Five Tiers of Cyber Intelligence Competency
Intelligence training has long been a collection of scattered skills. True mastery requires a deliberate evolution — from tactical practitioner to strategic architect to doctrinal trailblazer. The Treadstone 71 competency model maps that journey across five tiers, each building on the last with progressively deeper tradecraft, broader scope, and greater organizational impact.
Intelligence training has long been a collection of scattered skills. True mastery is built through a deliberate evolution from a tactical practitioner to a strategic architect.— Treadstone 71 Intelligence Doctrine
From Collection to Doctrine
Each tier represents a measurable leap in capability, scope, and organizational impact. Select a tier to see its full detail page, core competencies, and recommended training programs.
The Operator
Master the "how." Forge the instrument.
The forge. Master the tools and tactics of the trade — executing the intelligence lifecycle with precision and discipline. Become the hands-on collector and processor of raw information, operating with unbreakable OPSEC under established requirements.
The Analyst
Answer "so what?" Connect the dots.
Data is noise. Intelligence is signal. Transform raw data into finished intelligence. Move beyond collection into rigorous analysis, cognitive bias mitigation, and writing reports that support leaders, investigators, and security operations under pressure.
The Hunter
Dictate the engagement. Become a ghost.
Analysis informs. Action decides. Move from reactive to proactive. Specialize in adversarial domains — counterintelligence, deception planning, cognitive warfare, influence operations, transnational crime, and cryptocurrency investigations. Two specialization paths: CI and Influence Operations, or Transnational Threat Investigation.
The Architect
Answer "what's next?" Design the board.
The final ascent from playing the game to designing it. Build, direct, and align the entire intelligence function with executive strategy. Shape the organization's future by securing resources, influencing leadership, and commanding the mission. Not just building a program — engineering strategic advantage.
The Source
Define the standard. Write the doctrine.
The trailblazer of all that is new. Graduation from architecture to authorship. The Source does not ask "what's next?" — and instead sets the horizon. Research flows into frameworks; frameworks become doctrine; doctrine drives campaigns in cyber, information, and counterintelligence. Executives, operators, and analysts treat the Source as a reference point for method, writing, and foresight.
Competency Tier FAQ
Do I have to complete the tiers in order?
Which courses map to which tier?
How long does it take to complete all five tiers?
Can my team follow this model together?
Are there bundle discounts for multiple tiers?
Choose Your Tier. Begin the Journey.
Select a tier above to see its full detail page, core competencies, and recommended programs. Or go directly to the featured courses and bundle discounts to start your enrollment.
Questions? info@treadstone71.com · Contact Form