Target Network Analyst Job Profile

Discover more salary details for Targeting Analyst. Browse salaries by job title, company, location, school on Paysa

Target Network Analyst

Target Network Analyst (AN-TGT-002): Conducts advanced analysis of collection and open-source data to ensure target continuity; to profile targets and their activities; and develop techniques to gain more target information. Determines how targets communicate, move, operate and live based on knowledge of target technologies, digital networks, and the applications on them.

Professional certifications

  • Information Assurance
  • System Architecture
  • System Administration
  • Threat Intelligence
  • IT Risk Management
  • Risk Management
  • Cyber Intelligence Analysis
  • Vulnerability Management
  • Network Management
  • Cyber Operational Planning
  • Software Development
  • Forensics Analysis
  • Enterprise Architecture
  • Data Administration

Target Network Analyst must know

  • cybersecurity and privacy principles.
  • cyber threats and vulnerabilities.
  • specific operational impacts of cybersecurity lapses.
  • concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
  • cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • website types, administration, functions, and content management system (CMS).
  • attack methods and techniques (DDoS, brute force, spoofing, etc.).
  • client organizations, including information needs, objectives, structure, capabilities, etc.
  • collection sources including conventional and non-conventional sources.
  • cyber operation objectives, policies, and legalities.
  • denial and deception techniques.
  • evolving/emerging communications technologies.
  • fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects.
  • governing authorities for targeting.
  • host-based security products and how those products affect exploitation and reduce vulnerability.
  • how converged technologies impact cyber operations (e.g., digital, telephony, wireless).
  • how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
  • how modern digital and telephony networks impact cyber operations.
  • how to extract, analyze, and use metadata.
  • intelligence reporting principles, policies, procedures, and vehicles, including report formats, reportability criteria (requirements and priorities), dissemination practices, and legal authorities and restrictions.
  • Internet network addressing (IP addresses, classless inter-
  • network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
  • operations security.
  • organization and/or partner collection systems, capabilities, and processes (e.g., collection and protocol processors).
  • physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.
  • principles and practices related to target development such as target knowledge, associations, communication systems, and infrastructure.

Key skills of the Target Network Analyst include

  • analyzing a target’s communication networks.
  • analyzing essential network data (e.g., router configuration files, routing protocols).
  • analyzing midpoint collection data.
  • analyzing terminal or environment collection data.
  • applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses).
  • assessing the applicability of available analytical tools to various situations.
  • conducting non-attributable research.
  • conducting research using deep web.
  • conducting social network analysis, buddy list analysis, and/or cookie analysis.
  • defining and characterizing all pertinent aspects of the operational environment.
  • determining appropriate targeting options through the evaluation of available capabilities against desired effects.
  • determining the physical location of network devices.
  • evaluating data sources for relevance, reliability, and objectivity.
  • evaluating information to recognize relevance, priority, etc.
  • exploiting/querying organizational and/or partner collection databases.
  • fusion analysis
  • identifying a target’s communications networks.
  • identifying critical target elements, to include critical target elements for the cyber domain.
  • identifying cyber threats which may jeopardize organization and/or partner interests.
  • identifying how a target communicates.
  • identifying leads for target development.
  • managing client relationships, including determining client needs/requirements, managing client expectations, and demonstrating commitment to delivering quality results.
  • number normalization.
  • performing target system analysis.
  • providing understanding of target or threat systems through the identification and link analysis of physical, functional, or behavioral relationships.
  • recognizing denial and deception techniques of the target.
  • recognizing relevance of information.
  • recognizing significant changes in a target’s communication patterns.
  • recognizing technical information that may be used for leads for metadata analysis.
  • researching essential information.
  • reviewing and editing target materials.

Target Network Analyst must be able to:

  • communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • accurately and completely source all data used in intelligence, assessment and/or planning products.
  • clearly articulate intelligence requirements into well-formulated research questions and requests for information.
  • develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
  • evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused targeting/intelligence products.
  • exercise judgment when policies are not well-defined.
  • focus research efforts to meet the customer’s decision-making needs.
  • function effectively in a dynamic, fast-paced environment.
  • function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
  • identify intelligence gaps.
  • recognize and mitigate cognitive biases which may affect analysis.
  • recognize and mitigate deception in reporting and analysis.
  • think critically.
  • utilize multiple intelligence sources across all intelligence disciplines.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel