White Paper – CITP Training and Education Melissa Kasan Ludwick Troy Townsend Joan P. Downing September 2013 CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.1 Copyright 2013 Carnegie Mellon University This material is based upon work funded and supported by ODNI under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center sponsored by the United States Department of Defense. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of ODNI or the United States Department of Defense. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHEDON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. This material has been approved for public release and unlimited distribution except as restricted below. Internal use:* Permission to reproduce this material and to prepare derivative works from this material for internal use is granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative works. External use:* This material may be reproduced in its entirety, without modification, and freely distributed in written or electronic form without requesting formal permission. Permission is required for any other external and/or commercial use. Requests for permission should be directed to the Software Engineering Institute at permission@sei.cmu.edu. * These restrictions do not apply to U.S. government entities. DM-0000620 6.2 White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education Executive Summary From June to December 2012, the Software Engineering Institute (SEI) at Carnegie Mellon University conducted a survey of cyber intelligence programs across the public and private sector. Known as the Cyber Intelligence Tradecraft Project (CITP), SEI researchers developed an indepth assessment process that exposed several shared challenges across organizations performing cyber intelligence. One of the most compelling problems was the dearth of training and education opportunities for analysts in the cyber intelligence field. The goal of the CITP was not to develop training and education offerings, but rather determine the state of the practice for cyber intelligence across multiple sectors. Part of this work included defining the core competencies and skills that make up a successful cyber intelligence analyst. Having analyzed the data from the CITP participants, the team first developed a mind map to illustrate these core competencies and skills. More detailed information can be found later in the paper. CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.3 Problem Solving Diversity of Perspective Problem Definition Research Methodologies & Applications Collection Management Validation/Verification Defending Assessments Open Source Data Technical Writing Writing for Leadership Debating Skills Knowing Your Audience Big Picture/Scope Management Conflict Resolution Attention to Detail Assimilate New Information Public Speaking Data Collection & Examination Critical Thinking Communication & Collaboration Cyber Intel Analyst CORE COMPETENCIES & SKILLS Cyber Intel Analyst TRAITS Inquisitive Persistent Computing Fundamentals Networks & Networking Self-Motivated Team Player Quick Learner Open Minded Generalist Information Security Technical Exploitation Vulnerability Assessments Malware Cryptography Penetration Testing Technical Architecture Social Engineering Information Architecture Web Servers Scripting Network Defense Wireless Networks Data Mining Incident Response Web Applications Operating Systems Databases Programming Adaptable The team reviewed existing course offerings and identified discrepancies between the ideal skill set for a cyber intelligence analyst and what courses are actually being offered. The team accomplished this by • determining the current state of training and education offerings for cyber intelligence analysts across academia, industry, and government • defining the competencies and skills organizations should look for when hiring the “ideal” cyber intelligence analyst • identifying the gaps between the current and desired state of the available courses This white paper begins by defining core competencies and associated skills that the CITP team has determined are necessary for a cyber intelligence analyst to possess. The paper then covers existing offerings for cyber intelligence analysis training and education and how they match to the skills necessary to work as a cyber intelligence analyst. Finally, the paper explores how the team conducted a gap analysis, and recommends some courses of action to address the current state of cyber intelligence analysis training and education. 6.4 White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Problem Definition/Current State In January 2013, the SEI held a workshop for organizations that participated in the CITP study. A portion of the workshop was devoted to eliciting specific skills and traits that organizations wanted from their cyber intelligence analysts. The team quickly discovered that there was no standard for what constitutes a cyber intelligence analyst. During the CITP study, participants were asked to define the skill they valued most in a cyber intelligence analyst. One organization responded, “five years of experience.” This anecdote is not an outlier in the data. Many organizations reported differing demands of cyber intelligence analysts, typically based on the size of the organization or the maturity of their cyber intelligence program. Often, organizations did not have clear expectations for what the analyst’s skills or competencies should be and decided that the way around this was to hire experienced analysts (typically from the government) and hope that the previous employer had sufficiently trained them, thus alleviating that burden from the hiring organization. While hiring away another organization’s analyst may solve an immediate need, it does little to address the crux of the problem. The implications of not having a standard set of skills and competencies for cyber intelligence analysts are three-fold. First, as alluded to above, the absence of clearly defined