OG-WRL-016
Technology Program Auditing OPM Code: 805

Provides leadership, management, direction, and advocacy so the organization may effectively manage cybersecurity-related risks to the enterprise and conduct cybersecurity work.

Responsible for conducting evaluations of technology programs or their individual components to determine compliance with published standards. 

Code Description Work Roles
T0412 Conduct import/export reviews for acquiring systems and software 4
T1020 Determine the operational and safety impacts of cybersecurity lapses 37
T1026 Determine procurement requirements 9
T1067 Recommend development of new applications or modification of existing applications 4
T1068 Create development plans for new applications or modification of existing applications 4
T1154 Develop risk, compliance, and assurance monitoring strategies 4
T1155 Develop risk, compliance, and assurance measurement strategies 4
T1306 Conduct technology program and project audits 7
T1344 Determine if procurement activities sufficiently address supply chain risks 5
T1345 Recommend improvements to procurement activities to address cybersecurity requirements 6
T1394 Develop independent cybersecurity audit processes for application software, networks, and systems 7
T1395 Implement independent cybersecurity audit processes for application software, networks, and systems 7
T1396 Oversee independent cybersecurity audits 7
T1397 Determine if research and design processes and procedures are in compliance with cybersecurity requirements 7
T1398 Determine if research and design processes and procedures are accurately followed by cybersecurity staff when performing their day-to-day activities 7
T1399 Develop supply chain, system, network, and operational security contract language 5
T1480 Examine service performance reports for issues and variances 3
T1481 Initiate corrective actions to service performance issues and variances 3
T1498 Determine if cybersecurity requirements included in contracts are delivered 4
Code Description Work Roles
K0653 Knowledge of cybersecurity practices in the acquisition process 6
K0674 Knowledge of computer networking protocols 40
K0675 Knowledge of risk management processes 41
K0676 Knowledge of cybersecurity laws and regulations 41
K0677 Knowledge of cybersecurity policies and procedures 41
K0678 Knowledge of privacy laws and regulations 41
K0679 Knowledge of privacy policies and procedures 41
K0680 Knowledge of cybersecurity principles and practices 40
K0681 Knowledge of privacy principles and practices 40
K0682 Knowledge of cybersecurity threats 40
K0683 Knowledge of cybersecurity vulnerabilities 40
K0684 Knowledge of cybersecurity threat characteristics 40
K0721 Knowledge of risk management principles and practices 19
K0727 Knowledge of analysis standards and best practices 7
K0733 Knowledge of information technology (IT) architecture models and frameworks 4
K0734 Knowledge of Risk Management Framework (RMF) requirements 14
K0735 Knowledge of risk management models and frameworks 13
K0751 Knowledge of system threats 40
K0752 Knowledge of system vulnerabilities 40
K0754 Knowledge of resource management principles and practices 7
K0771 Knowledge of system life cycle management principles and practices 9
K0803 Knowledge of supply chain risk management principles and practices 17
K0819 Knowledge of import and export control laws and regulations 8
K0820 Knowledge of supply chain risks 18
K0821 Knowledge of federal agency roles and responsibilities 9
K0828 Knowledge of supply chain risk management standards and best practices 16
K0835 Knowledge of risk assessment principles and practices 8
K0836 Knowledge of threat assessment principles and practices 7
K0838 Knowledge of supply chain risk management policies and procedures 13
K0868 Knowledge of process improvement principles and practices 6
K0869 Knowledge of process maturity models and frameworks 6
K0872 Knowledge of service management principles and practices 11
K0873 Knowledge of service management standards and best practices 11
K0922 Knowledge of the acquisition life cycle models and frameworks 7
K0983 Knowledge of computer networking principles and practices 39
K1014 Knowledge of network security principles and practices 40
K1137 Knowledge of cybersecurity requirements 11
K1206 Knowledge of research and design processes and procedures 7
Code Description Work Roles
S0423 Skill in analyzing processes to ensure conformance with procedural requirements 6
S0462 Skill in integrating information security requirements in the acquisitions process 7
S0463 Skill in implementing software quality control processes 7
S0580 Skill in monitoring system performance 5
S0581 Skill in configuring systems for performance enhancement 5
S0619 Skill in auditing technical systems 3
S0811 Skill in managing intelligence collection requirements 5