recommended reading

Defense must ramp up recruitment of IT acquisition workforce, consultant says

The Defense Department should create an incentive program to lure information technology acquisition professionals from industry and establish a defined career path for them, according to an internal briefing on necessary improvements to the Defense IT acquisition workforce.

The briefing by Thomas Hickok, a consultant to the Defense Chief Information Officer, said the Pentagon also should establish critical positions in all IT disciplines throughout the military departments and agencies and target superior program and project managers for recruitment. He also suggested Defense creates an exchange program with industry for IT professionals.

The department budgeted $68.9 billion for IT spending in 2010, but the Defense Science Board noted in a March 2009 report that "IT expertise is scarce and the competition for talent is increasing." That report also stated the Pentagon and the military services need IT acquisition staff with extensive experience in large-scale, embedded and commercial IT.

In addition, the House Armed Services Committee called for a beefed up and more skilled IT workforce in its March report on Defense acquisition reform and said the Pentagon should "develop a plan for how to strengthen the IT acquisition workforce as it increases the size of the overall acquisition workforce in the coming years."

The 2010 Defense Authorization Act in a section on IT acquisition called on the Pentagon to develop an acquisition process for IT systems based on the Defense Science Board report and directed the process be outlined in a report due this past July. That report has not been submitted yet, but the Hickok briefing is a draft of the language Defense plans to present in its report to Congress. The Pentagon did not respond to queries on the status of the report and plans for the IT acquisition workforce.

Trey Hodgkins, vice president for national security and procurement policy for the IT industry association TechAmerica, said Defense definitely needs to boost the skills of its IT acquisition workforce, which lacks comprehensive understanding of commercial IT trends and technology.

To recruit highly skilled IT acquisition professionals, Defense should provide incentives such as bonuses and entry into the workforce at a high grade, he said. Beyond that, Hodgkins said Defense should design a clear career path for these professionals -- something the Pentagon currently lacks, which diminishes its ability to recruit the people needed to manage the IT systems key to the operation of networked forces.

Hodgkins endorsed the idea of an exchange program between industry and the Pentagon, suggesting that it start at the National Defense University and the Defense Acquisition University.

The Pentagon and Congress also need to dust off and ramp up the formal Information Technology Exchange Program, Hodgkins said. Only one person, John Moore, director of global strategic development, global security solutions at Lockheed Martin Corp., went through that program before authorizing legislation expired in 2008.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.