Apply for this Job
For further inquiries regarding the following opportunity, please contact one of our Talent SpecialistsMohamed Varsha Title: Cybersecurity Architect (Level 4 to Level 6)Duration: 18 months (with possible extension of 1 more year)Location: Amarillo, Texas (Remote)Remote - Traveling to Office location occasionally, and the client will pay expenses for the travel Candidates must have Security Clearance L-Secret required and Q-TS desiredDescription:Requirement Parameters: - Responsible for the overall design and development of secure enterprise security systems that support enterprise mission needs.
- Document and address information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition life cycle.
- Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines.
- Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.
- Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.
- Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents.
- Determine the security controls for the information system(s) and network(s) and document appropriately.
- Develop Enterprise Information Technology (IT) requirements that describes baseline and target systems involving cybersecurity and privacy principles.
- Skilled in managing, testing, and implementing current security architectures for operating systems, networks, cybersecurity analysis tools and related IT systems.
- Involved in a wide range of cybersecurity areas, including system architectures, firewalls, inspection and analysis tools, encryption components and networking architectures. Involved in security reporting and analysis to regulatory agencies.
- Identify systemic security issues based on the analysis of vulnerability and configuration data; apply secure system design tools, methods and techniques.
- Conduct vulnerability scans and recognize vulnerabilities in security systems.
- Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation
Date Posted: 07 April 2025
Apply for this Job