Serving as specialists in cyber communications CRYPTOLOGY TECHNICIAN

Similar documents
WHATE V ER IT TA K ES. WHERE V ER IT TA K ES US.

Find unrivaled experience and status NURSE CORPS

A path to professional leadership BECOMING A NAVY OFFICER

Subj: ELECTRONIC WARFARE DATA AND REPROGRAMMABLE LIBRARY SUPPORT PROGRAM

CURRICULUM VITAE PREVIOUS TEACHING AND COURSEWARE DEVELOPMENT EXPERIENCE:

navy strategy For AChIevIng InFormAtIon dominance navy strategy For AChIevIng InFormAtIon dominance Foreword

Executing our Maritime Strategy

Move your medical career beyond routine MEDICAL CORPS

Information Operations

CTT CAREER PATH (IW/SW/AW/SG/NAC/EXW)

POLICIES CONCERNING THE NAVAL POSTGRADUATE SCHOOL

Statement of FBI Executive Assistant Director for Intelligence Maureen A. Baginski. Before the House Permanent Select Committee on Intelligence

UNCLASSIFIED FY 2009 RDT&E,N BUDGET ITEM JUSTIFICATION SHEET DATE: February 2008 Exhibit R-2

Navy Information Warfare Pavilion 19 February RADM Matthew Kohler, Naval Information Forces

UNCLASSIFIED FY 2008/2009 RDT&E,N BUDGET ITEM JUSTIFICATION SHEET DATE: February 2007 Exhibit R-2

Enlisted Information Dominance Warfare Specialist (EIDWS) Common Core

MILPERSMAN CLASS A AND SERVICE SCHOOL REQUIREMENTS

CURRICULUM OUTLINE OF INSTRUCTION SURFACE WARFARE OFFICER DEPARTMENT HEAD COURSE CIN: A-4H-0107 CDP: 9545 VER: 2.0 CHANGE: 3

AIR FORCE CYBER COMMAND STRATEGIC VISION

BOATSWAIN S MATE RATING (BM) RATING ROADMAP

Leading the silent service at all fathoms SUBMARINE OFFICER

WHICH KIND OF STEM PIONEER ARE YOU?

UNCLASSIFIED. UNCLASSIFIED Navy Page 1 of 8 R-1 Line #152

ICCRTS Paper 103 Anti-submarine Warfare (ASW) Capability Transformation: Strategy of Response to Effects Based Warfare.

Naval Electronic Warfare Solutions Ensuring your mission success.

MCWP Electronic Warfare. U.S. Marine Corps PCN

Cybersecurity United States National Security Strategy President Barack Obama

GOOD MORNING I D LIKE TO UNDERSCORE THREE OF ITS KEY POINTS:

ON CALL FOR AMERICA AND FOR HUMANITY AT LARGE

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 7 R-1 Line #9

MILPERSMAN LATERAL TRANSFER AND CHANGE OF DESIGNATOR CODES OF REGULAR AND RESERVE OFFICER

aselsan EW SPECTRUM MANAGEMENT

UNCLASSIFIED UNCLASSIFIED

STATEMENT OF. MICHAEL J. McCABE, REAR ADMIRAL, U.S. NAVY DIRECTOR, AIR WARFARE DIVISION BEFORE THE SEAPOWER SUBCOMMITTEE OF THE

PART A BILLET AND OFFICER DESIGNATOR CODES

The AFIT of Today is the Air Force of Tomorrow.

Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE

Setting the standard in nuclear reactor research and regulation NAVAL REACTORS ENGINEER

First Announcement/Call For Papers

The Marine Corps Operating Concept How an Expeditionary Force Operates in the 21 st Century

OPNAVINST D N96 23 Jan Subj: SHIP ANTISUBMARINE WARFARE READINESS AND EFFECTIVENESS MEASURING PROGRAM

EXHIBIT R-2, RDT&E BUDGET ITEM JUSTIFICATION N/Space and Electronic Warfare (SEW) Support

Cryptologic Technician Interpretive (CTI) Conversion and A School Requests Updated 04 September 2018

C4I System Solutions.

