-
Participate in an Integrated Product Team to design new capabilities based upon evaluation of all necessary development and operational considerations
|
-
Allocate real-time process budgets and error budgets to systems and subsystem components
|
-
Generate alternative system concepts, physical architectures, and design solutions
|
-
Define the methods, processes, and evaluation criteria by which the systems, subsystems and work products are verified against their requirements in a written plan
|
-
Develop system design solution that satisfies the system requirements and fulfills the functional analysis
|
-
Review and provide input to program and contract work breakdown structure (WBS), work packages and the integrated master plan (IMP)
|
-
Participate in the development of system engineering documentation, such as System Engineering Plans, Initial Capabilities Documents, Requirements Specifications, and Interface Control Documents
|
-
Participate in interface definition, design, and changes to the configuration between affected groups and individuals throughout the life cycle
|
-
Derive from the system requirements an understanding of stakeholder needs, functions that may be logically inferred and implied as essential to system effectiveness
|
-
Derive lower-level requirements from higher-level allocated requirements that describe in detail the functions that a system component must fulfill, and ensure these requirements are complete, correct, unique, unambiguous, realizable, and verifiable
|
-
Participate in establishing and gaining approval of the definition of a system or component under development (requirements, designs, interfaces, test procedures, etc.) that provides a common reference point for hardware and software developers
|
-
Develop derived requirements for Information Assurance Services (Confidentiality, Integrity, Non repudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.)
|