Skip to main content
US flag signifying that this is a United States Federal Government website

Official website of the Cybersecurity and Infrastructure Security Agency

Here’s how you know

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

National Initiative for Cybersecurity Careers and Studies
Utility Menu - Refresh
  • About
  • Contact
  • Subscribe(link is external)
    • Beginners
    • K-12 Teachers
    • Students
    • School Administrators
    • Veterans
    • Colleges & Universities
    • Education & Training Catalog
    • CISA Learning
    • Add Your Courses to NICCS
    • Cybersecurity Workforce Development and Training
    • NICCS Training Frequently Asked Questions
    • NICE Workforce Framework for Cybersecurity (NICE Framework)
    • NICE Framework Mapping Tool
    • Cyber Career Pathways Tool
    • Career Pathways Roadmap
    • Cybersecurity Career Map
    • DHS PushButtonPD™ Tool
    • Certifications
    • Scholarships
    • Internships & Apprenticeships
    • Competitions & Games
    • Glossary
    • Additional Resources
    • News
    • Events
    • Featured Stories
  • About
  • Contact
  • Subscribe
Breadcrumb
  1. Interactive Tools
  2. NICE Workforce Framework for Cybersecurity (NICE Framework)
  3. Work Role Search
  4. Technology Portfolio Management

Technology Portfolio Management

Responsible for managing a portfolio of technology investments that align with the overall needs of mission and enterprise priorities.

Oversight and Governance
OG-WRL-015
  • T0220: Resolve conflicts in laws, regulations, policies, standards, or procedures
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1026: Determine procurement requirements
  • T1227: Manage cybersecurity budget, staffing, and contracting
  • T1306: Conduct technology program and project audits
  • T1369: Determine if acquisitions, procurement, and outsourcing efforts address cybersecurity requirements
  • T1394: Develop independent cybersecurity audit processes for application software, networks, and systems
  • T1395: Implement independent cybersecurity audit processes for application software, networks, and systems
  • T1396: Oversee independent cybersecurity audits
  • T1397: Determine if research and design processes and procedures are in compliance with cybersecurity requirements
  • T1398: Determine if research and design processes and procedures are accurately followed by cybersecurity staff when performing their day-to-day activities
  • T1399: Develop supply chain, system, network, and operational security contract language
  • T1472: Gather customer satisfaction and service performance feedback
  • T1498: Determine if cybersecurity requirements included in contracts are delivered
  • T1621: Prepare supply chain security reports
  • T1622: Prepare risk management reports
  • K0498: Knowledge of operational planning processes
  • K0674: Knowledge of computer networking protocols
  • K0675: Knowledge of risk management processes
  • K0676: Knowledge of cybersecurity laws and regulations
  • K0677: Knowledge of cybersecurity policies and procedures
  • K0678: Knowledge of privacy laws and regulations
  • K0679: Knowledge of privacy policies and procedures
  • K0680: Knowledge of cybersecurity principles and practices
  • K0681: Knowledge of privacy principles and practices
  • K0682: Knowledge of cybersecurity threats
  • K0683: Knowledge of cybersecurity vulnerabilities
  • K0684: Knowledge of cybersecurity threat characteristics
  • K0721: Knowledge of risk management principles and practices
  • K0734: Knowledge of Risk Management Framework (RMF) requirements
  • K0735: Knowledge of risk management models and frameworks
  • K0751: Knowledge of system threats
  • K0752: Knowledge of system vulnerabilities
  • K0754: Knowledge of resource management principles and practices
  • K0803: Knowledge of supply chain risk management principles and practices
  • K0820: Knowledge of supply chain risks
  • K0828: Knowledge of supply chain risk management standards and best practices
  • K0835: Knowledge of risk assessment principles and practices
  • K0836: Knowledge of threat assessment principles and practices
  • K0838: Knowledge of supply chain risk management policies and procedures
  • K0922: Knowledge of the acquisition life cycle models and frameworks
  • K0983: Knowledge of computer networking principles and practices
  • K1014: Knowledge of network security principles and practices
  • K1137: Knowledge of cybersecurity requirements
  • K1180: Knowledge of organizational cybersecurity goals and objectives
  • K1206: Knowledge of research and design processes and procedures
  • S0687: Skill in performing administrative planning activities
  • S0811: Skill in managing intelligence collection requirements

Source: Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) (Version: 2.0.0)

Related Courses

  • Certified Information Systems Auditor (CISA)
    ISACA
    Online, Self-Paced
  • Certified in the Governance of Enterprise IT (CGEIT)
    ISACA
    Online, Self-Paced
  • Tonex Certified Reshoring Strategy Professional (CRSP)
    Tonex, Inc.
    Online, Instructor-Led
  • Certified Smart Factory Leader (CSFL)
    Tonex, Inc.
    Online, Instructor-Led
  • Cost Modeling and Incentives for U.S. Manufacturing Essentials
    Tonex, Inc.
    Online, Instructor-Led
  • Smart Factory + Industry 4.0 Implementation Essentials
    Tonex, Inc.
    Online, Instructor-Led
Search for more courses related to “Technology Portfolio Management” »
  • Work Role Categories
  • Competency Areas
  • Work Role Search
  • Task Search
  • Knowledge Search
  • Skill Search
Return to top
  • Plain Writing
  • NICCS Policy
  • Sitemap
  • Glossary
National Initiative for Cybersecurity Careers and Studies
Follow us on CISA's Social Media
Facebook
X
Instagram
LinkedIn
Contact Us
NICCS@mail.cisa.dhs.gov
Cybersecurity and Infrastructure Security Agency Seal

CISA.gov

An official website of the Cybersecurity and Infrastructure Security Agency

Identifier links
  • About CISA
  • Accessibility
  • Budget and Performance
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
Looking for U.S. government information and services?
Visit USA.gov

You have been selected to participate in a brief survey about your experience today with National Initiative for Cybersecurity Careers and Studies.

Would you like to participate in our survey?

If you accept you will be leaving the National Initiative for Cybersecurity Careers and Studies website and going to a third party site.
That site may have different privacy, security and accessibility policies than the National Initiative for Cybersecurity Careers and Studies site.
National Initiative for Cybersecurity Careers and Studies does not endorse any commercial products, services, programs or content on the third party website.
Thank you for visiting our site. We hope your visit was informative and enjoyable.