AN-ASA-001 All-Source Analyst

Performs highly-specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.

Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications.

Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.

Knowledges 56

Code Description Work Roles
K0001 Knowledge of computer networking concepts and protocols, and network security methodologies. 52
K0002 Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). 52
K0003 Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. 52
K0004 Knowledge of cybersecurity and privacy principles. 52
K0005 Knowledge of cyber threats and vulnerabilities. 52
K0006 Knowledge of specific operational impacts of cybersecurity lapses. 52
K0036 Knowledge of human-computer interaction principles. 12
K0058 Knowledge of network traffic analysis methods. 10
K0108 Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). 11
K0109 Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). 15
K0177 Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). 12
K0221 Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). 3
K0349 Knowledge of website types, administration, functions, and content management system (CMS). 8
K0357 WITHDRAWN: Knowledge of analytical constructs and their use in assessing the operational environment. (See K0224) 2
K0362 Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). 9
K0377 Knowledge of classification and control markings standards, policies and procedures. 7
K0392 Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). 9
K0395 Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). 10
K0405 Knowledge of current computer-based intrusion sets. 5
K0409 Knowledge of cyber intelligence/information collection capabilities and repositories. 4
K0410 Knowledge of cyber laws and their effect on Cyber planning. 2
K0427 Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). 8
K0431 Knowledge of evolving/emerging communications technologies. 11
K0436 Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects. 8
K0437 Knowledge of general Supervisory control and data acquisition (SCADA) system components. 4
K0440 Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. 8
K0444 Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). 11
K0445 Knowledge of how modern digital and telephony networks impact cyber operations. 9
K0446 Knowledge of how modern wireless communications systems impact cyber operations. 8
K0449 Knowledge of how to extract, analyze, and use metadata. 7
K0457 Knowledge of intelligence confidence levels. 3
K0458 Knowledge of intelligence disciplines. 3
K0460 Knowledge of intelligence preparation of the environment and similar processes. 5
K0464 Knowledge of intelligence support to planning, execution, and assessment. 6
K0465 Knowledge of internal and external partner cyber operations capabilities and tools. 6
K0469 Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions. 3
K0471 Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). 9
K0480 Knowledge of malware. 8
K0507 Knowledge of organization or partner exploitation of digital networks. 6
K0511 Knowledge of organizational hierarchy and cyber decision-making processes. 6
K0516 Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. 10
K0533 Knowledge of specific target identifiers, and their usage. 2
K0542 Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.). 2
K0549 Knowledge of target vetting and validation procedures. 3
K0551 Knowledge of targeting cycles. 3
K0556 Knowledge of telecommunications fundamentals. 6
K0560 Knowledge of the basic structure, architecture, and design of modern communication networks. 10
K0561 Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). 8
K0565 Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. 11
K0577 Knowledge of the intelligence frameworks, processes, and related systems. 2
K0598 Knowledge of the structure and intent of organization specific plans, guidance and authorizations. 6
K0603 Knowledge of the ways in which targets or threats use the Internet. 6
K0604 Knowledge of threat and/or target systems. 4
K0610 Knowledge of virtualization products (VMware, Virtual PC). 7
K0612 Knowledge of what constitutes a “threat” to a network. 8
K0614 Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. 7

Skills 18

Code Description Work Roles
S0189 Skill in assessing and/or estimating effects generated during and after cyber operations. 3
S0194 Skill in conducting non-attributable research. 5
S0203 Skill in defining and characterizing all pertinent aspects of the operational environment. 6
S0211 Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. 3
S0218 Skill in evaluating information for reliability, validity, and relevance. 8
S0227 Skill in identifying alternative analytical interpretations to minimize unanticipated outcomes. 4
S0229 Skill in identifying cyber threats which may jeopardize organization and/or partner interests. 5
S0249 Skill in preparing and presenting briefings. 8
S0254 Skill in providing analysis to aid writing phased after action reports. 3
S0256 Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships. 5
S0278 Skill in tailoring analysis to the necessary levels (e.g., classification and organizational). 6
S0285 Skill in using Boolean operators to construct simple and complex queries. 4
S0288 Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst’s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.). 4
S0289 Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches. 4
S0296 Skill in utilizing feedback to improve processes, products, and services. 9
S0297 Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). 7
S0303 Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources. 3
S0360 Skill to analyze and assess internal and external partner cyber operations capabilities and tools. 6

Abilities 18

Code Description Work Roles
A0013 Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. 14
A0066 Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. 12
A0080 Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. 6
A0084 Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. 7
A0072 Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes. 3
A0082 Ability to effectively collaborate via virtual teams. 7
A0083 Ability to evaluate information for reliability, validity, and relevance. 6
A0085 Ability to exercise judgment when policies are not well-defined. 9
A0087 Ability to focus research efforts to meet the customer’s decision-making needs. 6
A0088 Ability to function effectively in a dynamic, fast-paced environment. 7
A0089 Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise. 13
A0091 Ability to identify intelligence gaps. 6
A0101 Ability to recognize and mitigate cognitive biases which may affect analysis. 6
A0102 Ability to recognize and mitigate deception in reporting and analysis. 5
A0106 Ability to think critically. 9
A0107 Ability to think like threat actors. 3
A0108 Ability to understand objectives and effects. 4
A0109 Ability to utilize multiple intelligence sources across all intelligence disciplines. 6

Tasks 40

Code Description Work Roles
T0569 Answer requests for information. 2
T0582 Provide expertise to course of action development. 5
T0583 Provide subject matter expertise to the development of a common operational picture. 3
T0584 Maintain a common intelligence picture. 2
T0585 Provide subject matter expertise to the development of cyber operations specific indicators. 3
T0586 Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. 3
T0589 Assist in the identification of intelligence collection shortfalls. 3
T0593 Brief threat and/or target current situations. 3
T0597 Collaborate with intelligence analysts/targeting organizations involved in related areas. 4
T0660 Develop information requirements necessary for answering priority information requests. 3
T0615 Conduct in-depth research and analysis. 3
T0617 Conduct nodal analysis. 5
T0642 Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology. 2
T0678 Engage customers to understand customers’ intelligence needs and wants. 2
T0685 Evaluate threat decision-making processes. 3
T0686 Identify threat vulnerabilities. 2
T0687 Identify threats to Blue Force vulnerabilities. 2
T0707 Generate requests for information. 5
T0708 Identify threat tactics, and methodologies. 2
T0710 Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. 3
T0713 Identify and submit intelligence requirements for the purposes of designating priority information requirements. 1
T0718 Identify intelligence gaps and shortfalls. 3
T0748 Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets. 3
T0749 Monitor and report on validated threat activities. 3
T0751 Monitor open source websites for hostile content directed towards organizational or partner interests. 2
T0752 Monitor operational environment and report on adversarial activities which fulfill leadership’s priority information requirements. 3
T0758 Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). 3
T0761 Provide subject-matter expertise and support to planning/developmental forums and working groups as appropriate. 4
T0771 Provide subject matter expertise to website characterizations. 1
T0782 Provide analyses and support for effectiveness assessment. 3
T0783 Provide current intelligence support to critical internal/external stakeholders as appropriate. 3
T0785 Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations. 3
T0786 Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations. 3
T0788 Provide input and assist in post-action effectiveness assessments. 2
T0789 Provide input and assist in the development of plans and guidance. 2
T0792 Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations. 2
T0797 Provide target recommendations which meet leadership objectives. 4
T0800 Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities. 2
T0805 Report intelligence-derived significant network events and intrusions. 2
T0834 Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date. 3