |
3271 | Knowledge of internal and external partner cyber operations capabilities and tools. |
Knowledge |
3281 | Knowledge of governing authorities for targeting. |
Knowledge |
3334 | Knowledge of intelligence confidence levels. |
Knowledge |
3335 | Knowledge of intelligence disciplines. |
Knowledge |
3342 | Knowledge of intelligence support to planning, execution, and assessment. |
Knowledge |
3368 | Knowledge of legal considerations in targeting. |
Knowledge |
3504 | Knowledge of threat and/or target systems. |
Knowledge |
3527 | Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.). |
Knowledge |
3528 | Knowledge of specific target identifiers, and their usage. |
Knowledge |
3530 | Knowledge of target list development (i.e. RTL, JTL, CTL, etc.). |
Knowledge |
3533 | Knowledge of target vetting and validation procedures. |
Knowledge |
3584 | Knowledge of intelligence preparation of the environment and similar processes. |
Knowledge |
3587 | Knowledge of targeting cycles. |
Knowledge |
3691 | Skill in assessing and/or estimating effects generated during and after cyber operations. |
Skill |
3788 | Skill in identifying alternative analytical interpretations in order to minimize unanticipated outcomes. |
Skill |
3793 | Skill in identifying critical target elements, to include critical target elements for the cyber domain. |
Skill |
3842 | Skill in performing target system analysis. |
Skill |
3844 | Skill in preparing and presenting briefings. |
Skill |
3851 | Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships. |
Skill |
3880 | Skill in reviewing and editing target materials. |
Skill |
3885 | Skill in fusion analysis |
Skill |
3893 | Skill in tailoring analysis to the necessary levels (e.g., classification and organizational). |
Skill |
3907 | Skill in using targeting databases and software packages. |
Skill |
3910 | Skill in using Boolean operators to construct simple and complex queries. |
Skill |
3920 | Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.). |
Skill |
3938 | Skill in utilizing feedback in order to improve processes, products, and services. |
Skill |
3946 | Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
52 | Knowledge of human-computer interaction principles. |
Knowledge |
87 | Knowledge of network traffic analysis methods. |
Knowledge |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
912 | Knowledge of collection management processes, capabilities, and limitations. |
Knowledge |
2059 | Provide expertise to course of action development. |
Task |
2066 | Provide expertise to the development of measures of effectiveness and measures of performance. |
Task |
2195 | Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology. |
Task |
2243 | Determine what technologies are used by a given target. |
Task |
2292 | Develop munitions effectiveness assessment or operational assessment materials. |
Task |
2378 | Estimate operational effects generated through cyber activities. |
Task |
2382 | Evaluate available capabilities against desired effects in order to recommend efficient solutions. |
Task |
2441 | Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
2515 | Initiate requests to guide tasking and assist with collection management. |
Task |
2565 | Maintain target lists (i.e., RTL, JTL, CTL, etc.). |
Task |
2677 | Perform targeting automation activities. |
Task |
2685 | Develop website characterizations. |
Task |
2716 | Produce target system analysis products. |
Task |
2730 | Provide analyses and support for effectiveness assessment. |
Task |
2749 | Provide input for targeting effectiveness assessments for leadership acceptance. |
Task |
2760 | Provide operations and re-engagement recommendations. |
Task |
2767 | Provide target recommendations which meet leadership objectives. |
Task |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3107 | Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.). |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3155 | Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3158 | Knowledge of cyber operation objectives, policies, and legalities. |
Knowledge |
3173 | Knowledge of operational effectiveness assessment. |
Knowledge |
3177 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3253 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3274 | Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects. |
Knowledge |
3277 | Knowledge of general SCADA system components. |
Knowledge |
3286 | Knowledge of host-based security products and how they affect exploitation and vulnerability. |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3337 | Knowledge of intelligence production processes. |
Knowledge |
3343 | Knowledge of cyber intelligence/information collection capabilities and repositories. |
Knowledge |
3349 | Knowledge of intrusion sets. |
Knowledge |
3367 | Knowledge of all applicable statutes, laws, regulations and policies governing cyber targeting and exploitation. |
Knowledge |
3372 | Knowledge of malware analysis and characteristics. |
Knowledge |
3419 | Knowledge of organization or partner exploitation of digital networks. |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3446 | Knowledge of analytical constructs and their use in assessing the operational environment. |
