Cloud Architect Security Clearance
Job in
Chantilly, Fairfax County, Virginia, 20151, USA
Listed on 2025-11-04
Listing for:
Convirgence
Full Time
position Listed on 2025-11-04
Job specializations:
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant, Network Security
Job Description & How to Apply Below
STAR 2259 Cloud Architect Position Requires ACTIVE TS/SCI Clearance with Polygraph Chantilly The maximum number of FTEs is two (2). Actual FTE bid, labor category, and skill level is at the discretion of the Contractor. INTRODUCTION:
The Sponsor supports a diverse set of corporate goals across the organization by conducting technical risk assessments and providing technical risk mitigation guidance on the use of various enabling technologies. The Sponsor requires subject matter expertise in technical risk analysis of enterprise and mission systems, IT systems and networks, mobile and wireless networks, cloud-based computing, network management platforms, communication protocols, scripting or programming products, configuration scripts, and IT hardware and software products in support of Sponsor's technical risk assessment activities.
The Sponsor also requires software development to maintain an online infrastructure, evaluating and extracting relevant data, web development, and software coding. WORK REQUIREMENTS:
Contractor Support; HHR;
Yes The Contractor shall perform technical risk assessments and provide technical risk mitigation guidance on the use of various enabling technologies. The Contractor shall gather Body of Evidence (BOE) and assess artifacts, such as CONOPS, use cases, detailed network diagrams, technical design details, procurement methods, and System Security Plan (SSP) to get a holistic view of the interworking parts of a given technology implementation being evaluated, from which real insights can be derived to inform risk assessor's judgement.
The Contractor shall apply consistent and systematic investigative practices to comprehensively assess risks, identify and characterize threats and vulnerabilities. The Contractor shall evaluate system or network operations using network management platforms, network scanning tools, auditing functions, PCAP captures, and log reviews. The Contractor shall analyze system, network, or cloud configurations for mis-configured settings, configurations not required for deployment, removal of test scripts to minimize the configuration to fulfill the specific deployment.
The Contractor shall analyze hardware and software used in a system or network for origin of manufacturer, known vulnerabilities, outdated hardware or software. The Contractor shall remain current with existing and future technologies to assist the Sponsor with identifying associated risks of implementing proposed technologies. The Contractor shall provide guidance of potential cyber threats, attacks, and exploitations and advise decision-makers of the inherent risks and mitigation to the Sponsor's equities.
The Contractor shall ensure appropriate risk mitigation considerations are baked in early in the development cycle, and risks and vulnerabilities are well understood and appropriately mitigated. The Contractor shall organize and schedule work to effectively manage a case load The Contractor shall track, document, and communicate progress status updates and weekly status updates on all technical risk assessment reports, cases describing potential security concerns and mitigations to enhance security posture.
Software Development; HRR;
Yes The Contractor shall work with applications in the Sponsor's cloud environment such as AWS, Oracle, Google, Microsoft Azure, and IBM. The Contractor shall provide support for the implementation, design and building enhancements, and long-term maintenance of a new application. The Contractor shall design and develop the application in a Web environment. The Contractor shall analyze user needs and develop software solutions.
The Contractor shall design software or customize software to optimize operational efficiency. The Contractor shall perform testing, debugging and quality assurance of the application. The Contractor shall play a major role in implementing a modern, high profile, mission enabling application used daily.
1. Cyber Security Support:
2. Demonstrated experience analyzing IT systems for cyber security vulnerabilities.
3. Demonstrated experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and vulnerability analysis using both open-source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, or Back Track.
4. Demonstrated experience analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cyber security vulnerabilities.
5. Demonstrated experience with communications protocols such as IP, TCP, UDP, HTTP, HTTPS, MPLS, OSPF, IGRP, BGP, SIP, H.232. 6. Demonstrated experience with multiple OS's, including Windows, Linux, and OSX. 7. Demonstrated experience with Microsoft Windows ver.; 7, 8, 10, 2008R2, 2012, 2012R2, or 2016. 8. Demonstrated experience with cloud computing technology and hypervisors such as Hyper
V, VMWare ESX, or Virtual Box. 9. Demonstrated experience with…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×