Home

USC or GC Only: Cyber Security Architect - Remote at Remote, Remote, USA
Email: [email protected]
From:

Srikanth,

Shrive Technologies

[email protected]

Reply to:   [email protected]

*Cyber Architect*

Remote

Cyber Architect for the Data Encryption Implementation, primarily to assist with solutions as well as create and finalize the designs for each technology stack (Storage, database, application, etc.).

Key Role:

Consult on and the Cyber Security Executive Order (EO) full scale end to end security implementation and architecture of all DOL financial system software, hardware, security documentation, polices, processes, procedures and artifacts for compliance with the Federal Cyber Security EO guidance in all areas: Information sharing; Zero Trust Architecture (multifactor authentication, data encryption, cloud adoption, etc.); Software Supply Chain Security; Vulnerability Detection, response and Remediation. Discover, architect and deploy the identified Cyber Security EO solutions. Apply advanced consulting skills, extensive technical expertise, and full industry knowledge to design and architect innovative cyber solutions. Work without considerable direction and mentor and supervise team members.

Basic Qualifications:

5+ years of proven experience as a System Architect with experience in development of conceptual and logical architecture

Experience developing systems documentation and architecture diagrams with thorough understanding of systems architecture, engineering, administration, configuration, and security procedures

Experience defining Business and Solution requirements

Experience with designing a Zero Trust Architecture including the implementation of multifactor authentication and data encryption solutions

Knowledge and understanding of the Intelligence Community cybersecurity practices

Knowledge and understanding of cyber risk management and government policy

Familiarity NIST RMF, NIST CSF, DoD 8500, CNSSI Instructions, Cybersecurity Executive Orders, NIST SP 800 Series instructions, and NISPOM

Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements

Experience collaborating with system administrators, network administrators, and database administrators

Knowledge of policy engines

Nice to have:

Experience with implementing a Zero Trust architecture

Experience with Zeek

Experience with Linux

Experience with WebLogic

Experience with writing and interpreting Suricata IDS rules

Experience with malware analysis

Experience with Tenable.sc, Nessus, and Burp Suite

Experience scripting in PowerShell, bash, or python

Experience with JSON and YAML

CISSP, OSCP, CISM or CISA Certification

Keywords: South Carolina
[email protected]
View all
Fri Dec 22 21:28:00 UTC 2023

To remove this job post send "job_kill 961995" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 0

Location: ,