Zero Trust IAM Lead

CACINorfolk, VA
Onsite

About The Position

Join NTCSS as Zero Trust Identity & Access Management (IAM) Lead, driving the Navy's identity-centric Zero Trust transformation. Lead enterprise integration of Naval Identity Services (NIS)—Ping Identity, SailPoint, Radiant Logic, and CyberArk—across NTCSS applications supporting naval readiness and DoD Zero Trust mandates for FY2027. This role combines technical architecture leadership with Agile SAFe Scrum Master execution.

Requirements

  • Active Secret; T5 eligible
  • CompTIA Security+ (or DoD 8570 IAT Level II)
  • Master's degree required
  • 10+ years cybersecurity architecture/governance in DoD/Federal environments
  • 3–5 years as Scrum Master with SAFe execution and PI planning
  • 5+ years hands-on ICAM: Ping/Okta, SailPoint, CyberArk, Radiant Logic
  • 3–5 years Zero Trust architecture (NIST SP 800-207)
  • RMF authorization leadership and proven Jira backlog management
  • FISCAM Domain 2 knowledge
  • Proficiency with Jira and Jira-to-Power BI integration
  • Authentication protocols (SAML, OAuth 2.0, OIDC), PKI, CAC-based authentication, RBAC/ABAC, identity governance, network segmentation, vulnerability management (ACAS/Tenable), SIEM (Splunk, QRadar), cloud identity (AWS IAM, Azure Entra ID), GRC platforms (eMASS, Xacta)
  • Exceptional facilitation and coaching, servant-leadership, cross-functional leadership, conflict resolution, metrics-driven decision-making

Nice To Haves

  • DoD supply/logistics systems experience valued
  • Doctorate Degree
  • CSM, SAFe Scrum Master (SSM), or SAFe Agilist (SA) strongly preferred
  • Advanced Certifications (CISSP, CCSP, CISM, SAFe SPC)
  • C2C architectures
  • DIL environment security
  • DISA STIGs
  • advanced Jira administration
  • DevSecOps integration
  • Agile transformation leadership

Responsibilities

  • Lead NTCSS Zero Trust strategy aligned with NIST SP 800-207 and DoD Zero Trust Reference Architecture
  • Drive NIS integration: Ping Identity (authentication/SSO/MFA), SailPoint (provisioning/lifecycle), Radiant Logic (federation), CyberArk (privileged access)
  • Design Policy Enforcement Point (PEP) architectures for dynamic, risk-based access control
  • Develop identity governance: RBAC/ABAC models, Privileged Access Agreements, User Access Reviews
  • Architect CAC-based authentication, PKI, MFA, and federation protocols (SAML, OIDC)
  • Serve as Scrum Master facilitating daily stand-ups, sprint planning, retrospectives, and PI planning
  • Establish Agile execution frameworks using Jira for transparent delivery
  • Remove impediments and escalate dependencies; coach teams on Agile SAFe principles
  • Track team velocity, sprint burndown, impediment resolution; lead scrum-of-scrums across teams
  • Establish Jira-to-Power BI metrics for real-time sprint visibility
  • Direct RMF lifecycle and author SSPs, SARs, POA&Ms in eMASS aligned with DoD, FISMA, NIST 800-53A
  • Align Zero Trust with FISCAM Domain 2 for audit-defensible access controls
  • Support continuous authorization (cATO) and develop audit-ready documentation
  • Develop executive briefings and 90-day roadmaps for shore-first and afloat integration
  • Create reusable identity security patterns and enterprise NTCSS Access Policy
  • Facilitate sprint reviews showcasing incremental capability delivery

Benefits

  • flexible time off
  • robust learning resources
  • competitive compensation
  • benefits and learning and development opportunities
  • comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service