Target Developer
What does this role do? Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation.
CORE KSATs
KSAT ID | Description | KSAT |
---|---|---|
22 | * Knowledge of computer networking concepts and protocols, and network security methodologies. | Knowledge |
108 | * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). | Knowledge |
1056 | Knowledge of operations security. | Knowledge |
1157 | * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. | Knowledge |
1158 | * Knowledge of cybersecurity principles. | Knowledge |
1159 | * Knowledge of cyber threats and vulnerabilities. | Knowledge |
2001 | Accurately characterize targets. | Task |
2076 | Build and maintain electronic target folders. | Task |
2087 | Collaborate with intelligence analysts/targeting organizations involved in related areas. | Task |
2089 | Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas. | Task |
2121 | Conduct nodal analysis. | Task |
2134 | Conduct target research and analysis. | Task |
2170 | Coordinate target vetting with appropriate partners. | Task |
2249 | Develop all-source intelligence targeting materials. | Task |
2289 | Develop measures of effectiveness and measures of performance. | Task |
2429 | Generate requests for information. | Task |
2458 | Identify critical target elements. | Task |
2728 | Provide aim point and re-engagement recommendations. | Task |
2768 | Provide targeting products and targeting support as designated. | Task |
2770 | Provide time sensitive targeting support. | Task |
2779 | Review appropriate information sources to determine validity and relevance of information gathered. | Task |
2818 | Sanitize and minimize information to protect sources and methods. | Task |
2840 | Support identification and documentation of collateral effects. | Task |
2882 | Work closely with planners, analysts, and collection managers to identify intelligence gaps and ensure intelligence requirements are accurate and up-to-date. | Task |
3001 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. | Ability |
3002 | Ability to focus research efforts to meet the customer’s decision-making needs. | Ability |
3020 | Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information. | Ability |
3022 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. | Ability |
3039 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. | Ability |
3043 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. | Ability |
3044 | Ability to exercise judgment when policies are not well-defined. | Ability |
3047 | Ability to function effectively in a dynamic, fast-paced environment. | Ability |
3048 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. | Ability |
3052 | Ability to identify intelligence gaps. | Ability |
3073 | Ability to recognize and mitigate cognitive biases which may affect analysis. | Ability |
3074 | Ability to recognize and mitigate deception in reporting and analysis. | Ability |
3077 | Ability to think critically. | Ability |
3078 | Knowledge of target methods and procedures. | Knowledge |
3081 | Ability to utilize multiple intelligence sources across all intelligence disciplines. | Ability |
3106 | Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). | Knowledge |
3161 | Knowledge of collateral damage and estimating impact(s). | Knowledge |
3197 | Knowledge of criticality and vulnerability factors (e.g., value, recuperation, cushion, countermeasures) for target selection and applicability to the cyber domain. | Knowledge |
3250 | Knowledge of dynamic and deliberate targeting. | Knowledge |
3271 | Knowledge of internal and external partner cyber operations capabilities and tools. | Knowledge |
3281 | Knowledge of governing authorities for targeting. | Knowledge |
3334 | Knowledge of intelligence confidence levels. | Knowledge |
3335 | Knowledge of intelligence disciplines. | Knowledge |
3342 | Knowledge of intelligence support to planning, execution, and assessment. | Knowledge |
3368 | Knowledge of legal considerations in targeting. | Knowledge |
3504 | Knowledge of threat and/or target systems. | Knowledge |
3527 | Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.). | Knowledge |
3528 | Knowledge of specific target identifiers, and their usage. | Knowledge |
3530 | Knowledge of target list development (i.e. RTL, JTL, CTL, etc.). | Knowledge |
3533 | Knowledge of target vetting and validation procedures. | Knowledge |
3584 | Knowledge of intelligence preparation of the environment and similar processes. | Knowledge |
3587 | Knowledge of targeting cycles. | Knowledge |
3691 | Skill in assessing and/or estimating effects generated during and after cyber operations. | Skill |
3788 | Skill in identifying alternative analytical interpretations in order to minimize unanticipated outcomes. | Skill |
3793 | Skill in identifying critical target elements, to include critical target elements for the cyber domain. | Skill |
3842 | Skill in performing target system analysis. | Skill |
3844 | Skill in preparing and presenting briefings. | Skill |
3851 | Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships. | Skill |
3880 | Skill in reviewing and editing target materials. | Skill |
3885 | Skill in fusion analysis | Skill |
3893 | Skill in tailoring analysis to the necessary levels (e.g., classification and organizational). | Skill |
3907 | Skill in using targeting databases and software packages. | Skill |
3910 | Skill in using Boolean operators to construct simple and complex queries. | Skill |
3920 | Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.). | Skill |
3938 | Skill in utilizing feedback in order to improve processes, products, and services. | Skill |
3946 | Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). | Skill |
6900 | * Knowledge of specific operational impacts of cybersecurity lapses. | Knowledge |
ADDITIONAL KSATs
