Peraton
Cybersecurity Solution Architect
Peraton, Doral, Florida, United States,
ResponsibilitiesPeraton will deliver a broad spectrum centralized IT infrastructure, services, and processes to include Cybersecurity Task Order (CTO) compliance activities for the USSOUTHCOM networks to include three enduring Joint Task Forces (JTFs) and multiple Security Cooperation Office(s) (SCO). Our team will provide support to continuously evolve and leverage the latest technologies and best practices to rapidly refresh capabilities and ensure platforms and intelligence operations are optimized to support the SOUTHCOM missions. Peraton will ensure that all required capabilities meeting the USSOUTHCOM’s mission and those of its various mission partners, to include, but not limited to, other DoD organizations, other U.S. Federal and state government agencies, and foreign government military and non-military mission partners.
As the Cybersecurity Solution Architect you will provide guidance & support in the translation of Desired Functional/Technical/Operational Outcomes into actionable/deliverable requirements.
Define/Maintain Cybersecurity compliance Guidelines/Models across the Enterprise (DAO SOUTHCOM)
Understand, Communicate & Translate Cybersecurity Reengineering needs driven by Zero Trust transformation
Develop the End State Cybersecurity "Security Reference Architecture" IAW Application, Data, & Technology Architectures
Suggest, Monitor & Apply Cybersecurity Design & Deployment ‘Best Practice’ to DOA SOUTHCOM, USANEC, J6-5 (Office of the CIO)
Cybersecurity Guru, that is able to interpret DoD Zero Trust Strategy, Use Cases, Application Pillars/Capabilities/Activities etc. and adapt to/with the DAO SOUTHCOM Technologies, Processes, etc.
Develop & Maintain Cybersecurity Models / Maps / Deliverables
Collaborate w/ All Solution Architects, the Enterprise Architect, Functional & Technical SME’s (Military, Govt. & Contractors) & the PIE (Projects, Integration & Engineering) & JDOC Teams
Job Description
Identifies solutions based on business and technical criteria, analyzes alternatives based on trade space, and implements designs
Experienced with on-prem, cloud, hybrid-cloud enablement of "Cybersecurity" and able to make recommendations to SOUTHCOM decision makers
Research current and emerging Cybersecurity methodologies/frameworks (ZTA) and proposes changes and tailoring where needed
Assesses the architectures currently in place and works with staff to recommend improvements
Develops, enhances, and maintains established service design procedure and processes by applying Cybersecurity frameworks and methodologies
Prepares and presents training plans, test plans, presentations, and analyst briefings
Identifies customer Cybersecurity requirements, analyzes alternatives, and conducts recommendations related to organizational change management (Jobs/Roles/Responsibilities), applications, data/resource mappings, etc.
May coach and provide guidance to less-experienced technical professionals, as well as 'project managers' in the PIE Services Team (especially those in the DevSecOps software factory)
Recognized as a Subject Matter Expert in Cybersecurity architecture
QualificationsRequired Skills and Experience
Top Secret/SCI Clearance
15+ years' experience of large-scale Enterprise Cloud Architecture, Design, and Mobilization within a DoD/Military or other State or Federal government environment.
Bachelor's degree in information systems, Computer Science, Computer Engineering, or other related field (6 Additional years of applicable experience may be substituted for a BS, AS plus 4 years applicable experience may be substituted for BS)
Desired Cybersecurity Background: IT/DoD/Cybersecurity Domains including:
Security Management Practices;
Access Control Systems and Methodology;
Telecommunications and Networking Security;
Cryptography; Encryption
Security Architecture and Models;
Operations Security;
Application and Systems Development Security;
Physical Security;
Business Continuity and Disaster Recovery Planning; and
Laws, Investigation, and Ethics.
Ideal Candidate will have any/all of the following:
industry experience (Aerospace & Defense, Automotive, High Tech, Regulated Industries)
agency/component experience (DoD, Federal, State and/or Local Govt.)
Defense Federal Acquisition Regulation Supplement (DFARS) —
Clause 252.204-7012 outlines the expectations for cyber hygiene for DIB organizations.
NIST 800-171 —
Based on DFARS, NIST 800-171 provides detailed guidelines for companies to assess their cybersecurity practices.