competencies and skills presents organizations with hiring challenges. Generally, organizations have two options for staffing cyber intelligence analysts: take a non-technical analyst and provide them with training in cyber security, or take a technical practitioner and teach them to look at the bigger picture and analyze technical data through a strategic lens. While many CITP participants advocated for hiring an inquisitive, critical thinker with a liberal arts background, when we surveyed what their staff consisted of it was almost unanimously Certified Information Systems Security Professional (CISSP) or Certified Ethical Hacking (CEH) certified network security practitioners that were promoted out of help desk or incident response roles. The exceptions to these cases occurred in the government, where organizations have the resources and the time to send analysts through months of internal training programs that groom them to be cyber intelligence analysts. Similarly, in the Air Force there is a 93-day program to train Airmen to become Network Intelligence Analysts1. Such opportunities are missing in the private sector, and many organizations cannot unilaterally afford to create and maintain a program like the Air Force program. Second, the lack of competencies and skills resulted in inconsistent training plans, no training path at all, or a costly “grab bag” approach where analysts were sent to a mix of technical classes that often overlapped in content or failed to address non-technical skills expected of intelligence analysts. The SEI conducted a survey of more than 100 courses including programs and certifications offered by academic institutions and private industry, and more than 40 offered by various components within the Department of Defense (DoD). Some of these programs were advertised specifically as cyber intelligence courses, others were technical components of a larger program in intelligence studies. As the analysis outlined in this paper will show, these programs, with few exceptions, were ineffective at addressing all of the key skills necessary for a cyber intelligence analyst. Instead, analysts have to navigate a series of courses to develop the skills required for strategic analysis of technical data. Alternatively, our research suggests that analysts can learn much of these skills through on-the-job training with mentors, hands-on apprenticeships, and being exposed to real-world scenarios, data, and tools that are absent from many of today’s traditional classroom offerings. Lastly, the lack of clearly defined skills and competencies for cyber intelligence analysts is a roadblock to professionalizing the workforce. In a community with such diverse backgrounds and experiences, it is difficult for the cyber intelligence community to establish standards that would benefit the profession. For example, government terminology is very different from the terminology used in industry. This discrepancy exists in part because the government has carefully shaped their definitions to allow the military and intelligence community to operate in cyberspace without breaking laws. For example, the definition of “computer network attack” was carefully crafted so that the activities of the intelligence community to gather data from targets would not constitute an “attack” (it is considered exploitation, not attack). However, the very same tactics are used by cyber actors against U.S. companies every day, and companies consider those activities as attacks against their networks. Standardizing the qualifications and training of cyber intelligence analysts would go a long way toward creating a standard lexicon and taxonomy. This standardization would improve the communication between analysts at different organizations, leading to improved collaboration on cyber threats. The challenge in cyber intelligence analysis is not a technology challenge – the technology exists. Structured Threat Information Expression (STIX) and the Trusted Automated Exchange of Indicator Information (TAXII) frameworks enable analysts are able to communicate and collaborate to produce useful analysis products. The main obstacle to effective cyber intelligence analysts is that the analysts themselves have different training, experiences, and backgrounds that prevent them from communicating effectively. Although the team was thorough in their work, there were still limitations to the availability of data that could be collected. Limitations included the inability to collect every course offering available; searches were restricted to information found online, mainly course titles and descriptions. The team was able to collect information from a small number of government offerings. The team, however, did not review any classified courses. Phone conversations provided insightful information from both academia and private industry. In spite of these limitations, the team was able collect a large sample of courses, training, and certifications offered to cyber intelligence analysts. See appendix A Gap Analysis Spreadsheet. 1 W isniewski, Brian. “A Brief Survey of the Demographics of the Current Uniformed DoD Cyber Workforce.” Proceedings of the Military Operations Research Symposium. June 2013. CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.5 Traits, Core Competencies, and Skills Throughout the project the team was able to spend a significant amount of time with practitioners learning about the capabilities and personality types required to conduct effective cyber intelligence. This information was divided into two categories: traits and competencies. Personality traits are naturally ingrained in an analyst. These natural traits are often difficult to teach. However, mentors and educators can encourage the development of these traits. For example, a person may not be naturally persistent, but coursework requires them to continue to ask questions, find out more information, and become more thorough in their work. Competencies are comprised of a set of teachable skills. Problem