Platzhalter Bild

Cybersecurity Architect en SAIC

SAIC · Santa Ana, Estados Unidos De América · Onsite

Solicitar ahora
%3Cp class=%22MsoNormal%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3E%3Cstrong%3ESAIC %3C/strong%3Eis seeking a highly skilled %3Cstrong%3ECybersecurity Architect%3C/strong%3E to support the Orange County Sheriff’s Department (OCSD). This role involves providing technical leadership and oversight for OCSD’s cybersecurity initiatives to safeguard systems, assets, and data against cyber threats.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22-webkit-text-stroke-width:0px;background-color:rgb(255, 255, 255);color:rgb(0, 0, 0);font-family:%26quot;Open Sans%26quot;, %26quot;Segoe UI%26quot;, Frutiger, %26quot;Frutiger Linotype%26quot;, %26quot;Dejavu Sans%26quot;, %26quot;Helvetica Neue%26quot;, Arial, sans-serif;font-size:13.02px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:400;letter-spacing:normal;margin:0px 0px 12px;orphans:2;text-align:start;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;%22%3E%3Cspan style=%22font-size:16pt;%22%3E%3Cspan style=%22line-height:24.5333px;%22%3E%3Cstrong%3EPeriod of Performance:%3C/strong%3E%26nbsp;Contract valid until June 2027.%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22 style=%22-webkit-text-stroke-width:0px;background-color:rgb(255, 255, 255);color:rgb(0, 0, 0);font-family:%26quot;Open Sans%26quot;, %26quot;Segoe UI%26quot;, Frutiger, %26quot;Frutiger Linotype%26quot;, %26quot;Dejavu Sans%26quot;, %26quot;Helvetica Neue%26quot;, Arial, sans-serif;font-size:13.02px;font-style:normal;font-variant-caps:normal;font-variant-ligatures:normal;font-weight:400;letter-spacing:normal;margin:0px 0px 12px;orphans:2;text-align:start;text-decoration-color:initial;text-decoration-style:initial;text-decoration-thickness:initial;text-indent:0px;text-transform:none;white-space:normal;widows:2;word-spacing:0px;%22%3E%3Cspan style=%22font-size:16pt;%22%3E%3Cspan style=%22line-height:24.5333px;%22%3E%3Cstrong%3E100% onsite 5 days a week%3C/strong%3E%3C/span%3E%3C/span%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoNormal%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3E%3Cstrong%3EKey Responsibilities:%3C/strong%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraph%22 style=%22mso-list:l3 level1 lfo6;tab-stops:list .5in;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EDesign, implement, and maintain Palo Alto Network firewalls (NGFW), Panorama Central Management, and associated security services (Wildfire, Threat Prevention, URL Filtering, Anti-Virus, etc.).%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cul style=%22margin-top:0in;%22 type=%22disc%22%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo1;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EDevelop and enforce comprehensive security policies, rule sets, and zone segmentation aligned with Zero Trust principles.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo1;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EAct as the top-tier subject matter expert for all Palo-Alto related security engineering, configuration, and troubleshooting.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3C/ul%3E%3Cul style=%22margin-top:0in;%22 type=%22disc%22%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l0 level1 lfo2;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EArchitect and optimize secure remote access solutions, utilizing Palo Alto GlobalProtect or similar enterprise VPN technologies, ensuring least privilege and multi-factor authentication (MFA) are implemented properly.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l0 level1 lfo2;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EDevelop and enforce security policies for both corporate and guest wireless networks, ensuring proper segmentation, secure authentication protocols, and encryption methods are in place.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l0 level1 lfo2;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EDesign and implement a secure DNS architecture utilizing DNSSEC or private DNS services.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3C/ul%3E%3Cul style=%22margin-top:0in;%22 type=%22disc%22%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l5 level1 lfo3;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3ELead the design, tuning, and integration of device logs into an enterprise SIEM.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l5 level1 lfo3;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EDevelop advanced correlation rules, alerts, dashboards, and reporting mechanisms to identify, prioritize, and track security threats and anomalies.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3C/ul%3E%3Cul style=%22margin-top:0in;%22 type=%22disc%22%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l4 level1 lfo4;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EDevelop, maintain, and test the OCSD Incident Response Plan and playbooks.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l4 level1 lfo4;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EConduct post-incident reviews to identify architectural gaps and define security enhancements.