This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Law Enforcement Agency OCIO's organization is moving to Information Systems Security as a Service and requires a Chief Security Architect to serve as the program’s principal technical authority, providing strategic risk advisory to OCIO leadership, Authorizing Officials, and ISSO(E)(M)s while overseeing the security posture of 600+ information systems across all classification levels. This position will be on site in Washington, DC and requires a Top-Secret Clearance.
Job Responsibility:
Serves as the program’s principal technical authority, providing strategic risk advisory to OCIO leadership, Authorizing Officials, and ISSO(E)(M)s while overseeing the security posture of 600+ information systems across all classification levels
Translates the Customer's security vision into actionable technical guidance
Validates the system categorization methodology
Reviews high-risk change requests
Enables innovation through evaluation of emerging technologies (AI/ML, zero trust, cloud-native security) within the Customer's governance constraints
Leads early lifecycle security advisory to embed security in system design rather than retrofit
Resolves complex technical disputes between implementation and assessment teams
Elevates ISaaS from tactical compliance execution to mission-enabling security partnership, ensuring the Customer maintains robust cybersecurity posture while adopting cutting-edge capabilities to counter evolving threats
Balances deep technical expertise with executive communication skills, translating complex security risks into business impacts and strategic recommendations for senior Customer leadership
Requirements:
Bachelors Degree
10+ years of experience
Deep expertise with NIST implementation at scale, 800-53 controls and assessment procedures
FISMA and Intelligence Community security frameworks
Proven ability to design security architectures for diverse environments (on-prem, cloud, hybrid, air-gapped)
Cloud security architecture
AWS/Azure security services, configurations, best practices
FedRAMP authorization process and cloud control inheritance