Cyber Enablers (EN)
OG-WRL-002
DCWF 752
Cyber Policy and Strategy Planner
Develops cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and initiatives.
Tasks
The concrete work activities defined for this role in the DCWF v5.1 spreadsheet. Core tasks are required for the role; additional tasks are associated but not mandatory.
- T1027A additional Interpret and apply applicable laws, statutes, and regulatory documents and integrate into policy.
- T410A additional Analyze organizational cyber policy.
- T424B additional Assess policy needs and collaborate with stakeholders to develop policies to govern cyber activities.
- T485A additional Define and integrate current and future mission environments.
- T492A additional Design/integrate a cyber strategy that outlines the vision, mission, and goals that align with the organization's strategic plan.
- T5020 additional Advocate for adequate funding for cyber training resources, to include both internal and industry-provided courses, instructors, and related materials.
- T539 additional Develop policy, programs, and guidelines for implementation.
- T5560 additional Promote awareness of cyber policy and strategy as appropriate among management and ensure sound principles are reflected in the organization's mission, vision, and goals.
- T5620 additional Review/Assess cyber workforce effectiveness to adjust skill and/or qualification standards.
- T565A additional Draft, staff, and publish cyber policy.
- T594 additional Establish and maintain communication channels with stakeholders.
- T720A additional Monitor the rigorous application of cyber policies, principles, and practices in the delivery of planning and management services.
- T724A additional Seek consensus on proposed policy changes from stakeholders.
- T812A additional Provide policy guidance to cyber management, staff, and users.
- T838 additional Review existing and proposed policies with stakeholders.
- T840A additional Review, conduct, or participate in audits of cyber programs and projects.
- T847 additional Serve on agency and interagency policy boards.
- T854A additional Support the CIO in the formulation of cyber-related policies.
Knowledge, Skills, and Abilities
KSA statements define what a person filling this role knows or can do. "Knowledge" is what they must know, "Skill" is what they can perform, and "Ability" is a durable capacity they bring to the work.
- A6100 ability core Ability to develop policy, plans, and strategy in compliance with laws, regulations, policies, and standards in support of organizational cyber activities.
- A6140 ability core Ability to leverage best practices and lessons learned of external organizations and academic institutions dealing with cyber issues.
- K088A knowledge core Knowledge of current and emerging cyber technologies.
- K1036 knowledge core Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.
- K282A knowledge core Knowledge of emerging technologies that have potential for exploitation by adversaries.
- K320A knowledge core Knowledge of external organizations and academic institutions with cyber focus (e.g., cyber curriculum/training and Research & Development).
- K6270 knowledge core Knowledge of full spectrum cyber capabilities.
- A244 ability additional Ability to determine the validity of technology trend data.
- K0105 knowledge additional Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
- K0336 knowledge additional Knowledge of the nature and function of the relevant information structure (e.g., National Information Infrastructure).
- K0942 knowledge additional Knowledge of the organization's core business/mission processes.
- K1125 knowledge additional Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.
- K297A knowledge additional Knowledge of industry indicators useful for identifying technology trends.
- K6210 knowledge additional Knowledge of cloud service models and possible limitations for an incident response.
- K6410 knowledge additional Knowledge of strategic theory and practice.
Other roles in this element
EN-211 Forensics Analyst
EN-221 Cyber Crime Investigator
EN-711 Cyber Instructional Curriculum Developer
EN-712 Cyber Instructor
EN-731 Cyber Legal Advisor
EN-732 Privacy Compliance Manager
EN-751 Cyber Workforce Developer and Manager
EN-801 Program Manager
EN-802 IT Project Manager
EN-803 Product Support Manager
EN-804 IT Investment/Portfolio Manager
EN-805 IT Program Auditor
EN-901 Executive Cyber Leader