Knowledge |
3529 | Knowledge of target estimated repair and recuperation times. |
Knowledge |
3535 | Knowledge of TCP/IP networking protocols. |
Knowledge |
3539 | Knowledge of telecommunications fundamentals. |
Knowledge |
3543 | Knowledge of the basic structure, architecture, and design of modern communication networks. |
Knowledge |
3545 | Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3561 | Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
Knowledge |
3593 | Knowledge of internal and external partner intelligence processes and the development of information requirements and essential information. |
Knowledge |
3615 | Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
Knowledge |
3630 | Knowledge of the ways in which targets or threats use the Internet. |
Knowledge |
3659 | Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3689 | Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses). |
Skill |
3699 | Skill in conducting research using deep web. |
Skill |
3704 | Skill in conducting non-attributable research. |
Skill |
3724 | Skill in defining and characterizing all pertinent aspects of the operational environment. |
Skill |
3737 | Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects. |
Skill |
3742 | Skill in determining the physical location of network devices. |
Skill |
3770 | Skill in evaluating available capabilities against desired effects in order to provide effective courses of action. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3794 | Skill in identifying cyber threats which may jeopardize organization and/or partner interests. |
Skill |
3915 | Skill in using geospatial data and applying geospatial resources. |
Skill |
3921 | Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches. |
Skill |
3953 | Skill in writing effectiveness reports. |
Skill |
Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks and the applications on them.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2081 | Classify documents in accordance with classification guidelines. |
Task |
2089 | Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas. |
Task |
2099 | Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets. |
Task |
2121 | Conduct nodal analysis. |
Task |
2127 | Conduct quality control in order to determine validity and relevance of information gathered about networks. |
Task |
2134 | Conduct target research and analysis. |
Task |
2243 | Determine what technologies are used by a given target. |
Task |
2251 | Apply analytic techniques to gain more target information. |
Task |
2427 | Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.) |
Task |
2441 | Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
2469 | Identify network components and their functionality to enable analysis and target development. |
Task |
2639 | Perform content and/or metadata analysis to meet organization objectives. |
Task |
2719 | Profile targets and their activities. |
Task |
2779 | Review appropriate information sources to determine validity and relevance of information gathered. |
Task |
2781 | Reconstruct networks in diagram or report format. |
Task |
2798 | Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3002 | Ability to focus research efforts to meet the customer’s decision-making needs. |
Ability |
3020 | Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3044 | Ability to exercise judgment when policies are not well-defined. |
Ability |
3047 | Ability to function effectively in a dynamic, fast-paced environment. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3052 | Ability to identify intelligence gaps. |
Ability |
3077 | Ability to think critically. |
Ability |
3078 | Knowledge of target methods and procedures. |
Knowledge |
3081 | Ability to utilize multiple intelligence sources across all intelligence disciplines. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3113 | Knowledge of target intelligence gathering and operational preparation techniques and life cycles. |
Knowledge |
3172 | Knowledge of collection sources including conventional and non-conventional sources. |
Knowledge |
3177 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3382 | Knowledge of methods to integrate and summarize information from any potential sources. |
Knowledge |
3407 | Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3418 | Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors). |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3450 | Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure. |
Knowledge |
3564 | Knowledge of the data flow from collection origin to repositories and tools. |
Knowledge |
3608 | Knowledge of the purpose and contribution of target templates. |
Knowledge |
3616 | Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
Knowledge |
3617 | Knowledge of the structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3664 | Skill in identifying how a target communicates. |
Skill |
3667 | Skill in analyzing a target’s communication networks. |
Skill |
3670 | Skill in analyzing terminal or environment collection data. |
Skill |
3671 | Skill in analyzing essential network data (e.g., router configuration files, routing protocols). |
