Required Skills

Storage database application CISSP OSCP CISM

Work Authorization

  • US Citizen

  • Green Card

Preferred Employment

  • Corp-Corp

  • W2-Permanent

  • W2-Contract

  • Contract to Hire

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 26th Dec 2023

JOB DETAIL

Consult on and the Cyber Security Executive Order (EO) full scale end to end security implementation and architecture of all DOL financial system software, hardware, security documentation, polices, processes, procedures and artifacts for compliance with the Federal Cyber Security EO guidance in all areas: Information sharing; Zero Trust Architecture (multifactor authentication, data encryption, cloud adoption, etc.); Software Supply Chain Security; Vulnerability Detection, response and Remediation. Discover, architect and deploy the identified Cyber Security EO solutions. Apply advanced consulting skills, extensive technical expertise, and full industry knowledge to design and architect innovative cyber solutions. Work without considerable direction and mentor and supervise team members.

 

Basic Qualifications:

  • 5+ years of proven experience as a System Architect with experience in development of conceptual and logical architecture
  • Experience developing systems documentation and architecture diagrams with thorough understanding of systems architecture, engineering, administration, configuration, and security procedures
  • Experience defining Business and Solution requirements
  • Experience with designing a Zero Trust Architecture including the implementation of multifactor authentication and data encryption solutions
  • Knowledge and understanding of the Intelligence Community cybersecurity practices
  • Knowledge and understanding of cyber risk management and government policy
  • Familiarity NIST RMF, NIST CSF, DoD 8500, CNSSI Instructions, Cybersecurity Executive Orders, NIST SP 800 Series instructions, and NISPOM
  • Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements
  • Experience collaborating with system administrators, network administrators, and database administrators
  • Knowledge of policy engines

Nice to have:

  • Experience with implementing a Zero Trust architecture
  • Experience with Zeek
  • Experience with Linux
  • Experience with WebLogic
  • Experience with writing and interpreting Suricata IDS rules
  • Experience with malware analysis
  • Experience with Tenable.sc, Nessus, and Burp Suite
  • Experience scripting in PowerShell, bash, or python
  • Experience with JSON and YAML
  • CISSP, OSCP, CISM or CISA Certification

Company Information