ICAM Solution Architect

GD Information TechnologySan Antonio, WA
16hHybrid

About The Position

We are seeking an individual with a broad base of experience in Information Technologies and Cybersecurity, and the desire and drive to make a difference. As an Identity, Credential, and Access Management (ICAM) Architect , you will be responsible for developing solutions for an extensive array of systems to detect suspicious and malicious user activity that could jeopardize the health of customer information systems. Our Solution Architects are responsible for reviewing cybersecurity and ICAM requirements. You must be able to research, compile information and prepare computer security incident solutions based on threat events, incidents and intrusions. You will work closely with Infrastructure Engineers and System Administrators to ensure GDIT expands the Cybersecurity ICAM solutions to support the customer requirements. How You Will Make An Impact: Act as an ICAM and cybersecurity subject-matter expert to multiple tasks and/or programs Architecting intrusion detection solution for systems, including SIEM tools Creation of technical incident response solutions based on threat intrusions and events Perform independent research and analysis of access security threats and ICAM solutions Implement security controls and supporting configurations to all customer IT system, hardware, and software components to satisfy compliance with the security controls identified within the Committee on National Security Systems Instructions (CNSSI) No 1253 Table D-1, Security Control Baselines Participate in security compliance efforts that will be assessed and validated by the Government IAW DoDI 8510.01 and National Institute of Standards and Technology (NIST) 800.53, Revision 4, and NIST 800-53A, Revision 4. Design solutions to analyze and evaluate anomalous user network and system activity Recommend modifications to security tools to better detect, prevent, and mitigate ICAM policy, governance, and operations Apply your knowledge of ICAM tools (including open-source tools, and their capabilities) system administration, ICAM architectures, and network security architecture Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established ICAM standards, policy, and regulations, and recommend mitigation strategies The ICAM Architect performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Develops; refines; and performs advanced analysis techniques to uncover new or potential cybersecurity and ICAM incidents Recommends defensive and proactive measures to thwart potential and malicious activity or inappropriate use by any internal or external entity to include: conducting malicious code activity analysis; determining the effects on a system or the network; assisting in gathering potential evidence for law enforcement; etc Prepares incident reports of analysis methodology and results. Analysis techniques may be refined into training and process improvements that are promulgated back to the ICAM processes for sustained operations

Requirements

  • 8+ years of related experience in ICAM and cybersecurity architectures.
  • Must have several years' experience with and be able to analyze ICAM solutions to identify security issues for remediation; evaluate enterprise change requests and assess organizational risk
  • Ability to effectively engage current and prospective partners to build trust and relationships, and foster their participation and sponsorship of program initiatives
  • Strong ability to work independently and as part of a cohesive and collaborative team
  • The successful candidate must have experience support cloud based credential/access management and ZeroTrust solutions.

Nice To Haves

  • One or more of the following Certifications: Security+ CE; GSEC, SSCP; CCNA-Security; CISA; GCIH; GCED; CISSP; or CASP CE; CEH, GCIA; or GCIH.

Responsibilities

  • Act as an ICAM and cybersecurity subject-matter expert to multiple tasks and/or programs
  • Architecting intrusion detection solution for systems, including SIEM tools
  • Creation of technical incident response solutions based on threat intrusions and events
  • Perform independent research and analysis of access security threats and ICAM solutions
  • Implement security controls and supporting configurations to all customer IT system, hardware, and software components to satisfy compliance with the security controls identified within the Committee on National Security Systems Instructions (CNSSI) No 1253 Table D-1, Security Control Baselines
  • Participate in security compliance efforts that will be assessed and validated by the Government IAW DoDI 8510.01 and National Institute of Standards and Technology (NIST) 800.53, Revision 4, and NIST 800-53A, Revision 4.
  • Design solutions to analyze and evaluate anomalous user network and system activity
  • Recommend modifications to security tools to better detect, prevent, and mitigate ICAM policy, governance, and operations
  • Apply your knowledge of ICAM tools (including open-source tools, and their capabilities) system administration, ICAM architectures, and network security architecture
  • Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established ICAM standards, policy, and regulations, and recommend mitigation strategies
  • The ICAM Architect performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
  • Develops; refines; and performs advanced analysis techniques to uncover new or potential cybersecurity and ICAM incidents
  • Recommends defensive and proactive measures to thwart potential and malicious activity or inappropriate use by any internal or external entity to include: conducting malicious code activity analysis; determining the effects on a system or the network; assisting in gathering potential evidence for law enforcement; etc
  • Prepares incident reports of analysis methodology and results. Analysis techniques may be refined into training and process improvements that are promulgated back to the ICAM processes for sustained operations

Benefits

  • Full-flex work week to own your priorities at work and at home
  • 401K with company match.
  • Comprehensive health and wellness packages.
  • Internal mobility team dedicated to helping you own your career.
  • Professional growth opportunities including paid education and certifications.
  • Cutting-edge technology you can learn from.
  • Reset and recharge with extra paid vacation and holidays.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service