Released in February 2023, the U.S. Department of Defense Manual 8140.03 (DoDM 8140.03) prescribes standards and assigns responsibilities for the management of the DoD cyber workforce to include workforce identification, tracking, qualification, and reporting.
The DoDM 8140.03 qualification standards focus on a demonstration of capability rather than a compliance-based approach, as was DoDM 8570.03, ensuring that the cyber workforce is competent in performing the required functions of their job role. In addition, organizations can feel empowered to maintain their own unique requirements based on operational needs.
The goals of the DoDM 8140.03 are to:
By February 2025, all DoD civilian employees and military service members in DCWF work roles under the cybersecurity workforce element must be qualified in accordance with DoDM 8140.03. If you or your organization are in need of training and certification as it relates to DoDM 8140.03 let CompTIA help. CompTIA currently has approval for 8 of their certifications across 31 work roles under DoDM 8140.03, including Security+, CySA+, PenTest+, CASP+ and more.
For essential insights on upskilling under the U.S. DoDM 8140.03 initiative, watch our webcasts Get a Head Start with DoDM 8140.03 Cybersecurity Workforce Qualifications and Upskilling to the DoDM 8140.03 cybersecurity workforce directive: What integrators need to know. Discover approved certifications, key roles like Security Analyst, and how CompTIA certifications align. Gain firsthand knowledge from experts experienced with the program.
See how CompTIA certifications map to DoDM 8140.03 work roles. Explore our interactive chart below.
Provides technical support to customers who need assistance utilizing client level hardware and software in accordance with established or approved organizational process components. (i.e., Master Incident Management Plan, when applicable).
Responsible for the management and administration of processes and tools that enable the organization to identify, document, and access intellectual capital and information content.
Plans, implements, and operates network services/systems, to include hardware and virtual environments.
Installs, configures, troubleshoots, and maintains hardware, software, and administers system accounts.
Consults with customers to evaluate functional requirements and translate functional requirements into technical solutions.
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Conducts software and systems engineering and software systems research in order to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation.
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Tests, implements, deploys, maintains, and administers the infrastructure hardware and software.
Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.
Conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST 800-37).
Analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results.
Designs, develops, tests, and evaluates information system security throughout the systems development lifecycle.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
Responsible for the cybersecurity of a program, organization, system, or enclave.
Develops cyberspace plans, strategy and policy to support and align with organizational cyberspace missions and initiatives.
Conducts deep-dive investigations on computer-based crimes establishing documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents.
Identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques.
Leads, coordinates, communicates, integrates and is accountable for the overall success of the program, ensuring alignment with critical agency priorities.
Work that involves directly managing information technology projects to provide a unique service or product.
Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components.
Manages a portfolio of IT capabilities that align with the overall needs of mission and business enterprise priorities.
Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations.
Responsible for analysis and development of systems/software security through the product lifecycle to include integration, testing, operations and maintenance.