UNCLASSIFIED UNCLASSIFIED

UNCLASSIFIED R-1 ITEM NOMENCLATURE

International and Regional Threats Posed by the LAWS: Russian Perspective

RATING ROADMAP January 2012

Introduction to Homeland Security. The Intelligence Community (IC) Director of National Intelligence (DNI) National Intelligence Coord.

Cryptologic Technician Interpretive (CTI) Conversion and A School Requests Updated 17 July 2018

MILPERSMAN CLASS "A" SCHOOL OPPORTUNITIES

Introduction to Homeland Security

NETWARCOM. PR 11 Integrated Priority List and the Requirements Process

Chapter 5. Intelligence & Counterterrorism DHS. The Intelligence Community (IC) Intelligence Activities. Intelligence Activities (cont.

SSC Pacific is making its mark as

Logbook Adm. Greenert and Gen. Amos: A New Naval Era Adm. Greenert and Gen. Welsh: Breaking the Kill Chain

STATEMENT OF GENERAL BRYAN D. BROWN, U.S. ARMY COMMANDER UNITED STATES SPECIAL OPERATIONS COMMAND BEFORE THE HOUSE ARMED SERVICES COMMITTEE

LESSON 4: MILITARY CAREER OPPORTUNITIES

Subj: INFORMATION DOMINANCE CORPS COMMAND QUALIFICATION PROGRAM. Encl: (1) Sample Command Qualification Board Recommendation Letter

N/SHIP SELF DEFENSE - DEM/VAL

OLMSTED SCHOLAR PROGRAM Standard Operating Procedures

WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT (WMSA&IS)

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

PRE-DECISIONAL INTERNAL EXECUTIVE BRANCH DRAFT

MILITARY STRATEGIC AND TACTICAL RELAY (MILSTAR) SATELLITE SYSTEM

Navy Expeditionary Combat Command Executing Navy s Maritime Strategy

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

UNCLASSIFIED. UNCLASSIFIED Navy Page 1 of 6 R-1 Line #162

Subj: SURFACE SHIP AND SUBMARINE SURVIVABILITY TRAINING REQUIREMENTS

Bachelor of Arts in Intelligence Studies

STATEMENT BY LIEUTENANT GENERAL RICHARD P. FORMICA, USA

***************************************************************** TQL

AVIATION SUPPORT EQUIPMENT TECHNICIAN ENLISTED CAREER ROADMAP

Key findings. Jennie W. Wenger, Caolionn O Connell, Maria C. Lytell

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

Who becomes a Limited Duty Officer and Chief Warrant Officer an examination of differences of Limited Duty Officers and Chief Warrant Officers

Tactical Technology Office

The Verification for Mission Planning System

Federal Bureau of Investigation (FBI)

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

WEST POINT CYBER INITIATIVES

Logbook Navy Perspective on Joint Force Interdependence Navigating Rough Seas Forging a Global Network of Navies

Engaging the DoD Enterprise to Protect U.S. Military Technical Advantage

Data Collection & Field Exercises: Lessons from History. John McCarthy

MILPERSMAN OFFICER SPECIAL ASSIGNMENTS DEFENSE ATTACHE SERVICE (DAS): ATTACHE ASSIGNMENTS CH-50, 3 Feb 2015 Page 1 of 10

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

Department of Defense DIRECTIVE. SUBJECT: Electronic Warfare (EW) and Command and Control Warfare (C2W) Countermeasures

MEDIA CONTACTS. Mailing Address: Phone:

CAPT Gene Black, USN Director, Surface Officer Assignments (PERS-41)

A Call to the Future

FIGHTER DATA LINK (FDL)

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

F oreword. Working together, we will attain the greatest degree of spectrum access possible for the current and future Navy/Marine Corps team.