Skill |
3674 | Skill in analyzing midpoint collection data. |
Skill |
3689 | Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses). |
Skill |
3692 | Skill in assessing the applicability of available analytical tools to various situations. |
Skill |
3704 | Skill in conducting non-attributable research. |
Skill |
3708 | Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis. |
Skill |
3724 | Skill in defining and characterizing all pertinent aspects of the operational environment. |
Skill |
3742 | Skill in determining the physical location of network devices. |
Skill |
3771 | Skill in evaluating data sources for relevance, reliability, and objectivity. |
Skill |
3773 | Skill in evaluating information to recognize relevance, priority, etc. |
Skill |
3778 | Skill in exploiting/querying organizational and/or partner collection databases. |
Skill |
3787 | Skill in identifying a target’s communications networks. |
Skill |
3793 | Skill in identifying critical target elements, to include critical target elements for the cyber domain. |
Skill |
3797 | Skill in identifying leads for target development. |
Skill |
3831 | Skill in number normalization. |
Skill |
3842 | Skill in performing target system analysis. |
Skill |
3851 | Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships. |
Skill |
3861 | Skill in recognizing denial and deception techniques of the target. |
Skill |
3864 | Skill in recognizing relevance of information. |
Skill |
3865 | Skill in recognizing significant changes in a target’s communication patterns. |
Skill |
3866 | Skill in recognizing technical information that may be used for leads for metadata analysis. |
Skill |
3873 | Skill in researching essential information. |
Skill |
3880 | Skill in reviewing and editing target materials. |
Skill |
3885 | Skill in fusion analysis |
Skill |
3895 | Skill in target network anomaly identification (e.g., intrusions, dataflow or processing, target implementation of new technologies). |
Skill |
3908 | Skill in using research methods including multiple, different sources to reconstruct a target network. |
Skill |
3915 | Skill in using geospatial data and applying geospatial resources. |
Skill |
3951 | Skill in writing about facts and ideas in a clear, convincing, and organized manner. |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
2059 | Provide expertise to course of action development. |
Task |
2101 | Identify and conduct analysis of target communications to identify information essential to support operations. |
Task |
2393 | Generate and evaluate the effectiveness of network analysis strategies. |
Task |
2429 | Generate requests for information. |
Task |
2453 | Identify collection gaps and potential collection strategies against targets. |
Task |
2568 | Make recommendations to guide collection in support of customer requirements. |
Task |
2628A | Provide subject matter expertise to development of exercises. |
Task |
2767 | Provide target recommendations which meet leadership objectives. |
Task |
3073 | Ability to recognize and mitigate cognitive biases which may affect analysis. |
Ability |
3074 | Ability to recognize and mitigate deception in reporting and analysis. |
Ability |
3107 | Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.). |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3155 | Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
Knowledge |
3158 | Knowledge of cyber operation objectives, policies, and legalities. |
Knowledge |
3237 | Knowledge of denial and deception techniques. |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3274 | Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects. |
Knowledge |
3281 | Knowledge of governing authorities for targeting. |
Knowledge |
3286 | Knowledge of host-based security products and how they affect exploitation and vulnerability. |
Knowledge |
3288 | Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3338 | Knowledge of intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions. |
Knowledge |
3348 | Knowledge of intrusion detection systems and signature development. |
Knowledge |
3349 | Knowledge of intrusion sets. |
Knowledge |
3372 | Knowledge of malware analysis and characteristics. |
Knowledge |
3534 | Knowledge of target, including related current events, communication profile, actors, and history (language, culture) and/or frame of reference. |
Knowledge |
3542 | Knowledge of the basic structure, architecture, and design of converged applications. |
Knowledge |
3627 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. |
Knowledge |
3699 | Skill in conducting research using deep web. |
Skill |
3737 | Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects. |
Skill |
3794 | Skill in identifying cyber threats which may jeopardize organization and/or partner interests. |
Skill |
3822 | Skill in managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results. |
Skill |
3890 | Skill in synthesizing, analyzing, and prioritizing meaning across data sets. |
Skill |
Develops unique cyber indicators to maintain constant awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber warning assessments.