definition, scope management, and research methodologies are some examples of the skills that address the larger competency of critical thinking. The following graphics describe the essential core competencies, skills, and traits of the cyber intelligence workforce. Problem Solving Diversity of Perspective Problem Definition Research Methodologies & Applications Collection Management Validation/Verification Defending Assessments Open Source Data Technical Writing Writing for Leadership Debating Skills Knowing Your Audience Big Picture/Scope Management Conflict Resolution Attention to Detail Assimilate New Information Public Speaking Data Collection & Examination Critical Thinking Communication & Collaboration Cyber Intel Analyst Cyber Intel Analyst CORE COMPETENCIES & SKILLS TRAITS Inquisitive Persistent Self-Motivated Team Player Computing Fundamentals Information Security Networks & Networking Operating Systems Databases Technical Exploitation Vulnerability Assessments Malware Cryptography Penetration Testing Technical Architecture Social Engineering Information Architecture Web Servers Quick Learner Programming Open Minded Scripting Network Defense Wireless Networks Data Mining Incident Response Web Applications Generalist Adaptable Cyber Intel Analyst TRAITS Inquisitive Always interested to know more, ask questions, verify findings Persistent Not deterred by opposition, continues to work to find answers and solutions Self-Motivated Team Player Able to work independently, not need constant guidance and monitoring, also able to ask for help, recognize other’s strengths, and collaborate effectively 6.6 White Paper – CITP Training and Education Quick Learner Interested in learning, able to understand and utilize new information, ask for help when needed Open Minded Able to accept different solutions and ideas, approaches information and hypothesis with healthy skepticism. Generalist Interested in multiple topics, not ”in the weeds“ on a single subject Adaptable Able to thrive in chaos, change focus, react quickly CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Critical Thinking Competency Problem Solving Diversity of Perspective Data Collection & Examination Critical Thinking Communication & Collaboration Cyber Intel Analyst Cyber Intel Analyst CORE COMPETENCIES & SKILLS TRAITS Computing Fundamentals Information Security Technical Exploitation Problem Definition Research Methodologies & Applications Validation/Verification Big Picture/Scope Management Critical Thinking Cyber Intel Analyst CORE COMPETENCIES & SKILLS Critical thinking is essential for intelligence analysts. The foundation of successful intelligence work is the analyst’s ability to define the problem, apply research methods, and think strategically to recommend a course of action. Problem Definition - Define a problem to be solved. Problem Solving - Understand the problem; think creatively to provide a solution(s) in a timely manner. Diversity of Perspective - Look at the problem from multiple angles, appreciate that different backgrounds and experiences enhance the solution. Big Picture/Summarization/Synthesis - Think strategically and recognize how solutions and recommendations are utilized. Scope Management - Understand the work that needs to be done to provide a solution, realize when to stop working. Research Methodologies & Applications - Have a working knowledge of diverse research methods and how to utilize methods to shape data gathering, analysis, and reporting. (This skill is also essential to the “Data Collection and Examination” core competency.) Validation/Verification - Approach potential solutions with healthy skepticism, explore different possibilities to validate and verify findings and conclusions. (This skill is also essential to the “Data Collection and Examination” core competency.) CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.7 Data Collection & Examination Competency Data Collection & Examination Critical Thinking Communication & Collaboration Research Methodologies & Applications Collection Management Validation/Verification Defending Assessments Open Source Data Cyber Intel Analyst Cyber Intel Analyst CORE COMPETENCIES & SKILLS TRAITS Computing Fundamentals Information Security Technical Exploitation Data Collection & Examination Cyber Intel Analyst CORE COMPETENCIES & SKILLS The analyst’s next step after defining the problem is to collect data. Data collection helps the analyst provide a decision maker with actionable recommendations. It is crucial for analysts to be disciplined when collecting and managing information and using that data to produce reliable recommendations. Research Methodologies & Applications - Possess a working knowledge of diverse research methods and how to utilize methods to shape data gathering, analysis, and reporting. (This skill is also essential to the “Critical Thinking” core competency.) Validation/Verification - Approach collected information with healthy skepticism and explore different possibilities to validate and verify findings and conclusions. (This skill is also related to the “Critical Thinking” core competency.) Collection Management - Understand how to turn requirements for intelligence into collection requirements, collect, prioritize, and store information from multiple intelligence disciplines. Open Source Data - Possess an operational understanding of how to ascertain, validate, and employ data from sources that are generally available to the public. Defending Assessments - Have the ability to explain and defend the assessments and recommendations that are made. 6.8 White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Communication & Collaboration Competency Technical Writing Writing for Leadership Data Collection & Examination Critical Thinking Communication & Collaboration Cyber Intel Analyst Cyber Intel Analyst CORE COMPETENCIES & SKILLS Knowing Your Audience TRAITS Computing Fundamentals Debating Skills Information Security Technical Exploitation Conflict Resolution Attention to Detail Assimilate