KSAT ID | Description | KSAT |
---|---|---|
52 | Knowledge of human-computer interaction principles. | Knowledge |
87 | Knowledge of network traffic analysis methods. | Knowledge |
264 | Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). | Knowledge |
912 | Knowledge of collection management processes, capabilities, and limitations. | Knowledge |
2059 | Provide expertise to course of action development. | Task |
2066 | Provide expertise to the development of measures of effectiveness and measures of performance. | Task |
2195 | Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology. | Task |
2243 | Determine what technologies are used by a given target. | Task |
2292 | Develop munitions effectiveness assessment or operational assessment materials. | Task |
2378 | Estimate operational effects generated through cyber activities. | Task |
2382 | Evaluate available capabilities against desired effects in order to recommend efficient solutions. | Task |
2441 | Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. | Task |
2515 | Initiate requests to guide tasking and assist with collection management. | Task |
2565 | Maintain target lists (i.e., RTL, JTL, CTL, etc.). | Task |
2677 | Perform targeting automation activities. | Task |
2685 | Develop website characterizations. | Task |
2716 | Produce target system analysis products. | Task |
2730 | Provide analyses and support for effectiveness assessment. | Task |
2749 | Provide input for targeting effectiveness assessments for leadership acceptance. | Task |
2760 | Provide operations and re-engagement recommendations. | Task |
2767 | Provide target recommendations which meet leadership objectives. | Task |
3095 | Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). | Knowledge |
3107 | Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.). | Knowledge |
3129 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). | Knowledge |
3137 | Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration). | Knowledge |
3155 | Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. | Knowledge |
3158 | Knowledge of cyber operation objectives, policies, and legalities. | Knowledge |
3173 | Knowledge of operational effectiveness assessment. | Knowledge |
3177 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). | Knowledge |
3188 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). | Knowledge |
3225 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). | Knowledge |
3253 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). | Knowledge |
3262 | Knowledge of evolving/emerging communications technologies. | Knowledge |
3274 | Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects. | Knowledge |
3277 | Knowledge of general SCADA system components. | Knowledge |
3286 | Knowledge of host-based security products and how they affect exploitation and vulnerability. | Knowledge |
3291 | Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). | Knowledge |
3292 | Knowledge of how modern digital and telephony networks impact cyber operations. | Knowledge |
3293 | Knowledge of how modern wireless communications systems impact cyber operations. | Knowledge |
3298 | Knowledge of how to extract, analyze, and use metadata. | Knowledge |
3337 | Knowledge of intelligence production processes. | Knowledge |
3343 | Knowledge of cyber intelligence/information collection capabilities and repositories. | Knowledge |
3349 | Knowledge of intrusion sets. | Knowledge |
3367 | Knowledge of all applicable statutes, laws, regulations and policies governing cyber targeting and exploitation. | Knowledge |
3372 | Knowledge of malware analysis and characteristics. | Knowledge |
3419 | Knowledge of organization or partner exploitation of digital networks. | Knowledge |
3441 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. | Knowledge |
3446 | Knowledge of analytical constructs and their use in assessing the operational environment. | Knowledge |
3529 | Knowledge of target estimated repair and recuperation times. | Knowledge |
3535 | Knowledge of TCP/IP networking protocols. | Knowledge |
3539 | Knowledge of telecommunications fundamentals. | Knowledge |
3543 | Knowledge of the basic structure, architecture, and design of modern communication networks. | Knowledge |
3545 | Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). | Knowledge |
3561 | Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. | Knowledge |
3593 | Knowledge of internal and external partner intelligence processes and the development of information requirements and essential information. | Knowledge |
3615 | Knowledge of the structure and intent of organization specific plans, guidance and authorizations. | Knowledge |
3630 | Knowledge of the ways in which targets or threats use the Internet. | Knowledge |
3659 | Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. | Knowledge |
3689 | Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses). | Skill |
3699 | Skill in conducting research using deep web. | Skill |
3704 | Skill in conducting non-attributable research. | Skill |
3724 | Skill in defining and characterizing all pertinent aspects of the operational environment. | Skill |
3737 | Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects. | Skill |
3742 | Skill in determining the physical location of network devices. | Skill |
3770 | Skill in evaluating available capabilities against desired effects in order to provide effective courses of action. | Skill |
3772 | Skill in evaluating information for reliability, validity, and relevance. | Skill |
3794 | Skill in identifying cyber threats which may jeopardize organization and/or partner interests. | Skill |
3915 | Skill in using geospatial data and applying geospatial resources. | Skill |
3921 | Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches. | Skill |
3953 | Skill in writing effectiveness reports. | Skill |