News RoomPublicationsEventsBlogAbout UsDonate

Guide to the Evaluation of Educational Experiences in the Armed Services

Occupation Exhibit

NER-CTN-002

CRYPTOLOGIC TECHNICIAN NETWORKS
CTN3
CTN2
CTN1
CTNC
CTNCS
CTNCM

Exhibit Dates: 8/12–Present.

Occupational Field: 20 (Cryptology).

Career Pattern
CTN3: Cryptologic Technician Networks, Third Class (E-4). CTN2: Cryptologic Technician Networks, Second Class (E-5). CTN1: Cryptologic Technician Networks, First Class (E-6). CTNC: Chief Cryptologic Technician Networks (E-7). CTNCS: Senior Chief Cryptologic Technician Networks (E-8). CTNCM: Master Chief Cryptologic Technician Networks(E-9).

Description
Summary: Cryptologic Technicians (Networks) (CTN) provide computer (network and infrastructure) analysis and technical solutions to produce Computer Network Operations (CNO) effects in support of national intelligence requirements. Duties include, but are not limited to: Computer Network Defense Analysis, Digital Forensics Analysis, Digital Network Exploitation Analysis, Interactive Operations, Expeditionary Operations, Research and Development, and Cyber Planning in support of Computer Network Operations. CTN3: Coordinate creation of initial database searches and collection of network intrusion data in support of global cyber threat activity; analyze computer processing unit; file system internals and network security systems; analyze application of operating systems and network protocols; implement sensitive compartmented information procedures; analyze target networks, vulnerability assessments and composition of remote target networks. CTN2: Able to perform the duties required for CTN3; analyze incidents for intelligence value, suspicious code and adversary tactics, techniques, and procedures; analyze operating system hardware interactions; update classified material, analyze global threat activities from data collected during network intrusion. CTN1: Able to perform the duties required for CTN2; interpret global threat indications posed by remote network; analyze obfuscated source code; de-conflict network operations; and document receipt of classified materials. CTNC: Able to perform the duties required for CTN1; approve signal intelligence reports; assess strategic impact of tools and techniques on specific targets; execute computer network operations; develop target templates; perform mission management functions; prepare written and oral operational and situational reports; monitor and deliver internal and external communication; coordinate unit embarkations and perform quality control analysis. Plan, direct, organize, schedule, and evaluate training programs; prepare and review Naval correspondence, instructions, and messages; review and coordinate work schedules; prioritize overall department work; review, recommend and monitor divisional programs (quality assurance, training, safety, etc.); provide guidance for on-the-job performance; identify and mediate interdepartmental differences, and assist, review, recommend, and monitor the implementation of policy statements, operational orders and directives. CTNCS: Able to perform the duties required for CTNC; plan, direct, organize, schedule, and evaluate training programs; prepare and review Naval correspondence, instructions, and messages; review and coordinate work schedules; prioritize overall department work; review, recommend and monitor divisional programs (quality assurance, training, safety, etc.); provide guidance for on-the-job performance; identify and mediate interdepartmental differences, and assist, review, recommend, and monitor the implementation of policy statements, operational orders and directives. CTNCM: Able to perform the duties required for CTNCS; plan, direct, organize, schedule, and evaluate training programs; prepare and review Naval correspondence, instructions, and messages; review and coordinate work schedules; prioritize overall department work; review, recommend and monitor divisional programs (quality assurance, training, safety, etc); provide guidance for on-the-job performance; identify and mediate interdepartmental differences, and assist, review, recommend, and monitor the implementation of policy statements, operational orders and directives.