New Information Public Speaking Cyber Intel Analyst Communication & Collaboration CORE COMPETENCIES & SKILLS “Strong communication skills” is such a common phrase that it is almost discounted when searching for an analyst. The team received overwhelming responses from skilled practitioners supporting the need for intelligence analysts to have the ability to communicate, write for leadership, and understand the audience. Technical Writing - Provide sufficient technical detail to show data gathering and analysis to support recommendations. Writing for Leadership - Understand how leadership will utilize recommendations and communicate relevant data. Debating Skills - Explain and defend assessments and recommendations. Knowing Your Audience - Understand the potential audience(s) of your product and craft the product to have the most impact to that audience. Conflict Resolution - Know how to quickly identify a resolution to a discrepancy when collaborating on an intelligence project. Attention to Detail - Show attention to detail when examining data and communicating recommendations. Assimilate New Information - Take new information and be able to understand and utilize it throughout the intelligence lifecycle. Public Speaking - Be able to present findings and recommendations in a public environment. CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.9 Computing Fundamentals Competency Data Collection & Examination Critical Thinking Cyber Intel Analyst Communication & Collaboration CORE COMPETENCIES & SKILLS Cyber Intel Analyst Cyber Intel Analyst CORE COMPETENCIES & SKILLS TRAITS Computing Fundamentals Information Security Technical Exploitation Computing Fundamentals Networks & Networking Operating Systems Databases Programming Scripting Data Mining This competency outlines the basic computing concepts that analysts should utilize to understand the environment they are operating in and how to gather and use the data that they are collecting. Networks & Networking - Understand and utilize physical components, types of networks, protocols, and topologies. Operating-Systems - Understand and utilize different operating-systems and operating system components. Databases - Understand and utilize database types and applications. Programming - Understand and utilize programming processes, methodologies, and programming languages. Scripting - Understand and utilize roles and types of scripting languages. Data Mining - Understand how to pull information from large data sets and how to structure information for reuse. 6.10 White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Information Security Competency Data Collection & Examination Critical Thinking Communication & Collaboration Cyber Intel Analyst Cyber Intel Analyst CORE COMPETENCIES & SKILLS TRAITS Computing Fundamentals Information Security Cyber Intel Analyst CORE COMPETENCIES & SKILLS Technical Exploitation Information Security Vulnerability Assessments Cryptography Technical Architecture Information Architecture Network Defense Incident Response Intelligence analysts should have an understanding of basic security concepts. This understanding should be used to collaborate and share information with an organization’s cybersecurity function. Vulnerability Assessments - Identify and prioritize system vulnerabilities. Cryptography - Utilize techniques and technologies for secure communications Technical Architecture - Utilize a framework for the networks, Open Systems Interconnection (OSI) model. Information Architecture - Understand categorization and organization of data, data access patterns, permissions, data flow, and governance. Network Defense - Understand how to protect, monitor, and respond to network attacks, reconnaissance, and intrusions. Incident Response - Utilize incident management process and response to computer events. CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.11 Technical Exploitation Competency Data Collection & Examination Critical Thinking Cyber Intel Analyst Cyber Intel Analyst CORE COMPETENCIES & SKILLS TRAITS Computing Fundamentals Information Security Cyber Intel Analyst Communication & Collaboration Technical Exploitation CORE COMPETENCIES & SKILLS Technical Exploitation Malware Penetration Testing Social Engineering Web Servers Wireless Networks Web Applications Intelligence analysts must be well versed in the techniques that actors utilize to attack an organization. Malware - Understand intrusive and disruptive software–viruses, worms, Trojans, rootkits, etc. Penetration Testing - Utilize simulated attacks to evaluate and improve network security. Social Engineering - Understand that social engineering can be used to manipulate employees, partners, and suppliers into provide information or unknowingly perform malicious activities. Web Servers - Understand security concerns associated with web content, physical and virtual web servers. Wireless networks - Understand types of wireless networks, wireless devices, and vulnerabilities. Web Applications - Understand how web applications can be exploited. 6.12 White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Gap Analysis After defining the traits, competencies, and skills of an ideal intelligence analyst, the team set out to understand the coursework offered to current and prospective analysts. To determine the current training and education opportunities, the team surveyed more than 150 courses, trainings, and certifications offered by academic institutions, private industry, and the DoD. Findings From the collected data, the team learned that government, private industry, and academic institutions do address more than half of the competencies and skills needed to become a cyber intelligence analyst. The team also confirmed that there are several discrepancies between the skills that analysts need and training opportunities that are offered. The training paths to become a qualified cyber intelligence analyst are inconsistent or nonexistent in some cases. This puts the analyst at a disadvantage because they