All Source Collection Requirements Manager Job Profile

What is an All Source Collection Requirements Manager?

The All Source-Collection Requirements Manager evaluates collection operations and develops effects-based collection requirements strategies using available sources and methods to improve collection. Develops, processes, validates, and coordinates submission of collection requirements. Evaluates performance of collection assets and collection operations.

All Source Collection Requirements Manager must know

  • computer networking concepts and protocols, and network security methodologies.
  • risk management processes (e.g., methods for assessing and mitigating risk).
  • laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • cybersecurity and privacy principles.
  • cyber threats and vulnerabilities.
  • specific operational impacts of cybersecurity lapses.
  • human-computer interaction principles.
  • network traffic analysis methods.
  • physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
  • cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • possible circumstances that would result in changing collection management authorities.
  • asset availability, capabilities and limitations.
  • available databases and tools necessary to assess appropriate collection tasking.
  • collaborative tools and environments.
  • collection capabilities and limitations.
  • collection capabilities, accesses, performance specifications, and constraints utilized to satisfy collection plan.
  • collection management functionality (e.g., positions, functions, responsibilities, products, reporting requirements).
  • collection management tools.
  • collection planning process and collection plan.
  • collection strategies.
  • computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).
  • criteria for evaluating collection products.
  • current collection requirements.
  • cyber lexicon/terminology
  • data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
  • database administration and maintenance.
  • databases, portals and associated dissemination vehicles.
  • different organization objectives at all levels, including subordinate, lateral and higher.
  • encryption algorithms and cyber capabilities/tools (e.g., SSL, PGP).
  • evolving/emerging communications technologies.
  • fundamental cyber concepts, principles, limitations, and effects.
  • how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
  • how modern digital and telephony networks impact cyber operations.
  • how modern wireless communications systems impact cyber operations.
  • how to establish priorities for resources.
  • indications and warning.
  • information needs.
  • internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities).
  • key cyber threat actors and their equities.
  • key factors of the operational environment and threat.
  • leadership’s Intent and objectives.
  • malware.
  • methods for ascertaining collection asset posture and availability.
  • non-traditional collection methodologies.
  • ongoing and future operations.
  • operational asset constraints.
  • operational planning processes.
  • organization objectives and associated demand on collection management.
  • organizational priorities, legal authorities and requirements submission processes.
  • physical and logical network devices and infrastructure to include hubs, switches, routers, firewalls, etc.
  • priority information, how it is derived, where it is published, how to access, etc.
  • research strategies and knowledge management.
  • risk management and mitigation strategies.
  • tasking mechanisms.
  • tasking, collection, processing, exploitation and dissemination.
  • the available tools and applications associated with collection requirements and collection management.
  • the basic structure, architecture, and design of modern communication networks.
  • the basics of network security (e.g., encryption, firewalls, authentication, honey pots, perimeter protection).
  • the capabilities and limitations of new and emerging collection capabilities, accesses and/or processes.
  • the capabilities, limitations and tasking methodologies of internal and external collections as they apply to planned cyber activities.
  • the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
  • the definition of collection management and collection management authority.
  • the existent tasking, collection, processing, exploitation and dissemination architecture.
  • the factors of threat that could impact collection operations.
  • the organization, roles and responsibilities of higher, lower and adjacent sub-elements.
  • the organization’s established format for collection plan.
  • the organization’s planning, operations and targeting cycles.
  • the organizational policies/procedures for temporary transfer of collection authority.
  • the POC’s, databases, tools and applications necessary to establish environment preparation and surveillance products.
  • the priority information requirements from subordinate, lateral and higher levels of the organization.
  • the request for information process.
  • tipping, cueing, mixing, and redundancy.
  • virtualization products (VMware, Virtual PC).
  • what constitutes a “threat” to a network.

key skills of the All Source Collection Requirements Manager

  • access information on current assets available, usage.
  • access the databases where plans/directives/guidance are maintained.
  • associate Intelligence gaps to priority information requirements and observables.
  • compare indicators/observables with requirements.
  • ensure that the collection strategy leverages all available resources.
  • evaluate the capabilities, limitations and tasking methodologies of organic, theater, national, coalition and other collection capabilities.
  • identify and apply tasking, collection, processing, exploitation and dissemination to associated collection disciplines.
  • identify Intelligence gaps.
  • identify when priority information requirements are satisfied.
  • interpret readiness reporting, its operational relevance and intelligence collection impact.
  • prepare and deliver reports, presentations and briefings, to include using visual aids or presentation technology.
  • review performance specifications and historical information about collection assets.
  • use collaborative tools and environments for collection operations.
  • evaluate requests for information to determine if response information exists.
  • implement established procedures for evaluating collection management and operations activities.
  • resolve conflicting collection requirements.
  • specify collections and/or taskings that must be conducted in the near term.
  • use systems and/or tools to track collection requirements and determine if they are satisfied.
  • analyze and assess internal and external partner organization capabilities and limitations (those with tasking, collection, processing, exploitation and dissemination responsibilities).

All Source Collection Requirements Manager must be able to

  • collaborative skills and strategies.
  • critical reading/thinking skills.
  • collaborate and disseminate information to subordinate, lateral and higher-level organizations.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?