Power BI Specialist

Dubai
3 days ago
Create job alert

601 Jefferson St.
Houston, TX 7002 USA
Statement of Work (SOW) Power BI Specialist Support
Pursuit Number:
Page | 1
KBR Proprietary and Confidential
Statement of Work (SOW) for
Power BI Specialist Support
AFCAP LN/OCN Task Order, UAE Date: 04/03/2025
Who is KBR?
KBR is the global government services business of KBR, Inc. We deliver the government programs that matter most – on time, on budget and notice or in extreme environments. We are trusted when the stakes are high and national security is on the line. We drive change in science and technology to push the boundaries of possibilities. KBR is at the forefront of its industry ready to take on any challenge, anywhere. When it comes to government services – We Deliver.

  1. PURPOSE
    This Statement of Work (SOW) is prepared in accordance with AFCAP (Air Force Contract Augmentation Program) and USG (United States Government) contract standards. It outlines the responsibilities, scope, and deliverables to be provided to KBR under a PMC (Project Management Consultancy) initiative based in Abu Dhabi. The core objective is to deliver advanced business intelligence solutions leveraging Microsoft Power BI to support performance monitoring, operational efficiency, and enterprise-level decision support systems.
  2. SCOPE OF WORK
    The Power BI Specialist shall operate in alignment with USG programmatic and data compliance standards, and will:
    • Design and implement Power BI dashboards that conform to AFCAP and DAFI (Department of the Air Force Instructions) reporting standards.
    • Create dynamic data visualizations tailored to stakeholder-specific KPIs, operational objectives, and federal reporting compliance.
    • Perform ETL operations from structured/unstructured data sources including Microsoft SQL Server, Excel, SharePoint, REST APIs and Azure services.
    601 Jefferson St.
    Houston, TX 7002 USA
    Statement of Work (SOW) Power BI Specialist Support
    Pursuit Number:
    Page | 2
    KBR Proprietary and Confidential
    • Develop scalable data models and calculated measures using DAX and Power Query M code.
    • Implement Row-Level Security (RLS), governance frameworks, and workspace architecture adhering to DoD/USG cybersecurity protocols.
    • Collaborate with project stakeholders, including Program Managers, Contracting Officers, and Data Governance teams.
    • Conduct business requirement workshops and convert functional needs into technical execution plans.
    • Provide knowledge transfer and user training tailored to government and civilian personnel.
    • Document all logic, model relationships, version control, and deployment workflows.
    • Maintain real-time monitoring, performance optimization, and issue resolution.
  3. DELIVERABLES
    • 10+ production-ready interactive Power BI dashboards addressing core operational and contractual KPIs.
    • Fully governed semantic models with reusable DAX measures and optimized relationships.
    • Monthly analytical performance reviews and reporting packages.
    • Training session(s) with tailored content for government personnel (minimum of two live sessions + reference guides).
    • Comprehensive documentation (technical specifications, user manuals, SOPs).
    • Architecture and security compliance checklist validated against USG/AFCAP data requirements.
  4. TIMELINE
    • Project Start Date: April 7, 2025
    • Period of Performance: Six (6) months from start date with an option to extend based on task order continuation or government direction.
    • Milestones:
    • Week 2: Requirements gathering and stakeholder alignment completed.
    • Week 4: Initial deployment of test dashboards to secure environment.
    • Month 2: Go-live of operational dashboards and system integration testing.
    • Quarterly: Government-facing reporting presentation and review cycle.
    601 Jefferson St.
    Houston, TX 7002 USA
    Statement of Work (SOW) Power BI Specialist Support
    Pursuit Number:
    Page | 3
    KBR Proprietary and Confidential
  5. PERSONNEL QUALIFICATIONS
    The assigned Power BI Specialist shall:
    • Hold a Bachelor’s degree in Computer Science, Data Analytics, or equivalent.
    • Have 5+ years of experience with Microsoft Power BI in a government or enterprise environment.
    • Possess expert-level proficiency with DAX, M (Power Query), and advanced data modeling techniques.
    • Be well-versed in U.S. government reporting standards, cybersecurity protocols (e.g., NIST SP 800-53, FedRAMP), and DoD data practices.
    • Have experience with KPI scorecard, RLS implementation, and publishing in Power BI Service/GovCloud.
    • Demonstrate strong communication skills with the ability to brief technical and non-technical audiences.
    • Power BI specialist shall be based on UAE.
  6. CLIENT RESPONSIBILITIES
    • Provide controlled access to secure systems, datasets, and SharePoint environments.
    • Designate an on-site Government Representative or COR (Contracting Officer’s Representative).
    • Ensure support for IT onboarding, data governance briefings, and baseline compliance protocols.
    • Allocate workspace and hardware where on-site presence is required.
  7. INTELLECTUAL PROPERTY & NON-COMPETE
    • Intellectual Property: All dashboards, models, source files, and documentation produced during this engagement shall remain the sole property of KBR and/or the USG.
    • Non-Compete: Consultant shall not engage in similar work for direct competitors of KBR or within overlapping USG projects in the Middle East for a period of 90 months post-termination without written consent.
    • Data Handling: All information handled shall comply with applicable federal, DoD, or KBR-specific data confidentiality policies.
    601 Jefferson St.
    Houston, TX 7002 USA
    Statement of Work (SOW) Power BI Specialist Support
    Pursuit Number:
    Page | 4
    KBR Proprietary and Confidential
  8. TERMINATION CLAUSE
    • KBR may terminate this SOW with labor law written notice.
    • Immediate termination is permissible in the event of:
    • Violation of federal security or confidentiality requirements.
    • Misuse of privileged access or data.
    • Failure to deliver core milestones or demonstrate progress.
    • Upon termination, all government-furnished equipment (GFE) and data must be returned or destroyed per federal data sanitization procedures.
  9. SUBCONTRACT
    All contractual matters, modifications, and billing queries shall be directed to the appointed Subcontract Specialist.

