All Source Collection Manager Job Profile

What is an All Source Collection Manager?

The All Source-Collection Manager identifies collection authorities and environment; incorporates priority information requirements into collection management; develops concepts to meet leadership’s intent. Determines capabilities of available collection assets, identifies new collection capabilities; and constructs and disseminates collection plans. Monitors execution of tasked collection to ensure effective execution of the collection plan.

Professional Certifications of an All Source Collection Manager

Core competencies of an All Source Collection Manager

  • Cybersecurity Policy and Strategy Management
  • Cyber Intelligence Analysis
  • Cyber Operational Planning
  • Vulnerability Management
  • Enterprise Architecture
  • Information Assurance
  • System Administration
  • Threat Intelligence
  • Network Management
  • Forensics Analysis
  • Risk Management
  • Criminal Law

All Source Collection Manager must know

  • physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
  • cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities).
  • the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
  • the capabilities, limitations and tasking methodologies of internal and external collections as they apply to planned cyber activities.
  • data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
  • organization formats of resource and asset readiness reporting, its operational relevance and intelligence collection impact.
  • who the organization’s operational planners are, how and where they can be contacted, and what are their expectations.
  • the POC’s, databases, tools and applications necessary to establish environment preparation and surveillance products.
  • collection capabilities, accesses, performance specifications, and constraints utilized to satisfy collection plan.
  • common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
  • computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).
  • Internet network addressing (IP addresses, classless inter-domain routing, TCP/UDP port numbering).
  • physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.
  • the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
  • the capabilities and limitations of new and emerging collection capabilities, accesses and/or processes.
  • the available tools and applications associated with collection requirements and collection management.
  • host-based security products and how those products affect exploitation and reduce vulnerability.
  • different organization objectives at all levels, including subordinate, lateral and higher.
  • the existent tasking, collection, processing, exploitation and dissemination architecture.
  • possible circumstances that would result in changing collection management authorities.
  • laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • organizational priorities, legal authorities and requirements submission processes.
  • priority information, how it is derived, where it is published, how to access, etc.
  • how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
  • available databases and tools necessary to assess appropriate collection tasking.
  • the basic structure, architecture, and design of modern communication networks.
  • risk management processes (e.g., methods for assessing and mitigating risk).
  • encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).
  • how modern wireless communications systems impact cyber operations.
  • how modern digital and telephony networks impact cyber operations.
  • fundamental cyber concepts, principles, limitations, and effects.
  • the factors of threat that could impact collection operations.
  • specific operational impacts of cybersecurity lapses.
  • cybersecurity and privacy principles.
  • cyber threats and vulnerabilities.
  • human-computer interaction principles.
  • network traffic analysis methods.
  • asset availability, capabilities and limitations.
  • collaborative tools and environments.
  • collection capabilities and limitations.
  • collection management tools.
  • collection planning process and collection plan.
  • collection strategies.
  • criteria for evaluating collection products.
  • current collection requirements.
  • current computer-based intrusion sets.
  • cyber lexicon/terminology
  • database administration and maintenance.
  • evolving/emerging communications technologies.
  • how to establish priorities for resources.
  • how to extract, analyze, and use metadata.
  • indications and warning.
  • information needs.
  • key cyber threat actors and their equities.
  • key factors of the operational environment and threat.
  • leadership’s Intent and objectives.
  • malware.
  • methods for ascertaining collection asset posture and availability.
  • non-traditional collection methodologies.
  • ongoing and future operations.
  • operational asset constraints.
  • operational planning processes.
  • organization objectives and associated demand on collection management.
  • production exploitation and dissemination needs and architectures.
  • research strategies and knowledge management.
  • risk management and mitigation strategies.
  • tasking mechanisms.
  • tasking processes for organic and subordinate collection assets.
  • tasking, collection, processing, exploitation and dissemination.
  • the organization, roles and responsibilities of higher, lower and adjacent sub-elements.
  • the organization’s established format for collection plan.
  • the organization’s planning, operations and targeting cycles.
  • the organizational plans/directives/guidance that describe objectives.
  • the organizational policies/procedures for temporary transfer of collection authority.
  • the priority information requirements from subordinate, lateral and higher levels of the organization.
  • the request for information process.
  • the systems/architecture/communications used for coordination.
  • tipping, cueing, mixing, and redundancy.
  • virtualization products (VMware, Virtual PC).
  • what constitutes a “threat” to a network.
  • Key skills of the All Source Collection Manager includes

    • information prioritization as it relates to operations.
    • access information on current assets available, usage.
    • access the databases where plans/directives/guidance are maintained.
    • apply the capabilities, limitations and tasking methodologies of available platforms, sensors, architectures and apparatus as they apply to organization objectives.
    • articulate a needs statement/requirement and integrate new and emerging collection capabilities, accesses and/or processes into collection operations.
    • associate Intelligence gaps to priority information requirements and observables.
    • compare indicators/observables with requirements.
    • determine feasibility of collection.
    • develop a collection plan that clearly shows the discipline that can be used to collect the information needed.
    • ensure that the collection strategy leverages all available resources.
    • evaluate factors of the operational environment to objectives, and information requirements.
    • evaluate the capabilities, limitations and tasking methodologies of organic, theater, national, coalition and other collection capabilities.
    • extract information from available tools and applications associated with collection requirements and collection operations management.
    • identify and apply tasking, collection, processing, exploitation and dissemination to associated collection disciplines.
    • identify Intelligence gaps.
    • identify when priority information requirements are satisfied.
    • interpret readiness reporting, its operational relevance and intelligence collection impact.
    • optimize collection system performance through repeated adjustment, testing, and re-adjustment.
    • prepare and deliver reports, presentations and briefings, to include using visual aids or presentation technology.
    • review performance specifications and historical information about collection assets.
    • translate the capabilities, limitations and tasking methodologies of organic, theater, national, coalition and other collection capabilities.
    • use collaborative tools and environments for collection operations.
    • analyze and assess internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities).

    All Source Collection Manager capabilities include/strong>

    • apply collaborative skills and strategies.
    • apply critical reading/thinking skills.
    • coordinate and collaborate with analysts regarding surveillance requirements and essential information development.
    • coordinate, collaborate and disseminate information to subordinate, lateral and higher-level organizations.
    • correctly employ each organization or element into the collection plan and matrix.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge



Is Linux Worth Learning in 2020?
Views: 299 / December 14, 2019
How do I Get MTA Certified?
Views: 895 / December 12, 2019
How much does your PAM software really cost?
Views: 1346 / December 10, 2019
How Do I Get into Android Development?
Views: 1725 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?