CISA Authorizing Official

This is a senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation (CNSSI 4009).

Personnel performing this role may unofficially or alternatively be called:

  • Certifying Official
  • Compliance Manager
  • Designated Accrediting Authority
  • Information Assurance (IA) Officer

Skill Community: Cybersecurity
Category: Protect and Defend
Specialty Area: Risk Management
Work Role Code: 611


Core Tasks

  • Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network. (T0145)
  • Establish acceptable limits for the software application, network, or system. (T0221)
  • Manage Accreditation Packages (e.g., ISO/IEC 15026-2). (T0371)
  • Manage and approve Accreditation Packages (e.g., ISO/IEC 15026-2). (T0495)

Core Competencies

  • Data Privacy and Protection
  • Information Assurance
  • Information Systems/Network Security
  • Legal, Government, and Jurisprudence
  • Risk Management

Core Knowledge, Skills, Abilities (KSAs)

  • Knowledge of Personally Identifiable Information (PII) data security standards. (K0260)
  • Knowledge of organization's enterprise information security architecture. (K0027)
  • Knowledge of Security Assessment and Authorization process. (K0037)
  • Knowledge of cybersecurity and privacy principles used to manage risks related to the use, processing, storage, and transmission of information or data. (K0038)
  • Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). (K0044)
  • Knowledge of current industry methods for evaluating, implementing, and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilizing standards-based concepts and capabilities. (K0054)
  • Knowledge of confidentiality, integrity, and availability principles. (K0295)
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). (K0179)
  • Skill in discerning the protection needs (i.e., security controls) of information systems and networks. (S0034)
  • Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures. (K0267)
  • Knowledge of Risk Management Framework (RMF) requirements. (K0048)
  • Knowledge of structured analysis principles and methods. (K0084)
  • Knowledge of information technology (IT) supply chain security and supply chain risk management policies, requirements, and procedures. (K0169)
  • Knowledge of new and emerging information technology (IT) and cybersecurity technologies. (K0059)


Join the Mission

CISA is always searching for diverse, talented, and highly motivated professionals to continue its mission of securing the nation’s critical infrastructure. CISA is more than a great place to work; our workforce tackles the risks and threats that matter most to the nation, our families, and communities.

To join this mission, visit USAJOBs and/or the DHS Cybersecurity Service to view job announcements and to access the application. Be sure to tailor your resume to the specific job announcement, attach relevant documents, and complete all required assessments. 

When applying for CISA’s cyber positions, please review CISA’s cyber roles above and update your resume to align your experience with the listed competencies. Your resume must also show demonstrated cyber/IT related experience in:

  • Attention to Detail
  • Customer Service
  • Oral Communication
  • Problem Solving

To receive email notifications when new CISA positions are announced, set up a “saved search” on USAJOBs with keyword “Cybersecurity and Infrastructure Security Agency.”

Individuals eligible for special hiring authorities may also be considered during CISA’s one-stop hiring events or by emailing or

Was this webpage helpful?  Yes  |  Somewhat  |  No