CEdge has an opportunity for a Systems Architecture located in Springfield, VA
. If you are ready to work alongside World renowned Technology experts, and carry the skills below, this is the opportunity that will inevitably take your career to unbelievable levels!
***********TS/SCI clearance required***********
Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.
Define appropriate levels of system availability based on critical system functions and ensure that system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration.
Employ secure configuration management processes. Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines.
Identify and prioritize critical business functions in collaboration with organizational stakeholders.
Provide advice on project costs, design concepts, or design changes. Provide input to the Risk Management Framework process activities
and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).
Analyze candidate architectures, allocate security services, and select security mechanisms.
Develop a system security context, a preliminary system security .Concept of Operations (CONOPS), and define baseline system security requirements in accordance with applicable cybersecurity requirements.
Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents.
Write detailed functional specifications that document the architecture development process.
Analyze user needs and requirements to plan architecture. Capture and integrate essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.
Develop enterprise architecture or system components required to meet user needs. Document and update as necessary all definition and architecture activities.
Integrate results regarding the identification of gaps in security architecture. Plan implementation strategy to ensure that enterprise components can be integrated and aligned.
Translate proposed capabilities into technical requirements. Document how the implementation of a new system or new interface between systems impacts the current and target environment including but not limited to security posture. Integrate key management functions as related to cyberspace.
Skill in applying and incorporating information technologies into proposed solutions.
Skill in designing the integration of hardware and software solutions. Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
Skill in design modeling and building use cases (e.g., unified modeling language).
Skill in writing code in a currently supported programming language (e.g., Java, C++).
Skill in the use of design methods. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations
Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).
Ability to conduct vulnerability scans and recognize vulnerabilities in security systems. Ability to apply an organization's goals and objectives to develop and maintain architecture.
Ability to optimize systems to meet enterprise performance requirements. Ability to execute technology integration processes.
Ability to build architectures and frameworks. Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations. Ability to set up a physical or logical sub-networks that separates an internal local area network (LAN) from other untrusted networks.
WHAT’S IN IT FOR YOU?
WHO ARE WE?
CEdge Software Consultants is an innovative IT consulting firm, and a strategic business partner. We offer IT solutions to Federal and State government, as well as, Commercial Enterprises throughout the United States. Our main objective is to create an integrity-based culture that takes pride in working as a collaborative team that focuses on growth and is driven by the desire to provide purely ethical services for both our clients and team mates
- Full Benefits Package
- 10 Days PTO
- 10 Paid Holidays