Cyber Architect || Remote || 10+ years || ONLY USC/GC at Remote, Remote, USA |
Email: [email protected] |
Greetings from ICONIC Infosys Inc !! ICONIC Infosys Inc is an IT Development & IT Staffing firm with more than a decade of experience in providing IT Staffing Solutions & Services. Our expertise is in sourcing and deploying highly skilled IT Specialists into mainstream and niche technologies to meet clients Temporary, Permanent & SOW project needs. Role : Cyber Architect Location: Remote Duration: Long term Visa- ONLY USC/GC Job Description: Cyber Architect for the Data Encryption Implementation, primarily to assist with solutions as well as create and finalize the designs for each technology stack (Storage, database, application, etc.). Key Role: Consult on and the Cyber Security Executive Order (EO) full scale end to end security implementation and architecture of all DOL financial system software, hardware, security documentation, polices, processes, procedures and artifacts for compliance with the Federal Cyber Security EO guidance in all areas: Information sharing; Zero Trust Architecture (multifactor authentication, data encryption, cloud adoption, etc.); Software Supply Chain Security; Vulnerability Detection, response and Remediation. Discover, architect and deploy the identified Cyber Security EO solutions. Apply advanced consulting skills, extensive technical expertise, and full industry knowledge to design and architect innovative cyber solutions. Work without considerable direction and mentor and supervise team members. Basic Qualifications: 5+ years of proven experience as a System Architect with experience in development of conceptual and logical architecture Experience developing systems documentation and architecture diagrams with thorough understanding of systems architecture, engineering, administration, configuration, and security procedures Experience defining Business and Solution requirements Experience with designing a Zero Trust Architecture including the implementation of multifactor authentication and data encryption solutions Knowledge and understanding of the Intelligence Community cybersecurity practices Knowledge and understanding of cyber risk management and government policy Familiarity NIST RMF, NIST CSF, DoD 8500, CNSSI Instructions, Cybersecurity Executive Orders, NIST SP 800 Series instructions, and NISPOM Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements Experience collaborating with system administrators, network administrators, and database administrators Knowledge of policy engines Bachelor's degree Nice to have: Experience with implementing a Zero Trust architecture Experience with Zeek Experience with Linux Experience with WebLogic Experience with writing and interpreting Suricata IDS rules Experience with malware analysis Experience with Tenable.sc, Nessus, and Burp Suite Experience scripting in PowerShell, bash, or python Experience with JSON and YAML CISSP, OSCP, CISM or CISA Certification Best Regards , Sai Krishna Technical Recruiter Email: [email protected] www.iconicinfosys.com -- To post to this group, send email to [email protected]. Keywords: information technology green card South Carolina |
[email protected] View all |
Fri Dec 22 20:51:00 UTC 2023 |