    Ganymede is committed to creating a diverse workforce and is an equal opportunities employer. We welcome applications from all suitably qualified persons regardless of age, disability, gender, marriage and civil partnership, pregnancy and maternity, race, religion or belief, sex, and sexual orientation

Related Jobs

View all jobs

IT Manager

IT Support Engineer

IT Development & Operations Technician Role Profile

Data Architect

IT Operations Assistant

Head of Cyber Security

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs for Non‑Technical Professionals: Where Do You Fit In?

Defence Needs More Than Hackers in Hoodies When headlines warn of ransomware crippling hospitals or deepfakes swaying elections, we picture hoodie‑clad hackers and elite penetration testers. Yet the reality of the UK’s cyber security sector is broader—and desperately short of talent. The Department for Science, Innovation & Technology (DSIT) estimates a shortfall of 11,200 cyber security professionals in 2024, while 43 % of advertised roles require governance, risk or communication skills rather than hands‑on technical exploits. Put plainly: if you can guide policy, manage projects, interpret regulations or inspire behaviour change, cyber security wants you. This guide highlights the fastest‑growing non‑technical roles, the transferable skills you already possess, and a concrete 90‑day plan to land a cyber security job—no packet sniffers required.

BAE Systems Cybersecurity Jobs in 2025: Your Complete UK Guide to Protecting Governments, Businesses and Critical Infrastructure

From securing the Royal Navy’s new Dreadnought submarines to foiling multimillion‑pound fraud rings, BAE Systems Digital Intelligence (DI)—formerly Detica—sits at the sharp end of global cyber defence. Head‑quartered in Guildford with hubs in Gloucester, Leeds and London, the 5,500‑strong DI business delivers threat‑intelligence platforms, secure‑by‑design software and 24/7 SOC services to government and commercial clients worldwide. With escalating ransomware, AI‑driven disinformation and complex supply‑chain threats, BAE plans to expand its UK cyber workforce by 20 % in 2025. Whether you’re a graduate passionate about reverse engineering, a DevSecOps engineer who loves IaC, or an incident‑response pro comfortable in high‑side environments, this guide explains how to land a BAE Systems cybersecurity job in 2025.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.