Required Skills

Storage database application

Work Authorization

  • US Citizen

  • Green Card

  • EAD (OPT/CPT/GC/H4)

  • H1B Work Permit

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 22nd Dec 2023

JOB DETAIL

Consult on and the Cyber Security Executive Order (EO) full scale end to end security implementation and architecture of all DOL financial system software, hardware, security documentation, polices, processes, procedures and artifacts for compliance with the Federal Cyber Security EO guidance in all areas: Information sharing; Zero Trust Architecture (multifactor authentication, data encryption, cloud adoption, etc.); Software Supply Chain Security; Vulnerability Detection, response and Remediation. Discover, architect and deploy the identified Cyber Security EO solutions. Apply advanced consulting skills, extensive technical expertise, and full industry knowledge to design and architect innovative cyber solutions. Work without considerable direction and mentor and supervise team members.

 

 

Basic Qualifications:

 

5+ years of proven experience as a System Architect with experience in development of conceptual and logical architecture

 

Experience developing systems documentation and architecture diagrams with thorough understanding of systems architecture, engineering, administration, configuration, and security procedures

 

Experience defining Business and Solution requirements

 

Experience with designing a Zero Trust Architecture including the implementation of multifactor authentication and data encryption solutions

 

Knowledge and understanding of the Intelligence Community cybersecurity practices

 

Knowledge and understanding of cyber risk management and government policy

 

Familiarity NIST RMF, NIST CSF, DoD 8500, CNSSI Instructions, Cybersecurity Executive Orders, NIST SP 800 Series instructions, and NISPOM

 

Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements

 

Experience collaborating with system administrators, network administrators, and database administrators

 

Knowledge of policy engines

 

Bachelor's degree

 

 

Nice to have:

 

Experience with implementing a Zero Trust architecture

 

Experience with Zeek

 

Experience with Linux

 

Experience with WebLogic

 

Experience with writing and interpreting Suricata IDS rules

 

Experience with malware analysis

 

Experience with Tenable.sc, Nessus, and Burp Suite

 

Experience scripting in PowerShell, bash, or python

 

Experience with JSON and YAML

 

CISSP, OSCP, CISM or CISA Certification

Company Information