Job Description :
Job Description:
Leads in securing enterprise information, systems, and development by developing and/or reviewing security requirements; planning, designing, and reviewing business and security systems; creates architectural artifacts; provides standards and governance oversight for the enterprise. Leads and participates in discovery efforts related to the introduction of new technologies. Defines security standards and leads in the use and adoption of frameworks that align with overall business and technology strategy. Maintain and update architecture systems of record. Participate and guide engineering and other subject matter experts on best practices.
Leads in the governance and interpretation of architectural standards, design concepts, and frameworks. Monitors industry security updates, technologies, emerging threats, and best practices to improve security management. Designs and collaborates on solutions that balance business requirements with information and security requirements for both internal and client systems. Identifies security design gaps in existing and proposed architectures and recommend changes or enhancements to existing processes or systems.

This Opportunity is for Full-Time Employment(FTE

Requirement:
Security Clearance: TS/SCI required.
BS 8+ years; 4 years experience in lieu of degree
At least 8 years of experience. CISSP certified. Expert knowledge of the IT cybersecurity-related Federal and Department directives policies and provide guidance/assistance to the Government in meeting those policies and directives.
Following the Handbook for Information Assurance Cyber Security Policy OCIO-01 for identification and mitigation of security risks or incidents on Systems Security POAM (Plan of Action and Milestone) management process to closure.
Maintenance of systems Authority-to-Operate (ATO) status clients Security Incident response that complies with the Handbook for Cybersecurity
Incident Response and Reporting OCIO-14.
Integrating clients FISMA security experience (e.g. 2-Factor-Authentication (2FA), Certification and Accreditation (C&A), Security controls, Plan of Action and Milestones (POA&M) resolution and management, etc system into FedRamp approved the hosting system.

Client : ThirdEye's direct Client.