UKRAINE CYBERSECURITY WORKFORCE FRAMEWORK WORKSHOP

Page 9

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCURE IN UKRAINE ACTIVITY

Cybersecurity Workforce Framework Workshop

Karen Wetzel, National Initiative for Cybersecurity Education

Randy Pestana, Florida International University

1 USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 2/15/2023

The NICE Workforce Framework for Cybersecurity: A model framework for workforce planning and development

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 2
2/15/2023

NIST Mission

• To promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 3
2/15/2023

QUICK FACTS

• Led by the National Institute of Standards and Technology (NIST) in the U.S. Department of Commerce

• A partnership between government, academia, and the private sector

NICE Mission

To energize, promote, and coordinate a robust community working together to advance an integrated ecosystem of cybersecurity education, training, and workforce development.

History

1998: The Comprehensive National Cybersecurity Initiative (CNCI) created. Initiative 8 aims at better preparing the Federal cybersecurity workforce.

2009: Initiative 8 scope expands to include private sector workforce.

2010: Initiative #8,“Expand cyber education,” becomes public.

2014: Cybersecurity Enhancement Act of 2014 Title IV establishes the “National cybersecurity awareness and education program” (NICE).

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 4
2/15/2023

What NICE Does

Community Coordinating Council

Interagency

Coordinating Council

International Engagement

Communities of Interest

Working Groups

LEADERSHI P & COORDINAT ION COMMUNIT Y ENGAGEME NT NICE FRAMEWOR K

Project Teams

Calls for Comments

RESOURCES

NICE Newsletter

One-Pagers

Framework in Focus

EVENTS

Monthly Webinars

NICE Conference

NICE K12 Conference

Cybersecurity Career

Awareness Week

Federal Cybersecurity

FAQs

Authoring Guides

Playbook

Spreadsheet Data

Success Stories

NF Resource Center

NICE Challenges

CyberSeek

Workforce Summit

FISSEA Forums

Workshops

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
5

Workforce Framework for Cybersecurity (NICE Framework)

- NIST SP 800-181r1

www.nist.gov/nice/framework

✔ A modular, building-blocks approach based on Task, Knowledge, and Skill (TKS) statements

✔ A common, consistent lexicon to clearly share information about what a workforce needs to know

✔ The concepts of work and learner are described in terms that can be applied to any organization

✔ Enables the establishment of regular processes

✔ For use in career awareness, education and training, hiring and career development, workforce planning and assessment

Ukrainian Translation of the 2020 NICE Framework (NIST SP 800-181r1)

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
6
Ukrainian
Official U.S.
translation.
(PDF)Document translated courtesy of the
Academy of Cybersecurity with the support of the U.S. Embassy to Ukraine. Reviewed by Diplomatic Language Services.
Government

Workforce Framework Attributes

Agility

Agility

People, processes, and technology mature and must adapt to change.A defined workforce framework enables organizations to keep pace with constantly evolving ecosystems.

Flexibility

There is no one-size-fits-all solution to common challenges.A workforce framework enables organizations to account for their unique operating context.

Interoperability

Solutions to common challenges may be unique, but they must agree upon consistent use of terms.A framework enables organizations to exchange workforce information using a common language.

Modularity

Using a common workforce framework model enables communication about across workforces (e.g., cybersecurity and privacy) within the enterprise and across sectors.

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
7

Workforce Framework Stakeholders

Employers

Framework

Educators

Identify Assess Define Teach Evidence

Learners

Possess • Acquire

Develop • Demonstrate

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
8

COMMON WORKFORCE FRAMEWORK USES

Employers

● Standardizing and aligning job descriptions to Work Roles

● Assessing candidates during hiring process

● Supporting mid-career shifts into the profession

Education & Training Providers

● Developing and aligning training and certifications to the framework

● Aligning curriculum to Work Roles

● Assessing learner capabilities

Learners (students, job-seekers, & employees)

