Threat/Warning Analyst
Develops cyber indicators to maintain awareness of the status of the highly dynamic operating environment. Collects, processes, analyzes, and disseminates cyber threat/warning assessments.
| NICE CATEGORY | Analyze | 
| NICE SPECIALIST AREA | Threat Analysis | 
| NICE WORK ROLE ID | AN-TWA-001 | 
| OPM CODE | 141 | 
KSA-T
        Below are the Knowledge, Skills, Abilities and Tasks (KSA-T) identified as being required to perform this work role.
        
        Learn More about the KAS-T's.
    
| ID | DESCRIPTION | 
|---|---|
| K001 | Knowledge of computer networking concepts and protocols, and network security methodologies. | 
| K0002 | Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). | 
| K0003 | Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. | 
| K0004 | Knowledge of cybersecurity and privacy principles. | 
| K0005 | Knowledge of cyber threats and vulnerabilities. | 
| K0006 | Knowledge of specific operational impacts of cybersecurity lapses. | 
| K0036 | Knowledge of human-computer interaction principles. | 
| K0058 | Knowledge of network traffic analysis methods. | 
| K0108 | Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). | 
| K0109 | Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). | 
| K0177 | Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). | 
| K0349 | Knowledge of website types, administration, functions, and content management system (CMS). | 
| K0362 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). | 
| K0377 | Knowledge of classification and control markings standards, policies and procedures. | 
| K0392 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). | 
| K0395 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). | 
| K0405 | Knowledge of current computer-based intrusion sets. | 
| K0409 | Knowledge of cyber intelligence/information collection capabilities and repositories. | 
| K0415 | Knowledge of cyber operations terminology/lexicon. | 
| K0417 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). | 
| K0427 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). | 
| K0431 | Knowledge of evolving/emerging communications technologies. | 
| K0436 | Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects. | 
| K0437 | Knowledge of general Supervisory control and data acquisition (SCADA) system components. | 
| K0440 | Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. | 
| K0444 | Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). | 
| K0445 | Knowledge of how modern digital and telephony networks impact cyber operations. | 
| K0446 | Knowledge of how modern wireless communications systems impact cyber operations. | 
| K0449 | Knowledge of how to extract, analyze, and use metadata. | 
| K0458 | Knowledge of intelligence disciplines. | 
| K0460 | Knowledge of intelligence preparation of the environment and similar processes. | 
| K0464 | Knowledge of intelligence support to planning, execution, and assessment. | 
| K0469 | Knowledge of internal tactics to anticipate and/or emulate threat capabilities and actions. | 
| K0471 | Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). | 
| K0480 | Knowledge of malware. | 
| K0499 | Knowledge of operations security. | 
| K0511 | Knowledge of organizational hierarchy and cyber decision-making processes. | 
| K0516 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. | 
| K0556 | Knowledge of telecommunications fundamentals. | 
| K0560 | Knowledge of the basic structure, architecture, and design of modern communication networks. | 
| K0561 | Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). | 
| K0565 | Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. | 
| K0603 | Knowledge of the ways in which targets or threats use the Internet. | 
| K0604 | Knowledge of threat and/or target systems. | 
| K0610 | Knowledge of virtualization products (VMware, Virtual PC). | 
| K0612 | Knowledge of what constitutes a ??threat?? to a network. | 
| K0614 | Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. | 
| ID | DESCRIPTION | 
|---|---|
| S0194 | Skill in conducting non-attributable research. | 
| S0196 | Skill in conducting research using deep web. | 
| S0203 | Skill in defining and characterizing all pertinent aspects of the operational environment. | 
| S0211 | Skill in developing or recommending analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. | 
| S0218 | Skill in evaluating information for reliability, validity, and relevance. | 
| S0227 | Skill in identifying alternative analytical interpretations to minimize unanticipated outcomes. | 
| S0228 | Skill in identifying critical target elements, to include critical target elements for the cyber domain. | 
| S0229 | Skill in identifying cyber threats which may jeopardize organization and/or partner interests. | 
| S0249 | Skill in preparing and presenting briefings. | 
| S0256 | Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships. | 
| S0278 | Skill in tailoring analysis to the necessary levels (e.g., classification and organizational). | 
| S0285 | Skill in using Boolean operators to construct simple and complex queries. | 
| S0288 | Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst??s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.). | 
| S0289 | Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches. | 
| S0296 | Skill in utilizing feedback to improve processes, products, and services. | 
| S0297 | Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). | 
| S0303 | Skill in writing, reviewing and editing cyber-related Intelligence/assessment products from multiple sources. | 
| ID | DESCRIPTION | 
|---|---|
| A0013 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. | 
| A0066 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. | 
| A0072 | Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes. | 
| A0080 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. | 
| A0082 | Ability to effectively collaborate via virtual teams. | 
| A0083 | Ability to evaluate information for reliability, validity, and relevance. | 
| A0084 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. | 
| A0087 | Ability to focus research efforts to meet the customer??s decision-making needs. | 
| A0088 | Ability to function effectively in a dynamic, fast-paced environment. | 
| A0089 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts??both internal and external to the organization??to leverage analytical and technical expertise. | 
| A0091 | Ability to identify intelligence gaps. | 
| A0101 | Ability to recognize and mitigate cognitive biases which may affect analysis. | 
| A0102 | Ability to recognize and mitigate deception in reporting and analysis. | 
| A0106 | Ability to think critically. | 
| A0107 | Ability to think like threat actors. | 
| A0109 | Ability to utilize multiple intelligence sources across all intelligence disciplines. | 
| ID | DESCRIPTION | 
|---|---|
| T0569 | Answer requests for information. | 
| T0583 | Provide subject matter expertise to the development of a common operational picture. | 
| T0584 | Maintain a common intelligence picture. | 
| T0585 | Provide subject matter expertise to the development of cyber operations specific indicators. | 
| T0586 | Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. | 
| T0589 | Assist in the identification of intelligence collection shortfalls. | 
| T0593 | Brief threat and/or target current situations. | 
| T0597 | Collaborate with intelligence analysts/targeting organizations involved in related areas. | 
| T0615 | Conduct in-depth research and analysis. | 
| T0617 | Conduct nodal analysis. | 
| T0660 | Develop information requirements necessary for answering priority information requests. | 
| T0685 | Evaluate threat decision-making processes. | 
| T0687 | Identify threats to Blue Force vulnerabilities. | 
| T0707 | Generate requests for information. | 
| T0708 | Identify threat tactics, and methodologies. | 
| T0718 | Identify intelligence gaps and shortfalls. | 
| T0748 | Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets. | 
| T0749 | Monitor and report on validated threat activities. | 
| T0751 | Monitor open source websites for hostile content directed towards organizational or partner interests. | 
| T0752 | Monitor operational environment and report on adversarial activities which fulfill leadership¡¯s priority information requirements. | 
| T0758 | Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). | 
| T0761 | Provide subject-matter expertise and support to planning/developmental forums and working groups as appropriate. | 
| T0783 | Provide current intelligence support to critical internal/external stakeholders as appropriate. | 
| T0785 | Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations. | 
| T0786 | Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations. | 
| T0792 | Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations. | 
| T0800 | Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities. | 
| T0805 | Report intelligence-derived significant network events and intrusions. | 
| T0834 | Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up-to-date. | 

