Information Technology (IT)
DD-WRL-004
DCWF 632
Systems Developer
Designs, develops, tests, and evaluates information systems throughout the systems development lifecycle.
Tasks
The concrete work activities defined for this role in the DCWF v5.1 spreadsheet. Core tasks are required for the role; additional tasks are associated but not mandatory.
- T1000A additional Ensure design and development activities are properly documented (providing a functional description of implementation) and updated as necessary.
- T1152A additional Implement and integrate systems engineering methodologies into development environment.
- T2354 additional Employ configuration management processes.
- T416A additional Analyze design constraints, analyze trade-offs and security design, and consider lifecycle support.
- T431A additional Build, assess, and modify product prototypes using working models or theoretical models.
- T494 additional Design and develop cybersecurity or cybersecurity-enabled products.
- T500B additional Design hardware, operating systems, or software applications to adequately address requirements.
- T501 additional Design or integrate appropriate data backup capabilities into overall system designs, and ensure appropriate technical and procedural processes exist for secure system backups and protected storage of backup data.
- T503A additional Design to security requirements to ensure requirements are met for all systems and/or applications.
- T5110 additional Conduct a market analysis to identify, assess, and recommend commercial, GOTS, and open source products for use within a system and ensure recommended products are in compliance with organization's evaluation and validation requirements.
- T516A additional Develop testing and validation procedures and documentation.
- T5190 additional Design and develop system administration and management functionality for privileged access users.
- T5200A additional Design, implement, assess, and evaluate secure interfaces between information systems, physical systems, and/or embedded technologies.
- T527 additional Develop architectures or system components consistent with technical specifications.
- T530A additional Develop detailed design documentation for component and interface specifications to support system design and development.
- T531 additional Develop Disaster Recovery and Continuity of Operations plans for systems under development and ensure testing prior to systems entering a production environment.
- T5400 additional Incorporates risk-driven systems maintenance updates process to address system deficiencies (periodically and out of cycle).
- T542B additional Develop risk mitigation strategies and cybersecurity countermeasures to address cost, performance, and security risks and to resolve vulnerabilities and recommend security changes to system or system components as needed.
- T602 additional Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.
- T626A additional Identify components or elements, allocate comprehensive functional components to include security functions, and describe the relationships between the elements.
- T630 additional Identify and direct the remediation of technical problems encountered during testing and implementation of new systems (e.g., identify and find work-arounds for communication protocols that are not interoperable).
- T632 additional Identify and prioritize essential system functions or sub-systems required to support essential capabilities or business functions for restoration or recovery after a system failure or during a system recovery event based on overall system requirements for continuity and availability.
- T648 additional Identify, assess, and recommend cybersecurity or cybersecurity-enabled products for use within a system and ensure recommended products are in compliance with organization's evaluation and validation requirements.
- T659A additional Implement designs for new or existing system(s).
- T766A additional Perform security reviews and identify security gaps in architecture.
- T770 additional Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change.
- T803 additional Provide guidelines for implementing developed systems to customers or installation teams.
- T808B additional Provide input to implementation plans, standard operating procedures, maintenance documentation, and maintenance training materials
- T809 additional Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).
- T850 additional Store, retrieve, and manipulate data for analysis of system capabilities and requirements.
- T856A additional Provide support to test and evaluation activities.
- T860A additional Trace system requirements to design components and perform gap analysis.
- T874 additional Utilize models and simulations to analyze or predict system performance under different operating conditions.
- T877A additional Verify stability, interoperability, portability, and/or scalability of system architecture.
- T998A additional Analyze user needs and requirements to plan and conduct system development.
- T999A additional Develop designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations.
- T999C additional Collaborate on cybersecurity professionals to implement cybersecurity into designs to meet specific operational needs and environmental factors (e.g., access controls, automated applications, networked operations, high integrity and availability requirements, multilevel security/processing of multiple classification levels, and processing Sensitive Compartmented Information).
Knowledge, Skills, and Abilities
KSA statements define what a person filling this role knows or can do. "Knowledge" is what they must know, "Skill" is what they can perform, and "Ability" is a durable capacity they bring to the work.
- K0038 knowledge core Knowledge of organization's enterprise information security architecture system.
- K0064 knowledge core Knowledge of performance tuning tools and techniques.
- K0070 knowledge core Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption).
- K0109 knowledge core Knowledge of secure configuration management techniques.
- K0118 knowledge core Knowledge of software development models (e.g., Waterfall Model, Spiral Model).
- K0119 knowledge core Knowledge of software engineering.
