All-Source Collection Management

Responsible for identifying intelligence collection authorities and environment; incorporating priority information requirements into intelligence collection management; and developing concepts to meet leadership's intent. Determines capabilities of available intelligence collection assets; constructs and disseminates intelligence collection plans; and monitors execution of intelligence collection tasks to ensure effective execution of collection plans.

  • T0578: Assess performance of collection assets against prescribed specifications
  • T0645: Determine course of action for addressing changes to objectives, guidance, and operational environment
  • T0698: Facilitate continuously updated intelligence, surveillance, and visualization input to common operational picture managers
  • T0723: Identify potential collection disciplines for application against priority information requirements
  • T0734: Issue requests for information
  • T0737: Link priority collection requirements to optimal assets and resources
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1031: Implement intelligence collection requirements
  • T1035: Determine how threat activity groups employ encryption to support their operations
  • T1036: Integrate leadership priorities
  • T1038: Integrate organization objectives in intelligence collection
  • T1055: Determine if priority information requirements are satisfied
  • T1630: Address identified issues in collection operations and collection plans
  • T1631: Synchronize collections with operational requirements
  • T1632: Determine if collection products and services meet requirements
  • T1634: Determine impacts on collection management operational structure and requirements
  • T1636: Develop intelligence collection management processes
  • T1640: Determine effectiveness of intelligence collection operations
  • T1641: Recommend adjustments to intelligence collection strategies
  • T1647: Develop priority information requirements
  • T1659: Compare allocated and available assets to collection demand
  • T1660: Prepare intelligence collection reports
  • T1677: Develop intelligence collection plans
  • T1681: Coordinate resource allocation of collection assets with collection discipline leads
  • T1682: Prepare collection plan documentation
  • T1686: Identify intelligence requirements
  • T1693: Inventory existing collection management webpage databases, libraries, and storehouses
  • T1695: Determine organizations with collection authority over predefined accessible collection assets
  • T1696: Develop intelligence collection report analysis processes
  • T1703: Prepare collections operation instructions
  • T1706: Allocate collection assets
  • T1723: Disseminate tasking messages
  • T1724: Disseminate collection plans
  • T1737: Develop intelligence collection strategies
  • T1739: Develop intelligence collection requirements
  • T1741: Designate priority information requirements
  • T1742: Select collaboration platforms
  • T1743: Identify information collection gaps
  • T1744: Develop coordination requirements and procedures
  • T1745: Identify gaps in understanding of target technology
  • T1746: Determine effectiveness of processing, exploitation, and dissemination architecture
  • T1748: Identify collection management risks
  • T1749: Mitigate collection management risks
  • T1769: Determine when reallocated collection efforts are completed
  • T1771: Determine effectiveness of the processing, exploitation, and dissemination architecture
  • T1773: Identify collection operational management process risks
  • T1783: Prioritize collection requirements for collection platforms
  • T1787: Reassign collection assets and resources in response to dynamic operational situations
  • T1805: Request discipline-specific processing, exploitation, and dissemination information
  • T1807: Determine intelligence collection asset capabilities
  • T1808: Determine accuracy of intelligence collection guidance
  • T1809: Update collection plans
  • T1813: Update collection matrices
  • T1818: Recommend changes to collection plans
  • T1819: Recommend changes to operational environment
  • T1820: Specify discipline-specific taskings
  • T1828: Synchronize the integrated employment of organic and partner intelligence collection assets
  • K0018: Knowledge of encryption algorithms
  • K0480: Knowledge of malware
  • K0498: Knowledge of operational planning processes
  • K0551: Knowledge of targeting cycles
  • K0674: Knowledge of computer networking protocols
  • K0675: Knowledge of risk management processes
  • K0676: Knowledge of cybersecurity laws and regulations
  • K0677: Knowledge of cybersecurity policies and procedures
  • K0678: Knowledge of privacy laws and regulations
  • K0679: Knowledge of privacy policies and procedures
  • K0680: Knowledge of cybersecurity principles and practices
  • K0681: Knowledge of privacy principles and practices
  • K0682: Knowledge of cybersecurity threats
  • K0683: Knowledge of cybersecurity vulnerabilities
  • K0684: Knowledge of cybersecurity threat characteristics
  • K0689: Knowledge of network infrastructure principles and practices
  • K0697: Knowledge of encryption algorithm capabilities and applications
  • K0718: Knowledge of network communications principles and practices
  • K0719: Knowledge of human-computer interaction (HCI) principles and practices
  • K0721: Knowledge of risk management principles and practices
  • K0734: Knowledge of Risk Management Framework (RMF) requirements
  • K0735: Knowledge of risk management models and frameworks
  • K0751: Knowledge of system threats
  • K0752: Knowledge of system vulnerabilities
  • K0773: Knowledge of telecommunications principles and practices
  • K0776: Knowledge of collaboration tools and techniques
  • K0786: Knowledge of physical computer components
  • K0787: Knowledge of computer peripherals
  • K0792: Knowledge of network configurations
  • K0806: Knowledge of machine virtualization tools and techniques
  • K0812: Knowledge of digital communication systems and software
  • K0815: Knowledge of intelligence collection management processes
  • K0844: Knowledge of cyber attack stages
  • K0845: Knowledge of cyber intrusion activity phases
  • K0857: Knowledge of malware analysis tools and techniques
  • K0858: Knowledge of virtual machine detection tools and techniques
  • K0864: Knowledge of knowledge management principles and practices
  • K0916: Knowledge of malware analysis principles and practices
  • K0972: Knowledge of intelligence collection tasking tools and techniques
  • K0976: Knowledge of intelligence collection principles and practices
  • K0977: Knowledge of intelligence collection management tools and techniques
  • K0978: Knowledge of intelligence collection planning processes
  • K0983: Knowledge of computer networking principles and practices
  • K0986: Knowledge of target selection criticality factors
  • K0987: Knowledge of target selection vulnerability factors
  • K0991: Knowledge of database administration principles and practices
  • K0992: Knowledge of database maintenance principles and practices
  • K1007: Knowledge of intelligence requirements tasking systems and software
  • K1011: Knowledge of network addressing principles and practices
  • K1014: Knowledge of network security principles and practices
  • K1021: Knowledge of resource and asset readiness reporting policies and procedures
  • K1023: Knowledge of network exploitation tools and techniques
  • K1026: Knowledge of requirements submission processes
  • K1029: Knowledge of production exploitation principles and practices
  • K1030: Knowledge of operational planning tools and techniques
  • K1031: Knowledge of risk mitigation tools and techniques
  • K1042: Knowledge of target selection policies and procedures
  • K1045: Knowledge of tasking processes
  • K1048: Knowledge of intelligence collection requirements tools and techniques
  • K1049: Knowledge of routing protocols
  • K1052: Knowledge of the Tasking, Collection, Processing, Exploitation and Dissemination (TCPED) process
  • K1060: Knowledge of intelligence collection authority policies and procedures
  • K1061: Knowledge of environment preparation tools and techniques
  • K1062: Knowledge of surveillance tools and techniques
  • K1064: Knowledge of Request For Information (RFI) processes
  • K1069: Knowledge of virtual machine tools and technologies
  • K1085: Knowledge of exploitation tools and techniques
  • K1088: Knowledge of knowledge management tools and techniques
  • K1109: Knowledge of virtual collaborative workspace tools and techniques
  • K1178: Knowledge of operational environment risks
  • K1195: Knowledge of priority information requirements
  • K1196: Knowledge of priority intelligence collection requirements
  • S0335: Skill in identify intelligence gaps
  • S0430: Skill in collaborating with others
  • S0431: Skill in applying critical thinking
  • S0432: Skill in coordinating cybersecurity operations across an organization
  • S0472: Skill in developing virtual machines
  • S0473: Skill in maintaining virtual machines
  • S0494: Skill in performing operational environment analysis
  • S0495: Skill in determining asset availability, capabilities, and limitations
  • S0496: Skill in assessing intelligence collection tasking
  • S0498: Skill in managing an intelligence collection plan
  • S0500: Skill in creating intelligence collection strategies
  • S0502: Skill in evaluating intelligence collection products
  • S0503: Skill in selecting targets
  • S0504: Skill in identifying vulnerabilities
  • S0505: Skill in performing intrusion data analysis
  • S0506: Skill in identifying customer information needs
  • S0509: Skill in evaluating security products
  • S0511: Skill in establishing priorities
  • S0512: Skill in extracting metadata
  • S0514: Skill in preparing operational environments
  • S0515: Skill in identifying partner capabilities
  • S0518: Skill in assessing threat actors
  • S0520: Skill in determining intelligence collection asset posture and availability
  • S0525: Skill in managing operations
  • S0528: Skill in identifying priority information
  • S0529: Skill in identifying production exploitation needs
  • S0530: Skill in conducting research
  • S0535: Skill in performing threat factor analysis
  • S0538: Skill in managing sensors
  • S0540: Skill in identifying network threats
  • S0586: Skill in administering databases
  • S0673: Skill in translating operational requirements into security controls
  • S0675: Skill in optimizing system performance
  • S0721: Skill in prioritizing information
  • S0728: Skill in preparing briefings
  • S0760: Skill in navigating databases
  • S0762: Skill in integrating organization objectives
  • S0764: Skill in comparing indicators with requirements
  • S0774: Skill in evaluating feasibility of intelligence collection sources
  • S0775: Skill in developing intelligence collection plans
  • S0777: Skill in developing collection strategies
  • S0778: Skill in evaluating operational environments
  • S0779: Skill in determining information requirements
  • S0781: Skill in evaluating collection capabilities
  • S0786: Skill in interpreting readiness reporting
  • S0788: Skill in orchestrating planning teams
  • S0789: Skill in coordinating collection support
  • S0790: Skill in monitoring status
  • S0791: Skill in presenting to an audience
  • S0793: Skill in analyzing performance specifications
  • S0800: Skill in analyzing organizational patterns and relationships
  • S0801: Skill in assessing partner operations capabilities
  • S0869: Skill in performing metadata analysis