Exploitation Analyst

Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.

Below are the Knowledge, Skills, Abilities and Tasks identified as being required to perform this work role.

Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
K0003Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
K0004Knowledge of cybersecurity and privacy principles.
K0005Knowledge of cyber threats and vulnerabilities.
K0006Knowledge of specific operational impacts of cybersecurity lapses.
K0108Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
K0109Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
K0131Knowledge of web mail collection, searching/analyzing techniques, tools, and cookies.
K0142Knowledge of collection management processes, capabilities, and limitations.
K0143Knowledge of front-end collection systems, including traffic collection, filtering, and selection.
K0177Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
K0224Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.
K0349Knowledge of website types, administration, functions, and content management system (CMS).
K0351Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation.
K0354Knowledge of relevant reporting and dissemination procedures.
K0362Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
K0368Knowledge of implants that enable cyber collection and/or preparation activities.
K0371Knowledge of principles of the collection development processes (e.g., Dialed Number Recognition, Social Network Analysis).
K0376Knowledge of internal and external customers and partner organizations, including information needs, objectives, structure, capabilities, etc.
K0379Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc.
K0388Knowledge of collection searching/analyzing techniques and tools for chat/buddy list, emerging technologies, VOIP, Media Over IP, VPN, VSAT/wireless, web mail and cookies.
K0393Knowledge of common networking devices and their configurations.
K0394Knowledge of common reporting databases and tools.
K0397Knowledge of security concepts in operating systems (e.g., Linux, Unix.)
K0417Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
K0418Knowledge of data flow process for terminal or environment collection.
K0430Knowledge of evasion strategies and techniques.
K0443WITHDRAWN: Knowledge of how hubs, switches, routers work together in the design of a network. (See K0143)
K0444Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
K0447Knowledge of how to collect, view, and identify essential information on targets of interest from metadata (e.g., email, http).
K0451Knowledge of identification and reporting processes.
K0470Knowledge of Internet and routing protocols.
K0471Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
K0473Knowledge of intrusion sets.
K0484Knowledge of midpoint collection (process, objectives, organization, targets, etc.).
K0487Knowledge of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
K0489Knowledge of network topology.
K0509Knowledge of organizational and partner authorities, responsibilities, and contributions to achieving objectives.
K0510Knowledge of organizational and partner policies, tools, capabilities, and procedures.
K0523Knowledge of products and nomenclature of major vendors (e.g., security suites – Trend Micro, Symantec, McAfee, Outpost, and Panda) and how those products affect exploitation and reduce vulnerabilities.
K0529Knowledge of scripting
K0535Knowledge of strategies and tools for target research.
K0544Knowledge of target intelligence gathering and operational preparation techniques and life cycles.
K0557Knowledge of terminal or environmental collection (process, objectives, organization, targets, etc.).
K0559Knowledge of the basic structure, architecture, and design of converged applications.
K0560Knowledge of the basic structure, architecture, and design of modern communication networks.
K0608Knowledge of Unix/Linux and Windows operating systems structures and internals (e.g., process management, directory structure, installed applications).
S0066Skill in identifying gaps in technical capabilities.
S0184Skill in analyzing traffic to identify network devices.
S0199Skill in creating and extracting important information from packet captures.
S0200Skill in creating collection requirements in support of data acquisition activities.
S0201Skill in creating plans in support of remote operations. (i.e., hot/warm/cold/alternative sites, disaster recovery).
S0204Skill in depicting source or collateral data on a network map.
S0207Skill in determining the effect of various router and firewall configurations on traffic patterns and network performance in both LAN and WAN environments.
S0214Skill in evaluating accesses for intelligence value.
S0223Skill in generating operation plans in support of mission and target requirements.
S0236Skill in identifying the devices that work at each level of protocol models.
S0237Skill in identifying, locating, and tracking targets via geospatial analysis techniques
S0239Skill in interpreting compiled and interpretive programming languages.
S0240Skill in interpreting metadata and content as applied by collection systems.
S0245Skill in navigating network visualization software.
S0247Skill in performing data fusion from existing intelligence for enabling new and continued collection.
S0258Skill in recognizing and interpreting malicious network activity in traffic.
S0260Skill in recognizing midpoint opportunities and essential information.
S0264Skill in recognizing technical information that may be used for leads to enable remote operations (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI behavior, mail servers, domain servers, SMTP header information).
S0269Skill in researching vulnerabilities and exploits utilized in traffic.
S0279Skill in target development in direct support of collection operations.
S0286Skill in using databases to identify target-relevant information.
S0290Skill in using non-attributable networks.
S0294Skill in using trace route tools and interpreting the results as they apply to network analysis and reconstruction.
S0300Skill in writing (and submitting) requirements to meet gaps in technical capabilities.
A0013Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
A0066Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
A0074Ability to collaborate effectively with others.
A0080Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
A0084Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
A0086Ability to expand network access by conducting target analysis and collection to identify targets of interest.
A0092Ability to identify/describe target vulnerability.
A0093Ability to identify/describe techniques/methods for conducting technical exploitation of the target.
A0104Ability to select the appropriate implant to achieve operational goals.
T0028Conduct and/or support authorized penetration testing on enterprise network assets.
T0266Perform penetration testing as required for new or updated applications.
T0570Apply and utilize authorized cyber capabilities to enable access to targeted networks.
T0572Apply cyber collection, environment preparation and engagement expertise to enable new exploitation and/or continued collection operations, or in support of customer requirements.
T0574Apply and obey applicable statutes, laws, regulations and policies.
T0591Perform analysis for target infrastructure exploitation activities.
T0600Collaborate with other internal and external partner organizations on target access and operational issues.
T0603Communicate new developments, breakthroughs, challenges and lessons learned to leadership, and internal and external customers.
T0608Conduct analysis of physical and logical digital technologies (e.g., wireless, SCADA, telecom) to identify potential avenues of access.
T0614Conduct independent in-depth target and technical analysis including target-specific information (e.g., cultural, organizational, political) that results in access.
T0641Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.
T0695Examine intercept-related metadata and content with an understanding of targeting significance.
T0701Collaborate with developers, conveying target and technical knowledge in tool requirements submissions, to enhance tool development.
T0720Identify gaps in our understanding of target technology and developing innovative collection approaches.
T0727Identify, locate, and track targets via geospatial analysis techniques.
T0736Lead or enable exploitation operations in support of organization objectives and target requirements.
T0738Maintain awareness of advancements in hardware and software technologies (e.g., attend training or conferences, reading) and their potential implications.
T0754Monitor target networks to provide indications and warning of target communications changes or processing failures.
T0775Produce network reconstructions.
T0777Profile network or system administrators and their activities.