Meet DoD 8140/8570 requirements
Compliance starts with the right certifications and the right training partner. Infosec prepares government teams and individual contractors to meet and maintain DoD qualification requirements.
What is 8140/8570?
DoD 8570 established the certification requirements for personnel accessing DoD information systems. DoD 8140 expanded that mandate into a comprehensive cyber workforce framework, tying qualifications to specific roles, proficiency levels and ongoing development requirements. Today, 8140 compliance is the standard for military personnel, civilian employees and contractors working within DoD systems and networks.
Find your work role in one of the seven Cyberspace Workforce Elements below. See what certifications meet 8140 qualifications based on the most recent DoD qualification matrix, along with the Infosec training to help you achieve your certification.
Cyberspace IT Workforce
The Cyberspace IT Workforce includes personnel who design, build, configure, operate and maintain the IT systems, networks and capabilities that underpin DoD operations.
Technical Support Specialist (411)
Provides technical support to customers who need assistance utilizing client-level hardware and software in accordance with established or approved organizational process components.
Knowledge Manager (431) 
Responsible for the management and administration of processes and tools that enable the organization to identify, document and access intellectual capital and information content.
- Intermediate: Security+
Enterprise Architect (651) 
Develops and maintains business, systems and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.  
Research & Development Specialist (661)
Conducts software and systems engineering and software systems research in order to develop new capabilities, ensuring cybersecurity is fully integrated. Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems.
Cybersecurity Workforce
The Cybersecurity Workforce includes personnel responsible for securing, defending and preserving data, networks and designated systems through appropriate security controls and internal defense actions.
Cyber Defense Analyst (511) 
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
Vulnerability Assessment Analyst (541)
Performs assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy or local policy. Measures the effectiveness of defense-in-depth architecture against known vulnerabilities.
Authorizing Official/Designated Representative (611)
Senior official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image or reputation), organizational assets, individuals, other organizations and the Nation (CNSSI 4009).
Security Control Assessor (612)
Conducts independent comprehensive assessments of the management, operational and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls (as defined in NIST 800-37).
Security Architect (652) 
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.
COMSEC Manager (723)
Manages the Communications Security (COMSEC) resources of an organization (CNSSI No. 4009).
- Advanced: CISM
Cyberspace Enablers
The Cyberspace Enablers element includes personnel who support or facilitate the functions of other cyber workforce elements, spanning acquisition, leadership, legal, law enforcement and training and education roles.
Cyber Workforce Developer and Manager (751)
Develop cyberspace workforce plans, strategies and guidance to support cyberspace workforce manpower, personnel, training and education requirements and to address changes to cyberspace policy, doctrine, materiel, force structure and education and training requirements.
Product Support Manager (803)
Manages the package of support functions required to field and maintain the readiness and operational capability of systems and components.
- Advanced: CCISO
Cyberspace Effects Workforce
The Cyberspace Effects Workforce includes personnel who plan, support and execute cyberspace capabilities where the primary purpose is to externally defend or conduct force projection in or through cyberspace.
Exploitation Analyst (121)
Partners with cyberspace operations customers to identify access and collection gaps that can be satisfied through cyberspace exploitation. Develops detailed plans executed by cyber operators. Identifies capability gaps and submits cyberspace capability requirements to capability development organizations.
Advanced: PenTest+ (pending)
Intelligence Workforce (Cyberspace)
The Intelligence Workforce includes personnel who collect, process, analyze and disseminate intelligence on foreign actors' cyberspace programs, intentions, capabilities and operational activities.
All-Source Analyst (111)
Analyzes data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information and submit intelligence collection and production requirements in support of planning and operations.
- Advanced: CySA+ (pending)
Software Engineering
The Software Engineering element includes personnel who develop, code and modify computer applications, software and specialized utility programs in accordance with software assurance best practices.
Systems Security Analyst (461)
Responsible for analysis and development of systems/software security through the product lifecycle to include integration, testing, operations and maintenance.
Software Developer (621)
Executes software planning, requirements, risk management, design, development, architecture, modeling, estimation, configuration management, quality, security and tests using software development methodologies, architectural structures, viewpoints, styles, design decisions and frameworks across all lifecycle phases.
