• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Jobs » Federal-Cyber Security Architect: 6 – 12 Month Contract Job

Federal-Cyber Security Architect: 6 – 12 Month Contract Job

2021-06-10 by Geo

Los Angeles CA

Federal-Cyber Security Architect: 6 – 12 Month Contract – CDW Company Location Los Angeles, CA

The Cyber Security Architect for the position is responsible for the creation, consultation, and ongoing assessment and authorization (A&A) documentation in compliance with Federal Cybersecurity policies and guidelines including DoD 8500, FISMA, and NIST 800-53 controls. Additionally, the Cyber Security Architect will evaluate information assurance compliance and coordinate program security documentation for various Federal customers.

The Cyber RMF Architect is an industry-recognized thought leader that has mastered multiple NIST/RMF practices. Provides insight and expertise on key solutions to best position CDWG’s approach, preparation, and delivery of new and emerging solutions.

READ Highest Paying Cyber Security Jobs

Motley Fool Stock Advisor

Key Responsibilities

  • Serves as a subject matter expert to advise for RMF packages, strategies, and technical components to ensure compliance of NIST 800-53 security controls.
  • Serves in a technical leadership role that includes consulting on systems and their plans, design, development, implementation of projects focused on Cyber Security.
  • Perform Certification & Accreditation (C&A), System Assessment & Authorization (SA&A) as part of NIST SP 800 Risk Management Framework (RMF) system and application accreditation
  • Prepare Vulnerability Scanning test plans, coordinate testing, and conduct scans using Nessus, Foundstone, WebInspect, Hailstorm and other scan applications
  • Analyze vulnerability scan results for validation and root cause
  • Perform security system event analysis, investigation, and validation
  • Provide incident response to classification spills, malware infection, misconfiguration exposure, internal inappropriate behavior and technical issue
  • Perform Independent Security Assessment and Reporting (ISAR) as part of application System Development Lifecycle (SDLC)
  • Participate in Lifecycle Management (LCM) Technical Change Control Boards (TCCB) providing technical guidance for security control compliance
  • Participate in Security Architecture Review Boards as part of security system Operations & Management (O&M) sustainment and architecture enhancement
  • Task, track and mitigate Plan of Action & Milestones (POA&M) vulnerability scan and security assessment findings requiring mitigation.
  • Privileged User Account Management and Role-Based Access assignment
  • Privacy Threshold Assessment (PTA) and Privacy Impact Assessment (PIA) as part of Personal Identifiable Information (PII) Management
  • Develop security artifacts to support the IA program to include System Security Plans (SSP), Security Assessment Reports (SAR), Risk Assessment Reports (RAR), Security Control Traceability Matrix (SCTM), Plan of Action and Milestones (POA&M), System Design and Installation Procedures, System User Guides, Privileged User Guides, Security Test Procedures and other documents as needed.
  • Support systems through all steps of RMF and enable Gov Client to achieve and or maintain authorities.
  • Review vulnerability scan results at the operating system (OS) and application level and work with stakeholders to architect and implement mitigations.
  • Promotes a culture of knowledge sharing and collaboration by organizing knowledge bases, contributing regularly, and encouraging team members to contribute.
  • Coaches and mentors team members to improve their technical, consulting, and sales skills.
  • Conducts technical assessment and expertise evaluations for candidate selection process.
  • Advises team members and sales prior to customer calls and/or sales strategy session on Course of Action (COA) decisions among competing technologies and solutions
  • Regularly creates forward-thinking thought leadership deliverables (e.g., external monthly blog posts, internal technical strategy documents); provides insight into emerging technical trends affecting CDWG’s portfolio; regularly contributes to major industry publications and/or speaks at national conferences
  • Manages competing priorities and sets expectations with sales and other stakeholders through proactive communication, planning, and potential for return on investment.
  • Leads the development of Bills of Materials, Statements of Work, RPFs, RFIs, and proposal content for cross-technology solutions with high levels of accuracy and quality.

READ 5 Reasons Why Cyber Security Certification Is Worth It

Minimum Qualifications

  • Bachelor’s degree in Computer Science, a related technical degree or equivalent years of relevant military service
  • 8 years of Information Assurance/Cyber experience
  • 8 years of Federal and/or DoD experience
  • DoD/OPM Secret or Top-Secret Clearance w/ SCI eligibility
  • DoD 8570 level II IAT Level III (example: CISSP or equivalent).

Our Most Popular Cyber Security Training Courses

  • Google Cloud Security
  • Google Cloud Networking
  • Introduction to Cybersecurity Tools & Cyber Attacks
  • Linux Security
  • Cyber Security 10 Domains
  • IBM Fundamentals
  • AWS Cloud Native

Other Requirements

  • Familiarity with Defense Information Systems Agency (DISA) Secure Technical Implementation Guidelines (STIGs)
  • Experience with remediating identified Information Assurance Vulnerability Alerts (IAVAs) within DoD systems
  • Strong organizational skills and excellent attention to details.
  • Abilities to work independently and to manage time effectively.
  • Effective communication skills with an appreciation for the appropriate ways to interact with managers, coworkers, customers and vendors
  • Willing to travel, 25% – 50% between the Los Angeles area and Washington, DC
  • Contractor/1099 based role, POP 6 – 12 months

Preferred Qualifications

  • Ability to work off-hours as necessary to meet clients’ needs
  • Desirable: Security+, CEH, Linux+, AWS Certs, Redhat
  • Proven implementation and maintenance experience with Splunk and Elastic
  • Knowledge of compliance standards for the organization to include NIST 800-53 controls, RMF, 800-53, FEDRAMP, agency-specific requirements and emerging IC/DoD polices for Cyber Security with a particular focus on Cross Domain Solutions
LinkedIn Apply
Apply on LinkedIn

Filed Under: Jobs

About Geo

Geo Dvorak has experience in the privacy space, with a focus on highlighting the growing market for privacy professionals. He joined the Ask Cyber team to handle the jobs board.


Twitter

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version