Subj: MISSION, FUNCTIONS, AND TASKS OF NAVAL SPECIAL WARFARE COMMAND

The best days in this job are when I have the privilege of visiting our Soldiers, Sailors, Airmen,

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate

Aviation Boatswain s Mate (Fuels)

AFCEA Mission Command Industry Engagement Symposium

Transcription:

Serving as specialists in cyber communications CRYPTOLOGY TECHNICIAN

Analyzing encrypted electronic communications. Jamming enemy radar signals. Deciphering information in foreign languages. Maintaining the state-of-the-art equipment and networks used to generate top secret intel. This is the highly specialized work of those in the Navy Cryptology community. JOB DESCRIPTION When it comes to sensitive military communications, the continuous battle is to keep one s information concealed and protected while simultaneously exposing and deciphering that of the enemy. The general role of a Cryptologic Technician (CT) in the Navy is to help maximize operational integrity and situational awareness by collecting, analyzing and reporting on communication signals using computers, specialized computer-assisted communications equipment and video display terminals. It s a highly secretive job that is carried out by different types of CTs with advanced training in specific areas of cryptology. Serving as Enlisted Sailors (high school diploma or equivalent required), Navy Cryptologic Technicians are part of the Information Dominance Corps (IDC) a group of highly specialized information experts fully integrated across surface, subsurface, air, space and cyberspace domains. With shared functions, capabilities and resources, IDC members leverage their skills to optimize decision making and to maximize the use of sensors, weapons, network communications and control systems for purposes of national security and warfighting. SPECIFIC RESPONSIBILITIES Within Navy Cryptology, there are distinct focus areas that have their own training paths and job descriptions. Depending on your interests, you could pursue opportunities centered around any of the following specializations: Interpretive, Technical, Networks, Maintenance or Collection. Each CT role works under the oversight of Information Warfare Officers (four-year degree required) or Cyber Warfare Engineers (four-year degree required) and potentially both. Cryptologic Technician Interpretive (CTI) CTIs serve as experts in linguistics (including Arabic, Chinese, Korean, Persian-Farsi, Russian, and Spanish) and deciphering information in other languages. Primarily, their responsibility is to collect, analyze and exploit foreign language communications of interest to identify, locate and monitor worldwide threats; transcribe, translate, and interpret foreign language materials and prepare time-sensitive tactical and strategic reports; and provide cultural and regional guidance in support of Navy, Joint Force, national and multi-national needs. MAINTAINING SUPERIORITY IN THE INFORMATION AGE INFORMATION & TECHNOLOGY In a highly networked world, information is everywhere easier to access and increasingly exploitable. Today s technological advancements make information both a formidable weapon and a constant threat to the point that it has evolved into a type of warfare all its own. With this in mind, America s Navy has the Information Dominance Corps (IDC) a community charged with mastering the capabilities, tools and techniques required to effectively collect, process, analyze and apply information. Gathering data through sources ranging from advanced cyberspace operations to unmanned surveillance systems. Converting data into effective and actionable intelligence. Maintaining cutting-edge communications networks that effectively share and safeguard information. It s all part of the mission for those who serve in the professional areas of information and technology in America s Navy for those warriors who do battle within the cyberspace domain and the electromagnetic spectrum. Made up of both Enlisted Sailors and Officers, IDC members specialize in information-intensive fields that include Information Management, Information Technology, Information Warfare, Cyber Warfare, Cryptology, Intelligence, and Meteorology & Oceanography. Collaboratively, they develop and defend vital intelligence, networks and systems. Managing the critical information that supports U.S. Navy, Joint and national warfighting requirements. Maintaining the Navy s essential technological edge. Visit facebook.com/navycryptologyandtechnology to ask questions. Get answers. And connect with others just like you. Cryptologic Technician Technical (CTT) CTTs serve as experts in airborne, shipborne and land-based radar signals. Primarily, their responsibility is to operate electronic intelligencereceiving and direction-finding systems, digital recording devices, analysis terminals and associated computer equipment; operate systems that produce high-power jamming signals used to deceive electronic sensors and defeat radar-guided weapons systems; and provide technical and tactical guidance in support of surface, subsurface, air and special warfare operations. 2