Data/Artificial Intelligence (AI)
The Data/AI element includes personnel who specialize in artificial intelligence, machine learning and the data analysis and research associated with these emerging technologies.
Showing 12 of 261
Showing 12 of 261
ISC2 Certified Information Systems Security Professional® (CISSP) Certification Training Boot Camp
CompTIA SecurityX (formerly CASP+) Training Boot Camp
ISACA Certified Information Security Manager (CISM) Training Boot Camp
CompTIA Security+ Certification Training Boot Camp
ISC2 Certified Information Systems Security Professional® (CISSP) Certification Training Boot Camp
CompTIA Security+ Certification Training Boot Camp
CompTIA Cybersecurity Analyst (CySA+) Certification Training Boot Camp
ISC2 Certified Information Systems Security Professional® (CISSP) Certification Training Boot Camp
Cisco Certified Network Associate (CCNA) Certification Training Boot Camp
This in-person offering is not available for self-paying students and enrollments must be funded by employers and government entities only.
Cisco CCNA Associate & CCNA Cybersecurity Training Boot Camp
This in-person offering is not available for self-paying students and enrollments must be funded by employers and government entities only.
Cisco CCNA Associate & CCNA Cybersecurity Training Boot Camp
ISC2 Certified Cloud Security Professional (CCSP®) Training Boot Camp
Why choose Infosec for DoD training
Flexible DoD 8140 training delivery options
Maximize your training budget with flexible purchase options
Meet DoD 8140 requirements with training built for federal teams and contractors and stay under your Government Purchase Card limit.
Approved government programs
Infosec accepts all forms of approved training requests and procurement systems:
- AF COOL: Air Force Credentialing Opportunities On-Line
- Army IgniteD: Professional Development Program
- Veteran Readiness & Employment: Chapter 31 Benefits
- Government Purchase Cards: Stay under GPC limits
Flexible budget solutions
Your team's training needs don't always align with federal budget cycles. Our flexible payment options help you:
- Purchase group training now and train when it’s convenient
- Save with volume discounts for large teams
- Spread costs across fiscal years
Frequently Asked Questions (FAQs)
How do I find my DCWF work role?
Your DCWF work role is determined by the primary duties of your position, not your job title. Your supervisor or human resources office can identify your coded work role and proficiency level. You can also reference the DoD Cyber Workforce Framework at cyber.mil to browse work roles by workforce element and match them to your responsibilities.
How long do I have to meet DoD 8140 qualification requirements?
It depends on your role. DoD civilian employees and service members must meet foundational qualification requirements within 9 months of assignment to a coded cyberspace work role and resident qualification requirements within 12 months. Contractors are held to a stricter standard; foundational qualifications must be met upon commencement of cyberspace work, not within a grace period. Individual components may set additional or more specific requirements, so check with your supervisor or security officer for guidance specific to your organization.
Which certifications are most widely applicable across DoD 8140 work roles?
Security+ is one of the most broadly applicable certifications across the framework, qualifying personnel at the foundational level for dozens of work roles. CISSP qualifies for advanced-level roles across five of the seven workforce elements. The right certification depends on your specific work role and proficiency level.
How do defense contractors maintain DoD 8140 compliance?
Defense contractors must hold the required certifications for their assigned role and proficiency level. Compliance is an ongoing requirement, as contractors must also meet annual continuous professional development (CPD) requirements and maintain current certifications to remain eligible for DoD contracts.
Can my team train for DoD 8140 compliance as a group?
Yes, Infosec offers team training options, including onsite boot camps, live online group sessions and volume pricing for organizations certifying multiple personnel at once. Group training benefits agencies and contractors facing compliance deadlines across a large workforce. Contact our team to discuss scheduling and pricing options tailored to your timeline.
What happens if DoD personnel don't meet 8140 qualification deadlines?
Failure to meet qualification requirements can affect an individual's eligibility to perform coded cyberspace work roles and may result in removal from the position. For contractors, non-compliance can impact contract eligibility. Components are responsible for enforcing qualification requirements, and consequences may vary by service branch or agency.