● Introducing careers to interested learners

● Demonstrating workplace capability

● Supporting career paths and development

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
9

✔ Benefits of a Model Workforce Framework

✔ Model Workforce

Framework Components

✔ Background

✔ Supporting Resources

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
A Playbook for Workforce Frameworks
10
https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framewor k-resource-center/playbook-workforce-frameworks

Workforce Framework Components

NICE Framework Building Blocks: Task, Knowledge, and Skill (TKS) Statements

Describes the Work

Describes the Learner

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
11

Using the NICE Framework: Building Block Applications

WORK ROLES

•Groupings of Task statements

•Work an individual or team is responsible for

COMPETENCY AREAS

• Groupings of related Knowledge and Skill statements

• Correlate with capability to perform Tasks in a domain

TEAMS

•Defined by Competency Areas or Work Roles

USAID CYBERSECURITY
CRITICAL INFRASTRUCTURE IN UKRAINE
FOR
ACTIVITY
12

Workforce Framework Work Roles

Work Role: A grouping of work for which someone is responsible or accountable

Work Roles:

• Are not synonymous with job titles or occupations

• May apply to many varying job titles

• Can be combined to create a particular job

Consist of:

• Tasks that constitute the work to be done

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
13

Oversee and Govern (14)

NICE Framework Work Role Categories

Securely Provision (11)

Operate and Maintain (7)

Protect and Defend (4) Investigate (3) Analyze (7) Collect and Operate (6)

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
5 2 W O R K R O L E S 14

Restricted Work Roles

– Title 10: Provides the legal basis for military operations (including cyber)

– Title 50: Legal authority to conduct intelligence operations and covert action (typically CIA)

Collect and Operate (Cyberspace Effects)

• All Source-Collection Manager

• All Source-Collection Requirements Manager

• Cyber Intel Planner

• Cyber Ops Planner

• Partner Integration Planner

• Cyber Operator

Analyze (Intelligence)

• Threat/Warning Analyst

• Exploitation Analyst

• All-Source Analyst

• Mission Assessment Specialist

• Target Developer

• Target Network Analyst

• Multi-Disciplined Language Analyst

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
15

NICE Framework Work Role Examples

Cyber Defense Incident Responder

PR-CIR-001 (OPM Code 531)

Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.

Information Systems Security Manager

OV-MGT-001 (OPM Code 722)

Cyber Defense Forensics Analyst

IN-FOR-002 (OPM Code 212)

Responsible for the cybersecurity of a program, organization, system, or enclave. Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.

Example Tasks (ISSM)

T0157 Oversee the information security training and awareness program.

T0213 Provide technical documents, incident reports, findings from computer examinations, summaries, and other situational awareness information to higher headquarters.

T0215 Recognize a possible security violation and take appropriate action to report the incident, as required.

T0219 Recommend resource allocations required to securely operate and maintain an organization’s cybersecurity requirements.

T0254 Oversee policy standards and implementation strategies to ensure procedures and guidelines comply with cybersecurity policies.

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
• 17 Tasks • 40 Knowledge/Skill/Ability • 53 Tasks • 59 Knowledge/Skill/Ability • 39 Tasks • 70 Knowledge/Skill/Ability
16

NICE Framework Work Roles: Complete List

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
17

Example Use: Using Work Roles in Hiring

Do we have the right people on our cybersecurity team?

Solution: Conduct a workforce assessment using the NICE Framework

• Determine needed Work Roles

• Assess current cybersecurity staff in needed Competency areas

• Identify gaps and provide requisite training

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
18

Example Use: Using Work Roles in Hiring

How can we be sure to hire the right candidate?

Solution: Use the NICE Framework to…

• Identify Competencies & Work Roles the new hire will be responsible for

• Use language from the NICE Framework in your job description

• Assess candidates for needed knowledge and skills

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
19

Example Use: Using Work Roles in Hiring

I’m looking to shift to a new cybersecurity role in my organization but want to make sure I’m prepared.

Solution: Upskill and reskill with the NICE

Framework

• Use related Work Roles in career pathing

• Clearly communicate organizational needs

• Identify areas of strength and weakness – and then focus on areas that need work

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
20

Getting Ready to Hire

• What NICE Framework cybersecurity Work Roles will the position be responsible for?

• Will this position be responsible for all the Tasks under a Work Role? Are there some missing? Are any shared across a team? Do any need to be adjusted to meet organizational needs?

• Which of the identified tasks will be needed on day one, and which can be learned on the job?

• What academic degrees, industry-recognized certifications, work experience, or other credentials (if any) are required or preferred to evidence sufficient qualifications for the position?

• How will you assess capabilities during the interview process?

• Will you offer support to candidates who meet minimum qualifications but may need additional development?

• Draft the job description using Work Roles and TKS statements, and referencing tools that map Work Roles to common job titles

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
21

Discussion: Example Job Description

• IT Cybersecurity Specialist Typical work assignments include:

• Ensures that the implemented security safeguards are adequate to assure the integrity, availability and confidentiality of the information being processed, transmitted or stored consistent with the level of sensitivity of that information.

• Plans the work to be accomplished by subordinate civilian and contractor; sets and adjust short-term priorities, and prepare schedules for completion of work; assigns work to subordinates based on priorities, selective consideration of the difficulty, requirements of assignments, and the capabilities of employees

• Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams.

• Analyzes policy and recommends improvements.

• Serves as an expert consultant evaluation for functional teams, to assist them in anticipating, identifying, evaluating, mitigating and minimizing risks associated with IT systems vulnerabilities.

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
22

Workforce Framework Competency Areas

Competency Area: A cluster of related Knowledge and Skill statements that correlates with one’s capability to perform Tasks in a particular domain.

Competency Areas may:

• Be additive to one or more Work Roles

• Span multiple Work Roles

• Represent emerging domains

Consist of: Title

Description

TKS statements

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
2nd Draft NISTIR 8355 NICE Framework Competencies: Assessing Learners for Cybersecurity Work https://doi.org/10.6028/NIST.IR.8355draft2 Compete ncies Stakehold ers 23

Using Competency Areas: Examples

• Overlaid on Work Role(s):A position responsible for one or more Work Roles may need the Competency with or across those roles (e.g., Cloud Security)

• Common Ground:When needed to be effective in a specific sector or domain, or for non-cybersecurity staff who need cybersecurity expertise to mitigate risks (e.g.,AI cybersecurity)

• Learning: For students, job-seekers, or employees, serve as a starting place for learning or a way to develop higher-level expertise in an area (e.g., Digital Forensics)

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
24

Example NICE Framework Competency Areas (Subset)

Access Controls

This Competency describes a learner’s capabilities to define, manage, and monitor the roles and secure access privileges of who is authorized to access protected data and resources.

AI Cybersecurity

Asset Management

This Competency describes a learner’s capabilities to utilize artificial intelligence to improve cybersecurity.

This Competency describes a learner’s capabilities to conduct and maintain an accurate inventory of all digital assets, to include identifying, developing, operating, maintaining, upgrading, and disposing of assets.

Cloud Security

This Competency describes a learner's capabilities to protect cloud data, applications, and infrastructure from threats.

Cybersecurity

Fundamentals

This Competency describes a learner’s capabilities to understand and demonstrate the fundamentals of cybersecurity, including risk management; privacy principles; policy, law, and ethics; networking and systems; etc.

Data Security

This Competency describes a learner’s capabilities to protect data and information systems by ensuring their confidentiality, integrity, and availability.

OT Cybersecurity

This Competency describes a learner’s capabilities to improve and maintain the security of Operational Technology (OT) systems while addressing their unique performance, reliability, and safety requirements.

Supply Chain Cybersecurity

This Competency describes a learner’s capabilities related to the process of analyzing and controlling digital and physical risks presented by technology products or services purchased from parties outside your organization.

