Intel (Cyber) (IN)
DCWF 111
All-Source Analyst
Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.
Tasks
The concrete work activities defined for this role in the DCWF v5.1 spreadsheet. Core tasks are required for the role; additional tasks are associated but not mandatory.
- T2028 additional Answer requests for information.
- T2059 additional Provide expertise to course of action development.
- T2060 additional Provide subject matter expertise to the development of a common operational picture.
- T2060A additional Maintain a common intelligence picture.
- T2061 additional Provide subject matter expertise to the development of cyber operations specific indicators.
- T2063 additional Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.
- T2068 additional Assist in the identification of intelligence collection shortfalls.
- T2075 additional Brief threat and/or target current situations.
- T2087 additional Collaborate with intelligence analysts/targeting organizations involved in related areas.
- T2115 additional Conduct in-depth research and analysis.
- T2121 additional Conduct nodal analysis.
- T2195 additional Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology.
- T2288 additional Develop information requirements necessary for answering priority information requests.
- T2356 additional Engage customers to understand customers’ intelligence needs and wants.
- T2379 additional Evaluate threat decision-making processes.
- T2379A additional Identify threat vulnerabilities.
- T2379B additional Identify threats to Blue Force vulnerabilities.
- T2429 additional Generate requests for information.
- T2434 additional Identify threat tactics, and methodologies.
- T2441 additional Identify and evaluate threat critical capabilities, requirements, and vulnerabilities.
- T2446 additional Identify and submit intelligence requirements for the purposes of designating priority information requirements.
- T2459 additional Identify intelligence gaps and shortfalls.
- T2593 additional Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.
- T2594 additional Monitor and report on validated threat activities.
- T2602 additional Monitor open source websites for hostile content directed towards organizational or partner interests.
- T2603 additional Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements.
- T2617 additional Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
- T2621 additional Provide SME and support to planning/developmental forums and working groups as appropriate.
- T2685A additional Provide subject matter expertise to website characterizations.
- T2730 additional Provide analyses and support for effectiveness assessment.
- T2735 additional Provide current intelligence support to critical internal/external stakeholders as appropriate.
- T2738 additional Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.
- T2745 additional Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.
- T2747 additional Provide input and assist in post-action effectiveness assessments.
- T2748 additional Provide input and assist in the development of plans and guidance.
- T2754 additional Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.
- T2767 additional Provide target recommendations which meet leadership objectives.
- T2771 additional Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.
- T2789 additional Report intelligence-derived significant network events and intrusions.
- T2881 additional Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date.
Knowledge, Skills, and Abilities
KSA statements define what a person filling this role knows or can do. "Knowledge" is what they must know, "Skill" is what they can perform, and "Ability" is a durable capacity they bring to the work.
- A3001 ability core Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
- A3002 ability core Ability to focus research efforts to meet the customer’s decision-making needs.
- A3019 ability core Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.
- A3022 ability core Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
- A3041 ability core Ability to effectively collaborate via virtual teams.
- A3042 ability core Ability to evaluate information for reliability, validity, and relevance.
- A3043 ability core Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
- A3047 ability core Ability to function effectively in a dynamic, fast-paced environment.
- A3048 ability core Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—in order to leverage analytical and technical expertise.
- A3052 ability core Ability to identify intelligence gaps.
- A3073 ability core Ability to recognize and mitigate cognitive biases which may affect analysis.
- A3077 ability core Ability to think critically.
- A3081 ability core Ability to utilize multiple intelligence sources across all intelligence disciplines.
- K0087 knowledge core Knowledge of network traffic analysis methods.
- K0264 knowledge core Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
- K3106 knowledge core Knowledge of a wide range of basic communications media concepts and terminology (e.g., computer and telephone networks, satellite, cable, wireless).
- K3107 knowledge core Knowledge of a wide range of concepts associated with websites (e.g., website types, administration, functions, software systems, etc.).
- K3129 knowledge core Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
- K3137 knowledge core Knowledge of basic malicious activity concepts (e.g., foot printing, scanning and enumeration).
- K3154 knowledge core Knowledge of classification and control markings standards, policies and procedures.
- K3177 knowledge core Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
- K3188 knowledge core Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).
- K3262 knowledge core Knowledge of evolving/emerging communications technologies.
- K3274 knowledge core Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber attack, cyber defense), principles, capabilities, limitations, and effects.