SPECIFIC RESPONSIBILITIES (CONT.) Cryptologic Technician Networks (CTN) CTNs serve as experts in communication network defense and forensics. Primarily, their responsibility is to monitor, identify, collect and analyze information; provide computer network risk mitigation and network vulnerability assessments and incident response/reconstruction; provide network target access tool development; conduct computer network operations worldwide in support of Navy and Department of Defense missions. Cryptologic Technician Maintenance (CTM) CTMs serve as experts in the preventative and corrective maintenance of sophisticated cryptologic equipment, networks and systems. Primarily, their responsibility is to install, test, troubleshoot, repair or replace cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces and data systems; and configure, monitor and evaluate Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations. Cryptologic Technician Collection (CTR) CTRs serve as experts in intercepting signals. Primarily, their responsibility is to collect, analyze and report on communication signals using computers, specialized computer-assisted communications equipment, video display terminals and electronic/magnetic tape recorders; exploit signals of interest to identify, locate and report worldwide threats; and provide tactical and strategic signals intelligence, technical guidance, and information warfare support to surface, subsurface, air and special warfare units. CTRs could also be assigned duties as fusion analysts a role that involves taking intelligence data from multiple sources, effectively piecing together the puzzle, and generating a coherent intelligence product report to be used by decision makers. WORK ENVIRONMENT Cryptologic Technicians perform a variety of duties worldwide, at numerous overseas and stateside shore commands, aboard surface ships, aircraft and submarines, and with Naval Special Warfare generally dividing time between assignments ashore and afloat. Duties could be performed in an office setting, lab-type setting, specialized maintenance shop, secure space or watch environment. Responsibilities may involve working closely with others or operating independently with little supervision. READY TO TAKE THE NEXT STEPS? Once you re inspired, better informed and seriously interested, here s how to proceed: 1. TALK TO YOUR RECRUITER Ask questions Discuss your long-term goals Review your qualifications Go over relevant financial incentives and bonuses 2. APPLY FOR THE POSITION Provide personal information that includes your birth certificate, social security card and professional details (if applicable) Take the Armed Services Vocational Aptitude Battery (ASVAB) to help assess your skills and interests Pass a full medical examination Participate in a precommitment interview Take the Defense Language Aptitude Battery (DLAB) test 3. BEGIN YOUR TRAINING Attend Boot Camp in Great Lakes, IL (8 10 weeks) Get advanced skills training at a Navy A School (time varies depending on specialty) From there, you re ready to start serving as a Sailor and respected professional As a CT, you may work independently or as part of small, coordinated teams ultimately under the supervision of Information Warfare Officers (four-year degree required) or Cyber Warfare Engineering Officers (four-year degree required). The specific working environment will vary depending upon specialization area within the field of cryptology. Contact a recruiter for details. TRAINING AND ADVANCEMENT Upon completion of initial 7 9 week Recruit Training (known as Boot Camp), those pursuing a Cryptologic Technician role report to either Pensacola, Fla., or Monterey, Calif., to receive formal Navy schooling in their specialty area within the field of cryptology. This consists of technical A School and possibly advanced C School or F School. CTI training Class A School is broken into two phases. Phase One, depending on the language, is anywhere from 27 to 64 weeks in duration. Schooling takes place at the Defense Language Institute, Monterey, Calif. Phase Two, depending on the language, is 12 weeks long. Class F School is conducted at the Regional Center for Excellence. CTT training Class A School is approximately 17 weeks long. After A school, some CTTs will attend a Class C School that is approximately 26 weeks in duration. The schools are located in Pensacola, Fla. 3