are not taught content that gives them both the technical and non-technical skills required to perform their job. This also puts hiring organizations (both government and industry) at a disadvantage because they need to invest time and money to appropriately equip their analysts. The team found that academic institutions offered a variety of programs that were either technical or non-technical in nature. Not one program offered an ideal mix of classes; there was frequent overlap in content or failure to address skills that are specific to intelligence analysts. Furthermore, academic institutions are not always able to provide courses that use relevant tools and technology with current data and threats; however, private organizations have the ability to offer these courses by exposing analysts to real-world scenarios, data, and tools. Analysts can also learn skills not taught in classrooms through on-the-job training and hands-on internships provided by an organization. Government The team was only able to capture a small amount of data that pertained to the programs the government makes available to cyber intelligence analysts, while still keeping the review of coursework at the unclassified level. From the data the team collected, it was clear that the government offers programs and training that are very resource-intensive. Government offerings are more expensive and require longer time commitments than other training programs. Although government organizations that create and maintain their own training programs are relatively successful, it is not organizationally cost effective for private industry to create and maintain their own internal cyber intelligence training programs. Academic Institutions Academic institutions offer a wide selection of courses that range anywhere from basic information technology to information security. This broad range gives analysts options; however, it does not give them a clear path to follow when their focus is cyber intelligence. Academic institutions are great at producing individuals that understand analysis but their courses lack the relevant tools and data an analyst needs to develop “real-world” skills. Existing Gaps To identify the existing gaps between the current and desired training and education opportunities, the team defined the core competencies and the correlating skills that are necessary for a cyber intelligence analyst. Next, the existing training and education offerings were matched to the newly identified core competencies and skills, shown in the Appendix A Gap Analysis Spreadsheet. The analysis shows that although the current offerings do have pockets of excellence the current curriculums do not address 35 percent of desired skills, shown in Figure 1. The deficient skills within the Computing Fundamentals, Information Security, and Technical Exploitation competencies are all technical skills that are taught in academic institutions and by private industry organizations. However, in academic institutions these courses often are not offered to intelligence analysts. The deficient skills found within the Critical Thinking, Data Collection & Examination, and Communication & Collaboration competencies are less technical in nature and are often taught as components of Liberal Arts courses, rather than having its own dedicated course. For example, the ability to know your audience and pay attention to detail are skills that should be taught to any analyst in any course that involves report preparation, presentation, and analysis. Courses need to address multiple skills in a single offering, equipping the analyst for a successful cyber intelligence career. For example, our research identified a course from the Naval Post Graduate School, Cyber Systems and Operations Research Methods, that teaches research methodologies and applications, collection management, analysis, and writing. Private Industry Surveys showed that organizations hire either a) analysts, training them in cyber security, or b) technical experts, teaching them to analyze technical data strategically. The team discovered that although organizations said they wanted to hire an inquisitive, critical thinker with a liberal arts background they were, in fact, mostly hiring technical experts. This approach to hiring staff does not work; organizations usually fall short when offering courses and training that focus on security and neglects analysis. Figure 1: Skill Set Gaps CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.13 Potential Courses of Action The CITP uncovered deficiencies in training and education opportunities for cyber intelligence analysts. The project team, through surveys and research, determined the traits, competencies, and skills that should create the ubiquitous and clear standard for what constitutes a cyber intelligence analyst. The team offers the following courses of action to greatly improve the education, recruitment, and professional development of cyber intelligence. Assess Current Analysts and Identify Appropriate Training to Address Deficiencies Academic institutions, private industry, and government should use the competencies and skills from the Intel Competencies Mind Map to review the current skill set of their intelligence analysts, target specific skills that are in need of improvement, then seek courses that specifically address those skills. Alternatively, organizations can develop training that will address the skills and competencies needed to perform cyber intelligence. Finally, organizations should identify a clear learning path for analysts that consist of core competencies and skills identified. Rethink the Traditional Classroom Industry and academic institutions offer an array of cyber intelligence education and training opportunities through traditional classroom instruction, online tutorials, and certification programs. Despite the variety of offerings, project participants indicated that these programs do not fully meet their organization’s needs. Participants expressed that the use of traditional