Analyzes collected information to identify vulnerabilities and potential for exploitation.
Below are the roles for this Specialty Area. Click each role to see the KSAs (Knowledge, Skills, and Abilities) and Tasks.
Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
Ability to collaborate effectively with others.
Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
Ability to expand network access by conducting target analysis and collection to identify targets of interest.
Ability to identify/describe target vulnerability.
Ability to identify/describe techniques/methods for conducting technical exploitation of the target.
Ability to select the appropriate implant to achieve operational goals.
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats and vulnerabilities.
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of application vulnerabilities.
Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies.
Knowledge of collection management processes, capabilities, and limitations.
Knowledge of front-end collection systems, including traffic collection, filtering, and selection.
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.
Knowledge of website types, administration, functions, and content management system (CMS).
Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation.
Knowledge of relevant reporting and dissemination procedures.
Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
Knowledge of implants that enable cyber collection and/or preparation activities.
Knowledge of principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis).
Knowledge of internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.
Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.
Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.
Knowledge of common networking devices and their configurations.
Knowledge of common reporting databases and tools.
Knowledge of concepts for operating systems (e.g., Linux, Unix.)
Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
Knowledge of data flow process for terminal or environment collection.
Knowledge of evasion strategies and techniques.
Knowledge of how hubs, switches, routers work together in the design of a network.
Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).
Knowledge of identification and reporting processes.
Knowledge of Internet and routing protocols.
Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
Knowledge of intrusion sets.
Knowledge of midpoint collection (process, objectives, organization, targets, etc.).
Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
Knowledge of network topology.
Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives.
Knowledge of organizational and partner policies, tools, capabilities, and procedures.
Knowledge of products and nomenclature of major vendors (e.g., security suites - Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities.
Knowledge of scripting
Knowledge of strategies and tools for target research.
Knowledge of target intelligence gathering and operational preparation techniques and life cycles.
Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.).
Knowledge of the basic structure, architecture, and design of converged applications.
Knowledge of the basic structure, architecture, and design of modern communication networks.
Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).
Skill in identifying gaps in technical capabilities.
Skill in analyzing traffic to identify network devices.
Skill in creating and extracting important information from packet captures.
Skill in creating collection requirements in support of data acquisition activities.
Skill in creating plans in support of remote operations.
Skill in depicting source or collateral data on a network map.
Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments.
Skill in evaluating accesses for intelligence value.
Skill in generating operation plans in support of mission and target requirements.
Skill in identifying the devices that work at each level of protocol models.
Skill in identifying, locating, and tracking targets via geospatial analysis techniques
Skill in interpreting compiled and interpretive programming languages.
Skill in interpreting metadata and content as applied by collection systems.
Skill in navigating network visualization software.
Skill in performing data fusion from existing intelligence for enabling new and continued collection.
Skill in recognizing and interpreting malicious network activity in traffic.
Skill in recognizing midpoint opportunities and essential information.
Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information).
Skill in researching vulnerabilities and exploits utilized in traffic.
Skill in target development in direct support of collection operations.
Skill in using databases to identify target-relevant information.
Skill in using non-attributable networks.
Skill in using trace route tools and interpreting the results as they apply to network analysis and reconstruction.
Skill in writing (and submitting) requirements to meet gaps in technical capabilities.
Conduct and/or support authorized penetration testing on enterprise network assets.
Perform penetration testing as required for new or updated applications.
Apply and utilize authorized cyber capabilities to enable access to targeted networks.
Apply cyber collection, environment preparation and engagement expertise to enable new exploitation and/or continued collection operations, or in support of customer requirements.
Apply and obey applicable statutes, laws, regulations and policies.
Perform analysis for target infrastructure exploitation activities.
Collaborate with other internal and external partner organizations on target access and operational issues.
Communicate new developments, breakthroughs, challenges and lessons learned to leadership, and internal and external customers.
Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access.
Conduct independent in-depth target and technical analysis including target-specific information (e.g., cultural, organizational, political) that results in access.
Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.
Examine intercept-related metadata and content with an understanding of targeting significance.
Collaborate with developers, conveying target and technical knowledge in tool requirements submissions, to enhance tool development.
Identify gaps in our understanding of target technology and developing innovative collection approaches.
Identify, locate, and track targets via geospatial analysis techniques.
Lead or enable exploitation operations in support of organization objectives and target requirements.
Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications.
Monitor target networks to provide indications and warning of target communications changes or processing failures.
Produce network reconstructions.
Profile network or system administrators and their activities.