22 |
* Knowledge of computer networking concepts and protocols, and network security methodologies. |
Knowledge |
108 |
* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
Knowledge |
264 |
Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
Knowledge |
1157 |
* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. |
Knowledge |
1158 |
* Knowledge of cybersecurity principles. |
Knowledge |
1159 |
* Knowledge of cyber threats and vulnerabilities. |
Knowledge |
2081 |
Classify documents in accordance with classification guidelines. |
Task |
2089 |
Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas. |
Task |
2099 |
Compile, integrate, and/or interpret all-source data for intelligence or vulnerability value with respect to specific targets. |
Task |
2121 |
Conduct nodal analysis. |
Task |
2127 |
Conduct quality control in order to determine validity and relevance of information gathered about networks. |
Task |
2134 |
Conduct target research and analysis. |
Task |
2243 |
Determine what technologies are used by a given target. |
Task |
2251 |
Apply analytic techniques to gain more target information. |
Task |
2427 |
Gather information about networks through traditional and alternative techniques, (e.g., social network analysis, call-chaining, traffic analysis.) |
Task |
2441 |
Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. |
Task |
2469 |
Identify network components and their functionality to enable analysis and target development. |
Task |
2639 |
Perform content and/or metadata analysis to meet organization objectives. |
Task |
2719 |
Profile targets and their activities. |
Task |
2779 |
Review appropriate information sources to determine validity and relevance of information gathered. |
Task |
2781 |
Reconstruct networks in diagram or report format. |
Task |
2798 |
Research communications trends in emerging technologies (in computer and telephony networks, satellite, cable, and wireless) in both open and classified sources. |
Task |
3001 |
Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
Ability |
3002 |
Ability to focus research efforts to meet the customer’s decision-making needs. |
Ability |
3020 |
Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information. |
Ability |
3022 |
Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
Ability |
3039 |
Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
Ability |
3043 |
Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
Ability |
3044 |
Ability to exercise judgment when policies are not well-defined. |
Ability |
3047 |
Ability to function effectively in a dynamic, fast-paced environment. |
Ability |
3048 |
Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise. |
Ability |
3052 |
Ability to identify intelligence gaps. |
Ability |
3077 |
Ability to think critically. |
Ability |
3078 |
Knowledge of target methods and procedures. |
Knowledge |
3081 |
Ability to utilize multiple intelligence sources across all intelligence disciplines. |
Ability |
3095 |
Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
Knowledge |
3106 |
Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless). |
Knowledge |
3113 |
Knowledge of target intelligence gathering and operational preparation techniques and life cycles. |
Knowledge |
3172 |
Knowledge of collection sources including conventional and non-conventional sources. |
Knowledge |
3177 |
Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
Knowledge |
3188 |
Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
Knowledge |
3291 |
Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP). |
Knowledge |
3298 |
Knowledge of how to extract, analyze, and use metadata. |
Knowledge |
3382 |
Knowledge of methods to integrate and summarize information from any potential sources. |
Knowledge |
3407 |
Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
Knowledge |
3418 |
Knowledge of organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors). |
Knowledge |
3441 |
Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
Knowledge |
3450 |
Knowledge of principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure. |
Knowledge |
3564 |
Knowledge of the data flow from collection origin to repositories and tools. |
Knowledge |
3608 |
Knowledge of the purpose and contribution of target templates. |
Knowledge |
3616 |
Knowledge of the structure, architecture, and design of modern digital and telephony networks. |
Knowledge |
3617 |
Knowledge of the structure, architecture, and design of modern wireless communications systems. |
Knowledge |
3664 |
Skill in identifying how a target communicates. |
Skill |
3667 |
Skill in analyzing a target’s communication networks. |
Skill |
3670 |
Skill in analyzing terminal or environment collection data. |
Skill |
3671 |
Skill in analyzing essential network data (e.g., router configuration files, routing protocols). |
Skill |
3674 |
Skill in analyzing midpoint collection data. |
Skill |
3689 |
Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses). |
Skill |
3692 |
Skill in assessing the applicability of available analytical tools to various situations. |
Skill |
3704 |
Skill in conducting non-attributable research. |
Skill |
3708 |
Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis. |
Skill |
3724 |
Skill in defining and characterizing all pertinent aspects of the operational environment. |
Skill |
3742 |
Skill in determining the physical location of network devices. |
Skill |
3771 |
Skill in evaluating data sources for relevance, reliability, and objectivity. |
Skill |
3773 |
Skill in evaluating information to recognize relevance, priority, etc. |
Skill |
3778 |
Skill in exploiting/querying organizational and/or partner collection databases. |
Skill |
3787 |
Skill in identifying a target’s communications networks. |
Skill |
3793 |
Skill in identifying critical target elements, to include critical target elements for the cyber domain. |
Skill |
3797 |
Skill in identifying leads for target development. |
Skill |
3831 |
Skill in number normalization. |
Skill |
3842 |
Skill in performing target system analysis. |
Skill |
3851 |
Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships. |
Skill |
3861 |
Skill in recognizing denial and deception techniques of the target. |
Skill |
3864 |
Skill in recognizing relevance of information. |
Skill |
3865 |
Skill in recognizing significant changes in a target’s communication patterns. |
Skill |
3866 |
Skill in recognizing technical information that may be used for leads for metadata analysis. |
Skill |
3873 |
Skill in researching essential information. |
Skill |
3880 |
Skill in reviewing and editing target materials. |
Skill |
3885 |
Skill in fusion analysis |
Skill |
3895 |
Skill in target network anomaly identification (e.g., intrusions, dataflow or processing, target implementation of new technologies). |
Skill |
3908 |
Skill in using research methods including multiple, different sources to reconstruct a target network. |
Skill |
3915 |
Skill in using geospatial data and applying geospatial resources. |
Skill |
3951 |
Skill in writing about facts and ideas in a clear, convincing, and organized manner. |
Skill |
6900 |
* Knowledge of specific operational impacts of cybersecurity lapses. |
Knowledge |