teaching methods for cyber intelligence is antiquated because they fail to produce analysts with the versatility and critical thinking skills needed to succeed in the diverse and ever-changing cyber environment. The team believes that many of the deficiencies in today’s cyber intelligence training programs can be addressed through advanced tradecraft technology. This technology leverages cyber intelligence, computer science, and visual analytics to provide a dynamic, virtual platform for individuals to hone technical and analytical skills. The principle goal of advanced tradecraft technology is to place students into real-world scenarios where the student is able to conduct multi-source analysis, understand critical information that is needed to make recommendations and decisions, and can impact strategic decisions. Hire Differently Organizations should invest in the time to review and rewrite job descriptions for new employees. Using the competencies and skills mind map, organizations should identify which competencies and skills address their current needs, and then craft the job description to look for the best candidate. During the interview process use the list of traits to ask questions to determine if the candidate has the natural abilities required to be a successful intelligence analyst. Explore Internships and Apprenticeships During the participant workshop, organizations emphasized the desire to establish internships and apprenticeships. The relationship between academic institutions and hiring organizations is mutually beneficial. The hiring organization is able to gain short-term talent, the ability to recruit qualified individuals, and provide feedback to schools. The academic institution is able to build a relationship with the hiring organization, which benefits the students, and will give them feedback to improve their curriculum. 6.14 White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Skill Critical Thinking Problem Solving Big Picture/Summarization/Synthesis Scope Management Research Methodologies & Applications Skepticism/Validation/Verification Data Collection & Examination Research Methodologies & Applications Skepticism/Validation/Verification Collection Management Open Source Data Communication & Collaboration Technical Writing Writing for Leadership Conflict Resolution Public Speaking Technical Exploitation Penetration Testing Social Engineering Wireless Networks Operating Systems Information Security Vulnerability Assessments Cryptology Technical Architecture Network Defense Incident Response Computing Fundamentals Networks & Networking Operating Systems Programming Data Mining CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.15 Competency Skill Critical Thinking Problem Solving Big Picture/Summarization/Synthesis Scope Management Research Methodologies & Applications Skepticism/Validation/Verification Data Collection & Examination Research Methodologies & Applications Skepticism/Validation/Verification Collection Management Open Source Data Communication & Collaboration Technical Writing Writing for Leadership Conflict Resolution Public Speaking Technical Exploitation Penetration Testing Social Engineering Wireless Networks Operating Systems Information Security Vulnerability Assessments Cryptology Technical Architecture Network Defense Incident Response Computing Fundamentals Networks & Networking Operating Systems Programming Data Mining 6.16 White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Competency Skill Critical Thinking Problem Definition Problem Solving Diversity of Perspective Big Picture/Summarization/Synthesis Scope Management Research Methodologies & Applications Skepticism/Validation/Verification Data Collection & Examination Research Methodologies & Applications Skepticism/Validation/Verification Collection Management Open Source Data Defending Assessments Communication & Collaboration Defending Assessments Technical Writing Writing for Leadership Debating Skills Knowing your Audience Conflict Resolution Attention to Detail Assimilate New Information Public Speaking Technical Exploitation Malware Penetration Testing Social Engineering Web Servers Wireless Networks Web Applications Operating Systems Information Security Vulnerability Assessments Cryptology Technical Architecture Information Architecture Network Defense Incident Response Computing Fundamentals Networks & Networking Operating Systems Databases Programming Scripting Data Mining CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.17 Applicable Programs and Courses Courses Competency Skill Good Maybe Critical Thinking Problem Definition NONE NONE Problem Solving AMU - Intelligence Operations AMU - Analytics II AMU Threat Analysis MU - Analytic Techniques MU - Cyber Threat Analysis ASU - Advanced Intelligence analysis: Operating in Complex Environments Diversity of Perspective NONE NONE Big Picture/Summarization/Synthesis ASU - Grand Strategy, Intelligence Analysis, and Rationality Scope Management HPU - Intelligence Team Management UM - Intelligence Management and Oversight Research Methodologies & Applications UM - Intelligence Analysis: Consumers, Uses, and Issues DC3 - Cyber Analyst Course UDM - Research Methods UM - Library Research Skills NPS - Cyber Systems and Operations Research Methods HPU - Open Source Intelligence MU - Research Methods in Intelligence AMU - Research Methods ASU - Introduction to Research Methods Data Collection & Examination Skepticism/Validation/Verification HPU - Vetting Research Methodologies & Applications UM - Intelligence Analysis: Consumers, Uses, and Issues DC3 - Cyber Analyst Course UDM - Research Methods UM - Library Research Skills NPS - Cyber Systems and Operations Research Methods HPU - Open Source Intelligence MU - Research Methods in Intelligence AMU - Research Methods ASU - Introduction to Research Methods Skepticism/Validation/Verification HPU - Vetting Collection Management ISA - Intelligence Collection ASU - Intelligence Analysis and National Security Perspectives ISA - Cyber