CO-OPL-001 Cyber Intel Planner
Provides specialized denial and deception operations and collection of cybersecurity information that may be used to develop intelligence.
Performs in-depth joint targeting and cybersecurity planning process. Gathers information and develops detailed Operational Plans and Orders supporting requirements. Conducts strategic and operational-level planning across the full range of operations for integrated information and cyberspace operations.
Develops detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and levy requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.
Knowledges 89
Code | Description | Work Roles |
---|---|---|
K0001 | Knowledge of computer networking concepts and protocols, and network security methodologies. | 52 |
K0002 | Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). | 52 |
K0003 | Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. | 52 |
K0004 | Knowledge of cybersecurity and privacy principles. | 52 |
K0005 | Knowledge of cyber threats and vulnerabilities. | 52 |
K0006 | Knowledge of specific operational impacts of cybersecurity lapses. | 52 |
K0036 | Knowledge of human-computer interaction principles. | 12 |
K0108 | Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). | 11 |
K0109 | Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). | 15 |
K0120 | Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise. | 6 |
K0347 | Knowledge and understanding of operational design. | 3 |
K0349 | Knowledge of website types, administration, functions, and content management system (CMS). | 8 |
K0350 | Knowledge of accepted organization planning systems. | 3 |
K0352 | Knowledge of forms of intelligence support needs, topics, and focus areas. | 2 |
K0355 | Knowledge of all-source reporting and dissemination procedures. | 1 |
K0358 | Knowledge of analytical standards and the purpose of intelligence confidence levels. | 1 |
K0362 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). | 9 |
K0377 | Knowledge of classification and control markings standards, policies and procedures. | 7 |
K0379 | Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. | 7 |
K0392 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). | 9 |
K0395 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). | 10 |
K0399 | Knowledge of crisis action planning and time sensitive planning procedures. | 2 |
K0400 | Knowledge of crisis action planning for cyber operations. | 3 |
K0403 | Knowledge of cryptologic capabilities, limitations, and contributions to cyber operations. | 5 |
K0405 | Knowledge of current computer-based intrusion sets. | 5 |
K0408 | Knowledge of cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber-attack) principles, capabilities, limitations, and effects. | 3 |
K0411 | Knowledge of cyber laws and legal considerations and their effect on cyber planning. | 3 |
K0414 | Knowledge of cyber operations support or enabling processes. | 4 |
K0417 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). | 10 |
K0422 | Knowledge of deconfliction processes and procedures. | 3 |
K0427 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). | 8 |
K0431 | Knowledge of evolving/emerging communications technologies. | 11 |
K0432 | Knowledge of existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization. | 3 |
K0435 | Knowledge of fundamental cyber concepts, principles, limitations, and effects. | 5 |
K0436 | Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects. | 8 |
K0440 | Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. | 8 |
K0444 | Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). | 11 |
K0445 | Knowledge of how modern digital and telephony networks impact cyber operations. | 9 |
K0446 | Knowledge of how modern wireless communications systems impact cyber operations. | 8 |
K0455 | Knowledge of information security concepts, facilitating technologies and methods. | 3 |
K0456 | Knowledge of intelligence capabilities and limitations. | 1 |
K0459 | Knowledge of intelligence employment requirements (i.e., logistical, communications support, maneuverability, legal restrictions, etc.). | 1 |
K0460 | Knowledge of intelligence preparation of the environment and similar processes. | 5 |
K0463 | Knowledge of intelligence requirements tasking systems. | 1 |
K0464 | Knowledge of intelligence support to planning, execution, and assessment. | 6 |
K0465 | Knowledge of internal and external partner cyber operations capabilities and tools. | 6 |
K0471 | Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). | 9 |
K0480 | Knowledge of malware. | 8 |
K0494 | Knowledge of objectives, situation, operational environment, and the status and disposition of internal and external partner collection capabilities available to support planning. | 2 |
K0499 | Knowledge of operations security. | 8 |
K0501 | Knowledge of organization cyber operations programs, strategies, and resources. | 3 |
K0502 | Knowledge of organization decision support tools and/or methods. | 2 |
K0504 | Knowledge of organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations. | 3 |
K0506 | Knowledge of organization objectives, leadership priorities, and decision-making risks. | 3 |
K0507 | Knowledge of organization or partner exploitation of digital networks. | 6 |
K0508 | Knowledge of organization policies and planning concepts for partnering with internal and/or external organizations. | 3 |
K0511 | Knowledge of organizational hierarchy and cyber decision-making processes. | 6 |
K0512 | Knowledge of organizational planning concepts. | 3 |
K0514 | Knowledge of organizational structures and associated intelligence capabilities. | 3 |
K0517 | Knowledge of post implementation review (PIR) approval process. | 1 |
K0518 | Knowledge of planning activity initiation. | 2 |
K0519 | Knowledge of planning timelines adaptive, crisis action, and time-sensitive planning. | 2 |
K0525 | Knowledge of required intelligence planning products associated with cyber operational planning. | 2 |
K0538 | Knowledge of target and threat organization structures, critical capabilities, and critical vulnerabilities | 3 |
K0556 | Knowledge of telecommunications fundamentals. | 6 |
K0560 | Knowledge of the basic structure, architecture, and design of modern communication networks. | 10 |
K0561 | Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). | 8 |
K0565 | Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. | 11 |
K0566 | Knowledge of the critical information requirements and how they're used in planning. | 2 |
K0572 | Knowledge of the functions and capabilities of internal teams that emulate threat activities to benefit the organization. | 2 |
K0575 | Knowledge of the impacts of internal and external partner staffing estimates. | 1 |
K0577 | Knowledge of the intelligence frameworks, processes, and related systems. | 2 |
K0578 | Knowledge of the intelligence requirements development and request for information processes. | 1 |
K0582 | Knowledge of the organizational planning and staffing process. | 2 |
K0585 | Knowledge of the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements. | 3 |
K0586 | Knowledge of the outputs of course of action and exercise analysis. | 2 |
K0589 | Knowledge of the process used to assess the performance and impact of operations. | 2 |
K0590 | Knowledge of the processes to synchronize operational assessment procedures with the critical information requirement process. | 2 |
K0591 | Knowledge of the production responsibilities and organic analysis and production capabilities. | 1 |
K0593 | Knowledge of the range of cyber operations and their underlying intelligence support needs, topics, and focus areas. | 2 |
K0594 | Knowledge of the relationships between end states, objectives, effects, lines of operation, etc. | 2 |
K0595 | Knowledge of the relationships of operational objectives, intelligence requirements, and intelligence production tasks. | 1 |
K0598 | Knowledge of the structure and intent of organization specific plans, guidance and authorizations. | 6 |
K0599 | Knowledge of the structure, architecture, and design of modern digital and telephony networks. | 5 |
K0602 | Knowledge of collection disciplines and capabilities. | 1 |
K0603 | Knowledge of the ways in which targets or threats use the Internet. | 6 |
K0610 | Knowledge of virtualization products (VMware, Virtual PC). | 7 |
K0612 | Knowledge of what constitutes a “threat” to a network. | 8 |
K0614 | Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. | 7 |
Skills 36
Code | Description | Work Roles |
---|---|---|
S0218 | Skill in evaluating information for reliability, validity, and relevance. | 8 |
S0203 | Skill in defining and characterizing all pertinent aspects of the operational environment. | 6 |
S0249 | Skill in preparing and presenting briefings. | 8 |
S0278 | Skill in tailoring analysis to the necessary levels (e.g., classification and organizational). | 6 |
S0296 | Skill in utilizing feedback to improve processes, products, and services. | 9 |
S0297 | Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). | 7 |
S0176 | Skill in administrative planning activities, to include preparation of functional and specific support plans, preparing and managing correspondence, and staffing procedures. | 4 |