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l4 level1 lfo4;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EEnsure alignment with local, state, and federal mandates, specifically CJIS requirements, across all security architectures, policies, and procedures.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3C/ul%3E%3Cul style=%22margin-top:0in;%22 type=%22disc%22%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l1 level1 lfo5;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3ECreate and maintain enterprise-wide security standards, control baselines, and reference architectures.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l1 level1 lfo5;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EConduct regular security assessments and define remediation strategies to address control deficiencies.%3Co:p%3E%3C/o:p%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3C/ul%3E
%3Cp class=%22MsoNormal%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3E%3Cstrong%3ERequired:%3C/strong%3E%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpFirst%22 style=%22mso-list:l1 level1 lfo3;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EBS in Cybersecurity or related technical field with 9+ years of relevant industry experience (4 years experience in lieu of degree)%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cp class=%22MsoListParagraphCxSpLast%22 style=%22mso-list:l1 level1 lfo3;text-indent:-.25in;%22%3E%3Cspan style=%22font-family:Symbol;font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E·%3C/span%3E%3Cspan style=%22font:7.0pt %26quot;Times New Roman%26quot;;line-height:115%;mso-bidi-font-family:Symbol;mso-fareast-font-family:Symbol;mso-list:Ignore;%22%3E%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp;%26nbsp; %3C/span%3E%3C/span%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EAbility to obtain and maintain a public trust and pass a lifestyle polygraph we well requiring U.S. Citzenship.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E%3Cul style=%22margin-top:0in;%22 type=%22disc%22%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l0 level1 lfo1;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3E%3Cstrong%3ECertifications:%3C/strong%3E%26nbsp;Certified Information Systems Security Professional (CISSP) or GIAC Reverse Engineering Malware (GREM) or equivalent.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3C/ul%3E%3Cul style=%22margin-top:0in;%22 type=%22disc%22%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo2;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EProfessional experience providing technical leadership in a Security Operations Center (SOC) or similar environment offering cybersecurity services.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo2;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EDeep understanding of Palo Alto Networks architecture and technologies, including firewalls, intrusion prevention systems, and other security products.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo2;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EExpertise in network security design, deployment, and maintenance.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo2;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EStrong problem-solving skills with the ability to troubleshoot security issues and provide user support.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo2;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EExcellent communication and interpersonal skills.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo2;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EProject management experience with the capacity to manage multiple projects and meet deadlines under pressure.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3Cli class=%22MsoNormal%22 style=%22mso-list:l2 level1 lfo2;tab-stops:list .5in;%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3EFlexibility and willingness to work overtime, including weekends and overnight as needed.%3Co:p%3E%3C/o:p%3E%3C/span%3E%3C/span%3E%3C/li%3E%3C/ul%3E%3Cp class=%22MsoNormal%22%3E%3Cspan style=%22font-size:16.0pt;%22%3E%3Cspan style=%22line-height:115%;%22%3E%3Co:p%3E %3C/o:p%3E%3C/span%3E%3C/span%3E%3C/p%3E
*!SAIC accepts applications on an ongoing basis and there is no deadline.

SAIC® is a premier Fortune 500® mission integrator focused on advancing the power of technology and innovation to serve and protect our world. Our robust portfolio of offerings across the defense, space, civilian and intelligence markets includes secure high-end solutions in mission IT, enterprise IT, engineering services and professional services. We integrate emerging technology, rapidly and securely, into mission critical operations that modernize and enable critical national imperatives.

We are approximately 24,000 strong; driven by mission, united by purpose, and inspired by opportunities. SAIC is an Equal Opportunity Employer. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $7.5 billion. For more information, visit saic.com. For ongoing news, please visit our newsroom. Solicitar ahora

Otros empleos