Systems Requirements Planning

Systems Requirements Planning

Consults with customers to gather and evaluate functional requirements and translates these requirements into technical solutions. Provides guidance to customers about applicability of information systems to meet business needs.



Below are the associated Work Roles. Click the arrow to expand/collapse the Work Role information and view the associated Core and Additional KSATs (Knowledge, Skills, Abilties, and Tasks). Items denoted by a * are CORE KSATs for every Work Role, while other CORE KSATs vary by Work Role. Click on the other blue links to further explore the information.
Systems Requirements Planner Work Role ID: 641 (NIST: SP-RP-001) Workforce Element: IT (Cyberspace)

Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.

Core KSATs

KSAT ID Description KSAT
9

Knowledge of applicable business processes and operations of customer organizations.

Knowledge
16

Knowledge of capabilities and requirements analysis.

Knowledge
22

* Knowledge of computer networking concepts and protocols, and network security methodologies.

Knowledge
63

Knowledge of cybersecurity principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

Knowledge
64

Knowledge of information security systems engineering principles.

Knowledge
108

* Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).

Knowledge
129

Knowledge of system life cycle management principles, including software security and usability.

Knowledge
143

Knowledge of the organization’s enterprise information technology (IT) goals and objectives.

Knowledge
162

Skill in conducting capabilities and requirements analysis.

Skill
458

Conduct risk analysis, feasibility study, and/or trade-off analysis to develop, document, and refine functional requirements and specifications.

Task
466

Consult with customers to evaluate functional requirements.

Task
487

Define project scope and objectives based on customer requirements.

Task
863

Translate functional requirements into technical solutions.

Task
911A

Ability to interpret and translate customer requirements into operational capabilities.

Ability
1144

Develop and document User Experience (UX) requirements including information architecture and user interface requirements.

Task
1157

* Knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity.

Knowledge
1158

* Knowledge of cybersecurity principles.

Knowledge
1159

* Knowledge of cyber threats and vulnerabilities.

Knowledge
6900

* Knowledge of specific operational impacts of cybersecurity lapses.

Knowledge
6935

* Knowledge of cloud computing service models Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

Knowledge
6938

* Knowledge of cloud computing deployment models in private, public, and hybrid environment and the difference between on-premises and off-premises environments.

Knowledge

Additional KSATs

KSAT ID Description KSAT
25

Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES]).

Knowledge
27

Knowledge of cryptography and cryptographic key management concepts.

Knowledge
46

Knowledge of fault tolerance.

Knowledge
51

Knowledge of how system components are installed, integrated, and optimized.

Knowledge
55

Knowledge of cybersecurity principles used to manage risks related to the use, processing, storage, and transmission of information or data.

Knowledge
62

Knowledge of industry-standard and organizationally accepted analysis principles and methods.

Knowledge
65A

Knowledge of Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).

Knowledge
68

Knowledge of information technology (IT) architectural concepts and frameworks.

Knowledge
78

Knowledge of microprocessors.

Knowledge
79

Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]).

Knowledge
81A

Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.

Knowledge
82A

Knowledge of network design processes, to include understanding of security objectives, operational objectives, and tradeoffs.

Knowledge
88A

Knowledge of current and emerging cyber technologies.

Knowledge
90

Knowledge of operating systems.

Knowledge
92

Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
94

Knowledge of parallel and distributed computing concepts.

Knowledge
100

Knowledge of Privacy Impact Assessments.

Knowledge
101

Knowledge of process engineering concepts.

Knowledge
109

Knowledge of secure configuration management techniques.

Knowledge
110

Knowledge of key concepts in security management (e.g., Release Management, Patch Management).

Knowledge
124

Knowledge of system design tools, methods, and techniques, including automated systems analysis and design tools.

Knowledge
126

Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.

Knowledge
130

Knowledge of systems testing and evaluation methods.

Knowledge
133

Knowledge of key telecommunications concepts (e.g., Routing Algorithms, Fiber Optics Systems Link Budgeting, Add/Drop Multiplexers).

Knowledge
144

Knowledge of the systems engineering process.

Knowledge
155

Skill in applying and incorporating information technologies into proposed solutions.

Skill
156

Skill in applying confidentiality, integrity, and availability principles.

Skill
158

Skill in applying organization-specific systems analysis principles and techniques.

Skill
224

Skill in design modeling and building use cases (e.g., unified modeling language).

Skill
476

Coordinate with systems architects and developers, as needed, to provide oversight in the development of design solutions.

Task
511B

Define baseline security requirements in accordance with applicable guidelines.

Task
517

Develop and document requirements, capabilities, and constraints for design procedures and processes.

Task
528A

Develop cost estimates for new or modified system(s).

Task
602

Evaluate factors such as reporting formats required, cost constraints, and need for security restrictions to determine hardware configuration.

Task
669

Integrate and align information security and/or cybersecurity policies to ensure system analysis meets security requirements.

Task
700A

Manage the information technology (IT) planning process to ensure that developed solutions meet customer requirements.

Task
726

Oversee and make recommendations regarding configuration management.

Task
760

Perform needs analysis to determine opportunities for new and improved business process solutions.

Task
789

Prepare use cases to justify the need for specific information technology (IT) solutions.

Task
1002A

Skill in conducting reviews of systems.

Skill
1003

Develop and document supply chain risks for critical system elements, as appropriate.

Task
1004

Knowledge of critical information technology (IT) procurement requirements.

Knowledge
1005

Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes).

Knowledge
1036

Knowledge of applicable laws (e.g., Electronic Communications Privacy Act, Foreign Intelligence Surveillance Act, Protect America Act, search and seizure laws, civil liberties and privacy laws), statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures relevant to work performed.

Knowledge
1037

Knowledge of information technology (IT) supply chain security and risk management policies, requirements, and procedures.

Knowledge
1038B

Knowledge of local specialized system requirements (e.g., critical infrastructure/control systems that may not use standard information technology [IT]) for safety, performance, and reliability).

Knowledge
1040A

Knowledge of relevant laws, policies, procedures, or governance related to critical infrastructure.

Knowledge
1073

Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.

Knowledge
1133

Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).

Knowledge
1141A

Knowledge of an organization’s information classification program and procedures for information compromise.

Knowledge
2214

Design and document quality standards.

Task
2343

Document a system’s purpose and preliminary system security concept of operations.

Task
2692

Ensure that all systems components can be integrated and aligned (e.g., procedures, databases, policies, software, and hardware).

Task