S0185 | Skill in applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action. | 3 |
S0186 | Skill in applying crisis planning procedures. | 3 |
S0213 | Skill in documenting and communicating complex technical and programmatic information. | 3 |
S0250 | Skill in preparing plans and related correspondence. | 5 |
S0272 | Skill in reviewing and editing intelligence products from various sources for cyber operations. | 1 |
S0273 | Skill in reviewing and editing plans. | 3 |
S0306 | Skill to analyze strategic guidance for issues requiring clarification and/or additional guidance. | 2 |
S0307 | Skill to analyze target or threat sources of strength and morale. | 2 |
S0308 | Skill to anticipate intelligence capability employment requirements. | 1 |
S0309 | Skill to anticipate key target or threat activities which are likely to prompt a leadership decision. | 2 |
S0310 | Skill to apply analytical standards to evaluate intelligence products. | 1 |
S0312 | Skill to apply the process used to assess the performance and impact of cyber operations. | 2 |
S0314 | Skill to articulate intelligence capabilities available to support execution of the plan. | 1 |
S0315 | Skill to articulate the needs of joint planners to all-source analysts. | 1 |
S0318 | Skill to conceptualize the entirety of the intelligence process in the multiple domains and dimensions. | 1 |
S0319 | Skill to convert intelligence requirements into intelligence production tasks. | 1 |
S0320 | Skill to coordinate the development of tailored intelligence products. | 1 |
S0321 | Skill to correlate intelligence priorities to the allocation of intelligence resources/assets. | 1 |
S0322 | Skill to craft indicators of operational progress/success. | 2 |
S0323 | Skill to create and maintain up-to-date planning documents and tracking of services/production. | 1 |
S0331 | Skill to express orally and in writing the relationship between intelligence capability limitations and decision-making risk and impacts on the overall operation. | 1 |
S0333 | Skill to graphically depict decision support materials containing intelligence and partner capability estimates. | 2 |
S0338 | Skill to interpret planning guidance to discern level of analytical support required. | 1 |
S0340 | Skill to monitor target or threat situation and environmental factors. | 1 |
S0341 | Skill to monitor threat effects to partner capabilities and maintain a running estimate. | 1 |
S0343 | Skill to orchestrate intelligence planning teams, coordinate collection and production support, and monitor status. | 1 |
S0345 | Skill to relate intelligence resources/assets to anticipated intelligence requirements. | 1 |
S0350 | Skill to synchronize planning activities and required intelligence support. | 1 |
S0360 | Skill to analyze and assess internal and external partner cyber operations capabilities and tools. | 6 |
Abilities 17
Code | Description | Work Roles |
---|---|---|
A0013 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. | 14 |
A0066 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. | 12 |
A0070 | Ability to apply critical reading/thinking skills. | 9 |
A0089 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise. | 13 |
A0085 | Ability to exercise judgment when policies are not well-defined. | 9 |
A0082 | Ability to effectively collaborate via virtual teams. | 7 |
A0074 | Ability to collaborate effectively with others. | 6 |
A0067 | Ability to adjust to and operate in a diverse, unpredictable, challenging, and fast-paced work environment. | 3 |
A0068 | Ability to apply approved planning development and staffing processes. | 3 |
A0077 | Ability to coordinate cyber operations with other organization functions or support activities. | 4 |
A0081 | Ability to develop or recommend planning solutions to problems and situations for which no precedent exists. | 3 |
A0090 | Ability to identify external partners with common cyber operations interests. | 5 |
A0094 | Ability to interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives. | 6 |
A0096 | Ability to interpret and understand complex and rapidly evolving concepts. | 4 |
A0098 | Ability to participate as a member of planning teams, coordination groups, and task forces as necessary. | 5 |
A0105 | Ability to tailor technical and planning information to a customer’s level of understanding. | 7 |
A0160 | Ability to translate, track, and prioritize information needs and intelligence collection requirements across the extended enterprise. | 1 |
Tasks 45
Code | Description | Work Roles |