- K0130 knowledge core Knowledge of virtualization technologies and virtual machine development and maintenance.
- K0144 knowledge core Knowledge of the systems engineering process.
- K063A knowledge core Knowledge of information systems and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- K124B knowledge core Knowledge of system design tools, methods, and techniques.
- K129A knowledge core Knowledge of system life cycle management principles.
- K191A knowledge core Knowledge of development and application of security system access controls.
- K3642 knowledge core Knowledge of various types of computer architectures.
- K0034 knowledge additional Knowledge of database systems.
- K0042 knowledge additional Knowledge of electrical engineering as applied to computer architecture, including circuit boards, processors, chips, and associated computer hardware.
- K0046 knowledge additional Knowledge of fault tolerance.
- K0051 knowledge additional Knowledge of how system components are installed, integrated, and optimized.
- K0052 knowledge additional Knowledge of human-computer interaction principles.
- K0072 knowledge additional Knowledge of local area and wide area networking principles and concepts including bandwidth management.
- K0075 knowledge additional Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, and statistics.
- K0078 knowledge additional Knowledge of microprocessors.
- K0079 knowledge additional Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).
- K008A knowledge additional Knowledge of access authentication methods.
- K0090 knowledge additional Knowledge of operating systems.
- K0092 knowledge additional Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
- K0094 knowledge additional Knowledge of parallel and distributed computing concepts.
- K0098 knowledge additional Knowledge of policy-based and risk adaptive access controls.
- K0100 knowledge additional Knowledge of Privacy Impact Assessments.
- K0101 knowledge additional Knowledge of process engineering concepts.
- K0121 knowledge additional Knowledge of structured analysis principles and methods.
- K0126 knowledge additional Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.
- K0133 knowledge additional Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).
- K025B knowledge additional Knowledge of encryption algorithms.
- K027A knowledge additional Knowledge of cryptology.
- K043A knowledge additional Knowledge of embedded systems.
- K065A knowledge additional Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).
- K081A knowledge additional Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
- K082A knowledge additional Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs.
- K1034A knowledge additional Knowledge of Personally Identifiable Information (PII) data security standards.
- K1034B knowledge additional Knowledge of Payment Card Industry (PCI) data security standards.
- K1034C knowledge additional Knowledge of Personal Health Information (PHI) data security standards.
- K1037 knowledge additional Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.
- K1038 knowledge additional Knowledge of local specialized system requirements (e.g., critical infrastructure systems that may not use standard information technology [IT]) for safety, performance, and reliability.
- K1073 knowledge additional Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
- K110A knowledge additional Knowledge of security management.
- K1133 knowledge additional Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
- K1141A knowledge additional Knowledge of an organization's information classification program and procedures for information compromise.
- K1142 knowledge additional Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
- K177A knowledge additional Knowledge of countermeasure design for identified security risks.
- K181B knowledge additional Knowledge of how detection technologies are used to detect host and network-based intrusions.
- K3153 knowledge additional Knowledge of circuit analysis.
- K3307 knowledge additional Knowledge of cybersecurity-enabled software products.
- K904A knowledge additional Knowledge of interpreted and compiled computer languages.
- S1002B skill additional Skill in conducting reviews of technical systems.
- S1073A skill additional Skill in network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
- S173A skill additional Skill in integrating and applying policies that meet system security objectives.
- S173B skill additional Skill in creating policies that enable systems to meet performance objectives (e.g. traffic routing, SLA's, CPU specifications).
- S177 skill additional Skill in designing countermeasures to identified security risks.
- S179 skill additional Skill in designing security controls based on cybersecurity principles and tenets.
- S180 skill additional Skill in designing the integration of hardware and software solutions.
- S197 skill additional Skill in discerning the protection needs (i.e., security controls) of information systems and networks.
- S199 skill additional Skill in evaluating the adequacy of security designs.
- S224A skill additional Skill in the use of design modeling (e.g., unified modeling language).
- S238A skill additional Skill in writing code in a currently supported programming language (e.g., Java, C++).
- S3687 skill additional Skill in applying security controls.
- S6945 skill additional Skill in migrating workloads to, from, and among the different cloud computing service models.
EWU courses that develop this role
Other roles in this element
IT-411 Technical Support Specialist
IT-421 Database Administrator
IT-431 Knowledge Manager
IT-441 Network Operations Specialist
IT-451 System Administrator
IT-641 Systems Requirements Planner
IT-651 Enterprise Architect
IT-661 Research & Development Specialist
IT-671 System Testing and Evaluation Specialist