Zero Trust Specialist

Bespoke Technologies, Inc.Bethesda, MD
5dOnsite

About The Position

Bespoke Technologies is seeking a Zero Trust Specialist for an exciting opportunity to support a large organization. Responsibilities include: Respond to inquiries on Cybersecurity issues; turning cybersecurity needs and capabilities into requirements and detailed technical solutions; developing and maintaining a list of Cybersecurity Architecture needs, dependencies, risks, and mitigation plans; analyzing cybersecurity best practices to identify gaps and improvement opportunities. Developing and publishing baseline security requirements for common enterprise services to ensure capabilities are in compliance with cybersecurity directives and policies; conducting critical path analysis, risk analysis, and task dependency analysis; developing security requirements and constraints to provide input to foundational technical documents, including program architectural artifacts, business cases, and concept of operations. Documenting architectural rules for Zero Trust Diagram an interim and future architecture for Zero Trust implementation Define/communicate the Zero Trust integration expectations for all ITE services Create a Zero Trust playbook

Requirements

  • Requires BS degree and 8 – 12 years of prior relevant experience in order to operate within the scope contemplated by the level. Additional experience may be exchanged for degree requirements.
  • Secure cloud architecture expertise
  • Detail-oriented, ability to consistently provide high-quality products that are concise, thorough, and accurate.
  • Ability to adapt in response to shifts in priorities.
  • Expert knowledge in Identity, Authentication and Authorization.

Responsibilities

  • Respond to inquiries on Cybersecurity issues; turning cybersecurity needs and capabilities into requirements and detailed technical solutions
  • Developing and maintaining a list of Cybersecurity Architecture needs, dependencies, risks, and mitigation plans
  • Analyzing cybersecurity best practices to identify gaps and improvement opportunities
  • Developing and publishing baseline security requirements for common enterprise services to ensure capabilities are in compliance with cybersecurity directives and policies
  • Conducting critical path analysis, risk analysis, and task dependency analysis
  • Developing security requirements and constraints to provide input to foundational technical documents, including program architectural artifacts, business cases, and concept of operations
  • Documenting architectural rules for Zero Trust
  • Diagram an interim and future architecture for Zero Trust implementation
  • Define/communicate the Zero Trust integration expectations for all ITE services
  • Create a Zero Trust playbook
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service