Secure Project Management

Responsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.

  • T0220: Resolve conflicts in laws, regulations, policies, standards, or procedures
  • T0412: Conduct import/export reviews for acquiring systems and software
  • T1011: Apply standards to identify safety risk and protect cyber-physical functions
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1022: Review enterprise information technology (IT) goals and objectives
  • T1023: Identify critical technology procurement requirements
  • T1026: Determine procurement requirements
  • T1031: Implement intelligence collection requirements
  • T1067: Recommend development of new applications or modification of existing applications
  • T1068: Create development plans for new applications or modification of existing applications
  • T1154: Develop risk, compliance, and assurance monitoring strategies
  • T1155: Develop risk, compliance, and assurance measurement strategies
  • T1227: Manage cybersecurity budget, staffing, and contracting
  • T1259: Identify opportunities for new and improved business process solutions
  • T1291: Advise stakeholders on the development of continuity of operations plans
  • T1306: Conduct technology program and project audits
  • T1344: Determine if procurement activities sufficiently address supply chain risks
  • T1345: Recommend improvements to procurement activities to address cybersecurity requirements
  • T1366: Identify supply chain risks for critical system elements
  • T1367: Document supply chain risks for critical system elements
  • T1369: Determine if acquisitions, procurement, and outsourcing efforts address cybersecurity requirements
  • T1394: Develop independent cybersecurity audit processes for application software, networks, and systems
  • T1395: Implement independent cybersecurity audit processes for application software, networks, and systems
  • T1396: Oversee independent cybersecurity audits
  • T1397: Determine if research and design processes and procedures are in compliance with cybersecurity requirements
  • T1398: Determine if research and design processes and procedures are accurately followed by cybersecurity staff when performing their day-to-day activities
  • T1399: Develop supply chain, system, network, and operational security contract language
  • T1435: Determine if technology services are delivered successfully
  • T1448: Manage customer services
  • T1465: Define service-level agreements (SLAs)
  • T1472: Gather customer satisfaction and service performance feedback
  • T1474: Define operating level agreements (OLAs)
  • T1480: Examine service performance reports for issues and variances
  • T1481: Initiate corrective actions to service performance issues and variances
  • T1497: Determine supply chain cybersecurity requirements
  • T1498: Determine if cybersecurity requirements included in contracts are delivered
  • T1552: Identify cyber workforce planning and management issues
  • T1553: Address cyber workforce planning and management issues
  • T1601: Advise stakeholders on enterprise cybersecurity risk management
  • T1602: Advise stakeholders on supply chain risk management
  • T1621: Prepare supply chain security reports
  • T1622: Prepare risk management reports