Software Development Specialty Area Qualification Matrix *

Associated Work Roles

  • Software Developer (621)
  • Secure Software Assessor (622)

Note: This page presents the qualification requirements at the Specialty Area level, a summary category one level above work roles. Until the qualification requirements for the Work Roles are released, please refer to the Specialty Area qualification table below for information. This table will be updated to reflect the specific Work Role requirements when the information is available.

Specialty Area Framework Category: Securely Provision

Specialty Areas responsible for conceptualizing, designing, and building secure information technology (IT) systems, with responsibility for some aspect of the systems' development.

Software Development Description

Develops, modifies, enhances, and sustains new or existing computer applications, software, or utility programs following software assurance best practices throughout the software lifecycle.

Example Job/Billet Titles

  • Analyst Programmer
  • Computer Programmer
  • Information Assurance (IA) Engineer
  • Information Assurance (IA) Software Developer
  • Information Assurance (IA) Software Engineer
  • Research and Development Engineer
  • Secure Software Engineer
  • Software Developer
  • Software Engineer/Architect
  • Web Application Developer

Master Tasks and KSAs

Detailed information on the Tasks and Knowledge, Skills and Abilities (KSAs) associated with each Navy Specialty Area can be found in the Master Task & KSA List spreadsheet on the NAVIFOR website (requires credentials/CAC to access) or on the DoD Cyber Exchange website.

Initial Training

Initial training qualification for a specialty area is generally met by a High School diploma or equivalent and completion of Navy "A" school (for Navy enlisted).

Minimum Credential Requirement

You must meet one of the education, training, or certification requirements in the Qualifications Table below. See “Understanding Qualifications” on the Qualifications Table for more information on the order of precedence for the minimum credential requirement.

Qualifying Degrees

The Qualifications Table below includes college degrees in the Education section. For example, "Bachelor degree from accredited University." To view a list of degree programs that are acceptable for this Specialty Area, click List of Qualifying Degrees below or the Information icon in the Qualifications Table.

Worksheet View

Click the button to toggle in and out of the worksheet view for the qualifications table. Turning the worksheet view on will allow you to mark requirements and qualifications for your proficiency level, and then print a printer-friendly version of the matrix worksheet.

Note: The Qualification Matrix information on this page will be in a different order when printed to reduce the number of pages needed.

View Proficiency Level(s)

MilGears logo For personalized information on how your education, training and credential history stacks up against the requirements for this and other work roles in the Navy, visit the Cyber IT/CSWF Tool on the MilGears website.



Qualifications Table

All qualifications have not been met.
 
Basic Intermediate Advanced
Associate Degree from accredited University Bachelor Degree from accredited University Graduate Degree from accredited University
OR
 
N/A N/A N/A
OR
AND
 
N/A PQS/JQR not appropriate for this position type N/A PQS/JQR not appropriate for this position type N/A PQS/JQR not appropriate for this position type

Note: The Qualification Matrix information on this page will be in a different order when printed to reduce the number of pages needed.

*If you have recommendations for degrees, qualifications, NECs or credentials for this matrix, direct them to NAVIFOR (requires credentials/CAC to access). Questions and recommendations regarding the Cyber IT/CSWF model, matrix, policies, implementation guidelines, and compliance should be directed to: Navy_CSWF_Program_Helpline@navy.mil

This is an official U.S. Navy websiteUpdated: January 29, 2021
TOP

Basic

Foundational understanding of computer systems and related cybersecurity software and hardware components. Ability to apply simple concepts and routine processes with frequent and specific guidance. Ability to perform successfully in routine, structured situations, or more complex situations with supervision.

Intermediate

Working knowledge and application of Information Security and security operational characteristics for a variety of computer platforms, networks, software applications, and Operating Systems. Extensive knowledge of basic concepts and processes and experience applying these with only periodic high-level guidance. Ability to perform successfully in non-routine and sometimes complicated situations.

Advanced

Application and mastery of Information Security, plans, and functions; responsible for the management of complex projects, and initiatives with large scope. An in-depth understanding of complex concepts and processes, and experience applying these with little or no guidance. Ability to provide guidance to others and to perform successfully in complex, unstructured situations.

Click link to go to Certified Information Systems Security Professional (CISSP) COOL Snapshot page.

The International Information Systems Security Certification Consortium, Inc. (ISC 2), Certified Information Systems Security Professional (CISSP) is an advanced skill level certification for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles. Candidates must have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Earning a four-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience.

Click link to go to Certified Secure Software Lifecycle Professional (CSSLP) COOL Snapshot page.

The International Information Systems Security Certification Consortium, Inc. (ISC 2), Certified Secure Software Lifecycle Professional (CSSLP) certification is ideal for software development and security professionals responsible for applying best practices to each phase of the SDLC – from software design and implementation to testing and deployment.  Candidates are required to have a minimum of four years of cumulative paid Software Development Lifecycle (SDLC) professional work experience in one or more of the eight domains of the (ISC)² CSSLP CBK, or three years of cumulative paid SDLC professional work experience in one or more of the eight domains of the CSSLP CBK with a four-year degree leading to a Baccalaureate, or regional equivalent in Computer Science, Information Technology (IT) or related fields.