Overview
- Responsible for guiding the design and implementation of secure solutions and services within the cloud.
- Responsible for the successful configuration and implementation of cloud-based security solutions to reduce risk to an acceptable level.
- Ensures that the stakeholder security requirements necessary to protect the organization's mission and business processes are adequately addressed in all aspects of enterprise architecture, including reference models, segment and cloud solution architectures, and the resulting systems supporting those missions and business processes.
- Serves as a cybersecurity SME for cybersecurity architecture policies and procedures.
Responsibilities
- Provides cybersecurity management support to Program Management Offices for emerging information systems through the acquisition lifecycle and, where applicable, into sustainment.
- Provides technical support and guidance to facilitate the identification and integration of cybersecurity controls at the onset of the acquisition lifecycle for emerging cloud capabilities.
- Serves as a principal liaison for enterprise-level boundary defense initiatives to ensure consistent and sufficient identification and implementation of applicable cybersecurity controls in concert with the agency cybersecurity and cloud architecture and NIST security guidelines.
- Provides oversight for the design and implementation of enterprise-level cybersecurity solutions providing standards for access control capabilities across the enterprise.
- Develops technical solutions to complex problems.
Qualifications
- Knowledge of cloud-native software development.
- Expertise of how to conduct cloud operations in AWS or Azure.
- Formal general security certification (e.g., CompTIA Security+, Cloud Security Alliance - Certificate of Cloud Security Knowledge, (ISC) 2 Certified in Cybersecurity / Systems Security Certified Practitioner, GSEC - Global Information Assurance Certification Security Essentials , Offensive Security Certified Professional, EC-Council Certified Ethical Hacker.)
- Formal security certification on cloud service provider platforms (e.g., AWS)
- Certified Cloud Security Engineer / Architect.
- Knowledge of cloud computing architectures, cloud governance and risk management, business continuity, infrastructure security, virtualization and containers, incident response, application security, data security and encryption, and identity and access management.
About Highlight
For over ten years, Highlight has provided Development and Modernization, Secure IT, and Mission Solution services to our federal government customers.
Our team knows the technology; we understand how our customers and their stakeholders work; and we know how to implement industry best practices to deliver high-quality, end-to-end solutions that minimize risk and maximize results.
Since our inception, Highlight has had an employee-first mindset. Our mission is to provide employees with rewarding and impactful career opportunities.
In 2021, Highlight's founder, Rebecca Andino, implemented an Employee Stock Ownership Plan to embody and expand our culture of transparency, teamwork and rewarding the work of our employees.
By becoming an ESOP, our employee-owners share in the success of the company through their ownership stake. To learn more about ESOPS, check out : www.esopinfo.org.
We're an Equal Opportunity Employer (EOE) that empowers our people to fearlessly drive change - regardless of their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other characteristics.
Our team is dedicated to foster diversity within our teams to promote creativity, innovation, and teamwork to deliver the best solutions for our customers.
To receive compensation and benefits information for this role, contact us or email us at [email protected] Please include the Req ID (this is at the top of the posting under the position title) in the subject line of the email.
Recruitment Fraud Disclaimer
Highlight takes your security seriously. Please be aware that fraudulent actors may attempt to circulate fictitious job opportunities and impersonate our recruiters.
The main purpose of these correspondences is to obtain privileged information from individuals.
To protect yourself, keep the following in mind :
- All emails will come from an official @highlighttech.com or @talent.icims.com email address.
- We will never request payment or personal financial information during the recruitment process.
- We will not send job offers via email. All offers are first extended verbally by a member of our recruitment team whenever possible, and then followed up via written communication through official channels.
If you suspect fraudulent activity or have any doubts about the authenticity of an email, letter, or telephone communication supposedly from, for, or on behalf of Highlight, please contact our team directly at [email protected].
cwhp