Cybersecurity Compliance Architect
Akima
For a DOD customer, the Cybersecurity Compliance Architect provides full spectrum support to the customer Chief Information Security Officer (CISO) and security and compliance staff in matters in the realm of cybersecurity, DevSecOps, cloud-native development, business management, and deploying to production in any customer environment, assisting and enabling the customer's cybersecurity personnel in ensuring a readily achievable “Continuous Authority to Operate” (cATO) at both the platform and application layers and obtaining and maintaining ATO for assigned systems. Travel: CONUS travel in performance of the contract will be determined at the time of need. Shift: Core business hours of 8:45 A.M through 5:15 P.M central time, Monday through Friday, with eight working (non-lunch) hours per day. Prescribed period during which lunch may be taken: 11:00 A.M. and 1:00 P.M. Responsibilities Compliance Architect ensures that ASWF systems and networks meet customer cybersecurity and compliance standards, focusing on the Risk Management Framework (RMF) process, and plays a crucial role in obtaining and maintaining system accreditation through the Authority to Operate (ATO) process. The Compliance Architect performs with expertise and proficiency as detailed below. Leads or supports efforts to ensure systems comply with DoD cybersecurity standards. Drives the ATO process, ensuring all required documentation and testing are completed. Coordinates with Authorizing Officials (AOs) and other stakeholders to obtain and maintain ATOs. Applies expert knowledge of DoD cybersecurity policies (e.g., DoD 8500, DoDI 8510.01, NIST SP 800-37, and NIST SP 800-53). Ensures adherence to Army-specific policies and directives such as AR 25-2 (Army Cybersecurity). Maintains system compliance with evolving cybersecurity regulations. Uses eMASS to document system security controls, manage POA&Ms (Plans of Action and Milestones), and support audits. Conducts security control assessments (SCAs) to verify system compliance. Develops and reviews security documentation, including System Security Plans (SSPs), Security Assessment Reports (SARs), and Continuous Monitoring Plans. Implements and maintains continuous monitoring processes for systems post-ATO. Analyzes security incident data and performs vulnerability management using tools like ACAS (Assured Compliance Assessment Solution) and HBSS (Host-Based Security System). Works closely with system owners, network administrators, and information assurance teams. Provides guidance and training to stakeholders on compliance requirements. Qualifications Bachelor’s degree in computer science or similar relevant field. 10 years of experience in the DoD managing and ensuring organizational security and compliance in all software development and cloud operations. Advanced experience in: Linux OS systems, bash scripting, network troubleshooting, Container technology, infrastructure as code, Terraform, CI/CD, agile and DevSecOps, Kubernetes and Kubernetes components - namespaces, clusters, nodes, control plane, etc., networking and service mesh concepts, Kubernetes command line Access logs, Trace issues, and Security best practices around distributed computing systems. Advanced experience with AWS and AWS components - EC2, RDS, S3, VPC, Route 53, etc., cloud computing, AWS native services like GuardDuty, Cloudwatch, Security best practices around Cloud Computing and DoD Security Concepts and practices such as Impact Level, eMASS, Authorization to Operate, Control Correlation Identifier (CCI or Controls), Containers, Distributed Computing Systems, Cloud Computing, Zero Trust, Continuous Monitoring, Alerting, Auditing, security operations, incident response. Technical Proficiency: Expertise in network architecture, system hardening, and vulnerability management. Proficient in tools like STIG Viewer, SCAP Compliance Checker, ACAS, and HBSS. DoD 8570.01-M compliance certifications (e.g., Security+, CISSP, CISM, CAP). Must hold a current and valid IATII or higher certification (Security Plus acceptable) at award/initiation of and throughout performance." Expert knowledge of DoD cybersecurity policies (e.g., DoD 8500, DoDI 8510.01, NIST SP 800-37, and NIST SP 800-53). Active Secret clearance. Desired Qualifications: Certification in RMF processes or cybersecurity auditing is a plus. Job ID 2025-16061 Work Type On-Site Company Description Work Where it Matters Systems Intelligence, an Akima company, is not just another federal IT contractor. As an Alaska Native Corporation (ANC), our mission and purpose extend beyond our exciting federal projects as we support our shareholder communities in Alaska. At Systems Intelligence, the work you do every day makes a difference in the lives of our 15,000 Iñupiat shareholders, a group of Alaska natives from one of the most remote and harshest environments in the United States. For our shareholders, Systems Intelligence provides support and employment opportunities and contributes to the survival of a culture that has thrived above the Arctic Circle for more than 10,000 years. For our government customers, Systems Intelligence delivers innovative information technology solutions that evolve and modernize IT infrastructures. As a Systems Intelligence employee, you will be surrounded by a challenging, yet supportive work environment that is committed to innovation and diversity, two of our most important values. You will also have access to our comprehensive benefits and competitive pay in addition to growth opportunities and excellent retirement options.
Confirm your E-mail: Send Email
All Jobs from Akima