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
25

Using the Framework to Form Teams

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
26

Curriculum Development

Using the NICE Framework for Educators, Learners, and Employers

Randy Pestana, Florida International University

rpestana@fiu.edu

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 27
2/15/2023

Presentation Overview

• Three Primary Users of the NICE Framework

Educators

Learners –

Employers

• Workforce Pathways

Work-Based Learning Approaches

• Apprenticeships

• Internships

• Co-Op Programs

• Fellowships

• Certifications and Badges

• Proficiencies and Competencies

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
28

What Educators Need to Ask Themselves

• What cybersecurity curriculum and faculty currently exist at my institution?

• What are the workforce demands of my government?

• What are the workforce demands of my local industry?

• What are the workforce demands of industry at large?

• Do you have institutional leadership buy-in?

• What is the process for bringing in new/adjunct faculty?

• How long should my pathway be?

• Comprehensive Records vs.Transcripts

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
29

Accessing the NICE Framework

• Visit www.NICCS.CISA.gov and  select on “workforce development” where you will find NICE Framework Search Tool

• Click on “categories” that best align to the curriculum you are seeking to develop

Once there, you will see the different “specialty areas” that should be built into your educational pathway

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
30

NICE Framework Function for Educators

• Each specialty area will open with a series of “work roles” that have respective “abilities, knowledge, skills, and tasks”

– Each course developed under your larger curriculum should utilize the “knowledge” section

When building hands-on activities and supplemental learning, you want to focus in on the “skills” and “abilities” section –

When maintaining an eye on marketplace requirements and advising learning, focus on the “tasks” section

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
31

Lower Division Requirements vs. Upper Division Requirements

Lower Division

• Foundational information you want learners to have:

Upper Division

• Targeted Workforce Pathways

– Work Roles 1, 2, 3 …

• Incorporate Hands-On Experience

Foundations course –

Soft-skills development

• Certification Training

– Workforce tracks

Programming basics

Mathematics

Policy

Interdisciplinary coursework

Electives

• Computer Science

• Electrical Engineering

• Information Technology

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
32

Building Course Syllabus

• Course Content

• Key Learning Objectives

What are the framework knowledge units this course is aimed at teaching?

• Tools and Techniques

– Splunk? Python? Kali Linux?

• Work Roles Target

• Competencies Gained

What are the framework skills/abilities built into this course?

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
33

What to do with all this information?

College Transcripts

• Transcripts primarily outlines:

– Degrees Earned

Accredited Certificates

Earned – Courses Taken [and when]

– Grades Achieved

Comprehensive Records

• Frequently referred to as “Comprehensive Learner Record”

• Expands on transcripts to include key learning objectives of every course

• Can also incorporate digital badges and micro-credentials

Prior Institution Information

• More valuable to employers to learners than transcripts

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
34

Questions

• Consider what your institution needs?

• If you are an educator, have you done an internal analysis of your existing programming and resources?

• If you are an employer, what partnerships with institutions of higher education to recruit and retain talent?

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
35

Value for Learners

• Comprehensive Records,Transcripts, and/or digital passports are supplementary to technical resumes.

• Framework serves as resume building support:

Relevant Courses Taken –

Knowledge, Skills,Abilities Learned –

Tasks for prior work experience –

Universal language

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
36

Value for Employers

• Alignment to cybersecurity work roles ensures universal language between educators, employers, and learners

• Supports HR personnel [often not aligned with hiring managers] in seeking cybersecurity talent

• Ensures tasks language is accurate to specific role

• Avoids the “unicorn” problem

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
37

Value of Strategic Partnerships

For Educators/Learners

• Alignment of curriculum to industry needs

• Pathway for learners into industry

• Access to industry experts that can teach or present at functions

• Partner in pursuit of research dollars

For Employers

• Access to talent

Work-based learning approach

• Shared research and development

– Grant and foundation dollars

– Technology development

Academically rigorous reports

• Increased brand awareness

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
38

Work-Based Learning Approaches

Not All Certifications Are Created Equal

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
39

Apprenticeships

• Requires Academic Enrollment: No

• Average length: 12-24 months

• New Hire Conversion Rate: 91%

• Retention Rate after 1 year: 91% • Talent Acquisition Costs: Medium to High • Federal Training and Wage Offsets: Yes

