Power BI Specialist

Dubai
3 weeks ago
Create job alert

601 Jefferson St.
Houston, TX 7002 USA
Statement of Work (SOW) Power BI Specialist Support
Pursuit Number:
Page | 1
KBR Proprietary and Confidential
Statement of Work (SOW) for
Power BI Specialist Support
AFCAP LN/OCN Task Order, UAE Date: 04/03/2025
Who is KBR?
KBR is the global government services business of KBR, Inc. We deliver the government programs that matter most – on time, on budget and notice or in extreme environments. We are trusted when the stakes are high and national security is on the line. We drive change in science and technology to push the boundaries of possibilities. KBR is at the forefront of its industry ready to take on any challenge, anywhere. When it comes to government services – We Deliver.

  1. PURPOSE
    This Statement of Work (SOW) is prepared in accordance with AFCAP (Air Force Contract Augmentation Program) and USG (United States Government) contract standards. It outlines the responsibilities, scope, and deliverables to be provided to KBR under a PMC (Project Management Consultancy) initiative based in Abu Dhabi. The core objective is to deliver advanced business intelligence solutions leveraging Microsoft Power BI to support performance monitoring, operational efficiency, and enterprise-level decision support systems.
  2. SCOPE OF WORK
    The Power BI Specialist shall operate in alignment with USG programmatic and data compliance standards, and will:
    • Design and implement Power BI dashboards that conform to AFCAP and DAFI (Department of the Air Force Instructions) reporting standards.
    • Create dynamic data visualizations tailored to stakeholder-specific KPIs, operational objectives, and federal reporting compliance.
    • Perform ETL operations from structured/unstructured data sources including Microsoft SQL Server, Excel, SharePoint, REST APIs and Azure services.
    601 Jefferson St.
    Houston, TX 7002 USA
    Statement of Work (SOW) Power BI Specialist Support
    Pursuit Number:
    Page | 2
    KBR Proprietary and Confidential
    • Develop scalable data models and calculated measures using DAX and Power Query M code.
    • Implement Row-Level Security (RLS), governance frameworks, and workspace architecture adhering to DoD/USG cybersecurity protocols.
    • Collaborate with project stakeholders, including Program Managers, Contracting Officers, and Data Governance teams.
    • Conduct business requirement workshops and convert functional needs into technical execution plans.
    • Provide knowledge transfer and user training tailored to government and civilian personnel.
    • Document all logic, model relationships, version control, and deployment workflows.
    • Maintain real-time monitoring, performance optimization, and issue resolution.
  3. DELIVERABLES
    • 10+ production-ready interactive Power BI dashboards addressing core operational and contractual KPIs.
    • Fully governed semantic models with reusable DAX measures and optimized relationships.
    • Monthly analytical performance reviews and reporting packages.
    • Training session(s) with tailored content for government personnel (minimum of two live sessions + reference guides).
    • Comprehensive documentation (technical specifications, user manuals, SOPs).
    • Architecture and security compliance checklist validated against USG/AFCAP data requirements.
  4. TIMELINE
    • Project Start Date: April 7, 2025
    • Period of Performance: Six (6) months from start date with an option to extend based on task order continuation or government direction.
    • Milestones:
    • Week 2: Requirements gathering and stakeholder alignment completed.
    • Week 4: Initial deployment of test dashboards to secure environment.
    • Month 2: Go-live of operational dashboards and system integration testing.
    • Quarterly: Government-facing reporting presentation and review cycle.
    601 Jefferson St.
    Houston, TX 7002 USA
    Statement of Work (SOW) Power BI Specialist Support
    Pursuit Number:
    Page | 3
    KBR Proprietary and Confidential
  5. PERSONNEL QUALIFICATIONS
    The assigned Power BI Specialist shall:
    • Hold a Bachelor’s degree in Computer Science, Data Analytics, or equivalent.
    • Have 5+ years of experience with Microsoft Power BI in a government or enterprise environment.
    • Possess expert-level proficiency with DAX, M (Power Query), and advanced data modeling techniques.
    • Be well-versed in U.S. government reporting standards, cybersecurity protocols (e.g., NIST SP 800-53, FedRAMP), and DoD data practices.
    • Have experience with KPI scorecard, RLS implementation, and publishing in Power BI Service/GovCloud.
    • Demonstrate strong communication skills with the ability to brief technical and non-technical audiences.
    • Power BI specialist shall be based on UAE.
  6. CLIENT RESPONSIBILITIES
    • Provide controlled access to secure systems, datasets, and SharePoint environments.
    • Designate an on-site Government Representative or COR (Contracting Officer’s Representative).
    • Ensure support for IT onboarding, data governance briefings, and baseline compliance protocols.
    • Allocate workspace and hardware where on-site presence is required.
  7. INTELLECTUAL PROPERTY & NON-COMPETE
    • Intellectual Property: All dashboards, models, source files, and documentation produced during this engagement shall remain the sole property of KBR and/or the USG.
    • Non-Compete: Consultant shall not engage in similar work for direct competitors of KBR or within overlapping USG projects in the Middle East for a period of 90 months post-termination without written consent.
    • Data Handling: All information handled shall comply with applicable federal, DoD, or KBR-specific data confidentiality policies.
    601 Jefferson St.
    Houston, TX 7002 USA
    Statement of Work (SOW) Power BI Specialist Support
    Pursuit Number:
    Page | 4
    KBR Proprietary and Confidential
  8. TERMINATION CLAUSE
    • KBR may terminate this SOW with labor law written notice.
    • Immediate termination is permissible in the event of:
    • Violation of federal security or confidentiality requirements.
    • Misuse of privileged access or data.
    • Failure to deliver core milestones or demonstrate progress.
    • Upon termination, all government-furnished equipment (GFE) and data must be returned or destroyed per federal data sanitization procedures.
  9. SUBCONTRACT
    All contractual matters, modifications, and billing queries shall be directed to the appointed Subcontract Specialist.

    Ganymede is committed to creating a diverse workforce and is an equal opportunities employer. We welcome applications from all suitably qualified persons regardless of age, disability, gender, marriage and civil partnership, pregnancy and maternity, race, religion or belief, sex, and sexual orientation

Related Jobs

View all jobs

IT Manager

IT Support Engineer

Asset Management Consultant

Systems Engineer

Project Controller

Apprentice Compliance Officer (Digital Support Technician)

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.