DOD & GOVERNMENT
CYBER WORKFORCE MANAGEMENT PROGRAM
(DoDD 8140.01 & DoD 8570.01-m)

The DoD Directive on Cyberspace Workforce Management purpose is to unify the overall cyberspace workforce and establishes specific workforce elements(cyberspace effects, cyber security, and cyberspace information technology (IT)) to align, manage and standardize cyberspace work roles, baseline qualifications, and training requirements. This directive does not address operational employment of the work roles.
Operational employment of the cyberspace workforce will be determined by the Joint Staff, Combatant Commands, another DoD Components to address mission requirements.The policy is that, The DoD maintains a total force management perspective to provide qualified cyberspace government civilian and military personnel to identified and authorized positions, augmented where appropriate by contracted services support. These personnel function as an integrated workforce with complementary skill sets to provide an agile, flexible response to DoD requirements. {(1c,3a) DoD Directive 8140.01, “Cyberspace Workforce Management (DoD CIO),” July31, 2017}
INFORMATION ASSURANCE TRAINING & CERTIFICATION
IA certification programs are intended to produce IA personnel with a baseline understanding of the fundamental IA principles and practices related to the functions of their assigned position. Each category, specialty, and skill level has specific training and certification requirements. Meeting these requirements will require a combination of formal training and experiential activities such as on-the-job training and continuing education(DoD Directive 8570.01-M, December 19, 2005).
In addition to the IA baseline certification requirement for their level, IATs with privileged access must obtain appropriate Computing Environment (CE) certifications for the operating system(s) and/or security related tools/devices they support as required by their employing organization.
FREQUENTLY ASKED QUESTIONS
Who has to pay for Certifications?
Who needs to be certified?
What are the contractor certification implementation requirements?
What will qualify for continuous learning?
What do you mean by Computing Environment, Network Environment or Enclave?
-
Enclave - The enclave consists of at least 2 networks controlled by the enclave security policy and procedures.
-
Networks - In this case we have the three networks Operations Network, Logistics Network and Human Resources network connecting to a Component Enclave. Each network consists of at least 1 Computing Environment.
-
Computing Environment - A CE has a server with multiple stations working from it. The stations can be standard computers, remote sensors, satellite feeds, etc.