News RoomPublicationsEventsBlogAbout UsDonate

Guide to the Evaluation of Educational Experiences in the Armed Services

Occupation Exhibit

NER-CTA-005
CRYPTOLOGIC TECHNICIAN, ADMINISTRATIVE
CTA3
CTA2
CTA1
CTAC
CTACS
CTACM

Exhibit Dates: 10/06–12/16.

Career Pattern
SN: Seaman (E-3). CTA3: Cryptologic Technician, Administrative, Third Class (E-4). CTA2: Cryptologic Technician, Administrative, Second Class (E-5). CTA1: Cryptologic Technician, Administrative, Second Class (E-6). CTAC: Chief Cryptologic Technician, Administrative (E-7). CTACS: Senior Chief Cryptologic Technician, Administrative (E-8). CTACM: Master Chief Cryptologic Technician, Administrative (E-9).

Description
Summary: Control the flow of messages and information. Their work depends on their special career area: administration (CTA) - administrative and clerical duties that control access to classified material; interpretive (CTI) - radiotelephone communications and foreign language translation; maintenance (CTM)- the installation, servicing and repair of electronic and electromechanical equipment; communication (CTO) - operation of telecommunications systems, and AIS networking and information management; collection (CTR) - Morse code communications and operation of radio direction-finding equipment; and technical (CTT) - communications by means other than Morse code and electronic countermeasures. CTA3: Information Management Specialists operates, supervises, and manages the operation of sophisticated Information Systems (IS) in an integrated software environment; conducts file management procedures; performs general administrative duties; evaluates, develops, implements and manages information workflow and file management procedures; operates, supervises and manages secure communications devices; performs, supervises and manages general administrative duties; supports the command administrative infrastructure necessary to meet the command objective; and performs joint duties with the Defense Courier Service. CTA2: Able to perform the duties required for CTA3; special Compartmented Information Security Program Specialists conducts sand supervises administrative functions and security procedures governing the Special Security Program; retains knowledge of security for classified matter safeguards and procedures; assists command personnel in the completion and submission of Single Scope Background Investigation (SSBI) packages and periodic reviews; prepares and reviews the checklist for Sensitive Compartmented Information Facility (SCIF) accreditation and periodic inspection; and manages administrative functions and security procedures governing the Special Security Program. CTA1: Able to perform the duties required for CTA2; special Compartmented Information Security Program Specialists conducts sand supervises administrative functions and security procedures governing the Special Security Program; retains knowledge of security for classified matter safeguards and procedures; assists command personnel in the completion and submission of Single Scope Background Investigation (SSBI) packages and periodic reviews; prepares and reviews the checklist for Sensitive Compartmented Information Facility (SCIF) accreditation and periodic inspection; and manages administrative functions and security procedures governing the Special Security Program. CTAC: Able to perform the duties required for CTA1; special Compartmented Information Security Program Specialists conducts sand supervises administrative functions and security procedures governing the Special Security Program; retains knowledge of security for classified matter safeguards and procedures; assists command personnel in the completion and submission of Single Scope Background Investigation (SSBI) packages and periodic reviews; prepares and reviews the checklist for Sensitive Compartmented Information Facility (SCIF) accreditation and periodic inspection; and manages administrative functions and security procedures governing the Special Security Program. CTACS: Able to perform the duties required for CTAC; special Compartmented Information Security Program Specialists conducts sand supervises administrative functions and security procedures governing the Special Security Program; retains knowledge of security for classified matter safeguards and procedures; assists command personnel in the completion and submission of Single Scope Background Investigation (SSBI) packages and periodic reviews; prepares and reviews the checklist for Sensitive Compartmented Information Facility (SCIF) accreditation and periodic inspection; and manages administrative functions and security procedures governing the Special Security Program. CTACM: Able to perform the duties required for CTACS; special Compartmented Information Security Program Specialists conducts sand supervises administrative functions and security procedures governing the Special Security Program; retains knowledge of security for classified matter safeguards and procedures; assists command personnel in the completion and submission of Single Scope Background Investigation (SSBI) packages and periodic reviews; prepares and reviews the checklist for Sensitive Compartmented Information Facility (SCIF) accreditation and periodic inspection; and manages administrative functions and security procedures governing the Special Security Program.

Related Competencies
Computer applications topics include basic computer skills; business-oriented problem solving; data entry; file management; hardware; inventory and budgeting software; presentation development; software applications (Microsoft Word, Excel, PowerPoint); and software installation. Office administration topics include administrative procedures, facilities management, information flow, office equipment maintenance, and recordkeeping. Supervision topics include counseling, evaluation and performance appraisal, mentoring, organizational staffing, planning, rewards motivation, and supervisory reports. Document security topics include authentication and authorization systems, back-up strategies and controls, encryption systems, file-fingerprinting tools, intrusion detection systems, and user access control. Security management topics include assets protection management (evaluation and implementation); information security programs and procedures (development and implementation); information technology security program management; management functions; personnel security systems; security programs implementation; security staff development; and security unit (planning, organizing, staffing, and controlling). Database applications topics include ad hoc queries, client-server network capabilities, creating standard reports, and database system administration. Management principles topics include career counseling, controlling, coordinating, handling extraordinary issues, leading, mentoring, organizing, staffing in a complex multi-faceted environment, volunteer and community relations, and work teams. Technical writing topics include appropriate styles and format, audience analysis, graphics, instructional manuals, technical reports, and techniques for gathering and interpreting presentation information. Project management topics include evaluation, forecasting, human needs assessment, quality control, reporting status and progress to supervisors, task execution, trend analysis, and workload management.

Recommendation, CTA3
In the lower-division baccalaureate/associate degree category, 3 semester hours in computer applications and 3 in office administration (11/06)(11/06).

Recommendation, CTA2
In the lower-division baccalaureate/associate degree category, 3 semester hours in computer applications, 3 in office administration, 2 in supervision, and 1 in document security (11/06)(11/06).

Recommendation, CTA1
In the lower-division baccalaureate/associate degree category, 3 semester hours in computer applications, 3 in office administration, 2 in supervision, and 1 in document security (11/06)(11/06).

Recommendation, CTAC
In the lower-division baccalaureate/associate degree category, 3 semester hours in computer applications, 3 in office administration, 2 in supervision, 1 in document security, 2 in security management, and 3 in database applications. In the upper-division baccalaureate degree category, 3 semester hours in management principles, 3 in technical writing, and 3 in project management (11/06)(11/06).

Recommendation, CTACS
In the lower-division baccalaureate/associate degree category, 3 semester hours in computer applications, 3 in office administration, 2 in supervision, 1 in document security, 2 in security management, and 3 in database applications. In the upper-division baccalaureate degree category, 3 semester hours in management principles, 3 in technical writing, and 3 in project management (11/06)(11/06).

Recommendation, CTACM
In the lower-division baccalaureate/associate degree category, 3 semester hours in computer applications, 3 in office administration, 2 in supervision, 1 in document security, 2 in security management, and 3 in database applications. In the upper-division baccalaureate degree category, 3 semester hours in management principles, 3 in technical writing, and 3 in project management (11/06)(11/06).

THIS PAGE WAS LAST UPDATED ON 12/08/2016
ACE occupation reviews are conducted by faculty currently teaching at appropriately accredited colleges and universities. Faculty teams analyze the official occupation standards and validate the duties and requirements through service member interviews to determine if the content, scope, and rigor of the experiential learning align to current postsecondary curricula. A minimum of 3 faculty evaluators must achieve consensus on credit recommendations. Please see Faculty Evaluators - Home Page for more information.