Multi-Discipline Intelligence Operational Support
- Support the build-out and improvement of friendly collection capabilities
- Improve access to battlespace information across the spectrum
- Recommend improvements and/or modifications to technological capabilities
PED Integration and Analysis
- Convert and refine collected ISR data
- Transform raw collected data into usable information for further analysis
- Modernize and integrate PED capabilities into holistic, efficient intelligence-gathering systems
Operations in the Information Environment
- Generate and apply informational power to increase competitive advantage across all operating environment domains
- Shape the role of information in operations across the Joint Force.
- Counter adversarial actions and create operational advantage
Training & Education
- Develop formal course structure and content
- Implement tailored exercise integration processes and scenarios
- Field and provide end-user training of emerging technologies and processes
- Supply formally trained platform instructors and curriculum developers
Special Security Operational Support
- Execute component Security programs, providing security office & security management services
- Conduct Security program management functions to include physical, personnel, information, and industrial security.
- Formulate and implement program goals, plans, policies, and procedures associated with the development and operation of SCI protection functions and activities.
Cyber Security Operational Support
- Conducting Assessment & Authorization (A&A) analysis ISO the Risk Management Framework (RMF) process.
- Conduct Independent Verification and Validation (IV&V)
- Establish and enforce System Security Plans (SSP), Ports Protocols, and Services Management (PPSM) plans, and Security Technical Implementation Guide (STIG) compliance.
ISR Modernization
- Advise senior leaders on modernization priorities to build more lethal forces and maintain superior US military capabilities.
- Provide recommendations on budget requests to develop advanced sensing capabilities
- Recommend network and system interactions that allow for enhanced command and control.
Focused on Compliance
Since inception, all JCTM company operations have ensured a consistent control framework and uniform implementation of NIST 800-53 based controls from which NIST 800-171 is derived, as well as adoption of the voluntary NIST Cybersecurity Framework (CSF). JCTM continues to mature its cyber readiness posture in preparation for future certifications.
Cyber Blog
Talking Compliance, Awareness, and Education


