Develops detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with other planners, operators and/or analysts. Participates in targeting selection, validation, synchronization, and enables integration during the execution of cyber actions.
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats and vulnerabilities.
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of human-computer interaction principles.
Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
Knowledge and understanding of operational design.
Knowledge of website types, administration, functions, and content management system (CMS).
Knowledge of accepted organization planning systems.
Knowledge of forms of intelligence support needs, topics, and focus areas.
Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
Knowledge of classification and control markings standards, policies and procedures.
Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.
Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).
Knowledge of crisis action planning and time sensitive planning procedures.
Knowledge of crisis action planning for cyber operations.
Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.
Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber-attack) principles, capabilities, limitations, and effects.
Knowledge of cyber laws and legal considerations and their effect on cyber planning.
Knowledge of cyber operations support or enabling processes.
Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
Knowledge of deconfliction processes and procedures.
Knowledge of evolving/emerging communications technologies.
Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization.
Knowledge of fundamental cyber concepts, principles, limitations, and effects.
Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects.
Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
Knowledge of how modern digital and telephony networks impact cyber operations.
Knowledge of how modern wireless communications systems impact cyber operations.
Knowledge of information security concepts, facilitating technologies and methods.
Knowledge of intelligence support to planning, execution, and assessment.
Knowledge of internal and external partner cyber operations capabilities and tools.
Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
Knowledge of malware.
Knowledge of objectives, situation, operational environment, and the status and disposition of internal and external partner collection capabilities available to support planning.
Knowledge of operational effectiveness assessment.
Knowledge of operations security.
Knowledge of organization cyber operations programs, strategies, and resources.
Knowledge of organization decision support tools and/or methods.
Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations.
Knowledge of organization objectives, leadership priorities, and decision-making risks.
Knowledge of organization or partner exploitation of digital networks.
Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations.
Knowledge of organizational hierarchy and cyber decision-making processes.
Knowledge of organizational planning concepts.
Knowledge of organizational structures and associated intelligence capabilities.
Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.
Knowledge of planning activity initiation.
Knowledge of planning timelines adaptive, crisis action, and time-sensitive planning.
Knowledge of required intelligence planning products associated with cyber operational planning.
Knowledge of staff management, assignment, and allocation processes.
Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities
Knowledge of telecommunications fundamentals.
Knowledge of the basic structure, architecture, and design of modern communication networks.
Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
Knowledge of the critical information requirements and how they're used in planning.
Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization.
Knowledge of the information environment.
Knowledge of the organizational planning and staffing process.
Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements.
Knowledge of the outputs of course of action and exercise analysis.
Knowledge of the process used to assess the performance and impact of operations.
Knowledge of the processes to synchronize operational assessment procedures with the critical information requirement process.
Knowledge of the range of cyber operations and their underlying intelligence support needs, topics, and focus areas.
Knowledge of the relationships between end states, objectives, effects, lines of operation, etc.
Knowledge of the role of network operations in supporting and facilitating other organization operations.
Knowledge of the structure and intent of organization specific plans, guidance and authorizations.
Knowledge of the structure, architecture, and design of modern digital and telephony networks.
Knowledge of the ways in which targets or threats use the Internet.
Knowledge of virtualization products (VMware, Virtual PC).
Knowledge of what constitutes a threat? to a network.
Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.
Skill in evaluating information for reliability, validity, and relevance.
Skill in preparing and presenting briefings.
Skill in utilizing feedback to improve processes, products, and services.
Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures.
Skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action.
Skill in applying crisis planning procedures.
Skill in documenting and communicating complex technical and programmatic information.
Skill in preparing plans and related correspondence.
Skill in reviewing and editing plans.
Skill to anticipate key target or threat activities which are likely to prompt a leadership decision.
Skill to apply the process used to assess the performance and impact of cyber operations.
Skill to craft indicators of operational progress/success.
Skill to graphically depict decision support materials containing intelligence and partner capability estimates.
Skill in developing and executing comprehensive cyber operations assessment programs for assessing and validating operational performance characteristics.
Skill to distinguish between notional and actual resources and their applicability to the plan under development.
Skill to synchronize operational assessment procedures with the critical information requirement process.
Skill to analyze and assess internal and external partner cyber operations capabilities and tools.
Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
Ability to apply critical reading/thinking skills.
Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
Ability to exercise judgment when policies are not well-defined.
Ability to effectively collaborate via virtual teams.
Ability to collaborate effectively with others.
Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment.
Ability to apply approved planning development and staffing processes.
Ability to coordinate cyber operations with other organization functions or support activities.
Ability to develop or recommend planning solutions to problems and situations for which no precedent exists.
Ability to identify external partners with common cyber operations interests.
Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.
Ability to interpret and understand complex and rapidly evolving concepts.
Ability to participate as a member of planning teams, coordination groups, and task forces as necessary.
Ability to tailor technical and planning information to a customer’s level of understanding.
Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives.
Apply expertise in policy and processes to facilitate the development, negotiation, and internal staffing of plans and/or memorandums of agreement.
Assess target vulnerabilities and/or operational capabilities to determine course of action.
Assist and advise interagency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives.
Provide input to the identification of cyber-related success criteria.
Develop, review and implement all levels of planning guidance in support of cyber operations.
Contribute to crisis action planning for cyber operations.
Contribute to the development of the organization's decision support tools if necessary.
Coordinate with intelligence and cyber defense partners to obtain relevant essential information.
Use intelligence estimates to counter potential target actions.
Determine indicators (e.g., measures of effectiveness) that are best suited to specific cyber operation objectives.
Develop and maintain deliberate and/or crisis plans.
Develop and review specific cyber operations guidance for integration into broader planning activities.
Develop cyber operations plans and guidance to ensure that execution and resource allocation decisions align with organization objectives.
Develop or participate in the development of standards for providing, requesting, and/or obtaining support from external partners to synchronize cyber operations.
Develop potential courses of action.
Develop, implement, and recommend changes to appropriate planning procedures and policies.
Devise, document, and validate cyber operation strategy and planning documents.
Ensure operational planning efforts are effectively transitioned to current operations.
Ensure that intelligence planning activities are integrated and synchronized with operational planning timelines.
Evaluate intelligence estimates to support the planning cycle.
Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives.
Gather and analyze data (e.g., measures of effectiveness) to determine effectiveness, and provide reporting for follow-on activities.
Incorporate cyber operations and communications security support plans into organization objectives.
Identify cyber intelligence gaps and shortfalls for cyber operational planning.
Integrate cyber planning/targeting efforts with other organizations.
Interpret environment preparations assessments to determine a course of action.
Issue requests for information.
Maintain relationships with internal and external partners involved in cyber planning or related areas.
Maintain situational awareness of cyber-related intelligence requirements and associated tasking.
Maintain situational awareness of partner capabilities and activities.
Maintain situational awareness to determine if changes to the operating environment require review of the plan.
Monitor and evaluate integrated cyber operations to identify opportunities to meet organization objectives.
Conduct long-range, strategic planning efforts with internal and external partners in cyber activities.
Provide subject matter expertise to planning efforts with internal and external cyber operations partners.
Prepare for and provide subject matter expertise to exercises.
Provide input for the development and refinement of the cyber operations objectives, priorities, strategies, plans, and programs.
Provide input to the administrative and logistical elements of an operational support plan.
Provide planning support between internal and external partners.
Recommend refinement, adaption, termination, and execution of operational plans as appropriate.
Review, approve, prioritize, and submit operational requirements for research, development, and/or acquisition of cyber capabilities.
Submit or respond to requests for deconfliction of cyber operations.
Document lessons learned that convey the results of events and/or exercises.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.