Systems Requirements Planner Job Profile

Discover more salary details for

What is a Systems Requirements Planner?

The Systems Requirements Planner consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.

Professional Certifications

  • ITIL
  • CompTIA Network+
  • CompTIA Cloud+
  • Systems Requirements Planner must know:

    • computer networking concepts and protocols, and network security methodologies.
    • risk management processes (e.g., methods for assessing and mitigating risk).
    • laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
    • cybersecurity and privacy principles.
    • cyber threats and vulnerabilities.
    • specific operational impacts of cybersecurity lapses.
    • applicable business processes and operations of customer organizations.
    • capabilities and requirements analysis.
    • encryption algorithms
    • cryptography and cryptographic key management concepts
    • resiliency and redundancy.
    • installation, integration, and optimization of system components.
    • cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data.
    • industry-standard and organizationally accepted analysis principles and methods.
    • cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
    • information security systems engineering principles (NIST SP 800-160).
    • information technology (IT) architectural concepts and frameworks.
    • microprocessors.
    • network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
    • new and emerging information technology (IT) and cybersecurity technologies.
    • operating systems.
    • how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
    • parallel and distributed computing concepts.
    • Privacy Impact Assessments.
    • process engineering concepts.
    • secure configuration management techniques. (e.g., Security Technical Implementation Guides (STIGs), cybersecurity best practices on cisecurity.org).
    • key concepts in security management (e.g., Release Management, Patch Management).
    • system design tools, methods, and techniques, including automated systems analysis and design tools.
    • system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.
    • system life cycle management principles, including software security and usability.
    • systems testing and evaluation methods.
    • telecommunications concepts (e.g., Communications channel, Systems Link Budgeting, Spectral efficiency, Multiplexing).
    • the organization’s enterprise information technology (IT) goals and objectives.
    • the systems engineering process.
    • Supply Chain Risk Management Practices (NIST SP 800-161)
    • critical information technology (IT) procurement requirements.
    • functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes).
    • applicable laws, statutes (e.g., in Titles 10, 18, 32, 50 in U.S. Code), Presidential Directives, executive branch guidelines, and/or administrative/criminal legal guidelines and procedures.
    • information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.
    • critical infrastructure systems with information communication technology that were designed without system security considerations.
    • network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
    • service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
    • laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
    • an organization’s information classification program and procedures for information compromise.
    • Information Theory (e.g., source coding, channel coding, algorithm complexity theory, and data compression).
    • network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
    • network design processes, to include understanding of security objectives, operational objectives, and trade-offs.
    • controls related to the use, processing, storage, and transmission of data.

    key skills of the Systems Requirements Planner include

    • applying and incorporating information technologies into proposed solutions.
    • applying confidentiality, integrity, and availability principles.
    • applying organization-specific systems analysis principles and techniques.
    • conducting capabilities and requirements analysis.
    • design modeling and building use cases (e.g., unified modeling language).
    • conducting reviews of systems.
    • apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

    Systems Requirements Planner must be able to:

    • interpret and translate customer requirements into operational capabilities.
    • apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
    • identify critical infrastructure systems with information communication technology that were designed without system security considerations.

    Our Revolution

    We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

    Cybrary On The Go

    Get the Cybrary app for Android for online and offline viewing of our lessons.

    Get it on Google Play
     

    Support Cybrary

    Donate Here to Get This Month's Donor Badge

     
    Skip to toolbar

    We recommend always using caution when following any link

    Are you sure you want to continue?

    Continue
    Cancel