Collections HPU - Intelligence Operations HPU - Intelligence Collection HPU - Intelligence Practicum HPU - Recruitment Cycle HPU - All Source Intelligence NPS - Cyber Systems and Operations Research Methods UM - Intelligence Collection: Sources and Challenges SN - Cyber Intelligence Training AMU - Collection Open Source Data Communication & Collaboration HPU - Open Source Intelligence ISA - Cyber Collections AMU - SIGINT UM - Intelligence Collection: Sources and Challenges Defending Assessments NONE NONE Defending Assessments NONE NONE Technical Writing ERAU - Technical Report Writing HPU - Writing for Publication Writing for Leadership CMU - Professional Writing HPU - Writing for Publication ISA - Analyst Training: Writing, Analysis, and Preparing Briefings 6.18 Debating Skills NONE NONE Knowing your Audience NONE NONE White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Communication & Collaboration Technical Exploitation Conflict Resolution ISA - Intelligence Concepts for Cyber Conflict Attention to Detail NONE NONE Assimilate New Information NONE NONE Public Speaking ERAU - Speech UDM - Intelligence Acquisition: Debriefing and Interviewing Techniques CMU - Strategic Presentation Skills HPU - Analytical Methods Malware NONE NONE Penetration Testing NPS - Cyber Wargame: Blue Team CMU - Hacking Exposed NPS - Cyber Wargame: Red Team HPU - Analytical methods NPS - Network Operations Social Engineering DISA - Social Networking DISA - Phishing NIU - Social Networks and Intelligence Web Servers NONE Wireless Networks UC - Telecommunications Forensics Web Applications NONE Operating Systems UC - Principles of Cybersecurity NONE NONE NPS - Computer Architecture and Operating Systems Information Security Vulnerability Assessments NPS - Network Vulnerability Assessment and Risk Mitigation NPS - Network Operations Cryptology UP - Cryptography Technical Architecture UM - Cyberspace and Cybersecurity NPS - Network Security NPS - Cyber Communications Architectures NPS - Computer Architecture and Operating Systems NPS - Network Operations in a Contested Environment ISA - Cyberforce Superiority Information Architecture NONE Network Defense ISA - Cyberforce Superiority Incident Response UC - Computer Forensics Investigations NONE NPS - Network Operations Computing Fundamentals Networks & Networking NPS - Communications Networks NPS - Internet Protocols NPS - Network Operations NPS - Network Vulnerability Assessment and Risk Mitigation NPS - Network Operations in a Contested Environment UC - Principles of Cybersecurity NPS - Network Security UC - Telecommunications Forensics UP - Network Security FSU - Networking Essentials Operating Systems UP - Principles of Cybersecurity NPS - Computer Architecture and Operating Systems Databases NONE NONE Programming UM - Cyberspace and Cybersecurity NPS - Computer Architecture and Operating Systems Scripting NONE NONE Data Mining CMU - Data Mining CMU - Business Intelligence and Data Mining NPS - Information Management for Cyber Operations UC - Critical Incident Command, Response, and All Hazards CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.19 Programs Reviewed School Name Course Name American Military University (online) Research Methods Strategic Intelligence School Name Bellevue University (Nebraska) (continued) Analytics II Strategic Deterrence Intelligence Operations Cyberwar and Cyberdeterrence Threat Analysis Democracy, Ethnicity, Development in Africa Cybercrime Analysis Democracy, Political Economy and Human Rights across Asia Cyber Ethics: Privacy and Intellectual Property Democracy, Gender, Reform across the Middle East Law, Ethics, and Cybersecurity Comparative Foreign Policy Criminal Intel Analysis Hard and Soft Power Intelligence Profiling Deterring the Enemy Army War College Counterintelligence Intelligence Analysis and National Security Perspectives Geography and US National Security Grand Strategy, Intelligence Analysis, and Rationality Decision Analysis for Senior Leaders Strategic Intelligence for Counterterrorism: Contemporary Threats to National Security Transformational Imperative: Reorganizing in a Multi-polar World Advanced Intelligence analysis: Operating in Complex Environments Cyberwarfare Cyberspace Theory and Strategic Security Implications Practice of US Intelligence and National Security Introduction to Research Methods Applied Statistics Intelligence Support to Policy Making: Impact of 9/11 Special Operations: Creating Strategic Intelligence Effects Carnegie Mellon University Business Intelligence and Data Mining Cybersecurity in Critical Infrastructure Protection Data Mining Decision Making Under Uncertainty Cyber Arms Race and the Intelligence Policy Nexus Hacking Exposed Intelligence and Counter-Terrorism Information Security Risk Analysis National Security, Transnational Interests Information Security: Comparison of US and European Policies Comparative Intelligence Cultures Information Warfare Post-Conflict Politics: Peacekeeping and Peacebuilding Professional Writing Green Security: Eco-conflict and its Challenges White Paper – CITP Training and Education Domestic and International Security Environments and the National Security System Contemporary Security Issues and national Security Policies and Strategies Information Operations 6.20 Transnational Crime and Corruption Analyzing Anti-Americanism Deception, Propaganda and Disinformation Bellevue University (Nebraska) Political Islam and Terrorism Collection SIGINT Angelo State University Course Name Information Assurance Policy Strategic Presentation Skills Terrorism Security and Intelligence CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE School Name Department of Defense Cyber Crime Center (DC3) Course Name Counterintelligence in Cyber Space Phase 1 School Name Henley-Putnam University (continued) Cyber Analyst Course Terrorism Group Dynamics Analyzing the Terrorist Mind Terrorism and Society Speech Kidnapping Strategies Intelligence Technology Influence Warfare Computer Forensics Principles of Information Security Advanced