Tech Stack
AWSCloudCyber SecurityOpen Source
About the role
- Design and implement secure AWS cloud environments aligned with DoD Cloud Computing Security Requirements Guide (SRG) and FedRAMP High baselines
- Implement and manage Zero Trust principles, including micro-segmentation, identity-based access controls, continuous authentication, and least privilege access enforcement
- Lead integration of ICAM solutions and ensure interoperability with DoD enterprise identity services
- Apply DoD STIGs, NIST 800-53 controls, and AWS security best practices; configure and monitor network segmentation, encryption, and key management
- Enforce MFA, conditional access, and enterprise-wide authentication/authorization policies; remediate findings from automated scans, penetration tests, and compliance assessments
- Embed security automation into CI/CD pipelines and integrate vulnerability scanning and SIEM/cloud-native monitoring for continuous monitoring
- Support RMF activities and prepare/maintain security documentation (SSPs, control implementation statements, security assessment reports) to achieve and sustain ATO
- Provide advisory support to government leadership, collaborate with cross-functional teams, and participate in working groups, IPTs, and security design reviews
Requirements
- Must be a US Citizen
- Must possess IT-II security clearance or have a current National Agency Check with Local Agency Check and Credit Check (NACLC) at time of proposal submission (Active Secret clearance preferred)
- Certifications: Security+, CISSP, CISM, or AWS Certified Security – Specialty
- Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or related field
- 8+ years of IT security engineering experience, with at least 3+ years focused on cloud security (AWS preferred)
- Expertise in AWS/Cloud security services
- Familiarity with DoD cybersecurity requirements (STIGs, RMF/ATO process, NIST 800-53)
- Understanding and application of Zero Trust architecture principles
- Strong experience with ICAM integration in enterprise environments
- Experience with DevSecOps tools (CI/CD pipeline integration, automated compliance, SIEM integration)
- Experience with vulnerability scanning, penetration testing remediation, and continuous monitoring
- Experience in LLMs