All Source Analysis Specialty Area Qualification Matrix

Associated Work Roles

  • All Source Analyst (111)

Note: This page presents the qualification requirements at the Specialty Area level, a summary category one level above work roles. Until the qualification requirements for the Work Roles are released, please refer to the Specialty Area qualification table below for information. This table will be updated to reflect the specific Work Role requirements when the information is available.

Specialty Area Framework Category: Analyze

Specialty Areas responsible for highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.

All Source Analysis Description

Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context draws insights about the possible implications.

Example Job/Billet Titles

  • Computer Network Defense (CND) Analyst

Master Tasks and KSAs

Detailed information on the Tasks and Knowledge, Skills and Abilities (KSAs) associated with each Marine Corps Specialty Area can be found in the Master Task & KSA List spreadsheet on the NAVIFOR website (requires credentials/CAC to access) or on the DoD Cyber Exchange website.

Initial Training

Initial training qualification for a specialty area is generally met by a High School diploma or equivalent and completion of recruit training.

Minimum Credential Requirement

You must meet one of the education, training, or certification requirements in the Qualifications Table below. See “Understanding Qualifications” on the Qualifications Table for more information on the order of precedence for the minimum credential requirement.

Qualifying Degrees

The Qualifications Table below includes college degrees in the Education section. For example, "Bachelor degree from accredited University." To view a list of degree programs that are acceptable for this Specialty Area, click List of Qualifying Degrees below or the Information icon in the Qualifications Table.

Worksheet View

Click the button to toggle in and out of the worksheet view for the qualifications table. Turning the worksheet view on will allow you to mark requirements and qualifications for your proficiency level, and then print a printer-friendly version of the matrix worksheet.

Note: The Qualification Matrix information on this page will be in a different order when printed to reduce the number of pages needed.

View Proficiency Level(s)

Qualifications Table

All qualifications have not been met.
 
Basic Intermediate Advanced
Associate Degree from accredited University Bachelor Degree from accredited University Graduate Degree from accredited University
OR
 
CID F07CVT0 Tactical SIGINT Operators CID F07CVT0 Tactical SIGINT Operators CID F074141 Marine Analysis and Rpting
CID N23CXA1 Communications Signals Collection and Processing CID N23CUQ1 Joint Cyber Analysis CID N23YLE5 Joint Network Attack Course (JNAC)
CID N23L5B1 Entry-Level ELINT (ELE) CID N23CXA1 Communications Signals Collection and Processing  
OR
AND
 
Evaluation of job performance at Marine Corps Unit based off T&R events from NAVMC 3500.56A, NAVMC 3500.105A Evaluation of job performance at Marine Corps Unit based off T&R events from NAVMC 3500.56A, NAVMC 3500.105A Evaluation of job performance at Marine Corps Unit based off T&R events from NAVMC 3500.56A, NAVMC 3500.105A

Note: The Qualification Matrix information on this page will be in a different order when printed to reduce the number of pages needed.

This is an official U.S. Marine Corps websiteUpdated: March 31, 2021
TOP

Basic

Foundational understanding of computer systems and related cybersecurity software and hardware components. Ability to apply simple concepts and routine processes with frequent and specific guidance. Ability to perform successfully in routine, structured situations, or more complex situations with supervision.

Intermediate

Working knowledge and application of Information Security and security operational characteristics for a variety of computer platforms, networks, software applications, and Operating Systems. Extensive knowledge of basic concepts and processes and experience applying these with only periodic high-level guidance. Ability to perform successfully in non-routine and sometimes complicated situations.

Advanced

Application and mastery of Information Security, plans, and functions; responsible for the management of complex projects, and initiatives with large scope. An in-depth understanding of complex concepts and processes, and experience applying these with little or no guidance. Ability to provide guidance to others and to perform successfully in complex, unstructured situations.

Click link to go to Certified Information Systems Auditor (CISA) COOL Snapshot page.

The ISACA, Certified Information Systems Auditor is an advanced credential that validates the skills and achievement of professionals who audit, monitor, control, and evaluate an organization’s business and information technology systems. The CISA certification covers topics such as the information systems audit process, IT governance and management, protection of information assets, information systems acquisition, development, implementation, operations, and business resilience. Candidates must pass a written exam.

Click link to go to Certified Information Systems Security Professional (CISSP) COOL Snapshot page.

The International Information Systems Security Certification Consortium, Inc. (ISC 2), Certified Information Systems Security Professional (CISSP) is an advanced skill level certification for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles. Candidates must meet a combination of education and experience requirements. Candidates must pass a written exam.

Click link to go to GIAC Certified Intrusion Analyst (GCIA) COOL Snapshot page.

The Global Information Assurance Certification (GIAC), Certified Intrusion Analyst (GCIA) is an advanced skill level credential that demonstrates a professional’s knowledge, skills, and abilities to configure and monitor intrusion detection systems, and to read, interpret, and analyze network traffic and related log files. There are no prerequisites for the GCIA certification. Candidates must pass a written exam.

Click link to go to Certified Information Security Manager (CISM) COOL Snapshot page.

The Certified Information Security Manager (CISM) is an advanced certification for the individual who designs, builds, and manages an enterprises information security. CISM focuses on information risk management as the basis of information security. It also includes material on broader issues such as how to govern information security as well as on practical issues such as developing and managing an information security program and managing incidents. This certification is targeted toward experienced information security managers and those who have information security management responsibilities. Five or more years of information security work experience, with a minimum of three years of information security management work experience is required.

Click link to go to Certified Ethical Hacker (CEH) COOL Snapshot page.

The International Council of Electronic Commerce Consultants (EC-Council), Certified Ethical Hacker (CEH) program certifies professionals who are responsible for securing (or testing the security of) computer networks from a vendor-neutral perspective. A Certified Ethical Hacker understands how to look for the weaknesses and vulnerabilities in networks and/or computer systems, and, lawfully and at the request of an organization, uses the same tools as a malicious hacker. The CEH is appropriate for security officers, auditors, security professionals, site administrators, and others who may be concerned about the integrity of their organizations network infrastructure. Candidates must pass a written exam.

Click link to go to Certified in Risk and Information Systems Control (CRISC) COOL Snapshot page.

The ISACA, Certified in Risk and Information Systems Control (CRISC) certification is for individuals experienced in the management of IT risk and the design, implementation, monitoring and maintenance of IS controls. CRISC candidates must have a minimum of at least three years of cumulative work experience performing the tasks of a CRISC professional across at least two of the four CRISC domains. Candidates must also pass a written exam.