Cryptologic Technicians (Networks) (CTN) employ tactical and strategic capabilities to plan, develop, and execute offensive and defensive Cyberspace Operations. They perform Threat Analysis, Digital Forensics, Network Exploitation, Research and Development, and Mission Planning, leverage tactical and strategic signals intelligence and cryptologic functions, produce and execute cyberspace effects, identify and report worldwide threats in support of special operations forces, national, fleet, and joint requirements, and control and safeguard access to classified material and information systems.

There are 27 credentials closely related to the tasks performed in this Rating that may be attainable as soon as Class “A” technical school has been completed. Sailors can take advantage of these credentialing opportunities shortly following their initial training. Select “< 1 Year” for the “Experience after ‘A’ School” filter in the “Related Credentials” section to view these credentials.

CTN Roles:


Access Network Operator

Access Network Operators perform access collection, processing, and/or geolocation of wired or wireless computer and digital networks in order to exploit, locate, and/or track targets of interests in support of special operations forces, national, fleet, and joint requirements.

Cyber Defense Analyst
Cyber Defense Analysts collect and utilize host and/or network data from a variety of cyber defense tools to analyze events that occur within various environments for the purpose of mitigating threats.

Cyber Defense Forensic Analyst
Cyber Defense Forensics Analysts collect and analyze digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.

Cyber Exploitation Analyst
Cyber Exploitation Analysts collaborate to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. They leverage all authorized resources and analytic techniques to penetrate targeted networks.

Cyber Operations Planner
Cyber Operations Planners develop detailed plans for the conduct or support of the applicable range of cyber operations through collaboration with internal and external partners. They participate in targeting selection, validation, and synchronization and enable integration during the execution of cyber actions.

Cyber Research and Development Specialist
Cyber Research and Development Specialists perform capability development through reverse engineering, vulnerability research, all-source intelligence, and industry-standard development practices to enable offensive and defensive operations.

Cyber Threat Emulation Operator
Cyber Threat Emulation Operators (CTEOs) replicate threat activity for full scope assessments of blue Mission Relevant Terrain Cyber (MRTC) utilizing adversarial Tactics, Techniques, and Procedures (TTPs). CTEOs will utilize all-source intelligence to execute an offensive cyber operational plan in support of Commanders training, or operational requirements to perform aggressive threat assessments of information and combat systems to inform defensive TTPs and posture. Additionally, CTEOs utilize knowledge of adversary activities/behaviors and vulnerabilities to develop operational effects that will align with MRT-C priorities and recommend mitigation strategies to allied entities.

Digital Network Analyst
Digital Network Analysts perform cyberspace target development, discovery, and analysis in support of offensive cyberspace operations to meet special operations forces, national, fleet, and joint requirements.

Source: cool.osd.mil