Core KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
52 | Knowledge of human-computer interaction principles. |
Knowledge |
87 | Knowledge of network traffic analysis methods. |
Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
1056 | Knowledge of operations security. |
Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 | * Knowledge of cybersecurity principles. |
Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2060A | Maintain a common intelligence picture. |
Task |
2087 | Collaborate with intelligence analysts/targeting organizations involved in related areas. |
Task |
2115 | Conduct in-depth research and analysis. |
Task |
2288 | Develop information requirements necessary for answering priority information requests. |
Task |
2379B | Identify threats to Blue Force vulnerabilities. |
Task |
2429 | Generate requests for information. |
Task |
2434 | Identify threat tactics, and methodologies. |
Task |
2459 | Identify intelligence gaps and shortfalls. |
Task |
2593 | Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets. |
Task |
2594 | Monitor and report on validated threat activities. |
Task |
2602 | Monitor open source websites for hostile content directed towards organizational or partner interests. |
Task |
2603 | Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements. |
Task |
2617 | Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). |
Task |
2735 | Provide current intelligence support to critical internal/external stakeholders as appropriate. |
Task |
2754 | Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations. |
Task |
2771 | Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities. |
Task |
2789 | Report intelligence-derived significant network events and intrusions. |
Task |
2881 | Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date. |
Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3002 | Ability to focus research efforts to meet the customer’s decision-making needs. |
Ability |
3019 | Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes. |
Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3041 | Ability to effectively collaborate via virtual teams. |
Ability |
3042 | Ability to evaluate information for reliability, validity, and relevance. |
Ability |
3047 | Ability to function effectively in a dynamic, fast-paced environment. |
Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3073 | Ability to recognize and mitigate cognitive biases which may affect analysis. |
Ability |
3074 | Ability to recognize and mitigate deception in reporting and analysis. |
Ability |
3077 | Ability to think critically. |
Ability |
3078A | Ability to think like threat actors. |
Ability |
3081 | Ability to utilize multiple intelligence sources across all intelligence disciplines. |
Ability |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3098 | Knowledge of virtualization products (Vmware, Virtual PC). |
Knowledge |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3107 | Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.). |
Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). |
Knowledge |
3154 | Knowledge of classification and control markings standards, policies and procedures. |
Knowledge |
3177 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3205 | Knowledge of current computer-based intrusion sets. |
Knowledge |
3218 | Knowledge of cyber operations terminology/lexicon. |
Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
Knowledge |
3253 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. |
Knowledge |
3274 | Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects. |
Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. |
Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. |
Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3335 | Knowledge of intelligence disciplines. |
Knowledge |
3343 | Knowledge of cyber intelligence/information collection capabilities and repositories. |
Knowledge |
3358 | Knowledge of organizational hierarchy and cyber decision making processes. |
Knowledge |
3374 | Knowledge of malware. |
Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3539 | Knowledge of telecommunications fundamentals. |
Knowledge |
3543 | Knowledge of the basic structure, architecture, and design of modern communication networks. |
Knowledge |
3545 | Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3561 | Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
Knowledge |
3651 | Knowledge of what constitutes a “threat” to a network. |
Knowledge |
3659 | Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3699 | Skill in conducting research using deep web. |
Skill |
3704 | Skill in conducting non-attributable research. |
Skill |
3756 | Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. |
Skill |
3788 | Skill in identifying alternative analytical interpretations in order to minimize unanticipated outcomes. |
Skill |
3793 | Skill in identifying critical target elements, to include critical target elements for the cyber domain. |
Skill |
3794 | Skill in identifying cyber threats which may jeopardize organization and/or partner interests. |
Skill |
3851 | Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships. |
Skill |
3876 | Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources. |
Skill |
3893 | Skill in tailoring analysis to the necessary levels (e.g., classification and organizational). |
Skill |
3910 | Skill in using Boolean operators to construct simple and complex queries. |
Skill |
3921 | Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches. |
Skill |
3938 | Skill in utilizing feedback in order to improve processes, products, and services. |
Skill |
3946 | Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). |
Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |
Additional KSATs
KSAT ID | Description | KSAT |
---|---|---|
2028 | Answer requests for information. |
Task |
2060 | Provide subject matter expertise to the development of a common operational picture. |
Task |
2061 | Provide subject matter expertise to the development of cyber operations specific indicators. |
Task |
2063 | Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. |
Task |
2068 | Assist in the identification of intelligence collection shortfalls. |
Task |
2075 | Brief threat and/or target current situations. |
Task |
2121 | Conduct nodal analysis. |
Task |
2379 | Evaluate threat decision-making processes. |
Task |
2621 | Provide SME and support to planning/developmental forums and working groups as appropriate. |
Task |
2738 | Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations. |
Task |
2745 | Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations. |
Task |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3052 | Ability to identify intelligence gaps. |
Ability |
3277 | Knowledge of general SCADA system components. |
Knowledge |
3286 | Knowledge of host-based security products and how they affect exploitation and vulnerability. |
Knowledge |
3342 | Knowledge of intelligence support to planning, execution, and assessment. |
Knowledge |
3460 | Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions. |
Knowledge |
3504 | Knowledge of threat and/or target systems. |
Knowledge |
3584 | Knowledge of intelligence preparation of the environment and similar processes. |
Knowledge |
3630 | Knowledge of the ways in which targets or threats use the Internet. |
Knowledge |
3724 | Skill in defining and characterizing all pertinent aspects of the operational environment. |
Skill |
3844 | Skill in preparing and presenting briefings. |
Skill |
3920 | Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.). |
Skill |