- K3292 knowledge core Knowledge of how modern digital and telephony networks impact cyber operations.
- K3293 knowledge core Knowledge of how modern wireless communications systems impact cyber operations.
- K3298 knowledge core Knowledge of how to extract, analyze, and use metadata.
- K3335 knowledge core Knowledge of intelligence disciplines.
- K3342 knowledge core Knowledge of intelligence support to planning, execution, and assessment.
- K3374 knowledge core Knowledge of malware.
- K3431 knowledge core Knowledge of OSI model and underlying network protocols (e.g., TCP/IP).
- K3441 knowledge core Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.
- K3539 knowledge core Knowledge of telecommunications fundamentals.
- K3543 knowledge core Knowledge of the basic structure, architecture, and design of modern communication networks.
- K3545 knowledge core Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
- K3561 knowledge core Knowledge of the common networking and routing protocols(e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
- K3582 knowledge core Knowledge of the intelligence frameworks, processes, and related systems.
- K3584 knowledge core Knowledge of intelligence preparation of the environment and similar processes.
- K3630 knowledge core Knowledge of the ways in which targets or threats use the Internet.
- K3651 knowledge core Knowledge of what constitutes a “threat” to a network.
- K3659 knowledge core Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.
- S3772 skill core Skill in evaluating information for reliability, validity, and relevance.
- S3794 skill core Skill in identifying cyber threats which may jeopardize organization and/or partner interests.
- S3844 skill core Skill in preparing and presenting briefings.
- S3851 skill core Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.
- S3876 skill core Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources.
- S3910 skill core Skill in using Boolean operators to construct simple and complex queries.
- S3920 skill core Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).
- S3921 skill core Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.
- S3938 skill core Skill in utilizing feedback in order to improve processes, products, and services.
- A3039 ability additional Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
- A3044 ability additional Ability to exercise judgment when policies are not well-defined.
- A3074 ability additional Ability to recognize and mitigate deception in reporting and analysis.
- A3078A ability additional Ability to think like threat actors.
- A3079 ability additional Ability to understand objectives and effects.
- K0052 knowledge additional Knowledge of human-computer interaction principles.
- K3095 knowledge additional Knowledge of internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
- K3098 knowledge additional Knowledge of virtualization products (Vmware, Virtual PC).
- K3205 knowledge additional Knowledge of current computer-based intrusion sets.
- K3210 knowledge additional Knowledge of cyber laws and their effect on Cyber planning.
- K3253 knowledge additional Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).
- K3271 knowledge additional Knowledge of internal and external partner cyber operations capabilities and tools.
- K3277 knowledge additional Knowledge of general SCADA system components.
- K3286 knowledge additional Knowledge of host-based security products and how they affect exploitation and vulnerability.
- K3291 knowledge additional Knowledge of how internet applications work (SMTP email, web-based email, chat clients, VOIP).
- K3334 knowledge additional Knowledge of intelligence confidence levels.
- K3343 knowledge additional Knowledge of cyber intelligence/information collection capabilities and repositories.
- K3358 knowledge additional Knowledge of organizational hierarchy and cyber decision making processes.
- K3419 knowledge additional Knowledge of organization or partner exploitation of digital networks.
- K3446 knowledge additional Knowledge of analytical constructs and their use in assessing the operational environment.
- K3460 knowledge additional Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions.
- K3504 knowledge additional Knowledge of threat and/or target systems.
- K3527 knowledge additional Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.).
- K3528 knowledge additional Knowledge of specific target identifiers, and their usage.
- K3533 knowledge additional Knowledge of target vetting and validation procedures.
- K3587 knowledge additional Knowledge of targeting cycles.
- K3615 knowledge additional Knowledge of the structure and intent of organization specific plans, guidance and authorizations.
- S3691 skill additional Skill in assessing and/or estimating effects generated during and after cyber operations.
- S3704 skill additional Skill in conducting non-attributable research.
- S3724 skill additional Skill in defining and characterizing all pertinent aspects of the operational environment.
- S3756 skill additional Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
- S3788 skill additional Skill in identifying alternative analytical interpretations in order to minimize unanticipated outcomes.
- S3893 skill additional Skill in tailoring analysis to the necessary levels (e.g., classification and organizational).
- S3946 skill additional Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).
- S3953A skill additional Skill in providing analysis to aid writing phased after action reports.