Information Security/Cyber Security Architect
In an era of dynamic change in space, Aerospace is addressing a generation of complex challenges. We operate the only federally funded research and development center (FFRDC) committed exclusively to the space enterprise. Our technical experts span every discipline of space-related science and engineering. Join our team and thrive in a career that matters to the world and you personally.
Responsibilities
Will be a member of the Information Security team that is responsible for all elements of cybersecurity including but not limited to: Enterprise & Cloud Security, Identity & Access Management, forensics, intrusion detection using Artificial Intelligence (AI) and Machine Learning (ML) capabilities, incident response, endpoint security, application whitelisting, security assessments, risk mitigation programs, automation and orchestration. As a Security Architect, you will be building and designing new cybersecurity processes and tools to protect the Corporation. Prior experience working and securing an Enterprise environment is required.
Key Functions:
- Architect, develop, implement, maintain, and oversee cybersecurity tools and policies to protect the Enterprise, including cloud governance & security.
- Define and communicate enterprise information security plans, procedures, policies, and standards for acquiring, implementing, and operating new security systems, equipment, software, and other technologies
- Work closely with other departments within IT on corporate technology development to fully secure information, computer, network, and processing systems
- Provide input to security policies and practices in accordance with changes in federal acquisition law or various Aerospace contracts
- Participate in strategic security relationships between internal resources and external entities, including government, customers, vendors, and partner organizations
- Remain informed on trends and issues in the security industry, including current and emerging technologies and policies
- Communicate effectively with senior management, peers, staff, and customers both inside and outside the corporation
- Where necessary, provide Tier 3 support to help troubleshoot complex issues and architect new solutions.
Qualifications
Required for Level III
- 6 or more years of relevant experience w/ Bachelor’s Degree in Computer Science, Information Systems or equivalent field of study, or equivalent experience
- Prior experience securing the Enterprise by approving, implementing or designing cybersecurity policies in key technologies such as at the network, firewall or application layers.
- Experience with securely designing solutions, based on business requirements
- Ability to translate organizational goals and objectives into actionable plans
- Demonstrated ability to apply IT in solving security and business problems for an Enterprise environment
- Excellent written and verbal communication skills.
- Ability to document security best practices and IT security requirements
- Working knowledge of Windows & Linux operating systems
Required for Level IV (all Level III qualifications plus items below)
- 8 or more years of relevant experience w/ Bachelor’s Degree in Computer Science, Information Systems or equivalent field of study, OR equivalent experience
- Prior experience securing the Enterprise by approving, implementing or designing cybersecurity policies in key technologies such as at the network, firewall or application layers.
- Experience with securely designing solutions, based on business requirements
- Ability to translate organizational goals and objectives into actionable plans
- Demonstrated ability to apply IT in solving security and business problems for an Enterprise environment
- Excellent written and verbal communication skills.
- Ability to document security best practices and IT security requirements
- Working knowledge of Windows & Linux operating systems
Preferred III and IV
- Experience with key cloud technologies, such as AWS, Azure, Docker, Kubernetes or other SaaS products
- Solid knowledge of common IAM technical principles, theories, concepts, and tools.
- Seeks opportunities for process improvement, recommends improvements and contributes to solutions. Demonstrations of the personal initiative are highly regarded.
- Experience with specific IAM and Information security technologies: Multi-Factor Authentication (MFA) PKI (Public Key Infrastructure), Single Sign-On, Federated Identity.
- Experience with software defined networking
- Working knowledge of Windows & Linux operating systems
- Experience with Agile methodologies