Power BI Specialist

Dubai
1 month ago
Applications closed

Related Jobs

View all jobs

Asset Management Consultant

Head of IT - Data & Applications

Graduate IT Technician

Project Controller

Group Privacy Analyst

Head of Digital & ICT

601 Jefferson St.
Houston, TX 7002 USA
Statement of Work (SOW) Power BI Specialist Support
Pursuit Number:
Page | 1
KBR Proprietary and Confidential
Statement of Work (SOW) for
Power BI Specialist Support
AFCAP LN/OCN Task Order, UAE Date: 04/03/2025
Who is KBR?
KBR is the global government services business of KBR, Inc. We deliver the government programs that matter most – on time, on budget and notice or in extreme environments. We are trusted when the stakes are high and national security is on the line. We drive change in science and technology to push the boundaries of possibilities. KBR is at the forefront of its industry ready to take on any challenge, anywhere. When it comes to government services – We Deliver.

  1. PURPOSE
    This Statement of Work (SOW) is prepared in accordance with AFCAP (Air Force Contract Augmentation Program) and USG (United States Government) contract standards. It outlines the responsibilities, scope, and deliverables to be provided to KBR under a PMC (Project Management Consultancy) initiative based in Abu Dhabi. The core objective is to deliver advanced business intelligence solutions leveraging Microsoft Power BI to support performance monitoring, operational efficiency, and enterprise-level decision support systems.
  2. SCOPE OF WORK
    The Power BI Specialist shall operate in alignment with USG programmatic and data compliance standards, and will:
    • Design and implement Power BI dashboards that conform to AFCAP and DAFI (Department of the Air Force Instructions) reporting standards.
    • Create dynamic data visualizations tailored to stakeholder-specific KPIs, operational objectives, and federal reporting compliance.
    • Perform ETL operations from structured/unstructured data sources including Microsoft SQL Server, Excel, SharePoint, REST APIs and Azure services.
    601 Jefferson St.
    Houston, TX 7002 USA
    Statement of Work (SOW) Power BI Specialist Support
    Pursuit Number:
    Page | 2
    KBR Proprietary and Confidential
    • Develop scalable data models and calculated measures using DAX and Power Query M code.
    • Implement Row-Level Security (RLS), governance frameworks, and workspace architecture adhering to DoD/USG cybersecurity protocols.
    • Collaborate with project stakeholders, including Program Managers, Contracting Officers, and Data Governance teams.
    • Conduct business requirement workshops and convert functional needs into technical execution plans.
    • Provide knowledge transfer and user training tailored to government and civilian personnel.
    • Document all logic, model relationships, version control, and deployment workflows.
    • Maintain real-time monitoring, performance optimization, and issue resolution.
  3. DELIVERABLES
    • 10+ production-ready interactive Power BI dashboards addressing core operational and contractual KPIs.
    • Fully governed semantic models with reusable DAX measures and optimized relationships.
    • Monthly analytical performance reviews and reporting packages.
    • Training session(s) with tailored content for government personnel (minimum of two live sessions + reference guides).
    • Comprehensive documentation (technical specifications, user manuals, SOPs).
    • Architecture and security compliance checklist validated against USG/AFCAP data requirements.
  4. TIMELINE
    • Project Start Date: April 7, 2025
    • Period of Performance: Six (6) months from start date with an option to extend based on task order continuation or government direction.
    • Milestones:
    • Week 2: Requirements gathering and stakeholder alignment completed.
    • Week 4: Initial deployment of test dashboards to secure environment.
    • Month 2: Go-live of operational dashboards and system integration testing.
    • Quarterly: Government-facing reporting presentation and review cycle.
    601 Jefferson St.
    Houston, TX 7002 USA
    Statement of Work (SOW) Power BI Specialist Support
    Pursuit Number:
    Page | 3
    KBR Proprietary and Confidential
  5. PERSONNEL QUALIFICATIONS
    The assigned Power BI Specialist shall:
    • Hold a Bachelor’s degree in Computer Science, Data Analytics, or equivalent.
    • Have 5+ years of experience with Microsoft Power BI in a government or enterprise environment.
    • Possess expert-level proficiency with DAX, M (Power Query), and advanced data modeling techniques.
    • Be well-versed in U.S. government reporting standards, cybersecurity protocols (e.g., NIST SP 800-53, FedRAMP), and DoD data practices.
    • Have experience with KPI scorecard, RLS implementation, and publishing in Power BI Service/GovCloud.
    • Demonstrate strong communication skills with the ability to brief technical and non-technical audiences.
    • Power BI specialist shall be based on UAE.
  6. CLIENT RESPONSIBILITIES
    • Provide controlled access to secure systems, datasets, and SharePoint environments.
    • Designate an on-site Government Representative or COR (Contracting Officer’s Representative).
    • Ensure support for IT onboarding, data governance briefings, and baseline compliance protocols.
    • Allocate workspace and hardware where on-site presence is required.
  7. INTELLECTUAL PROPERTY & NON-COMPETE
    • Intellectual Property: All dashboards, models, source files, and documentation produced during this engagement shall remain the sole property of KBR and/or the USG.
    • Non-Compete: Consultant shall not engage in similar work for direct competitors of KBR or within overlapping USG projects in the Middle East for a period of 90 months post-termination without written consent.
    • Data Handling: All information handled shall comply with applicable federal, DoD, or KBR-specific data confidentiality policies.
    601 Jefferson St.
    Houston, TX 7002 USA
    Statement of Work (SOW) Power BI Specialist Support
    Pursuit Number:
    Page | 4
    KBR Proprietary and Confidential
  8. TERMINATION CLAUSE
    • KBR may terminate this SOW with labor law written notice.
    • Immediate termination is permissible in the event of:
    • Violation of federal security or confidentiality requirements.
    • Misuse of privileged access or data.
    • Failure to deliver core milestones or demonstrate progress.
    • Upon termination, all government-furnished equipment (GFE) and data must be returned or destroyed per federal data sanitization procedures.
  9. SUBCONTRACT
    All contractual matters, modifications, and billing queries shall be directed to the appointed Subcontract Specialist.

    Ganymede is committed to creating a diverse workforce and is an equal opportunities employer. We welcome applications from all suitably qualified persons regardless of age, disability, gender, marriage and civil partnership, pregnancy and maternity, race, religion or belief, sex, and sexual orientation

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.