We are seeking an individual with a broad base of experience in Information Technologies and Cybersecurity, and the desire and drive to make a difference. As an Identity, Credential, and Access Management (ICAM) Architect , you will be responsible for developing solutions for an extensive array of systems to detect suspicious and malicious user activity that could jeopardize the health of customer information systems. Our Solution Architects are responsible for reviewing cybersecurity and ICAM requirements. You must be able to research, compile information and prepare computer security incident solutions based on threat events, incidents and intrusions. You will work closely with Infrastructure Engineers and System Administrators to ensure GDIT expands the Cybersecurity ICAM solutions to support the customer requirements. How You Will Make An Impact: Act as an ICAM and cybersecurity subject-matter expert to multiple tasks and/or programs Architecting intrusion detection solution for systems, including SIEM tools Creation of technical incident response solutions based on threat intrusions and events Perform independent research and analysis of access security threats and ICAM solutions Implement security controls and supporting configurations to all customer IT system, hardware, and software components to satisfy compliance with the security controls identified within the Committee on National Security Systems Instructions (CNSSI) No 1253 Table D-1, Security Control Baselines Participate in security compliance efforts that will be assessed and validated by the Government IAW DoDI 8510.01 and National Institute of Standards and Technology (NIST) 800.53, Revision 4, and NIST 800-53A, Revision 4. Design solutions to analyze and evaluate anomalous user network and system activity Recommend modifications to security tools to better detect, prevent, and mitigate ICAM policy, governance, and operations Apply your knowledge of ICAM tools (including open-source tools, and their capabilities) system administration, ICAM architectures, and network security architecture Perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established ICAM standards, policy, and regulations, and recommend mitigation strategies The ICAM Architect performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Develops; refines; and performs advanced analysis techniques to uncover new or potential cybersecurity and ICAM incidents Recommends defensive and proactive measures to thwart potential and malicious activity or inappropriate use by any internal or external entity to include: conducting malicious code activity analysis; determining the effects on a system or the network; assisting in gathering potential evidence for law enforcement; etc Prepares incident reports of analysis methodology and results. Analysis techniques may be refined into training and process improvements that are promulgated back to the ICAM processes for sustained operations
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees