Systems Requirements Planning Specialty Area Qualification Matrix *

Associated Work Roles

  • Systems Requirements Planner (641)

Note: This page presents the qualification requirements at the Specialty Area level, a summary category one level above work roles. Until the qualification requirements for the Work Roles are released, please refer to the Specialty Area qualification table below for information. This table will be updated to reflect the specific Work Role requirements when the information is available.

Specialty Area Framework Category: Securely Provision

Specialty Areas responsible for conceptualizing, designing, and building secure information technology (IT) systems, with responsibility for some aspect of the systems' development.

Systems Requirements Planning Description

Consults with stakeholders to guide, gather, and evaluate functional and security requirements. Translates these requirements into guidance to stakeholders about the applicability of information systems to meet their needs.

Example Job/Billet Titles

  • Enterprise Resource Planner
  • IT Policy and Planning Analyst
  • IT Program Management Specialist
  • Requirements Analyst

Master Tasks and KSAs

Detailed information on the Tasks and Knowledge, Skills and Abilities (KSAs) associated with each Navy Specialty Area can be found in the Master Task & KSA List spreadsheet on the NAVIFOR website (requires credentials/CAC to access) or on the DoD Cyber Exchange website.

Initial Training

Initial training qualification for a specialty area is generally met by a High School diploma or equivalent and completion of Navy "A" school (for Navy enlisted).

Minimum Credential Requirement

You must meet one of the education, training, or certification requirements in the Qualifications Table below. See “Understanding Qualifications” on the Qualifications Table for more information on the order of precedence for the minimum credential requirement.

Qualifying Degrees

The Qualifications Table below includes college degrees in the Education section. For example, "Bachelor degree from accredited University." To view a list of degree programs that are acceptable for this Specialty Area, click List of Qualifying Degrees below or the Information icon in the Qualifications Table.

Worksheet View

Click the button to toggle in and out of the worksheet view for the qualifications table. Turning the worksheet view on will allow you to mark requirements and qualifications for your proficiency level, and then print a printer-friendly version of the matrix worksheet.

Note: The Qualification Matrix information on this page will be in a different order when printed to reduce the number of pages needed.

View Proficiency Level(s)

MilGears logo For personalized information on how your education, training and credential history stacks up against the requirements for this and other work roles in the Navy, visit the Cyber IT/CSWF Tool on the MilGears website.



Qualifications Table

All qualifications have not been met.
 
Basic Intermediate Advanced
N/A not entry level position Bachelor Degree from accredited University Graduate Degree from accredited University
OR
 
N/A not entry level position N/A N/A
OR
AND
 
N/A PQS/JQR not appropriate for this position type N/A PQS/JQR not appropriate for this position type N/A PQS/JQR not appropriate for this position type

Note: The Qualification Matrix information on this page will be in a different order when printed to reduce the number of pages needed.

*If you have recommendations for degrees, qualifications, NECs or credentials for this matrix, direct them to NAVIFOR (requires credentials/CAC to access). Questions and recommendations regarding the Cyber IT/CSWF model, matrix, policies, implementation guidelines, and compliance should be directed to: Navy_CSWF_Program_Helpline@navy.mil

This is an official U.S. Navy websiteUpdated: January 29, 2021
TOP

Basic

Foundational understanding of computer systems and related cybersecurity software and hardware components. Ability to apply simple concepts and routine processes with frequent and specific guidance. Ability to perform successfully in routine, structured situations, or more complex situations with supervision.

Intermediate

Working knowledge and application of Information Security and security operational characteristics for a variety of computer platforms, networks, software applications, and Operating Systems. Extensive knowledge of basic concepts and processes and experience applying these with only periodic high-level guidance. Ability to perform successfully in non-routine and sometimes complicated situations.

Advanced

Application and mastery of Information Security, plans, and functions; responsible for the management of complex projects, and initiatives with large scope. An in-depth understanding of complex concepts and processes, and experience applying these with little or no guidance. Ability to provide guidance to others and to perform successfully in complex, unstructured situations.

Click link to go to Certified Information Systems Security Professional (CISSP) COOL Snapshot page.

The International Information Systems Security Certification Consortium, Inc. (ISC 2), Certified Information Systems Security Professional (CISSP) is an advanced skill level certification for experienced security practitioners, managers and executives interested in proving their knowledge across a wide array of security practices and principles. Candidates must have a minimum of five years cumulative paid work experience in two or more of the eight domains of the CISSP CBK. Earning a four-year college degree or regional equivalent or an additional credential from the (ISC)² approved list will satisfy one year of the required experience. Education credit will only satisfy one year of experience.

Click link to go to GIAC Security Leadership Certification (GSLC) COOL Snapshot page.

The Global Information Assurance Certification (GIAC), Security Leadership Certification (GSLC) is an advanced skill level certification for information security, information technology and security professionals with leadership responsibilities. GSLCs understand governance and technical controls focused on protecting, detecting, and responding to security issues. GSLCs display knowledge of data, network, host, application, and user controls along with fundamental management topics that pertain to the security lifecycle. There are no prerequisites for the GSLC certification. Candidates must pass a written exam.

 

 

Click link to go to Certified Information Security Manager (CISM) COOL Snapshot page.

The Certified Information Security Manager (CISM) is an advanced certification for the individual who designs, builds, and manages an enterprises information security. CISM focuses on information risk management as the basis of information security. It also includes material on broader issues such as how to govern information security as well as on practical issues such as developing and managing an information security program and managing incidents. This certification is targeted toward experienced information security managers and those who have information security management responsibilities. Five or more years of information security work experience, with a minimum of three years of information security management work experience is required.

Click link to go to ITIL Foundation Level COOL Snapshot page.

AXELOS, ITIL Foundation certification is an entry level certification which offers candidates a general awareness of the key elements, concepts, and terminology used in the ITIL service lifecycle, including the links between lifecycle stages, the processes used, and their contribution to service management practice. This certification is appropriate for those who require a basic understanding or the ITIL framework, those who need understanding of how ITIL can be used to enhance IT service management within an organization, and IT professionals who are working within an organization that has adopted and adapted ITIL who need to be informed about and thereafter contribute to an ongoing service improvement program. The Foundation examination tests candidates in their ability to understand the basic concepts of ITIL, describe them, and demonstrate basic comprehension of the ITIL practices. This certification is appropriate for IT service managers or those responsible for support, delivery and management of critical IT services and systems. There are no experience or education requirements. Candidates must pass a written exam.

Click link to go to CompTIA Advanced Security Practitioner (CASP+) COOL Snapshot page.

The Computing Technology Industry Association (CompTIA), CompTIA Advanced Security Practitioner (CASP+) certification is for professionals with advanced-level cybersecurity skills and knowledge. CASP+ practitioners demonstrate skills in risk management, enterprise security architecture, research, development and collaboration, technical integration of enterprise security and enterprise security operations. Candidates must pass an exam that includes written and performance-based questions.

Click link to go to ITIL Master Certification COOL Snapshot page.

The AXELOS, ITIL Master Certification is for individuals who can explain and justify how to select and apply a range of knowledge, principles, methods and techniques from the ITIL Framework and supporting management techniques, to achieve desired business outcomes in one or more practical assignments. Candidates must have achieved the ITIL Expert certificate and have worked in IT service management for at least five years in leadership, managerial, or higher management advisory levels. Candidates must also pass a written exam.