Cyber Enablers (EN)
OG-WRL-015
DCWF 804
IT Investment/Portfolio Manager
Manages a portfolio of IT capabilities that align with the overall needs of mission and business enterprise priorities.
Tasks
The concrete work activities defined for this role in the DCWF v5.1 spreadsheet. Core tasks are required for the role; additional tasks are associated but not mandatory.
- T1018 additional Ensure all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.
- T1148 additional Develop contract language to ensure supply chain, system, network, and operational security are met.
- T1148B additional Ensure supply chain, system, network, performance, and cyber security requirements are included in contract language and delivered.
- T5380 additional Gather feedback on customer satisfaction and internal service performance to foster continual improvement.
- T680A additional Lead and oversee budget, staffing, and contracting.
- T834 additional Resolve conflicts in laws, regulations, policies, standards, or procedures.
- T840B additional Review or conduct audits of programs and projects.
- T955A additional Draft and publish supply chain security and risk management documents.
Knowledge, Skills, and Abilities
KSA statements define what a person filling this role knows or can do. "Knowledge" is what they must know, "Skill" is what they can perform, and "Ability" is a durable capacity they bring to the work.
- K0325 knowledge core Knowledge of secure acquisitions (e.g., relevant Contracting Officer's Technical Representative [COTR] duties, secure procurement, supply chain risk management).
- K1004A knowledge core Knowledge of information technology (IT) acquisition/procurement requirements.
- A6160 ability additional Ability to oversee the development and update of the lifecycle cost estimate.
- A6918 ability additional Ability to apply cybersecurity strategy to cloud computing service and deployment models, identifying proper architecture for different operating environments.
- A6919 ability additional Ability to determine the best cloud deployment model for the appropriate operating environment.
- K0107 knowledge additional Knowledge of resource management principles and techniques.
- K0296 knowledge additional Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.
- K069A knowledge additional Knowledge of risk management processes and requirements per the Risk Management Framework (RMF).
- K0942 knowledge additional Knowledge of the organization's core business/mission processes.
- K0979 knowledge additional Knowledge of supply chain risk management standards, processes, and practices.
- K1021 knowledge additional Knowledge of risk threat assessment.
- K1037 knowledge additional Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.
- K1061A knowledge additional Knowledge of the acquisition/procurement life cycle process.
- K1125 knowledge additional Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.
- K6290 knowledge additional Knowledge of how to leverage government research and development centers, think tanks, academic research, and industry systems.
Other roles in this element
EN-211 Forensics Analyst
EN-221 Cyber Crime Investigator
EN-711 Cyber Instructional Curriculum Developer
EN-712 Cyber Instructor
EN-731 Cyber Legal Advisor
EN-732 Privacy Compliance Manager
EN-751 Cyber Workforce Developer and Manager
EN-752 Cyber Policy and Strategy Planner
EN-801 Program Manager
EN-802 IT Project Manager
EN-803 Product Support Manager
EN-805 IT Program Auditor
EN-901 Executive Cyber Leader