USC or GC Only: Cyber Architect - Remote at Remote, Remote, USA |
Email: [email protected] |
From: Srikanth, Shrive Technologies [email protected] Reply to: [email protected] *Cyber Architect* Remote Cyber Architect for the Data Encryption Implementation, primarily to assist with solutions as well as create and finalize the designs for each technology stack (Storage, database, application, etc.). Key Role: Consult on and the Cyber Security Executive Order (EO) full scale end to end security implementation and architecture of all DOL financial system software, hardware, security documentation, polices, processes, procedures and artifacts for compliance with the Federal Cyber Security EO guidance in all areas: Information sharing; Zero Trust Architecture (multifactor authentication, data encryption, cloud adoption, etc.); Software Supply Chain Security; Vulnerability Detection, response and Remediation. Discover, architect and deploy the identified Cyber Security EO solutions. Apply advanced consulting skills, extensive technical expertise, and full industry knowledge to design and architect innovative cyber solutions. Work without considerable direction and mentor and supervise team members. Basic Qualifications: 5+ years of proven experience as a System Architect with experience in development of conceptual and logical architecture Experience developing systems documentation and architecture diagrams with thorough understanding of systems architecture, engineering, administration, configuration, and security procedures Experience defining Business and Solution requirements Experience with designing a Zero Trust Architecture including the implementation of multifactor authentication and data encryption solutions Knowledge and understanding of the Intelligence Community cybersecurity practices Knowledge and understanding of cyber risk management and government policy Familiarity NIST RMF, NIST CSF, DoD 8500, CNSSI Instructions, Cybersecurity Executive Orders, NIST SP 800 Series instructions, and NISPOM Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements Experience collaborating with system administrators, network administrators, and database administrators Knowledge of policy engines Nice to have: Experience with implementing a Zero Trust architecture Experience with Zeek Experience with Linux Experience with WebLogic Experience with writing and interpreting Suricata IDS rules Experience with malware analysis Experience with Tenable.sc, Nessus, and Burp Suite Experience scripting in PowerShell, bash, or python Experience with JSON and YAML CISSP, OSCP, CISM or CISA Certification Keywords: South Carolina |
[email protected] View all |
Fri Dec 22 00:44:00 UTC 2023 |