Related Competencies
Computer forensics topics include digital analysis, forensic data collection, hash filters, kernel functions, malware analysis, suspicious code, and vulnerability analysis. Network security topics include access control lists (ACL’s), architecture components, device logs, encryption standards, sniffing, and virtual private network (VPN). Database management topics include back-up and recovery strategies, data flows, data mining, database interfaces, database queries, dictionary terms, and report design. Networking fundamentals topics include network analysis, numbering conversions: binary and hex, open system interconnect models (OSI), routing protocols, server/client, and TCP/IP protocol. Systems analysis topics include logical and physical design, modeling, open source exploitation, programming, systems requirements, and testing. Business communication topics include active listening, composition of technical business communications, intercultural communication, oral communication techniques, proper format, proper grammar, small group interactions, verbal and nonverbal feedback, writing standards, and written communication skills. Intelligence analysis topics include all-source information analysis, analytical report writing, computer network operations, critical thinking and reasoning, cryptology, cyber analysis, information operations, metadata analysis, signals intelligence reports, systems thinking, target analysis, and threat analysis. Intelligence collection topics include all-source intelligence, collection management, data mining, forensic data collection, incident data collection, open source intelligence collection, service cryptologic element (SCE) functions, signals intelligence (SIGINT), and target collection. Management topics include career planning, conflict resolution, counseling, delegation, financial fundamentals, intelligence management, legal compliance, operational and systems organization, problem solving, and resource maintenance. Project management topics include briefings, budget administration, budget forecasting, communication of status reports, coordination of internal and external vendors, defining and monitoring milestones, presentations, prioritization planning, and scheduling management. Strategic planning topics include critical thinking and analysis, long-range planning and development, planning overview, policies and procedures, predictive analysis, risk management, strategy development, and strengths/weaknesses/opportunities/threats (SWOT) analysis. Leadership topics include analytical management, assessment, change management, cultural sensitivity and analysis, ethical decision-making, information management, presentations, and training and development.

Recommendation, CTN3
In the lower-division baccalaureate/associate degree category, 3 semester hours in computer forensics, 3 in network security, 3 in database management, 3 in networking fundamentals, 3 in systems analysis, and 3 in business communication. In the upper-division baccalaureate degree category, 3 semester hours in intelligence analysis and 3 in intelligence collection (8/12)(8/12).

Recommendation, CTN2
In the lower-division baccalaureate/associate degree category, 3 semester hours in computer forensics, 3 in network security, 3 in database management, 3 in networking fundamentals, 3 in systems analysis, and 3 in business communication. In the upper-division baccalaureate degree category, 3 semester hours in intelligence analysis and 3 in intelligence collection (8/12)(8/12).

Recommendation, CTN1
In the lower-division baccalaureate/associate degree category, 3 semester hours in computer forensics, 3 in network security, 3 in database management, 3 in networking fundamentals, 3 in systems analysis, and 3 in business communication. In the upper-division baccalaureate degree category, 3 semester hours in intelligence analysis and 3 in intelligence collection (8/12)(8/12).

Recommendation, CTNC
In the lower-division baccalaureate/associate degree category, 3 semester hours in computer forensics, 3 in network security, 3 in database management, 3 in networking fundamentals, 3 in systems analysis, and 3 in business communication. In the upper-division baccalaureate degree category, 3 semester hours in intelligence analysis, 3 in intelligence collection, 3 in management, and 3 in project management (8/12)(8/12).

Recommendation, CTNCS
In the lower-division baccalaureate/associate degree category, 3 semester hours in computer forensics, 3 in network security, 3 in database management, 3 in networking fundamentals, 3 in systems analysis, and 3 in business communication. In the upper-division baccalaureate degree category, 3 semester hours in intelligence analysis, 3 in intelligence collection, 3 in management, 3 in project management, and 3 in strategic planning (8/12)(8/12).

Recommendation, CTNCM
In the lower-division baccalaureate/associate degree category, 3 semester hours in computer forensics, 3 in network security, 3 in database management, 3 in networking fundamentals, 3 in systems analysis, and 3 in business communication. In the upper-division baccalaureate degree category, 3 semester hours in intelligence analysis, 3 in intelligence collection, 3 in leadership, 3 in management, 3 in project management, and 3 in strategic planning (8/12)(8/12).

THIS PAGE WAS LAST UPDATED ON 02/22/2016
ACE occupation reviews are conducted by faculty currently teaching at appropriately accredited colleges and universities. Faculty teams analyze the official occupation standards and validate the duties and requirements through service member interviews to determine if the content, scope, and rigor of the experiential learning align to current postsecondary curricula. A minimum of 3 faculty evaluators must achieve consensus on credit recommendations. Please see Faculty Evaluators - Home Page for more information.