Mission Assessment Specialist

Develops assessment plans and measures of performance/effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness.

Below are the Knowledge, Skills, Abilities and Tasks identified as being required to perform this work role.

CoursesDESCRIPTION
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
K0003Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
K0004Knowledge of cybersecurity and privacy principles.
K0005Knowledge of cyber threats and vulnerabilities.
K0006Knowledge of specific operational impacts of cybersecurity lapses.
K0036Knowledge of human-computer interaction principles.
K0058Knowledge of network traffic analysis methods.
K0108Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
K0109Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
K0177Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
K0349Knowledge of website types, administration, functions, and content management system (CMS).
K0362Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.).
K0377Knowledge of classification and control markings standards, policies and procedures.
K0392Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
K0395Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).
K0405Knowledge of current computer-based intrusion sets.
K0409Knowledge of cyber intelligence/information collection capabilities and repositories.
K0410Knowledge of cyber laws and their effect on Cyber planning.
K0414Knowledge of cyber operations support or enabling processes.
K0417Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
K0427Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).
K0431Knowledge of evolving/emerging communications technologies.
K0436Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects.
K0437Knowledge of general Supervisory control and data acquisition (SCADA) system components.
K0440Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability.
K0444Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
K0445Knowledge of how modern digital and telephony networks impact cyber operations.
K0446Knowledge of how modern wireless communications systems impact cyber operations.
K0449Knowledge of how to extract, analyze, and use metadata.
K0457Knowledge of intelligence confidence levels.
K0460Knowledge of intelligence preparation of the environment and similar processes.
K0464Knowledge of intelligence support to planning, execution, and assessment.
K0465Knowledge of internal and external partner cyber operations capabilities and tools.
K0469Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions.
K0471Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
K0480Knowledge of malware.
K0507Knowledge of organization or partner exploitation of digital networks.
K0511Knowledge of organizational hierarchy and cyber decision-making processes.
K0516Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.
K0549Knowledge of target vetting and validation procedures.
K0551Knowledge of targeting cycles.
K0556Knowledge of telecommunications fundamentals.
K0560Knowledge of the basic structure, architecture, and design of modern communication networks.
K0561Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
K0565Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
K0598Knowledge of the structure and intent of organization specific plans, guidance and authorizations.
K0603Knowledge of the ways in which targets or threats use the Internet.
K0604Knowledge of threat and/or target systems.
K0610Knowledge of virtualization products (VMware, Virtual PC).
K0612Knowledge of what constitutes a ??threat?? to a network.
K0614Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems.
IDDESCRIPTION
S0189Skill in assessing and/or estimating effects generated during and after cyber operations.
S0194Skill in conducting non-attributable research.
S0203Skill in defining and characterizing all pertinent aspects of the operational environment.
S0211Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
S0216Skill in evaluating available capabilities against desired effects to provide effective courses of action.
S0218Skill in evaluating information for reliability, validity, and relevance.
S0227Skill in identifying alternative analytical interpretations to minimize unanticipated outcomes.
S0228Skill in identifying critical target elements, to include critical target elements for the cyber domain.
S0229Skill in identifying cyber threats which may jeopardize organization and/or partner interests.
S0249Skill in preparing and presenting briefings.
S0254Skill in providing analysis to aid writing phased after action reports.
S0256Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.
S0271Skill in reviewing and editing assessment products.
S0278Skill in tailoring analysis to the necessary levels (e.g., classification and organizational).
S0285Skill in using Boolean operators to construct simple and complex queries.
S0288Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst??s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).
S0289Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.
S0292Skill in using targeting databases and software packages.
S0296Skill in utilizing feedback to improve processes, products, and services.
S0297Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).
S0303Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources.
S0360Skill to analyze and assess internal and external partner cyber operations capabilities and tools.
IDDESCRIPTION
A0013Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
A0066Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
A0072Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.
A0080Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
A0082Ability to effectively collaborate via virtual teams.
A0083Ability to evaluate information for reliability, validity, and relevance.
A0084Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
A0085Ability to exercise judgment when policies are not well-defined.
A0087Ability to focus research efforts to meet the customer??s decision-making needs.
A0088Ability to function effectively in a dynamic, fast-paced environment.
A0089Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts??both internal and external to the organization??to leverage analytical and technical expertise.
A0091Ability to identify intelligence gaps.
A0101Ability to recognize and mitigate cognitive biases which may affect analysis.
A0102Ability to recognize and mitigate deception in reporting and analysis.
A0106Ability to think critically.
A0107Ability to think like threat actors.
A0108Ability to understand objectives and effects.
A0109Ability to utilize multiple intelligence sources across all intelligence disciplines.
IDDESCRIPTION
T0582Provide expertise to course of action development.
T0583Provide subject matter expertise to the development of a common operational picture.
T0585Provide subject matter expertise to the development of cyber operations specific indicators.
T0586Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.
T0588Provide expertise to the development of measures of effectiveness and measures of performance.
T0589Assist in the identification of intelligence collection shortfalls.
T0593Brief threat and/or target current situations.
T0597Collaborate with intelligence analysts/targeting organizations involved in related areas.
T0611Conduct end-of-operations assessments.
T0615Conduct in-depth research and analysis.
T0617Conduct nodal analysis.
T0624Conduct target research and analysis.
T0660Develop information requirements necessary for answering priority information requests.
T0661Develop measures of effectiveness and measures of performance.
T0663Develop munitions effectiveness assessment or operational assessment materials.
T0678Engage customers to understand customers¡¯ intelligence needs and wants.
T0684Estimate operational effects generated through cyber activities.
T0685Evaluate threat decision-making processes.
T0686Identify threat vulnerabilities.
T0707Generate requests for information.
T0718Identify intelligence gaps and shortfalls.
T0748Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets.
T0749Monitor and report on validated threat activities.
T0752Monitor operational environment and report on adversarial activities which fulfill leadership¡¯s priority information requirements.
T0758Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
T0761Provide subject-matter expertise and support to planning/developmental forums and working groups as appropriate.
T0782Provide analyses and support for effectiveness assessment.
T0783Provide current intelligence support to critical internal/external stakeholders as appropriate.
T0785Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations.
T0786Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.
T0788Provide input and assist in post-action effectiveness assessments.
T0789Provide input and assist in the development of plans and guidance.
T0793Provide effectiveness support to designated exercises, and/or time sensitive operations.
T0797Provide target recommendations which meet leadership objectives.
T0834Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date.