• Require Mentorship: Highly Recommended

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
40

Internships

• Requires Academic Enrollment: Yes

• Average length: 3 months

• New Hire Conversion Rate: 46% •

Retention Rate after 1 year: 70% •

Talent Acquisition Costs: Low to Medium

• Federal Training and Wage Offsets: No

• Require Mentorship: Not Often

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
41

Co-Op Programs

• Requires Academic Enrollment: Yes

• Average length: 6 months

• New Hire Conversion Rate: 28%

• Retention Rate after 1 year: 47%

• Talent Acquisition Costs: Medium to High

• Federal Training and Wage Offsets: No

• Require Mentorship: Sometimes

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
42

Fellowships

• Closed Ecosystem

• Often sponsored by specific organizations, institutions, or governments

• Typically has four components:

Academics –

Research/Hands-On Training

Mentorship –

Professional Development

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
43

Certifications

• Think about what type of certifications do you want to get

Do you want an industry recognized credential?

• i.e., SANS, CompTIA, EC Council

Do you want a platform/tool specific certification?

• i.e.,AWS,Azure, Lynix

Can this be built into existing curriculum?

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
44

Badges and Micro-credentials

• Badges are made up of “micro-credentials” that verify the achievement of specific skills.

• These are intended to be shorter and more affordable [often free] way of gaining knowledge and skills.

• Value of credentials depends on the key learning objectives and assessment requirements that are built into the microcredentials

• Industry/Government aligned badges more valuable than “in the wild” certifications

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
45

Verticals vs. Horizontals

Cybersecurity

Academic Degree Programs

• Computer Science

• Information Technology

• Electrical Engineering

• Information Systems Management

• Cybersecurity Policy and Law

• Hospitality Management

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
Analytical Thinking
46
Hygiene Interpersonal Communication Financial Literacy
Effective Writing

Measuring Cybersecurity Workforce Capabilities: Defining a Proficiency Scale for the NICE Framework

Key Characteristics of Workplace Proficiency

Scales

• Demonstrative: How capability is evidenced

• Supervision:Amount and type for the level

Recommendations

1. Establish a workplace-focused NICE Framework

proficiency scale to be applied to Competency Areas and Work Roles

• Professional Skills: Soft skills, employability skills… https://www.nist.gov/system/files/documents/2022/08/03/NIST%20Measuring%20Cybersecurity%20Wo

2. Encourage the NICE Modernize Talent Management

Working Group to establish a Project Team for NICE

Strategic Plan Goal #3:Align qualification requirements according to proficiency levels

3. Engage stakeholders and subject matter experts to develop statements of proficiency to apply to NICE Framework

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
rkforce%20Capabilities%207-25-22.pdf
47
DEMOONLY
USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY 5 4 3 1 NF Content & Tools Framework DocumentSupplement al MaterialUpdatesTools Users Group LearnShareDiscussInfluence Success Stories ProfileDriversProcessBenefits & Impact Resources by Stakeholde r EmployersEducation & Training ProvidersLearners 2 Framework in Focus Practitioner ProfileCareer PathAdvice NICE Framework Resource Center www.NIST.gov/NICE/Framework 6 About FAQsHistoryAudienceRevision Process 48

Example NICE Framework Tools & Implementations

CyberSeek Jobs Map & Pathways

NICE Challenge

NICCS Career Pathways

MilGears

NICE Framework Search

Job Mapping

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
49

NICE Framework

• Updated Knowledge and Skill Statements

• Competency Areas: – NISTIR Report

– List –

Authoring Guide

• OT Cybersecurity Work Role

• Work Role Categories and Work Role names/descriptions

• New Staff

USAID CYBERSECURITY FOR CRITICAL INFRASTRUCTURE IN UKRAINE ACTIVITY
50

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.