Partner Integration Planner Job Profile

What is a Partner Integration Planner?

The Partner Integration Planner works to advance cooperation across organizational or national borders between cyber operations partners. Aids the integration of partner cyber teams by providing guidance, resources, and collaboration to develop best practices and facilitate organizational support for achieving objectives in integrated cyber actions.

Partner Integration Planner must know:

  • computer networking concepts and protocols, and network security methodologies.
  • laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • cybersecurity and privacy principles.
  • cyber threats and vulnerabilities.
  • specific operational impacts of cybersecurity lapses.
  • concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
  • accepted organization planning systems.
  • attack methods and techniques (DDoS, brute force, spoofing, etc.).
  • classification and control markings standards, policies and procedures.
  • client organizations, including information needs, objectives, structure, capabilities, etc.
  • common computer/network infections (virus, Trojan, etc.) and methods of infection (ports, attachments, etc.).
  • computer networking fundamentals (i.e., basic computer components of a network, types of networks, etc.).
  • crisis action planning for cyber operations.
  • cryptologic capabilities, limitations, and contributions to cyber operations.
  • cyber actions (i.e. cyber defense, information gathering, environment preparation, cyber-attack) principles, capabilities, limitations, and effects.
  • cyber laws and legal considerations and their effect on cyber planning.
  • cyber operations support or enabling processes.
  • data communications terminology (e.g., networking protocols, Ethernet, IP, encryption, optical devices, removable media).
  • deconfliction processes and procedures.
  • evolving/emerging communications technologies.
  • existing, emerging, and long-range issues related to cyber operations strategy, policy, and organization.
  • fundamental cyber concepts, principles, limitations, and effects.
  • fundamental cyber operations concepts, terminology/lexicon (i.e., environment preparation, cyber-attack, cyber defense), principles, capabilities, limitations, and effects.
  • how Internet applications work (SMTP email, web-based email, chat clients, VOIP).
  • information security concepts, facilitating technologies and methods.
  • internal and external partner cyber operations capabilities and tools.
  • operations security.
  • organization cyber operations programs, strategies, and resources.
  • organization issues, objectives, and operations in cyber as well as regulations and policy directives governing cyber operations.
  • organization objectives, leadership priorities, and decision-making risks.
  • organization or partner exploitation of digital networks.
  • organization policies and planning concepts for partnering with internal and/or external organizations.
  • organizational hierarchy and cyber decision-making processes.
  • organizational planning concepts.
  • organizational structures and associated intelligence capabilities.
  • target and threat organization structures, critical capabilities, and critical vulnerabilities
  • the organizational structure as it pertains to full spectrum cyber operations, including the functions, responsibilities, and interrelationships among distinct internal elements.
  • the structure and intent of organization specific plans, guidance and authorizations.
  • the structure, architecture, and design of modern digital and telephony networks.

Key skills of the Partner Integration Planner include:

  • evaluating information for reliability, validity, and relevance.
  • preparing and presenting briefings.
  • utilizing feedback to improve processes, products, and services.
  • utilizing virtual collaborative workspaces and/or tools (e.g., IWS, VTCs, chat rooms, SharePoint).
  • applying analytical methods typically employed to support planning and to justify recommended strategies and courses of action.
  • applying crisis planning procedures.
  • documenting and communicating complex technical and programmatic information.
  • preparing plans and related correspondence.
  • distinguish between notional and actual resources and their applicability to the plan under development.
  • analyze and assess internal and external partner cyber operations capabilities and tools.

Partner Integration Planner must be able to:

  • communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • accurately and completely source all data used in intelligence, assessment and/or planning products.
  • apply critical reading/thinking skills.
  • function in a collaborative environment, seeking continuous consultation with other analysts and experts—both internal and external to the organization—to leverage analytical and technical expertise.
  • exercise judgment when policies are not well-defined.
  • effectively collaborate via virtual teams.
  • collaborate effectively with others.
  • adjerate in a diverse, unpredictable, challenging, and fast-paced work environment.
  • apply approved planning development and staffing processes.
  • coordinate cyber operations with other organization functions or support activities.
  • develop or recommend planning solutions to problems and situations for which no precedent exists.
  • identify external partners with common cyber operations interests.
  • interpret and apply laws, regulations, policies, and guidance relevant to organization cyber objectives.
  • interpret and understand complex and rapidly evolving concepts.
  • participate as a member of planning teams, coordination groups, and task forces as necessary.
  • tailor technical and planning information to a customer’s level of understanding.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel