Target Developer
Performs target system analysis, builds and/or maintains electronic target folders to include inputs from environment preparation, and/or internal or external intelligence sources. Coordinates with partner target activities and intelligence organizations, and presents candidate targets for vetting and validation.
| NICE CATEGORY | Analyze |
| NICE SPECIALIST AREA | Targets |
| NICE WORK ROLE ID | AN-TGT-001 |
| OPM CODE | 131 |
KSA-T
Below are the Knowledge, Skills, Abilities and Tasks (KSA-T) identified as being required to perform this work role.
Learn More about the KAS-T's.
| ID | DESCRIPTION |
|---|---|
| K001 | Knowledge of computer networking concepts and protocols, and network security methodologies. |
| K0002 | Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). |
| K0003 | Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. |
| K0004 | Knowledge of cybersecurity and privacy principles. |
| K0005 | Knowledge of cyber threats and vulnerabilities. |
| K0006 | Knowledge of specific operational impacts of cybersecurity lapses. |
| K0036 | Knowledge of human-computer interaction principles. |
| K0058 | Knowledge of network traffic analysis methods. |
| K0108 | Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless). |
| K0109 | Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage). |
| K0142 | Knowledge of collection management processes, capabilities, and limitations. |
| K0177 | Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). |
| K0349 | Knowledge of website types, administration, functions, and content management system (CMS). |
| K0351 | Knowledge of applicable statutes, laws, regulations and policies governing cyber targeting and exploitation. |
| K0357 | WITHDRAWN: Knowledge of analytical constructs and their use in assessing the operational environment. (See K0224) |
| K0362 | Knowledge of attack methods and techniques (DDoS, brute force, spoofing, etc.). |
| K0379 | Knowledge of client organizations, including information needs, objectives, structure, capabilities, etc. |
| K0381 | Knowledge of collateral damage and estimating impact(s). |
| K0392 | Knowledge of common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.). |
| K0395 | Knowledge of computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.). |
| K0402 | Knowledge of criticality and vulnerability factors (e.g., value, recuperation, cushion, countermeasures) for target selection and applicability to the cyber domain. |
| K0409 | Knowledge of cyber intelligence/information collection capabilities and repositories. |
| K0413 | Knowledge of cyber operation objectives, policies, and legalities. |
| K0417 | Knowledge of data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media). |
| K0426 | Knowledge of dynamic and deliberate targeting. |
| K0427 | Knowledge of encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP). |
| K0431 | Knowledge of evolving/emerging communications technologies. |
| K0436 | Knowledge of fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects. |
| K0437 | Knowledge of general Supervisory control and data acquisition (SCADA) system components. |
| K0439 | Knowledge of governing authorities for targeting. |
| K0440 | Knowledge of host-based security products and how those products affect exploitation and reduce vulnerability. |
| K0444 | Knowledge of how Internet applications work (SMTP email, web-based email, chat clients, VOIP). |
| K0445 | Knowledge of how modern digital and telephony networks impact cyber operations. |
| K0446 | Knowledge of how modern wireless communications systems impact cyber operations. |
| K0449 | Knowledge of how to extract, analyze, and use metadata. |
| K0457 | Knowledge of intelligence confidence levels. |
| K0458 | Knowledge of intelligence disciplines. |
| K0460 | Knowledge of intelligence preparation of the environment and similar processes. |
| K0461 | Knowledge of intelligence production processes. |
| K0464 | Knowledge of intelligence support to planning, execution, and assessment. |
| K0465 | Knowledge of internal and external partner cyber operations capabilities and tools. |
| K0466 | Knowledge of internal and external partner intelligence processes and the development of information requirements and essential information. |
| K0471 | Knowledge of Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering). |
| K0473 | Knowledge of intrusion sets. |
| K0478 | Knowledge of legal considerations in targeting. |
| K0479 | Knowledge of malware analysis and characteristics. |
| K0497 | Knowledge of operational effectiveness assessment. |
| K0499 | Knowledge of operations security. |
| K0507 | Knowledge of organization or partner exploitation of digital networks. |
| K0516 | Knowledge of physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc. |
| K0533 | Knowledge of specific target identifiers, and their usage. |
| K0542 | Knowledge of target development (i.e., concepts, roles, responsibilities, products, etc.). |
| K0543 | Knowledge of target estimated repair and recuperation times. |
| K0546 | Knowledge of target list development (i.e. Restricted, Joint, Candidate, etc.). |
| K0547 | Knowledge of target methods and procedures. |
| K0549 | Knowledge of target vetting and validation procedures. |
| K0551 | Knowledge of targeting cycles. |
| K0555 | Knowledge of TCP/IP networking protocols. |
| K0556 | Knowledge of telecommunications fundamentals. |
| K0560 | Knowledge of the basic structure, architecture, and design of modern communication networks. |
| K0561 | Knowledge of the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection). |
| K0565 | Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications. |
| K0598 | Knowledge of the structure and intent of organization specific plans, guidance and authorizations. |
| K0603 | Knowledge of the ways in which targets or threats use the Internet. |
| K0604 | Knowledge of threat and/or target systems. |
| K0614 | Knowledge of wireless technologies (e.g., cellular, satellite, GSM) to include the basic structure, architecture, and design of modern wireless communications systems. |
| ID | DESCRIPTION |
|---|---|
| S0187 | Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses). |
| S0189 | Skill in assessing and/or estimating effects generated during and after cyber operations. |
