IT Project Manager

Directly manages information technology projects.
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • Knowledge of cybersecurity and privacy principles.
  • Knowledge of cyber threats and vulnerabilities.
  • Knowledge of specific operational impacts of cybersecurity lapses.
  • Knowledge of capabilities and requirements analysis.
  • Knowledge of industry-standard and organizationally accepted analysis principles and methods.
  • Knowledge of information technology (IT) architectural concepts and frameworks.
  • Knowledge of Risk Management Framework (RMF) requirements.
  • Knowledge of new and emerging information technology (IT) and cybersecurity technologies.
  • Knowledge of resource management principles and techniques.
  • Knowledge of system life cycle management principles, including software security and usability.
  • Knowledge of the organization's enterprise information technology (IT) goals and objectives.
  • Knowledge of how information needs and collection requirements are translated, tracked, and prioritized across the extended enterprise.
  • Knowledge of Supply Chain Risk Management Practices (NIST SP 800-161)
  • Knowledge of the organization's core business/mission processes.
  • Knowledge of import/export control regulations and responsible agencies for the purposes of reducing supply chain risk.
  • Knowledge of supply chain risk management standards, processes, and practices.
  • Knowledge of functionality, quality, and security requirements and how these will apply to specific items of supply (i.e., elements and processes).
  • Knowledge of risk/threat assessment.
  • Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures.
  • Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.
  • Knowledge of Import/Export Regulations related to cryptography and other security technologies.
  • Knowledge of organizational process improvement concepts and process maturity models (e.g., Capability Maturity Model Integration (CMMI) for Development, CMMI for Services, and CMMI for Acquisitions).
  • Knowledge of service management concepts for networks and related standards (e.g., Information Technology Infrastructure Library, current version [ITIL]).
  • Knowledge of how to leverage research and development centers, think tanks, academic research, and industry systems.
  • Knowledge of information technology (IT) acquisition/procurement requirements.
  • Knowledge of the acquisition/procurement life cycle process.
  • Skill in identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.
  • Skill to translate, track, and prioritize information needs and intelligence collection requirements across the extended enterprise.
  • Ability to apply supply chain risk management standards.
  • Ability to oversee the development and update of the life cycle cost estimate.
  • Ability to evaluate/ensure the trustworthiness of the supplier and/or product.
  • Ability to ensure security practices are followed throughout the acquisition process.
  • Develop methods to monitor and measure risk, compliance, and assurance efforts.
  • Perform needs analysis to determine opportunities for new and improved business process solutions.
  • Provide advice on project costs, design concepts, or design changes.
  • Provide enterprise cybersecurity and supply chain risk management guidance for development of the Continuity of Operations Plans.
  • Provide ongoing optimization and problem-solving support.
  • Provide recommendations for possible improvements and upgrades.
  • Resolve conflicts in laws, regulations, policies, standards, or procedures.
  • Review or conduct audits of information technology (IT) programs and projects.
  • Evaluate the effectiveness of procurement function in addressing information security requirements and supply chain risks through procurement activities and recommend improvements.
  • Develop and document supply chain risks for critical system elements, as appropriate.
  • Ensure that all acquisitions, procurements, and outsourcing efforts address information security requirements consistent with organization goals.
  • Act as a primary stakeholder in the underlying information technology (IT) operational processes and functions that support the service, provide direction and monitor all significant activities so the service is delivered successfully.
  • Coordinate and manage the overall service provided to a customer end-to-end.
  • Ensure that appropriate Service-Level Agreements (SLAs) and underpinning contracts have been defined that clearly set out for the customer a description of the service and the measures for monitoring the service.
  • Gather feedback on customer satisfaction and internal service performance to foster continual improvement.
  • Manage the internal relationship with information technology (IT) process owners supporting the service, assisting with the definition and agreement of Operating Level Agreements (OLAs).
  • Review service performance reports identifying any significant issues and variances, initiating, where necessary, corrective actions and ensuring that all outstanding issues are followed up.
  • Work with other service managers and product owners to balance and prioritize services to meet overall customer requirements, constraints, and objectives.
  • Participate in the acquisition process as necessary.
  • Conduct import/export reviews for acquiring systems and software.
  • Develop supply chain, system, network, performance, and cybersecurity requirements.
  • Ensure that supply chain, system, network, performance, and cybersecurity requirements are included in contract language and delivered.
  • Identify and address cyber workforce planning and management issues (e.g. recruitment, retention, and training).
  • Lead and oversee budget, staffing, and contracting.
  • Draft and publish supply chain security and risk management documents.