Cybersecurity Solution Architect - Peraton
Doral, FL
About the Job
Responsibilities
Peraton will deliver a broad spectrum centralized IT infrastructure, services, and processes to include Cybersecurity Task Order (CTO) compliance activities for the USSOUTHCOM networks to include three enduring Joint Task Forces (JTFs) and multiple Security Cooperation Office(s) (SCO). Our team will provide support to continuously evolve and leverage the latest technologies and best practices to rapidly refresh capabilities and ensure platforms and intelligence operations are optimized to support the SOUTHCOM missions. Peraton will ensure that all required capabilities meeting the USSOUTHCOM’s mission and those of its various mission partners, to include, but not limited to, other DoD organizations, other U.S. Federal and state government agencies, and foreign government military and non-military mission partners.
As the Cybersecurity Solution Architect you will provide guidance & support in the translation of Desired Functional/Technical/Operational Outcomes into actionable/deliverable requirements
- Define/Maintain Cybersecurity conpliance Guidelines/Models across the Enterprise (DAO SOUTHCOM)
- Understand, Communicate & Translate Cybersecurity Reengineering needs driven by Zero Trust transformation
- Develop the End State Cybersecurity "Security Reference Architecture" IAW Application , Data, & Technology Architectures
- Suggest, Monitor & Apply Cybersecurity Design & Deployment ‘Best Practice’ to DOA SOUTHCOM, USANEC, J6-5 (Office of the CIO)
- Cybersecurity Guru, that is able to interpret DoD Zero Trust Strategy, Use Cases, Application Pillars/Capabilities/Activities etc. and adapt to/with the DAO SOUTHCOM Technologies, Processes, etc.
- Develop & Maintain Cybersecurity Models / Maps / Deliverables
- Collaborate w/ All Solution Architects, the Enterprise Architect, Functional & Technical SME’s (Military, Govt. & Contractors) & the PIE (Projects, Integration & Engineering) & JDOC Teams
Job Description
- Identifies solutions based on business and technical criteria, analyzes alternatives based on trade space, and implements designs
- Experienced with on-prem, cloud, hybrid-cloud enablement of "Cybersecurity" and able to make recommendations to SOUTHCOM decision makers
- Research current and emerging Cybersecurity methodologies/frameworks (ZTA) and proposes changes and tailoring where needed
- Assesses the architectures currently in place and works with staff to recommend improvements
- Develops, enhances, and maintains established service design procedure and processes by applying Cybersecurity frameworks and methodologies
- Prepares and presents training plans, test plans, presentations, and analyst briefings
- Identifies customer Cybersecurity requirements, analyzes alternatives, and conducts recommendations related to organizational change management (Jobs/Roles/Responsibilities), applications, data/resource mappings, etc.
- May coach and provide guidance to less-experienced technical professionals, as well as 'project managers' in the PIE Services Team (especially those in the DevSecOps software factory)
- Recognized as a Subject Matter Expert in Cybersecurity architecture
Qualifications
Required Skills and Experience *
-
- Top Secret/SCI Clearance
- 15+ years' experience of large-scale Enterprise Cloud Architecture, Design, and Mobilization within a DoD/Military or other State or Federal government environment.
- Bachelor's degree in information systems, Computer Science, Computer Engineering, or other related field (6 Additional years of applicable experience may be substituted for a BS, AS plus 4 years applicable experience may be substituted for BS)
Desired Cybersecurity Background: IT/DoD/Cybersecurity Domains including:
- Security Management Practices;
- Access Control Systems and Methodology;
- Telecommunications and Networking Security;
- Cryptography; Encryption
- Security Architecture and Models;
- Operations Security;
- Application and Systems Development Security;
- Physical Security;
- Business Continuity and Disaster Recovery Planning; and
- Laws, Investigation, and Ethics.
Ideal Candidate will have any/all of the following:
- industry experience (Aerospace & Defense, Automotive, High Tech, Regulated Industries)
- agency/component experience (DoD, Federal, State and/or Local Govt.)
- Defense Federal Acquisition Regulation Supplement (DFARS) — Clause 252.204-7012 outlines the expectations for cyber hygiene for DIB organizations.
- NIST 800-171 — Based on DFARS, NIST 800-171 provides detailed guidelines for companies to assess their cybersecurity practices.
- CMMC — The CMMC provides a clear plan for DIB organizations to attain the cyber hygiene certification required to be an approved DoD vendor.
Desired Certifications (any/all): CompTIA Network, CompTIA Security, EC-Council Certified Ethical Hacker, CompTIA CASP, ISC(2) CISSP
#Southcom
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.