| S0194 | Skill in conducting non-attributable research. |
| S0196 | Skill in conducting research using deep web. |
| S0203 | Skill in defining and characterizing all pertinent aspects of the operational environment. |
| S0205 | Skill in determining appropriate targeting options through the evaluation of available capabilities against desired effects. |
| S0208 | Skill in determining the physical location of network devices. |
| S0216 | Skill in evaluating available capabilities against desired effects to provide effective courses of action. |
| S0218 | Skill in evaluating information for reliability, validity, and relevance. |
| S0222 | Skill in fusion analysis |
| S0227 | Skill in identifying alternative analytical interpretations to minimize unanticipated outcomes. |
| S0228 | Skill in identifying critical target elements, to include critical target elements for the cyber domain. |
| S0229 | Skill in identifying cyber threats which may jeopardize organization and/or partner interests. |
| S0248 | Skill in performing target system analysis. |
| S0249 | Skill in preparing and presenting briefings. |
| S0256 | Skill in providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships. |
| S0274 | Skill in reviewing and editing target materials. |
| S0278 | Skill in tailoring analysis to the necessary levels (e.g., classification and organizational). |
| S0285 | Skill in using Boolean operators to construct simple and complex queries. |
| S0287 | Skill in using geospatial data and applying geospatial resources. |
| S0288 | Skill in using multiple analytic tools, databases, and techniques (e.g., Analyst??s Notebook, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.). |
| S0289 | Skill in using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches. |
| S0292 | Skill in using targeting databases and software packages. |
| S0296 | Skill in utilizing feedback to improve processes, products, and services. |
| S0297 | Skill in utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint). |
| S0302 | Skill in writing effectiveness reports. |
| S0360 | Skill to analyze and assess internal and external partner cyber operations capabilities and tools. |
| S0361 | Skill to analyze and assess internal and external partner intelligence processes and the development of information requirements and essential information. |
| ID | DESCRIPTION |
|---|---|
| A0013 | Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means. |
| A0066 | Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. |
| A0073 | Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information. |
| A0080 | Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists. |
| A0084 | Ability to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products. |
| A0085 | Ability to exercise judgment when policies are not well-defined. |
| A0087 | Ability to focus research efforts to meet the customer??s decision-making needs. |
| A0088 | Ability to function effectively in a dynamic, fast-paced environment. |
| A0089 | Ability to function in a collaborative environment, seeking continuous consultation with other analysts and experts??both internal and external to the organization??to leverage analytical and technical expertise. |
| A0091 | Ability to identify intelligence gaps. |
| A0101 | Ability to recognize and mitigate cognitive biases which may affect analysis. |
| A0102 | Ability to recognize and mitigate deception in reporting and analysis. |
| A0106 | Ability to think critically. |
| A0109 | Ability to utilize multiple intelligence sources across all intelligence disciplines. |
| ID | DESCRIPTION |
|---|---|
| T0561 | Accurately characterize targets. |
| T0582 | Provide expertise to course of action development. |
| T0588 | Provide expertise to the development of measures of effectiveness and measures of performance. |
| T0594 | Build and maintain electronic target folders. |
| T0597 | Collaborate with intelligence analysts/targeting organizations involved in related areas. |
| T0599 | Collaborate with other customer, Intelligence and targeting organizations involved in related cyber areas. |
| T0617 | Conduct nodal analysis. |
| T0624 | Conduct target research and analysis. |
| T0633 | Coordinate target vetting with appropriate partners. |
| T0642 | Maintain awareness of internal and external cyber organization structures, strengths, and employments of staffing and technology. |
| T0650 | Determine what technologies are used by a given target. |
| T0652 | Develop all-source intelligence targeting materials. |
| T0661 | Develop measures of effectiveness and measures of performance. |
| T0663 | Develop munitions effectiveness assessment or operational assessment materials. |
| T0684 | Estimate operational effects generated through cyber activities. |
| T0688 | Evaluate available capabilities against desired effects to recommend efficient solutions. |
| T0707 | Generate requests for information. |
| T0710 | Identify and evaluate threat critical capabilities, requirements, and vulnerabilities. |
| T0717 | Identify critical target elements. |
| T0731 | Initiate requests to guide tasking and assist with collection management. |
| T0744 | Maintain target lists (i.e., RTL, JTL, CTL, etc.). |
| T0769 | Perform targeting automation activities. |
| T0770 | Characterize websites. |
| T0776 | Produce target system analysis products. |
| T0781 | Provide aim point and reengagement recommendations. |
| T0782 | Provide analyses and support for effectiveness assessment. |
| T0790 | Provide input for targeting effectiveness assessments for leadership acceptance. |
| T0794 | Provide operations and reengagement recommendations. |
| T0797 | Provide target recommendations which meet leadership objectives. |
| T0798 | Provide targeting products and targeting support as designated. |
| T0799 | Provide time sensitive targeting support. |
| T0802 | Review appropriate information sources to determine validity and relevance of information gathered. |
| T0815 | Sanitize and minimize information to protect sources and methods. |
| T0824 | Support identification and documentation of collateral effects. |
| T0835 | Work closely with planners, analysts, and collection managers to identify intelligence gaps and ensure intelligence requirements are accurate and up-to-date. |