Works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats and vulnerabilities.
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
Knowledge of accepted organization planning systems.
Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
Knowledge of classification and control markings standards, policies and procedures.
Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.
Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).
Knowledge of crisis action planning for cyber operations.
Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.
Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber-attack) principles, capabilities, limitations, and effects.
Knowledge of cyber laws and legal considerations and their effect on cyber planning.
Knowledge of cyber operations support or enabling processes.
Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
Knowledge of deconfliction processes and procedures.
Knowledge of evolving/emerging communications technologies.
Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization.
Knowledge of fundamental cyber concepts, principles, limitations, and effects.
Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects.
Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
Knowledge of information security concepts, facilitating technologies and methods.
Knowledge of internal and external partner cyber operations capabilities and tools.
Knowledge of operations security.
Knowledge of organization cyber operations programs, strategies, and resources.
Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations.
Knowledge of organization objectives, leadership priorities, and decision-making risks.
Knowledge of organization or partner exploitation of digital networks.
Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations.
Knowledge of organizational hierarchy and cyber decision-making processes.
Knowledge of organizational planning concepts.
Knowledge of organizational structures and associated intelligence capabilities.
Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities
Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements.
Knowledge of the structure and intent of organization specific plans, guidance and authorizations.
Knowledge of the structure, architecture, and design of modern digital and telephony networks.
Skill in evaluating information for reliability, validity, and relevance.
Skill in preparing and presenting briefings.
Skill in utilizing feedback to improve processes, products, and services.
Skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action.
Skill in applying crisis planning procedures.
Skill in documenting and communicating complex technical and programmatic information.
Skill in preparing plans and related correspondence.
Skill to distinguish between notional and actual resources and their applicability to the plan under development.
Skill to analyze and assess internal and external partner cyber operations capabilities and tools.
Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
Ability to apply critical reading/thinking skills.
Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
Ability to exercise judgment when policies are not well-defined.
Ability to effectively collaborate via virtual teams.
Ability to collaborate effectively with others.
Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment.
Ability to apply approved planning development and staffing processes.
Ability to coordinate cyber operations with other organization functions or support activities.
Ability to develop or recommend planning solutions to problems and situations for which no precedent exists.
Ability to identify external partners with common cyber operations interests.
Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.
Ability to interpret and understand complex and rapidly evolving concepts.
Ability to participate as a member of planning teams, coordination groups, and task forces as necessary.
Ability to tailor technical and planning information to a customer's level of understanding.
Apply expertise in policy and processes to facilitate the development, negotiation, and internal staffing of plans and/or memorandums of agreement.
Assist and advise interagency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives.
Provide expertise to course of action development.
Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials).
Contribute to crisis action planning for cyber operations.
Contribute to the development, staffing, and coordination of cyber operations policies, performance standards, plans and approval packages with appropriate internal and/or external decision makers.
Coordinate with intelligence and cyber defense partners to obtain relevant essential information.
Develop or participate in the development of standards for providing, requesting, and/or obtaining support from external partners to synchronize cyber operations.
Develop or shape international cyber engagement strategies, policies, and activities to meet organization objectives.
Develop strategy and processes for partner planning, operations, and capability development.
Develop, implement, and recommend changes to appropriate planning procedures and policies.
Develop, maintain, and assess cyber cooperation security agreements with external partners.
Facilitate interactions between internal and external partner decision makers to synchronize and integrate courses of action in support of objectives.
Facilitate the sharing of “best practices” and “lessons learned” throughout the cyber operations community.
Identify and manage security cooperation priorities with external partners.
Inform external partners of the potential effects of new or revised policy and guidance on cyber operations partnering activities.
Integrate cyber planning/targeting efforts with other organizations.
Maintain relationships with internal and external partners involved in cyber planning or related areas.
Monitor and evaluate integrated cyber operations to identify opportunities to meet organization objectives.
Contribute to the review and refinement of policy, to include assessments of the consequences of endorsing or not endorsing such policy.
Provide subject matter expertise to planning teams, coordination groups, and task forces as necessary.
Conduct long-range, strategic planning efforts with internal and external partners in cyber activities.
Provide subject matter expertise to planning efforts with internal and external cyber operations partners.
Propose policy which governs interactions with external coordination groups.
Prepare for and provide subject matter expertise to exercises.
Provide cyber focused guidance and advice on intelligence support plan inputs.
Provide input for the development and refinement of the cyber operations objectives, priorities, strategies, plans, and programs.
Provide planning support between internal and external partners.
Serve as a conduit of information from partner teams by identifying subject matter experts who can assist in the investigation of complex or unusual situations.
Serve as a liaison with external partners.
Submit or respond to requests for deconfliction of cyber operations.
Synchronize cyber international engagement activities and associated resource requirements as appropriate.
Synchronize cyber portions of security cooperation plans.
Document lessons learned that convey the results of events and/or exercises.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.