The 70th ISRW is known in the cyber community as “America’s Cryptologic Wing,” being a premier source for the Department of Defense’s information network fortification. One way the 70th received that accolade is through enhancing their 41st IS exploitation analysts with precise selection, testing and training.
“An exploitation analyst’s job is to defend the DoD information network, secure DoD data and mitigate risks to DoD missions against some of the nation’s hardest cyber threats,” Tech. Sgt. James, cyber intelligence analyst, 41st IS, said. “Specifically, we provide actionable intelligence about nominated targets in order to provide affects in cyberspace and ensure our DoD’s freedom of maneuver within the cyber domain.”
Cyberspace warrior training is no easy task.
To become an EA, Airmen go through a rigorous and lengthy training process, said James. After Air Force basic training, Airmen spend 110 days learning the foundations of Intelligence Analysis at Goodfellow Air Force Base, Texas.
“Those that show potential in the cyber realm are then nominated or selected for the Joint Cyber Analysis Course at Corry Station, Florida, where they receive instruction on a wide spectrum of cyber topics,” James said.
Before becoming fully operational, those selected must complete 600 hours and 15 courses in U.S. Cyber Command Joint training. Airmen are then tested on 114 job qualification requirements, James said. Upon completion, they become Cyber National Mission Force qualified.
In addition to their military credentialing, EA Airmen are also given the opportunity to qualify with certifications in Cisco Certified Network Apprentice, Linux+, Security+, Network+ and others, like their civilian counterparts, James said.
“Our training requirements are difficult because of the nature of our mission,” he said. “Our Squadron must build Cyber National Mission Teams and National Support Teams in an era when our economy demands that we do more with less. We have to continually grow and learn to stay in stride with new technologies, developing tradecraft and emerging threat vectors.”
The exploitation analyst training flight at the 41st IS previously realized that even with all the training through U.S. CYBERCOM’s Joint pipeline, it was not enough, said James. They had a zero percent acceptance rate to high-profile cyber network organizations for their EA Airmen.
“It became apparent that we needed more rigorous training in order to prepare analysts for the tough mission; thus, our internal EA training program was born,” James said.
Even though the program is still in its infancy, the increase in efficient and knowledgeable Airmen has been realized.
The intensified training program is a highly effective capstone solution that refines analysts on a one-on-one level, said Staff Sgt. Matthew, cyber intelligence analyst, 41st IS.
“Our program takes the foundational knowledge from JCAC [Joint Cyber Analysis Course], and the subject knowledge from the pipeline, and provides a tailored environment to challenge each individual analyst to leverage their unique bodies of knowledge and apply that knowledge to effectively conduct cyberspace maneuvers and achieve mission objectives,” said Master Sgt. Michael, cyber intelligence analyst, 41st IS. “This is the art of teaching tradecraft.”
Creating these types of cultural investments to improve Airmen’s readiness has begun to evolve the future of cyber Airmen at the 41st IS, said Michael.
To practice performing their duties, EA Airmen are provided transient training laboratories, individual lab kits, to utilize their knowledge. In each kit, Airmen receive a locally crafted portable desktop which can influence virtual machines and facilitate hands-on scenarios. This advances Airmen’s capabilities, Michael said.
The advanced mobile desktop training challenges each individual analyst in cyberspace maneuvers to achieve mission objectives. “This, of course, is a short-term measure,” James said.
The ideal, long-term goal is to have squadron, group and wing-owned labs and hardware that can all be leveraged to develop amazing training, rather than simply paying vendors, he said.
“Rather than relying so heavily on costly commercial training, our innovative in-house training has enabled our EAs to join the ranks of some of the best cyber professionals in the world, and take the fight to the most advanced and sophisticated cyber actors across the globe,” Michael said.
This one-on-one training has strengthened the unit’s comradery, he said. As a plus, it has also saved the unit approximately $80K in training.
“This training is pivotal in not only helping analysts reach the level they need to reach in order to pass the interview,” James said. “More importantly, it empowers EA’s to be the best they can be to fight harder in our difficult mission space.”
Date Taken: | 04.17.2017 |
Date Posted: | 05.02.2017 07:35 |
Story ID: | 232221 |
Location: | FORT GEORGE G. MEADE, MARYLAND, US |
Web Views: | 116 |
Downloads: | 3 |
This work, Intelligence Exploitation Analysts: Creating cyberspace warriors, by MSgt Alexandre Montes, identified by DVIDS, must comply with the restrictions shown on https://www.dvidshub.net/about/copyright.