Tactical Security Architect

Greenville, Texas

Insight Global
Apply for this Job
Job Description

An employer in the Greenville, TX market is looking for a Security Architect to join their team. The role of a Security Architect is akin to that of an Infrastructure Architect, but with a specialized emphasis on cybersecurity.

Key Responsibilities:

Trend Analysis and Threat Detection: Analyze and understand emerging trends in threats and threat detection.

Cybersecurity Baseline Requirements: Define the cybersecurity baseline requirements for the program and support funding activities for these requirements.

Legacy System Adaptation: Adapt legacy implementations to address current and emerging threats, ensuring an appropriate security posture.

Security Deployment Guidelines: Establish guidelines for the efficient and effective deployment of security practices within a DoD AF information management system.

Body of Evidence Guidelines: Create guidelines for the efficient and effective collection and generation of the Body of Evidence necessary to attain an Authority to Operate (ATO) aligned with DoD and AF regulations, with regular reviews and updates.

Software Update Guidelines: Set update guidelines for commercial and open-source software and third-party packages to maintain a current security posture, including regular reviews and approvals of software updates and patches.

Collaboration with Compliance and Vulnerability Teams: Collaborate closely with the compliance and vulnerability teams to establish program benchmarks and standards that meet delivery milestones, with regular communication and coordination meetings to ensure alignment and progress.

Training and Awareness Programs: Provide training and awareness programs for the Engineering organization and relevant functions to promote a security-conscious culture.

Continuous Improvement Process: Implement a continuous improvement process for security to enhance efficiency and reduce costs.

Cross-Departmental Communication: Facilitate cross-departmental communication to address security concerns and implement best practices.

Third-Party Agreements: Ensure that third-party agreements, such as sub-contracts, include appropriate security requirements and compliance measures. For example, specify the minimum OS or container build environment and include Fortify, Tivey, and Nessus scan results as contract deliverables.

We are a company committed to creating inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity employer that believes everyone matters. Qualified candidates will receive consideration for employment opportunities without regard to race, religion, sex, age, marital status, national origin, sexual orientation, citizenship status, disability, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to . The EEOC "Know Your Rights" Poster is available here .

To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: .

Skills and Requirements

Bachelors degree in Information Systems or related field

10+ years of experience in the cyber security information systems industry

Secret Clearance, with ability to obtain a Top Secret and willingness to obtain a Polygraph

Certified Information Systems Security Professional (CISSP)

Experience in administering and managing Tenable Security Center in a complex environment

In-depth understanding of ACAS (Assured Compliance Assessment Solution) requirements and best practices for vulnerability management and compliance

Experience with risk management framework based on NIST 800-53 documentation

Ability to manage ATO (Authority to Operate) processes

Solid understanding of networking

Experience with Trend Analysis and Threat Detection

Experience with Xacta Air Force policy experience

Anti-tamper experience

Additional certifications in specific technologies (e.g., hyperconverged infrastructure, Kubernetes, operating systems) null

We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal employment opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment without regard to race, color, ethnicity, religion,sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military oruniformed service member status, or any other status or characteristic protected by applicable laws, regulations, andordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or the recruiting process, please send a request to .

Date Posted: 10 May 2025
Apply for this Job