Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats and vulnerabilities.
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of human-computer interaction principles.
Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.
Knowledge and understanding of operational design.
Knowledge of website types, administration, functions, and content management system (CMS).
Knowledge of accepted organization planning systems.
Knowledge of forms of intelligence support needs, topics, and focus areas.
Knowledge of all-source reporting and dissemination procedures.
Knowledge of analytical standards and the purpose of intelligence confidence levels.
Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
Knowledge of classification and control markings standards, policies and procedures.
Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.
Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).
Knowledge of crisis action planning and time sensitive planning procedures.
Knowledge of crisis action planning for cyber operations.
Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.
Knowledge of current computer-based intrusion sets.
Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber-attack) principles, capabilities, limitations, and effects.
Knowledge of cyber laws and legal considerations and their effect on cyber planning.
Knowledge of cyber operations support or enabling processes.
Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
Knowledge of deconfliction processes and procedures.
Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).
Knowledge of evolving/emerging communications technologies.
Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization.
Knowledge of fundamental cyber concepts, principles, limitations, and effects.
Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects.
Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability.
Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
Knowledge of how modern digital and telephony networks impact cyber operations.
Knowledge of how modern wireless communications systems impact cyber operations.
Knowledge of information security concepts, facilitating technologies and methods.
Knowledge of intelligence capabilities and limitations.
Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures.
Skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action.
Skill in applying crisis planning procedures.
Skill in documenting and communicating complex technical and programmatic information.
Skill in preparing plans and related correspondence.
Skill in reviewing and editing intelligence products from various sources for cyber operations.
Skill in reviewing and editing plans.
Skill to analyze strategic guidance for issues requiring clarification and/or additional guidance.
Skill to analyze target or threat sources of strength and morale.
Skill to anticipate intelligence capability employment requirements.
Skill to anticipate key target or threat activities which are likely to prompt a leadership decision.
Skill to apply analytical standards to evaluate intelligence products.
Skill to apply the process used to assess the performance and impact of cyber operations.
Skill to articulate intelligence capabilities available to support execution of the plan.
Skill to articulate the needs of joint planners to all-source analysts.
Skill to conceptualize the entirety of the intelligence process in the multiple domains and dimensions.
Skill to convert intelligence requirements into intelligence production tasks.
Skill to coordinate the development of tailored intelligence products.
Skill to correlate intelligence priorities to the allocation of intelligence resources/assets.
Skill to craft indicators of operational progress/success.
Skill to create and maintain up-to-date planning documents and tracking of services/production.
Skill to express orally and in writing the relationship between intelligence capability limitations and decision-making risk and impacts on the overall operation.
Skill to graphically depict decision support materials containing intelligence and partner capability estimates.
Skill to interpret planning guidance to discern level of analytical support required.
Skill to monitor target or threat situation and environmental factors.
Skill to monitor threat effects to partner capabilities and maintain a running estimate.
Skill to orchestrate intelligence planning teams, coordinate collection and production support, and monitor status.
Skill to relate intelligence resources/assets to anticipated intelligence requirements.
Skill to synchronize planning activities and required intelligence support.
Skill to analyze and assess internal and external partner cyber operations capabilities and tools.
Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
Ability to apply critical reading/thinking skills.
Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
Ability to exercise judgment when policies are not well-defined.
Ability to effectively collaborate via virtual teams.
Ability to collaborate effectively with others.
Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment.
Ability to apply approved planning development and staffing processes.
Ability to coordinate cyber operations with other organization functions or support activities.
Ability to develop or recommend planning solutions to problems and situations for which no precedent exists.
Ability to identify external partners with common cyber operations interests.
Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.
Ability to interpret and understand complex and rapidly evolving concepts.
Ability to participate as a member of planning teams, coordination groups, and task forces as necessary.
Ability to tailor technical and planning information to a customer’s level of understanding.
Ability to translate, track, and prioritize information needs and intelligence collection requirements across the extended enterprise.
Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives.
Coordinate for intelligence support to operational planning activities.
Assess all-source intelligence and recommend targets to support cyber operation objectives.
Assess target vulnerabilities and/or operational capabilities to determine course of action.
Assist and advise interagency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives.
Assist in the development and refinement of priority information requirements.
Enable synchronization of intelligence support plans across partner organizations as required.
Provide input to the identification of cyber-related success criteria.
Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials).
Contribute to crisis action planning for cyber operations.
Contribute to the development of the organization's decision support tools if necessary.
Incorporate intelligence equities into the overall design of cyber operations plans.
Coordinate with intelligence planners to ensure that collection managers receive information requirements.
Coordinate with the intelligence planning team to assess capability to satisfy assigned intelligence tasks.
Coordinate, produce, and track intelligence requirements.
Coordinate, synchronize and draft applicable intelligence sections of cyber operations plans.
Use intelligence estimates to counter potential target actions.
Determine indicators (e.g., measures of effectiveness) that are best suited to specific cyber operation objectives.
Develop and review intelligence guidance for integration into supporting cyber operations planning and execution.
Develop detailed intelligence support to cyber operations requirements.
Develop potential courses of action.
Develop, implement, and recommend changes to appropriate planning procedures and policies.
Draft cyber intelligence collection and production requirements.
Ensure that intelligence planning activities are integrated and synchronized with operational planning timelines.
Evaluate intelligence estimates to support the planning cycle.
Evaluate the conditions that affect employment of available cyber intelligence capabilities.
Incorporate intelligence and counterintelligence to support plan development.
Identify all available partner intelligence capabilities and limitations supporting cyber operations.
Identify, draft, evaluate, and prioritize relevant intelligence or information requirements.
Identify cyber intelligence gaps and shortfalls for cyber operational planning.
Identify the need, scope, and timeframe for applicable intelligence environment preparation derived production.
Provide input to or develop courses of action based on threat factors.
Interpret environment preparations assessments to determine a course of action.
Issue requests for information.
Lead and coordinate intelligence support to operational planning.
Maintain relationships with internal and external partners involved in cyber planning or related areas.
Maintain situational awareness to determine if changes to the operating environment require review of the plan.
Provide subject matter expertise to planning teams, coordination groups, and task forces as necessary.
Conduct long-range, strategic planning efforts with internal and external partners in cyber activities.
Prepare for and provide subject matter expertise to exercises.
Provide cyber focused guidance and advice on intelligence support plan inputs.
Recommend refinement, adaption, termination, and execution of operational plans as appropriate.
Review and comprehend organizational leadership objectives and guidance for planning.
Scope the cyber intelligence planning effort.
Document lessons learned that convey the results of events and/or exercises.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.