Consequence Management and Incident Command System Computer Forensics Computer Intrusion Defense All Things Digital Cyberterrorism, Cyberwarfare, Cybercrime Business Information System Data and Intelligence Competitive Theory Hostage Negotiation, Hostage Survival Organized Crime, Gang and Terrorist Organizations Henley-Putnam University Political Analysis Extremist Organizations Cybersecurity Introduction Technical Report Writing Ferris State University Leadership Analysis Area Studies Analysis Introduction to Cyber Investigations Embry-Riddle Aeronautical University Course Name Stalking and Workplace Violence Risk Analysis and Strategy Advanced Threat Assessment Networking Essentials Background Investigations Recruitment Cycle Vehicular Security Cover Building and Perimeter Security Double Agents, Denial, Deception Explosives and Arson Security Analytical methods White Collar Crime Writing for Publication Open Source Intelligence Surveillance and Counterserveillance Intelligence Operations Intelligence Practicum Intelligence Team management Secret Societies All Source Intelligence Intelligence Policy and Reform Intelligence & Security Academy, LLC National Security Policy Process History of US Intelligence Intro to US Intelligence Risk Awareness Intelligence Homeland Security Intelligence Intelligence Budget Process Intelligence Collection Intelligence Concepts for Cyber Conflict WMD Terrorism Cyber Collections Counterespionage Operational intelligence Vetting Counter Terrorism: Actionable Intelligence Counterterrorism Analysis Cults and Charismatic Leaders Advanced Domestic Terrorism Operational Concepts and Planning Case Studies in Covert Operations Strategic Intelligence CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Analyst Training: Writing, Analysis, and Preparing Briefings Intelligence Collection Cyberforce Superiority Intelligence and the Law White Paper – CITP Training and Education 6.21 School Name Mercyhurst University Course Name Research Methods in Intelligence Intelligence Theories and Applications School Name Naval PostGraduate School (NPS) (continued) Network Operations Cyber Mission Planning Law Enforcement Intelligence Cyber Policy Strategy Intelligence Communications Network Operations in a Contested Environment Contemporary Leadership for Intelligence Managing Strategic Intelligence Information Management for Cyber Operations Analytical Techniques Cyber Wargame: Blue Team Cyber Threat Analysis Cyber Wargame: Red Team Comparative History of Intelligence Cyber Systems and Operations Research Methods Evolution of Counterintelligence Computer Architecture and Operating Systems Intelligence to Support Targeting Strategic Business Intelligence Conflict and Cyberspace Intelligence and the Constitution Computer Security Analyzing Financial Crimes Nonproliferation Analysis Information Assurance: Secure Management of Systems National Security Network Security Studies in Terrorism Network Vulnerability Assessment and Risk Mitigation Counterintelligence Events and Concepts Penn State Computer Science Economics Intelligence, the Military, and Warfare Foreign Languages and Cultures Counterespionage and Policy Making Geography Topics in Intelligence Information Sciences and Technology Strategic Crisis Exercise Political Science Information Power and National Security Psychology Sociology Propaganda, Persuasion and Influence Information, People, and Technology Cyber Intelligence Security and Risk Analysis Foreign Information and Cyber Strategies Threat of Terrorism and Crime Cyber Threat Social Networks and Intelligence Advanced Information Power Seminar Naval PostGraduate School (NPS) Cyber Communications Architectures Topics in Signals Operations Competitive Intelligence National Intelligence University Course Name Cyber Systems and Operations Secure Ninja Secure Ninja Cyber Intelligence Training Secure Ninja Cyber Counterintelligence Secure Ninja Introduction to Cyber Crime Communications Networks Internet Protocols 6.22 White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE School Name University of Detroit Mercy Course Name Research Methods School Name University of Pittsburgh Information Science Spatial Analysis and Mapping Cryptography Terrorism Human Information Processing Homeland Security and Threat Assessment Interactive System Design Human Factors in Systems Roots of 21st Century Conflict Information Security and Privacy Intelligence Acquisition: Debriefing and Interviewing Techniques Network Security Information Ethics Policy Analysis and Strategy Creation Legal Issues in Information Handling Leadership and Behavior in Organizational Intelligence Information Security Professionals Topics in Intelligence System Administrator in Information Systems Security Seminar in Security Issues University of Maryland Course Name Information System Security Officer Organizational Theory Intercultural Communication and Leadership System Certifiers Utica College (online) Financial Decision Making for Managers Cyber Intelligence Critical National Infrastructures and National Security Statistics for Managerial Decision Making Cybercrime Investigations Managing Intelligence Activities Cyber Counterintelligence Intelligence Collection: Sources and Challenges Domestic Terrorism and Extremist Groups Intelligence Analysis: Consumers, Uses, and Issues Counterterrorism and Cyber Conflict Critical Incident Command, Response, and All Hazards Espionage and Counterintelligence Intelligence Led Enforcement Computer Forensics Investigations Intelligence Management and Oversight Leadership Seminar Principles of Cybersecurity Telecommunications Forensics DISA Cyber Awareness Challenge Library Research Skills IC ISS Awareness Cyberspace and Cybersecurity Social Networking Human Aspects in Cybersecurity: Ethics, Legal Issues and Psychology Phishing National Cybersecurity Policy and Law Enterprise Cybersecurity Policy Global Cybersecurity CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.23 6.24 White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE