Threat Analysis

Responsible for collecting, processing, analyzing, and disseminating cybersecurity threat assessments. Develops cybersecurity indicators to maintain awareness of the status of the highly dynamic operating environment.

  • T0569: Answer requests for information
  • T0685: Evaluate threat decision-making processes
  • T0698: Facilitate continuously updated intelligence, surveillance, and visualization input to common operational picture managers
  • T0707: Generate requests for information
  • T0718: Identify intelligence gaps and shortfalls
  • T0751: Monitor open source websites for hostile content directed towards organizational or partner interests
  • T0845: Identify cyber threat tactics and methodologies
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1035: Determine how threat activity groups employ encryption to support their operations
  • T1053: Identify and characterize intrusion activities against a victim or target
  • T1054: Scope analysis reports to various audiences that accounts for data sharing classification restrictions
  • T1055: Determine if priority information requirements are satisfied
  • T1640: Determine effectiveness of intelligence collection operations
  • T1641: Recommend adjustments to intelligence collection strategies
  • T1643: Develop common operational pictures
  • T1644: Develop cyber operations indicators
  • T1645: Coordinate all-source collection activities
  • T1646: Validate all-source collection requirements and plans
  • T1647: Develop priority information requirements
  • T1651: Prepare threat and target briefings
  • T1652: Prepare threat and target situational updates
  • T1686: Identify intelligence requirements
  • T1762: Modify collection requirements
  • T1763: Determine effectiveness of collection requirements
  • T1765: Monitor changes to designated cyber operations warning problem sets
  • T1766: Prepare change reports for designated cyber operations warning problem sets
  • T1767: Monitor threat activities
  • T1768: Prepare threat activity reports
  • T1770: Report on adversarial activities that fulfill priority information requirements
  • T1772: Identify indications and warnings of target communication changes or processing failures
  • T1775: Prepare cyber operations intelligence reports
  • T1776: Prepare indications and warnings intelligence reports
  • T1792: Assess effectiveness of intelligence production
  • T1793: Assess effectiveness of intelligence reporting
  • T1798: Provide intelligence analysis and support
  • T1799: Notify appropriate personnel of imminent hostile intentions or activities
  • T1804: Prepare network intrusion reports
  • T1835: Determine if intelligence requirements and collection plans are accurate and up-to-date