Joint Targeting Analyst
Joint Targeting Analyst conduct target development at the system, component and entity levels. Builds and maintains Electronic Target Folders (ETFs), to include inputs from JIPOE, Target System Analysis (TSA), GMI and other IC sources. Senior analysts run collaborative target working groups across Geographic Combatant Commands (GCCs) and IC members, and present candidate targets for IC vetting and commander’s approval for inclusion on target lists. JTAs assess damage resulting from the application of lethal or non-lethal military force, and write Battle Damage Assessment (BDA) reports and coordinate federated support as required.
Tasks
The concrete work activities defined for this role in the DCWF v5.1 spreadsheet. Core tasks are required for the role; additional tasks are associated but not mandatory.
- T2001 additional Accurately characterize targets.
- T2068 additional Assist in the identification of intelligence collection shortfalls.
- T2089 additional Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas.
- T2134 additional Conduct target research and analysis.
- T2170 additional Coordinate target vetting with appropriate partners.
- T2289 additional Develop measures of effectiveness and measures of performance.
- T2459 additional Identify intelligence gaps and shortfalls.
- T2524 additional Integrate cyber planning/targeting efforts with other organizations.
- T2628 additional Participate in exercises.
- T2716 additional Produce target system analysis products.
- T2882 additional Work closely with planners, analysts, and collection managers to identify intelligence gaps and ensure intelligence requirements are accurate and up-to-date.
- T8024 additional Provide input for targeting community meetings (e.g., Targeting Issues Working Group (TIWG), Military Targeting Committee (MTC), etc.).
- T8027 additional Build and maintain target materials.
- T8077 additional Develop, or assist in the development, of a Collateral Effects Estimation (CEE) methodology for cyberspace.
- T8133 additional Maintain situational awareness of the common intelligence picture and/or common operational picture as applicable
- T8140 additional Participate in Boards, Bureaus, Cells, Centers, and Working Groups (B2C2WGs).
- T8143 additional Participate in the Joint Planning Process and other commander and staff planning processes.
- T8160 additional Provide analysis and support for combat assessments.
- T8177 additional Provide targeting support to all aspects of target planning/operations (etc. deliberate, dynamic targets).
- T8195 additional Support target list management (i.e. Restricted Target List (RTL), Joint Target List (JTL), Candidate Target List (CTL), etc.).
- T8214 additional Understand measures of effectiveness and measures of performance.
Knowledge, Skills, and Abilities
KSA statements define what a person filling this role knows or can do. "Knowledge" is what they must know, "Skill" is what they can perform, and "Ability" is a durable capacity they bring to the work.
- A3001 ability additional Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
- A3040 ability additional Ability to develop or recommend planning solutions to problems and situations for which no precedent exists.
- A3044 ability additional Ability to exercise judgment when policies are not well-defined.
- A3073 ability additional Ability to recognize and mitigate cognitive biases which may affect analysis.
- A4202 ability additional Ability to collaborate with the IC to leverage analytical and technical expertise.
- A4203 ability additional Ability to communicate effectively when writing and speaking.
- A4227 ability additional Ability to create products to meet decision making needs.
- A4356 ability additional Ability to support the joint targeting cycle in a dynamic environment.
- A4362 ability additional Ability to understand US Code Titles as they apply to targeting in support of operations in cyberspace.
- A4373 ability additional Ability to utilize analytical constructs
- A4374 ability additional Ability to utilize and synthesize multiple intelligence sources to create products.
- K1056 knowledge additional Knowledge of operations security.
- K3154 knowledge additional Knowledge of classification and control markings standards, policies and procedures.
- K3188 knowledge additional Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).
- K3197 knowledge additional Knowledge of criticality and vulnerability factors (e.g., value, recuperation, cushion, countermeasures) for target selection and applicability to the cyber domain.
- K3218 knowledge additional Knowledge of cyber operations terminology/lexicon.
- K3250 knowledge additional Knowledge of dynamic and deliberate targeting.
- K3271 knowledge additional Knowledge of internal and external partner cyber operations capabilities and tools.
- K3281 knowledge additional Knowledge of governing authorities for targeting.
- K3334 knowledge additional Knowledge of intelligence confidence levels.
- K3335 knowledge additional Knowledge of intelligence disciplines.
- K3342 knowledge additional Knowledge of intelligence support to planning, execution, and assessment.
- K3358 knowledge additional Knowledge of organizational hierarchy and cyber decision making processes.
- K3446 knowledge additional Knowledge of analytical constructs and their use in assessing the operational environment.
- K3527 knowledge additional Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.).
- K3530 knowledge additional Knowledge of target list development (i.e. RTL, JTL, CTL, etc.).
- K3533 knowledge additional Knowledge of target vetting and validation procedures.
- K3539 knowledge additional Knowledge of telecommunications fundamentals.
- K3541 knowledge additional Knowledge of the available tools and applications associated with collection requirements and collection management.
- K3584 knowledge additional Knowledge of intelligence preparation of the environment and similar processes.
- K3587 knowledge additional Knowledge of targeting cycles.
- K3630 knowledge additional Knowledge of the ways in which targets or threats use the Internet.
- K3651 knowledge additional Knowledge of what constitutes a “threat” to a network.
- K4405 knowledge additional Knowledge of Collateral Damage Estimate (CDE) methodology
- K4406 knowledge additional Knowledge of Collateral Effects Estimation.
- K4409 knowledge additional Knowledge of combat assessment.
- K4412 knowledge additional Knowledge of Command Structure.
- K4451 knowledge additional Knowledge of the full spectrum of cyberspace operational missions (e.g., DODIN Operations, DCO, OCO), principles, capabilities, limitations, and effects.
- K4468 knowledge additional Knowledge of IC, to include members, structure, and associated missions.
- K4473 knowledge additional Knowledge of ISR capabilities and repositories (e.g., Geospatial Intelligence Information Management Services (GIMS), National SIGINT Requirements Process (NSRP), etc.).
- K4484 knowledge additional Knowledge of metadata.
- K4492 knowledge additional Knowledge of Mission Packages.
- K4514 knowledge additional Knowledge of Political, Military, Economic, Social, PMESII and Counter-Terrorism Analytical Framework analytical constructs and their use in assessing the operational environment.
- K4536 knowledge additional Knowledge of state and non-state target systems.
- K4556 knowledge additional Knowledge of the development of Intelligence Needs (INs), Intelligence Requirements (IRs), and Essential Elements of Information (EEI).
- K4559 knowledge additional Knowledge of the target entity types.
- K4562 knowledge additional Knowledge of the Joint Tactical Cyber Request (JTCR).
- K4569 knowledge additional Knowledge of the National SIGINT system.
- K4572 knowledge additional Knowledge of the Request for Support (RFS) process.
- K4574 knowledge additional Knowledge of the review and approval process for cyberspace operations Review and Approval Process of Cyber Operations (RAP-CO) process.
- K4576 knowledge additional Knowledge of the sensitive target and review (STAR) process.
- K4596 knowledge additional Knowledge of what a Tasking Order is and the information contained in it (e.g., ATO, CTO, and MTO).
- S3691 skill additional Skill in assessing and/or estimating effects generated during and after cyber operations.
- S3724 skill additional Skill in defining and characterizing all pertinent aspects of the operational environment.
- S3737 skill additional Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects.
- S3844 skill additional Skill in preparing and presenting briefings.
- S3851 skill additional Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.
- S3880 skill additional Skill in reviewing and editing target materials.
- S3893 skill additional Skill in tailoring analysis to the necessary levels (e.g., classification and organizational).
- S3920 skill additional Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).
- S3946 skill additional Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).
- S4617 skill additional Skill in creating and maintaining target materials.
- S4622 skill additional Skill in developing TSA products.
- S4634 skill additional Skill in identifying intelligence gaps to generate RFIs.
- S4654 skill additional Skill in providing input into Mission Packages.
- S4681 skill additional Skill in utilizing Microsoft Office applications (e.g., Word, PowerPoint, Excel, etc.).
- S4683 skill additional Skill in writing phased BDA reports.