TRAINING AND ADVANCEMENT (CONT.) CTN training Class A School is 26 weeks long and located in Pensacola, Fla. CTM training Class A School is approximately 10 weeks in duration and located in Pensacola, Fla. CTR training Class A School is approximately 22 weeks long. The school is located in Pensacola, Fla. In the course of service, specialized training received could lead to credentialing, certification, licensure and/or apprenticeship opportunities from a number of national boards and organizations. Promotion opportunities are regularly available but are competitive and based on performance. To learn more about the specific training path for any of the focus areas within the field of cryptology, contact a recruiter for details. SERVICE OPTIONS Active Duty Sailors serve full-time. This allows you to take full advantage of the available career and leadership opportunities. Enjoy the broad range of benefits. And experience incredible possibilities for travel and adventure. Reserve Sailors serve part-time. This way you can maintain a civilian career while serving as few as two days a month and two weeks a year. With opportunities for additional service and pay. Additionally, you ll have the possibility of flexible drilling options to better meet service requirements. While enjoying many of the same advantages and benefits of full-time service. EDUCATION OPPORTUNITIES Beyond offering access to professional credentials and certifications, Navy technical and operational training in the field of intelligence can translate to credit hours toward a bachelor s or associate degree through the American Council on Education. You may also continue your education through opportunities like the Servicemembers Opportunity Colleges Navy (SOCNAV) Degree Program, Navy College Program and Tuition Assistance, and the Post-9/11 GI Bill. Specific opportunities vary depending upon specialization area within the field of cryptology. Contact a recruiter for details. PAY RANGE Cryptologic Technicians are rewarded with excellent benefits including competitive pay that s dependent upon rank or rate and years in service. Like most positions, your increase in rate and rank is earned. Promotions depend upon your performance and time in service. BENEFITS When it comes to financial advantages, the Navy amounts to much more than a competitive paycheck. As a Sailor in the Navy, you can look forward to:* Supplemental/bonus pay Foreign Language Proficiency Pay Scheduled pay raises and regular promotions Postgraduate education, fully funded by the Navy Post-9/11 GI Bill funding for you or your family to use for school 30 days vacation with pay earned every year Outstanding retirement benefits, plus a 401(k)-like thrift savings plan Comprehensive medical and dental coverage Tax-free allowances for housing and meals Tax-free shopping privileges at military stores Free or low-cost travel opportunities Access to military bases, clubs and recreational facilities all over the world 100% tuition assistance while serving Credentials/Certifications through Navy Credentialing Opportunities On-Line (Navy COOL) *Benefits and training vary for Navy Reserve service. Contact a Navy Reserve Recruiter for details. 4

QUALIFICATIONS A high-school diploma or equivalent is required to become an Enlisted Sailor in the cryptology field in the Navy. Those seeking a Cryptologic Technician position must be U.S. citizens who can meet eligibility requirements for a Top Secret/Sensitive Compartmented Information security clearance. They should have an interest in advanced electronics and technology; exceptionally good character; good speaking, writing and record-keeping skills; a good working aptitude of math; and the capability to do highly detail-oriented, highly classified work. Specific qualifications vary depending upon specialization area within the field of cryptology. Contact a recruiter for details. AFTER THE NAVY The world-class training and expertise you gain as a Cryptologic Technician, coupled with your security clearance, may prepare you for a wide range of federal jobs. Depending on your specialization area, this could include opportunities within the U.S. Intelligence Community, and potential employment with the Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI) or National Security Agency (NSA). Depending upon your specific background, other excellent career opportunities in the civilian sector could include work as a Computer Systems Analyst, Computer Programmer, Computer and Information Systems Manager, Database Administrator, Network and Computer Systems Administrator, Intelligence Analyst, Operations Manager, Linguist or Translator. 5