Senior Cybersecurity Architect DoD Secret Clearance
Listed on 2026-02-15
-
IT/Tech
Cybersecurity, Systems Engineer, IT Consultant
Position Title: Senior Cybersecurity Architect
Location: Redstone Arsenal. Huntsville, AL
Relocation Assistance: None available at this time
Remote/Telework: NO - Not available for this position
Clearance Type: DoD Secret
Shift: Day shift
Travel Required: Up to 10% of the time
⚠️ IMPORTANT – READ BEFORE APPLYING
- This position supports a classified Department of Defense mission and is not an entry-level or clearance-sponsoring role.
- Applicants must meet all minimum requirements to be considered. Applications that do not follow the instructions below will be automatically disqualified.
- Only U.S. citizens with an active DoD Secret security clearance will be considered.
- Clearance level must be clearly listed on the resume.
- Resumes must be submitted in month/year format.
- Applicants who do not meet these requirements should not apply.
The Senior Cybersecurity Architect supports the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract. The Senior Cybersecurity System Architect is a leadership role responsible for designing, developing, and implementing robust cybersecurity architectures that protect the organization's assets, data, and systems. This position provides technical expertise and guidance, ensuring that security principles are embedded into all layers of the IT infrastructure.
The Senior Cybersecurity Architect will collaborate with cross-functional teams to develop and maintain a comprehensive cybersecurity strategy and architecture aligned with business objectives, threat landscape, and compliance requirements.
- Develop and maintain the organization's cybersecurity architecture framework, standards, and blueprints.
- Design and implement security architectures for various systems and environments, including cloud, on-premises, and hybrid infrastructures.
- Evaluate and recommend security technologies, platforms, and tools to support the organization's cybersecurity posture.
- Review and approve architectural diagrams, documentation, and models, focusing on security controls and data flow.
- Lead the development of proof-of-concepts and prototypes to validate security architectural designs.
- Architect and design secure solutions for data protection, network security, endpoint security, identity and access management (IAM), and application security.
- Participate in threat modeling exercises to identify potential security vulnerabilities and weaknesses in systems and applications.
- Perform risk assessments to evaluate the likelihood and impact of potential security threats.
- Develop and implement mitigation strategies to address identified security risks.
- Provide technical leadership and mentoring to other security professionals, including security engineers, analysts, and developers.
- Serve as a subject matter expert on cybersecurity architecture best practices and emerging security technologies.
- Collaborate with project teams to ensure that security is integrated into all phases of the system development lifecycle (SDLC).
- Drive the adoption of new security technologies and architectural patterns within the organization.
- Ensure the cybersecurity architecture complies with relevant legal and regulatory requirements (e.g., NIST Cybersecurity Framework, ISO 27001, and Security Technical Implementation Guides).
- Work with compliance teams to conduct security audits and assessments.
- Participate in incident response activities as needed, providing technical expertise and guidance.
- Review security incident analysis reports of root causes and determine the need for architectural or technical corrective actions.
- Collaborate with cross-functional teams, including IT operations, development, and business units, to ensure alignment of security goals.
- Communicate security architectural designs and decisions effectively to both technical and non-technical audiences.
- Actively participate in architecture review boards and other governance processes.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).