CMMC —
The CMMC provides a clear plan for DIB organizations to attain the cyber hygiene certification required to be an approved DoD vendor.
Desired Certifications (any/all): CompTIA Network, CompTIA Security, EC-Council Certified Ethical Hacker, CompTIA CASP, ISC(2) CISSP
Peraton OverviewPeraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.
Target Salary Range$135,000 - $216,000. This represents the typical salary range for this position based on experience and other factors.
#J-18808-Ljbffr
As the Cybersecurity Solution Architect you will provide guidance & support in the translation of Desired Functional/Technical/Operational Outcomes into actionable/deliverable requirements.
Define/Maintain Cybersecurity compliance Guidelines/Models across the Enterprise (DAO SOUTHCOM)
Understand, Communicate & Translate Cybersecurity Reengineering needs driven by Zero Trust transformation
Develop the End State Cybersecurity "Security Reference Architecture" IAW Application, Data, & Technology Architectures
Suggest, Monitor & Apply Cybersecurity Design & Deployment ‘Best Practice’ to DOA SOUTHCOM, USANEC, J6-5 (Office of the CIO)
Cybersecurity Guru, that is able to interpret DoD Zero Trust Strategy, Use Cases, Application Pillars/Capabilities/Activities etc. and adapt to/with the DAO SOUTHCOM Technologies, Processes, etc.
Develop & Maintain Cybersecurity Models / Maps / Deliverables
Collaborate w/ All Solution Architects, the Enterprise Architect, Functional & Technical SME’s (Military, Govt. & Contractors) & the PIE (Projects, Integration & Engineering) & JDOC Teams
Job Description
Identifies solutions based on business and technical criteria, analyzes alternatives based on trade space, and implements designs
Experienced with on-prem, cloud, hybrid-cloud enablement of "Cybersecurity" and able to make recommendations to SOUTHCOM decision makers
Research current and emerging Cybersecurity methodologies/frameworks (ZTA) and proposes changes and tailoring where needed
Assesses the architectures currently in place and works with staff to recommend improvements
Develops, enhances, and maintains established service design procedure and processes by applying Cybersecurity frameworks and methodologies
Prepares and presents training plans, test plans, presentations, and analyst briefings
Identifies customer Cybersecurity requirements, analyzes alternatives, and conducts recommendations related to organizational change management (Jobs/Roles/Responsibilities), applications, data/resource mappings, etc.
May coach and provide guidance to less-experienced technical professionals, as well as 'project managers' in the PIE Services Team (especially those in the DevSecOps software factory)
Recognized as a Subject Matter Expert in Cybersecurity architecture
QualificationsRequired Skills and Experience
Top Secret/SCI Clearance
15+ years' experience of large-scale Enterprise Cloud Architecture, Design, and Mobilization within a DoD/Military or other State or Federal government environment.
Bachelor's degree in information systems, Computer Science, Computer Engineering, or other related field (6 Additional years of applicable experience may be substituted for a BS, AS plus 4 years applicable experience may be substituted for BS)
Desired Cybersecurity Background: IT/DoD/Cybersecurity Domains including:
Security Management Practices;
Access Control Systems and Methodology;
Telecommunications and Networking Security;
Cryptography; Encryption
Security Architecture and Models;
Operations Security;
Application and Systems Development Security;
Physical Security;
Business Continuity and Disaster Recovery Planning; and
Laws, Investigation, and Ethics.
Ideal Candidate will have any/all of the following:
industry experience (Aerospace & Defense, Automotive, High Tech, Regulated Industries)
agency/component experience (DoD, Federal, State and/or Local Govt.)
Defense Federal Acquisition Regulation Supplement (DFARS) —
Clause 252.204-7012 outlines the expectations for cyber hygiene for DIB organizations.
NIST 800-171 —
Based on DFARS, NIST 800-171 provides detailed guidelines for companies to assess their cybersecurity practices.
CMMC —
The CMMC provides a clear plan for DIB organizations to attain the cyber hygiene certification required to be an approved DoD vendor.
Desired Certifications (any/all): CompTIA Network, CompTIA Security, EC-Council Certified Ethical Hacker, CompTIA CASP, ISC(2) CISSP
Peraton OverviewPeraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.
Target Salary Range$135,000 - $216,000. This represents the typical salary range for this position based on experience and other factors.
#J-18808-Ljbffr