WHAT IS DoD 8140?
The DoD Directive (DoDD) 8140 unifies the overall cyber workforce and establishes specific workforce elements, including information technology (IT), cybersecurity, cyber effects, cyber (intel), and cyber enablers. This directive aims to align, manage, and standardize cyber work roles, baseline qualifications, and training requirements. It establishes the DoD Cyberspace Workforce Framework (DCWF) as the authoritative reference for identifying, tracking, and reporting DoD cyberspace positions, serving as a foundation for developing enterprise baseline cyberspace workforce qualifications.
The goals of the 8140 Directive are to:
- Provide a larger array of standards-based certification and training options based on 72 work roles that are currently defined.
- Allow DoD workers to choose between certification and training options, such as well-defined work roles or assessment-based training for emerging technologies.
- Attract, upskill, and retain an inclusive workforce and track progress, ensuring the DoD workforce reflects the diversity of skills, perspectives, and experiences found in the overall population.
DoD CYBER WORKFORCE FRAMEWORK
The DoD Cyber Workforce Framework (DCWF) establishes the DoD’s authoritative lexicon based on the work an individual is performing, not their position titles, occupational series, or designators. The DCWF describes the work performed by the full spectrum of the cyber workforce as defined in DoD Directive (DoDD) 8140. The DCWF leverages the original National Initiative for Cybersecurity Education (NICE), Cybersecurity Workforce Framework (NCWF), and the DoD Joint Cyberspace Training and Certification Standards (JCT&CS).
WORKFORCE ELEMENTS AND ASSOCIATED WORK ROLES
IT (Cyberspace): Personnel who design, build, configure, operate, and maintain IT networks and capabilities. This includes actions to prioritize implementing, evaluating, and disposing of resource management, storage, transmission, and display of data and information.
Database Administrator | System Administrator |
Enterprise Architect | System Testing & Evaluation Specialist |
Knowledge Manager | Systems Developer |
Network Manager | Systems Requirement Planner |
Network Operations Specialist | Tech Support Specialist |
Research and Development Specialist |
Cybersecurity: Personnel who secure, defend, and preserve data, networks, net-centric capabilities, and other designated systems through appropriate security controls and internal defense actions. This includes access to system controls, monitoring, administration, and integration of cybersecurity into all aspects of engineering and acquisition of cyberspace capabilities.
Authorizing Official/Designating Representative | Information Systems Security Developer |
COMSEC Manager | Information Systems Security Manager |
Cyber Defense Analyst | Secure Software Assessor |
Cyber Defense Forensics Analyst | Security Architect |
Cyber Defense Incident Responder | Security Control Assessor |
Cyber Defense Infrastructure Support Specialist | Vulnerability Assessment Analyst |
Cyberspace Effects: Personnel who plan, support, and execute cyberspace capabilities with the primary purpose to externally defend or conduct force projection in or through cyberspace.
Cyber Operations Planner | Target Developer |
Exploitation Analyst | Target Network Analyst |
Mission Assessment Specialist | Warning Analyst |
Partner Integration Planner |
Intelligence (Cyberspace): Personnel who collect, process, analyze, and disseminate information from all sources of intelligence on foreign actors’ cyberspace programs, intentions, capabilities, research and development, and operational activities.
All-Source Analyst | Cyber Intelligence Planner |
All-Source Collection Manager | Multi-Disciplined Language Analyst |
All-Source Collection Requirements Manager |
Cyberspace Enablers: Personnel who support or facilitate the functions of cyber IT, cybersecurity, cyberspace effects, or intelligence workforce (cyberspace) roles. This includes actions to support acquisition, training, and leadership activities.
IT Investment Portfolio | Executive Cyber Leader |
IT Program Auditor | Privacy Compliance Manager |
IT Project Manager | Cyber Legal Advisor |
Product Support Manager | Cyber Crime Investigator |
Program Manager | Forensics Analyst |
Cyber Policy and Strategy Planner | Cyber Instructional Curriculum Developer |
Cyber Workforce Developer and Manager | Cyber Instructor |
Software Engineering: Personnel who develop and code new or modify existing computer applications, software, or specialized utility programs, following software assurance best practices.
DevSecOps Specialist | Software/Cloud Architect |
Product Designer User Interface (UI) | Software Developer |
Product Manager | Software Test & Evaluation Specialist |
Service Designer User Experience (UX) | Systems Security Analyst |
Data/AI:
AI Adoption Specialist | Data Architect |
AI Innovation Leader | Data Officer |
AI Risk & Ethics Specialist | Data Operations Specialist |
AI Test Evaluation Specialist | Data Scientist |
AI/ML Specialist | Data Steward |
Data Analyst |
BASELINE CERTIFICATIONS
Packed with resources to help you prepare for your certification exam, our learning solutions can be tailored to fit your unique needs. Our offerings include:
- Study guides and digests
- Pre and post-assessment questions
- Test vouchers
- Certification preparation
- Program management
- Post-training support and testing
- Tracking and reporting
Certification Prep Courses that Align to Multiple Work Roles
WE'RE HERE TO HELP
Contact us at Government.US@skillsoft.com to learn more about our DoD cyberspace workforce learning solutions.
Sources: