×
Register Here to Apply for Jobs or Post Jobs. X

Cybersecurity-SME; Expert

Job in Springfield, Fairfax County, Virginia, 22161, USA
Listing for: Compass, Inc
Full Time position
Listed on 2026-02-16
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, Data Security
Salary/Wage Range or Industry Benchmark: 110000 - 140000 USD Yearly USD 110000.00 140000.00 YEAR
Job Description & How to Apply Below
Position: Cybersecurity-SME (Expert) #2067

Compass is looking for a motivated individual to provide operational services primarily to the Intelligence Community (IC), the Department of War (DoW), and Federal communities. Our goal is to hire talented and passionate team members who desire to grow their skillsets, as well as the reputation of the company with our partners, clients, and stakeholders. We are looking for an individual to join an innovative team supporting mission critical/mission essential activities.

Position:
Cybersecurity-SME Expert#2067

Location:
Springfield, VA

Clearance Required:

Active Top Secret/SCI

Position Description

The Subject Matter Expert (SME) provides extremely high-level subject matter expertise for work in support of IC and DoD Cybersecurity requirements, specifications, certifications, and regulations to include but not limited to facets such as Zero-Trust (ZT), Identity, Credential, and Access Management (ICAM), Privileged Access Management (PAM), and Public-Key Infrastructure (PKI). The SME provides advanced technical knowledge and analysis of highly specialized applications and operational environments, high-level functional systems analysis, design, integration, documentation, training, and implementation advice on complex, sometimes esoteric problems which require detailed, in-depth knowledge of the subject matter for effective oversight.

The SME understands the multiple facets of cybersecurity requirements and applies sound principles, methods, and techniques to provide recommendations that ensure optimal security and performance. The SME designs and prepares technical reports, studies, and related documentation, makes charts and graphs to record metrics and analytics, prepares and delivers presentations, training, and briefings as required by the Enterprise Cybersecurity Division.

Key Duties
  • Assess the current architecture of existing NGA Program/Activities and design the appropriate cloud architecture for those activities. Once the appropriate architecture has been established, work with government and contractor personnel supporting the migrating activity to transition them into the appropriate cloud environment.
  • Facilitate Agency implementation of multiple facets of the seven ZT pillars such as the Identity, Credential and Access Management (ICAM) Zero Trust Architecture (ZTA) Cloud Modernization by developing multi-cloud ICAM strategies and architectures and recommending NGA portfolio and program technical acquisition strategies that align with IC/DoD Identity and Access Management (IdAM) policies and directives.
  • Analyze IdAM capabilities to develop recommendations for senior level decision makers on NGA’s IdAM multi-cloud/ZTA capabilities and those of other IC and DoD partners.
  • Develop recommended courses of action for NGA senior leadership with options for IC Information Technology Enterprise (ITE) Identification Authentication Authorization (IAA) and Department of War (DoW) adoption and transition of Agency Enterprise services when applicable.
  • Collaborate across agencies (inter-agency) and across NGA (intra-agency) to analyze cybersecurity vulnerabilities to develop recommendations for senior leadership on matters of cybersecurity inter-dependencies, requirements, risks, threats, and prioritized courses of action.
  • Track requirements and devise processes in support of Privileged Access Management (PAM) to verify proper elevated users are monitored for anomalies across multi-cloud environments, and research strong multifactor authentication technologies for multi-cloud environments. Identify, prioritize, and resource-plan a phased approach for a zero-trust architecture to verify that both, Non-Person Entities (NPEs) and Person-Entities (PEs) have a verified identity (Authentication
    -AuthN), reducing the threat of cyber-attacks.
  • Evaluate test plans, observe tests, and monitor test results for functional requirements developed for cybersecurity and ZT capability Integration associated with migration activities to demonstrate to the NGA Program Management Office (PMO) that the migrated activity performs all intended cybersecurity functions, introduce low risk, and require minimal resources for adoption.
  • An…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary