Lead design and build activities for hosting controlled data residing in new and legacy applications
Leverage infrastructure-as-code to blueprint ITAR compliant hosting environments that deliver all necessary requirements an ITAR application needs, already built in and compliance ready
Design for ITAR compliance in a global setting delivering required end-user access while strictly prohibiting other access and other factors by design
Collaborate with application developers to understand their product requirements to be able to deliver hosting solutions that enable rapid adoption
Create and maintain broad communications and key metrics for multiple audiences
Communicate effectively across all levels of leadership and engaging stakeholders
Requirements
5+ years of experience working with solutions aimed at compliance with United States government data compliance regulations including the International Traffic in Arms Regulations (ITAR)
5+ years of experience analyzing data and making recommendations to take appropriate actions based on findings
5+ years of experience designing and implementing data protection solutions and tools that safeguard sensitive information across various platforms and environments
5+ years of experience with IT services and technologies relevant to data protection, including cloud computing, cybersecurity measures, and data encryption techniques
5+ years of experience assessing complex data protection challenges and developing innovative solutions that enhance compliance and operational efficiency
Bachelor's degree or higher
Cloud certifications (e.g. Azure, GCP, AWS, etc.)
Experience with EAR
Experience with DFARs, NIST, and other regulations
Experience building activities for "ITAR-Safe" hosting environments
Benefits
Health insurance
Flexible spending accounts
Health savings accounts
Retirement savings plans
Life and disability insurance programs
Paid time off
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
data protection solutionsdata encryption techniquescloud computingcybersecurity measuresinfrastructure-as-codeITAR compliancedata analysisdesigning hosting environmentsimplementing solutionsassessing data protection challenges