---|---|---|
T0563 | Provide input to the analysis, design, development or acquisition of capabilities used for meeting objectives. | 2 |
T0575 | Coordinate for intelligence support to operational planning activities. | 1 |
T0576 | Assess all-source intelligence and recommend targets to support cyber operation objectives. | 1 |
T0579 | Assess target vulnerabilities and/or operational capabilities to determine course of action. | 2 |
T0581 | Assist and advise interagency partners in identifying and developing best practices for facilitating operational support to achievement of organization objectives. | 3 |
T0587 | Assist in the development and refinement of priority information requirements. | 1 |
T0590 | Enable synchronization of intelligence support plans across partner organizations as required. | 1 |
T0592 | Provide input to the identification of cyber-related success criteria. | 2 |
T0601 | Collaborate with other team members or partner organizations to develop a diverse program of information materials (e.g., web pages, briefings, print materials). | 2 |
T0627 | Contribute to crisis action planning for cyber operations. | 3 |
T0628 | Contribute to the development of the organization's decision support tools if necessary. | 2 |
T0630 | Incorporate intelligence equities into the overall design of cyber operations plans. | 1 |
T0636 | Coordinate with intelligence planners to ensure that collection managers receive information requirements. | 1 |
T0637 | Coordinate with the intelligence planning team to assess capability to satisfy assigned intelligence tasks. | 1 |
T0638 | Coordinate, produce, and track intelligence requirements. | 1 |
T0639 | Coordinate, synchronize and draft applicable intelligence sections of cyber operations plans. | 1 |
T0640 | Use intelligence estimates to counter potential target actions. | 2 |
T0648 | Determine indicators (e.g., measures of effectiveness) that are best suited to specific cyber operation objectives. | 2 |
T0656 | Develop and review intelligence guidance for integration into supporting cyber operations planning and execution. | 1 |
T0659 | Develop detailed intelligence support to cyber operations requirements. | 1 |
T0667 | Develop potential courses of action. | 2 |
T0670 | Develop, implement, and recommend changes to appropriate planning procedures and policies. | 3 |
T0676 | Draft cyber intelligence collection and production requirements. | 1 |
T0680 | Ensure that intelligence planning activities are integrated and synchronized with operational planning timelines. | 2 |
T0690 | Evaluate intelligence estimates to support the planning cycle. | 2 |
T0691 | Evaluate the conditions that affect employment of available cyber intelligence capabilities. | 1 |
T0705 | Incorporate intelligence and counterintelligence to support plan development. | 1 |
T0709 | Identify all available partner intelligence capabilities and limitations supporting cyber operations. | 1 |
T0711 | Identify, draft, evaluate, and prioritize relevant intelligence or information requirements. | 1 |
T0719 | Identify cyber intelligence gaps and shortfalls for cyber operational planning. | 2 |
T0726 | Identify the need, scope, and timeframe for applicable intelligence environment preparation derived production. | 1 |
T0728 | Provide input to or develop courses of action based on threat factors. | 1 |
T0733 | Interpret environment preparations assessments to determine a course of action. | 2 |
T0734 | Issue requests for information. | 4 |
T0735 | Lead and coordinate intelligence support to operational planning. | 1 |
T0739 | Maintain relationships with internal and external partners involved in cyber planning or related areas. | 3 |
T0743 | Maintain situational awareness to determine if changes to the operating environment require review of the plan. | 2 |
T0760 | Provide subject matter expertise to planning teams, coordination groups, and task forces as necessary. | 2 |
T0763 | Conduct long-range, strategic planning efforts with internal and external partners in cyber activities. | 4 |
T0772 | Prepare for and provide subject matter expertise to exercises. | 3 |
T0784 | Provide cyber focused guidance and advice on intelligence support plan inputs. | 2 |
T0801 | Recommend refinement, adaption, termination, and execution of operational plans as appropriate. | 2 |
T0808 | Review and comprehend organizational leadership objectives and guidance for planning. | 1 |
T0816 | Scope the cyber intelligence planning effort. | 1 |
T0836 | Document lessons learned that convey the results of events and/or exercises. | 3 |