Systems Requirements Planner

Work Role ID: 641  |  Workforce Element: Cyber IT

What does this role do? Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.

Foundational Qualifications for System Requirements Planner

Foundational Qualifications: Anyone assigned to a DCWF Work Role-Coded position must meet the Foundational Qualification Requirements upon hire or conversion into the position. Contractors and foreign nationals must meet these requirements prior to the commencement of work. If the person does not meet any of the three options, they may still qualify based on an assessment of their work experience as compared to the Work Role’s KSATs.

Proficiency: Basic Proficiency: Intermediate Proficiency: Advanced
Foundational Qualification Options Education Bachelor degree or higher from an accredited college or university Bachelor degree or higher from an accredited college or university Bachelor degree or higher from an accredited college or university
Training Offerings listed in DoD 8140 Training Repository Offerings listed in DoD 8140 Training Repository Offerings listed in DoD 8140 Training Repository
Certification CND or GSEC or Security+ CCSP or CFR or SSCP CASP+ or GSLC
Foundational Qualification Alternative Experience Conditional Alternative Conditional Alternative Conditional Alternative

Residential Qualifications and Continuous Professional Development: Residential Qualifications and Demonstration of Capability must be met, by all Service members and DoD civilian employees, following a formal period of supervised engagement after assignment to the DCWF Work Role-Coded position. Continuous Professional Development commences the fiscal year after the employee has completed the foundational and residential qualifications.

Proficiency: Basic Proficiency: Intermediate Proficiency: Advanced
Residential Qualification – Demonstration of Capability On-the-Job Qualification Always Required Always Required Always Required
Environment-Specific Requirements Component Discretion Component Discretion Component Discretion
Annual Maintenance – Current With Technology, Hostile Actor Tactics Continuous Professional Development Minimum of 20 hours annually or what is required to maintain certification; whichever is greater. Minimum of 20 hours annually or what is required to maintain certification; whichever is greater. Minimum of 20 hours annually or what is required to maintain certification; whichever is greater.

Below are the Core and Additional Knowledges, Skills, Abilities, and Tasks for this work role.

KSAT ID Description KSAT
9 Knowledge of applicable business processes and operations of customer organizations. Knowledge
16 Knowledge of capabilities and requirements analysis. Knowledge
22 * Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge
63 Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Knowledge
64 Knowledge of information security systems engineering principles. Knowledge
108 * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). Knowledge
129 Knowledge of system life cycle management principles, including software security and usability. Knowledge
143 Knowledge of the organization’s enterprise information technology (IT) goals and objectives. Knowledge
162 Skill in conducting capabilities and requirements analysis. Skill
458 Conduct risk analysis, feasibility study, and/or trade-off analysis to develop, document, and refine functional requirements and specifications. Task
466 Consult with customers to evaluate functional requirements. Task
487 Define project scope and objectives based on customer requirements. Task
863 Translate functional requirements into technical solutions. Task
911A Ability to interpret and translate customer requirements into operational capabilities. Ability
1144 Develop and document User Experience (UX) requirements including information architecture and user interface requirements. Task
1157 * Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity. Knowledge
1158 * Knowledge of cybersecurity principles. Knowledge
1159 * Knowledge of cyber threats and vulnerabilities. Knowledge
6900 * Knowledge of specific operational impacts of cybersecurity lapses. Knowledge
KSAT ID Description KSAT
25 Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]). Knowledge
27 Knowledge of cryptography and cryptographic key management concepts. Knowledge
46 Knowledge of fault tolerance. Knowledge
51 Knowledge of how system components are installed, integrated, and optimized. Knowledge
55 Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data. Knowledge
62 Knowledge of industry-standard and organizationally accepted analysis principles and methods. Knowledge
65A Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression). Knowledge
68 Knowledge of information technology (IT) architectural concepts and frameworks. Knowledge
78 Knowledge of microprocessors. Knowledge
79 Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]). Knowledge
81A Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. Knowledge
82A Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs. Knowledge
88 Knowledge of new and emerging information technology (IT) and cybersecurity technologies. Knowledge
90 Knowledge of operating systems. Knowledge
92 Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). Knowledge
94 Knowledge of parallel and distributed computing concepts. Knowledge
100 Knowledge of Privacy Impact Assessments. Knowledge
101 Knowledge of process engineering concepts. Knowledge
109 Knowledge of secure configuration management techniques. Knowledge
110 Knowledge of key concepts in security management (e.g., Release Management, Patch Management). Knowledge
124 Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools. Knowledge
126 Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design. Knowledge
130 Knowledge of systems testing and evaluation methods. Knowledge
133 Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers). Knowledge
144 Knowledge of the systems engineering process. Knowledge
155 Skill in applying and incorporating information technologies into proposed solutions. Skill
156 Skill in applying confidentiality, integrity, and availability principles. Skill
158 Skill in applying organization-specific systems analysis principles and techniques. Skill
224 Skill in design modeling and building use cases (e.g., unified modeling language). Skill
476 Coordinate with systems architects and developers, as needed, to provide oversight in the development of design solutions. Task
511B Define baseline security requirements in accordance with applicable guidelines. Task
517 Develop and document requirements, capabilities, and constraints for design procedures and processes. Task
528A Develop cost estimates for new or modified system(s). Task
669 Integrate and align information security and/or cybersecurity policies to ensure system analysis meets security requirements. Task
700A Manage the information technology (IT) planning process to ensure that developed solutions meet customer requirements. Task
726 Oversee and make recommendations regarding configuration management. Task
760 Perform needs analysis to determine opportunities for new and improved business process solutions. Task
789 Prepare use cases to justify the need for specific information technology (IT) solutions. Task
1002A Skill in conducting reviews of systems. Skill
1003 Develop and document supply chain risks for critical system elements, as appropriate. Task
1004 Knowledge of critical information technology (IT) procurement requirements. Knowledge
1005 Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes). Knowledge
1036 Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed. Knowledge
1037 Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures. Knowledge
1038 Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability. Knowledge
1040A Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure. Knowledge
1073 Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools. Knowledge
1133 Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]). Knowledge
1141A Knowledge of an organization’s information classification program and procedures for information compromise. Knowledge
2214 Design and document quality standards. Task
2343 Document a system’s purpose and preliminary system security concept of operations. Task
2692 Ensure that all systems components can be integrated and aligned (e.g., procedures, databases, policies, software, and hardware). Task