Systems Requirements Planner

Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.

Below are the Knowledge, Skills, Abilities and Tasks identified as being required to perform this work role.

CoursesDESCRIPTION
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
K0003Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
K0004Knowledge of cybersecurity and privacy principles.
K0005Knowledge of cyber threats and vulnerabilities.
K0006Knowledge of specific operational impacts of cybersecurity lapses.
K0008Knowledge of applicable business processes and operations of customer organizations.
K0012Knowledge of capabilities and requirements analysis.
K0018Knowledge of encryption algorithms
K0019Knowledge of cryptography and cryptographic key management concepts
K0032Knowledge of resiliency and redundancy.
K0035Knowledge of installation, integration, and optimization of system components.
K0038Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
K0043Knowledge of industry-standard and organizationally accepted analysis principles and methods.
K0044Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
K0045Knowledge of information security systems engineering principles (NIST SP 800-160).
K0047Knowledge of information technology (IT) architectural concepts and frameworks.
K0055Knowledge of microprocessors.
K0056Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
K0059Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
K0060Knowledge of operating systems.
K0061Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
K0063Knowledge of parallel and distributed computing concepts.
K0066Knowledge of Privacy Impact Assessments.
K0067Knowledge of process engineering concepts.
K0073Knowledge of secure configuration management techniques. (e.g., Security Technical Implementation Guides (STIGs), cybersecurity best practices on cisecurity.org).
K0074Knowledge of key concepts in security management (e.g., Release Management, Patch Management).
K0086Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools.
K0087Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.
K0090Knowledge of system life cycle management principles, including software security and usability.
K0091Knowledge of systems testing and evaluation methods.
K0093Knowledge of telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing).
K0101Knowledge of the organization??s enterprise information technology (IT) goals and objectives.
K0102Knowledge of the systems engineering process.
K0126Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161)
K0163Knowledge of critical information technology (IT) procurement requirements.
K0164Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes).
K0168Knowledge of applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures.
K0169Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.
K0170Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations.
K0180Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
K0200Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
K0267Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
K0287Knowledge of an organization’s information classification program and procedures for information compromise.
K0325Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).
K0332Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
K0333Knowledge of network design processes, to include understanding of security objectives, operational objectives, and trade-offs.
K0622Knowledge of controls related to the use, processing, storage, and transmission of data.
IDDESCRIPTION
S0005Skill in applying and incorporating information technologies into proposed solutions.
S0006Skill in applying confidentiality, integrity, and availability principles.
S0008Skill in applying organization-specific systems analysis principles and techniques.
S0010Skill in conducting capabilities and requirements analysis.
S0050Skill in design modeling and building use cases (e.g., unified modeling language).
S0134Skill in conducting reviews of systems.
S0367Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
IDDESCRIPTION
A0064Ability to interpret and translate customer requirements into operational capabilities.
A0123Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
A0170Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
IDDESCRIPTION
T0033Conduct risk analysis, feasibility study, and/or trade-off analysis to develop, document, and refine functional requirements and specifications.
T0039Consult with customers to evaluate functional requirements.
T0045Coordinate with systems architects and developers, as needed, to provide oversight in the development of design solutions.
T0052Define project scope and objectives based on customer requirements.
T0062Develop and document requirements, capabilities, and constraints for design procedures and processes.
T0127Integrate and align information security and/or cybersecurity policies to ensure that system analysis meets security requirements.
T0156Oversee and make recommendations regarding configuration management.
T0174Perform needs analysis to determine opportunities for new and improved business process solutions.
T0191Prepare use cases to justify the need for specific information technology (IT) solutions.
T0235Translate functional requirements into technical solutions.
T0273Develop and document supply chain risks for critical system elements, as appropriate.
T0300Develop and document User Experience (UX) requirements including information architecture and user interface requirements.
T0313Design and document quality standards.
T0325Document a system’s purpose and preliminary system security concept of operations.
T0334Ensure that all systems components can be integrated and aligned (e.g., procedures, databases, policies, software, and hardware).
T0454Define baseline security requirements in accordance with applicable guidelines.
T0463Develop cost estimates for new or modified system(s).
T0497Manage the information technology (IT) planning process to ensure that developed solutions meet customer requirements.