Attention: November 11th is the last day to access FedVTE. Users may access FedVTE until 6PM EST on November 11th. After this time FedVTE will be permanently decommissioned. Starting November 15th, users will be able to access all the same learning content through CISA Learning. Stay tuned for more details about the CISA Learning platform.

Skill ID: S0811

Skill in managing intelligence collection requirements

Work roles with this Skill

  • Product Support Management

    NICE Framework ID: OG-WRL-009

    Responsible for planning, estimating costs, budgeting, developing, implementing, and managing product support strategies in order to field and maintain the readiness and operational capability of systems and components.

  • Program Management

    NICE Framework ID: OG-WRL-010

    Responsible for leading, coordinating, and the overall success of a defined program. Includes communicating about the program and ensuring alignment with agency or organizational priorities.

  • Secure Project Management

    NICE Framework ID: OG-WRL-011

    Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.

  • Technology Portfolio Management

    NICE Framework ID: OG-WRL-015

    Responsible for managing a portfolio of technology investments that align with the overall needs of mission and enterprise priorities.

  • Technology Program Auditing

    NICE Framework ID: OG-WRL-016

    Responsible for conducting evaluations of technology programs or their individual components to determine compliance with published standards.

  • Cyber Intelligence Planning

    NICE Framework ID: CI-WRL-004

    Responsible for developing intelligence plans to satisfy cyber operation requirements. Identifies, validates, and levies requirements for intelligence collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.