Analyze
Ukraine
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of cybersecurity and privacy principles.
Knowledge of cyber threats an`d vulnerabilities.
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of human-computer interaction principles.
Knowledge of network traffic analysis methods.
Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
Knowledge of website types, administration, functions, and content management system (CMS).
Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
Knowledge of classification and control markings standards, policies and procedures.
Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).
Knowledge of current computer-based intrusion sets.
Knowledge of cyber intelligence/information collection capabilities and repositories.
Knowledge of cyber operations terminology/lexicon.
Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).
Knowledge of evolving/emerging communications technologies.
Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects.
Knowledge of general Supervisory control and data acquisition (SCADA) system components.
Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability.
Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
Knowledge of how modern digital and telephony networks impact cyber operations.
Knowledge of how modern wireless communications systems impact cyber operations.
Knowledge of how to extract, analyze, and use metadata.
Knowledge of intelligence disciplines.
Knowledge of intelligence preparation of the environment and similar processes.
Knowledge of intelligence support to planning, execution, and assessment.
Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions.
Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
Knowledge of malware.
Knowledge of operations security.
Knowledge of organizational hierarchy and cyber decision-making processes.
Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.
Knowledge of telecommunications fundamentals.
Knowledge of the basic structure, architecture, and design of modern communication networks.
Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
Knowledge of the ways in which targets or threats use the Internet.
Knowledge of threat and/or target systems.
Knowledge of virtualization products (VMware, Virtual PC).
Knowledge of what constitutes a “threat” to a network.
Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.
Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies.
Knowledge of collection management processes, capabilities, and limitations.
Knowledge of front-end collection systems, including traffic collection, filtering, and selection.
Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.
Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation.
Knowledge of relevant reporting and dissemination procedures.
Knowledge of implants that enable cyber collection and/or preparation activities.
Knowledge of principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis).
Knowledge of internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.
Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.
Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.
Knowledge of common networking devices and their configurations.
Knowledge of common reporting databases and tools.
Knowledge of security concepts in operating systems (e.g., Linux, Unix.)
Knowledge of data flow process for terminal or environment collection.
WITHDRAWN: Knowledge of how hubs, switches, routers work together in the design of a network. (See K0143)
Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).
Knowledge of identification and reporting processes.
Knowledge of Internet and routing protocols.
Knowledge of intrusion sets.
Knowledge of midpoint collection (process, objectives, organization, targets, etc.).
Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
Knowledge of network topology.
Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives.
Knowledge of organizational and partner policies, tools, capabilities, and procedures.
Knowledge of products and nomenclature of major vendors (e.g., security suites - Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities.
Knowledge of scripting
Knowledge of strategies and tools for target research.
Knowledge of target intelligence gathering and operational preparation techniques and life cycles.
Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.).
Knowledge of the basic structure, architecture, and design of converged applications.
Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).
Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).
Knowledge of analytical constructs and their use in assessing the operational environment
Knowledge of cyber laws and their effect on Cyber planning.
Knowledge of intelligence confidence levels.
Knowledge of internal and external partner cyber operations capabilities and tools.
Knowledge of organization or partner exploitation of digital networks.
Knowledge of specific target identifiers, and their usage.
Knowledge of cyber operations support or enabling processes.
Knowledge of cyber operation objectives, policies, and legalities.
Knowledge of governing authorities for targeting.
Knowledge of malware analysis and characteristics.
Knowledge of operational effectiveness assessment.
Knowledge of target estimated repair and recuperation times.
Knowledge of TCP/IP networking protocols.
Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations.
Knowledge of denial and deception techniques.
Knowledge of how converged technologies impact cyber operations (e.g., digital, telephony, wireless).
Knowledge of intrusion detection systems and signature development.
Knowledge of methods to integrate and summarize information from any potential sources.
Knowledge of the data flow from collection origin to repositories and tools.
Knowledge of analytic tools and techniques for language, voice and/or graphic material.
Knowledge of computer programming concepts, including computer languages, programming, testing, debugging, and file types.
Knowledge of concepts related to websites (e.g., web servers/pages, hosting, DNS, registration, web languages such as HTML).
Knowledge of customer information needs.
Knowledge of cyber operations.
Knowledge of network security implementations (e.g., host-based IDS, IPS, access control lists), including their function and placement in a network.
Knowledge of networking and Internet communications fundamentals (i.e. devices, device configuration, hardware, software, applications, ports/protocols, addressing, network architecture and infrastructure, routing, operating systems, etc.).
Knowledge of obfuscation techniques (e.g., TOR/Onion/anonymizers, VPN/VPS, encryption).
Knowledge of relevant laws, regulations, and policies.
Knowledge of specialized target language (e.g., acronyms, jargon, technical terminology, code words).
Knowledge of target language(s).
Skill in conducting non-attributable research.
Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
Skill in evaluating information for reliability, validity, and relevance.
Skill in identifying alternative analytical interpretations to minimize unanticipated outcomes.
Skill in identifying critical target elements, to include critical target elements for the cyber domain.
Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.
Skill in utilizing feedback to improve processes, products, and services.
Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources.
Skill in identifying gaps in technical capabilities.
Skill in analyzing traffic to identify network devices.
Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments.
Skill in generating operation plans in support of mission and target requirements.
Skill in identifying the devices that work at each level of protocol models.
Skill in identifying, locating, and tracking targets via geospatial analysis techniques
Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information).
Skill in researching vulnerabilities and exploits utilized in traffic.
Skill in writing (and submitting) requirements to meet gaps in technical capabilities.
Skill to analyze and assess internal and external partner cyber operations capabilities and tools.
Skill in reviewing and editing assessment products.
Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses).
Skill in determining the physical location of network devices.
Skill in performing target system analysis.
Skill in reviewing and editing target materials.
Skill in writing effectiveness reports.
Skill in analyzing essential network data (e.g., router configuration files, routing protocols).
Skill in analyzing midpoint collection data.
Skill in analyzing terminal or environment collection data.
Skill in assessing the applicability of available analytical tools to various situations.
Skill in conducting social network analysis, buddy list analysis, and/or cookie analysis.
Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
Ability to effectively collaborate via virtual teams.
Ability to think critically.
Ability to utilize multiple intelligence sources across all intelligence disciplines.
Ability to collaborate effectively with others.
Ability to identify/describe target vulnerability.
Ability to understand objectives and effects.
Ability to review processed target language materials for accuracy and completeness.