Security Architect
2262 San Antonio TX
Applications have closed
At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers’ success. We empower our teams, contribute to our communities, and operate sustainably. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business.
The Digital Modernization Sector is focused on delivering performance-based IT services and repeatable solutions to include applying cloud-factory and aaS (as a Service) capabilities and integrating commercial products to provide a comprehensive digital engineering approach to IT transformation. Our team is solving the world’s toughest security challenges for customers with “can’t fail” missions. To explore and learn more, click here!
Leidos is seeking a highly qualified candidate for the Security Architecture and Engineer position for the Integrated Defensive Cyber Systems (IDCS) Contract. The role Security Architect position is to provide long range planning for Air Force Defensive Cyber Systems to address capacity management, adapt to new intelligence-based threats, shortfalls in current systems, and feedback from operational users. This position is located near Lackland Air Force Base; all work is onsite.
Primary Responsibilities
- The Cyber Security Solution Architect is responsible for researching, evaluating, planning, designing, engineering, and delivering cybersecurity solutions. This includes:
- Supports overall division technical innovation, differentiation, and strategy to include creation and execution of a technology roadmap, development of technical strategies for division captures, and supporting technical performance on major programs focused on growing the division in the areas of mission support; systems engineering and integration; communications in contested areas; cyber security, cloud, resiliency to support multi-domain and distributed operation in contested environment.
- Integrates security architecture and engineering principles into the IT lifecycle, ensuring secure design, development, and deployment of IT solutions.
- Designs, develops, and implements comprehensive security architectures for IT systems, applications, and networks. Ensure that these architectures meet the required levels of security, compliance, and reliability.
- Reviews new and existing system designs for compliance with security standards and best practices.
- Engages in technical planning and design activities to develop secure IT infrastructure solutions. Provide architectural guidance and establish security standards, best practices, and methodologies.
- Oversees the implementation and integration of security controls within the organization's IT infrastructure. Collaborate with engineering teams to ensure seamless integration and functionality of security measures.
- Ensures consistent implementation of the capture process to include playing a major role in strategy reviews, technology readiness reviews, and color reviews.
- Documents and communicates security policy to enterprise organizations and gain organization commitment for security plans.
- Conducts research on emerging technologies in support of enterprise operations. Ensures new and existing products conform to information security policies, standards, and best practices.
- Understands competitor and teammate technology.
Basic Qualifications
- BS degree and 10+ years of prior relevant experience or Masters with 8 – 10 years of prior relevant experience, additional years of experience will be accepted in lieu of a degree.
- Expert knowledge of security architecture and engineering with the ability to apply advanced technical principles, theories, and best practices to design and implement robust security solutions.
- Deep understanding of IT security principles and technologies, including logical access control, PKI and encryption methods, network- and host-based IDS/IPS, security configuration baselines, auditing, vulnerability discovery, and management.
- Proven experience in deploying advanced cybersecurity technologies within complex environments, ensuring secure and scalable operations.
- Skilled in developing and implementing security controls and procedures to ensure secure system operations, including comprehensive documentation.
- Strong experience in documenting systems' compliance with NIST SP 800-53, ensuring alignment with security and privacy controls for information systems.
- Experience with system accreditation using the Risk Management Framework (RMF), ensuring systems meet rigorous security standards.
- Leadership experience in guiding technical teams, including solution architects and developers, to deliver secure solutions.
- Proficient in conducting ongoing Authorizations and Assessments (A&A), as well as continuous monitoring to ensure the security of systems.
- Demonstrated expertise in testing and mitigating network vulnerabilities, implementing protection measures that enhance security posture.
- Senior-level knowledge of information security concepts and frameworks, with the ability to align with industry best practices and policies.
- Ability to develop, manage, and execute technology roadmaps, ensuring cybersecurity initiatives align with organizational goals.
- Proficient discussing Cybersecurity Policy at the architecture level as driven by modern infrastructure not limited to but including containers, serverless infrastructure, SaaS, DaaS, PaaS.
- Highly organized and self-motivated with strong documentation skills and the ability to work independently. Excellent communication skills with the ability to effectively engage with customers and team members at all levels.
- Must have a Secret Security Clearance with the ability to obtain a Top-Secret Clearance.
- Must have IAT Level III certification (i.e., CISSP, CISA, GCIH, etc.).
Preferred Qualifications
- Knowledge of Agile development.
- Experience using Atlassian tool suite to include JIRA and Confluence to track activities and knowledge management documentation.
- Experience with working Army, Navy and Air Force Customers highly desired
- Prior technical roles within similar organizations with growing duties and responsibilities.
- Large acquisition program experience.
- Demonstrated expertise and program performance in the areas of solutioning different technologies, including cloud, data, cyber, network, SAP and end-user capabilities.
Original Posting Date:
2024-10-04While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $101,400.00 - $183,300.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Tags: Agile Audits CISA CISSP Clearance Cloud Compliance Confluence Encryption GCIH IDS IPS IT infrastructure Jira Monitoring NIST NIST 800-53 PaaS PKI Privacy Risk management RMF SaaS SAP Security Clearance Strategy Vulnerabilities
Perks/benefits: Equity / stock options
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.