

5+ years of experience with leading cyber and information security management and processes, including Plan of Action and Milestones, Risk Management Framework, and Authority to Operate Join our team as we improve warfighter communications through cybersecurity. You’ll be able to broaden your skillset into areas like prototyping, using multiple techniques and new technologies while building piece of mind in a critical infrastructure. Your technical expertise will be vital as you help customers overcome their most difficult challenges by integrating secure practices like cloud-based security and other cloud-based solutions while developing critical systems for our defense client. This is a chance to make a difference in the security of warfighter communications. You’ll lead the team through a critical approach to network design, providing alternatives and customizing solutions, to maintain a balance of security and mission needs. We need to come up with the best solution, so you’ll investigate new techniques, break free from the legacy model, and go where the industry is going. You’ll coordinate work with system development SMEs, migration teams, and cloud architects to identify the right mix of tools and techniques to translate your customer’s IT needs and future goals into a plan that will enable secure and effective solutions.

What if you could use your Cybersecurity Professional skills to design and build secure systems for DoD Cyber? We’re looking for a Cybersecurity Professional who can create solutions for a DoD Cyber client that will stand up to even the most advanced cyber threats.Īs a Cybersecurity Professional on our project, you’ll support efforts to help the DevSecOps security, infrastructure, and system operations administrative support Team with performing onsite DevSecOps integration, maintenance, architecture integration, troubleshooting, security, configuration management, and onboarding of various software and development teams. You can identify and implement ways to harden systems and reduce their attack surface. Everyone knows security needs to be “baked in” to a system architecture, but you actually know how to bake it in.
