Security Architecture & Engineering Sme
Listed on 2026-02-28
-
IT/Tech
Cybersecurity, Systems Engineer, Cloud Computing
Zermount Inc. is seeking a Cybersecurity Architect & Engineer SME who can create government solutions that will withstand even the most complex of IT and Cyber threats. The SME will support a federal client's enterprise cybersecurity and Continuous Authorization to Operate (cATO) initiative(s). The SME provides technical expertise, architectural recommendations, and engineering oversight across hybrid environments (on‑prem, cloud, and Cloud). The role focuses on designing secure enterprise architectures, engineering automated control assessments and evidence pipelines, and operationalizing zero trust and cATO capabilities.
You will coordinate with a dynamic team of thought leaders and experts to determine the right tools and methods to translate your client's IT needs and future goals into a plan that delivers secure and efficient solutions. You will assist the client through a critical approach to innovative solutions design, suggesting alternatives and tweaking capabilities to maintain a balance between security and mission needs.
The candidate must have experience in delivering measurable improvements in security posture, automation, and compliance maturity.
- Develop, maintain, and evolve the Enterprise Security Reference Architecture (ESRA).
- Provide architectural input to the organization's Cybersecurity Roadmap and Strategy, addressing: o Continuous ATO (cATO) and automated control testing maturity.
- Cloud security standards, compliance, and improvements to ATO timelines.
- Cloud monitoring, detection, response, and security operations.
- Privacy, continuous monitoring, and vulnerability assessment modernization.
- Integration of security scanning into cloud pipelines.
- Implementation of EO 14028 (ZTA) and SCRM requirements.
- Architect and implement continuous monitoring pipelines for automated evidence collection (SIEM, XDR, scanners, cloud APIs, CI/CD).
- Develop and manage OSCAL profiles, inheritance models, and evidence data contracts.
- Integrate telemetry and evidence into AO‑grade dashboards.
- Support ATO intake, assessment workflows, and vulnerability scanning processes.
- Conduct RMF‑aligned security reviews for compliance and best practices.
- Develop security architectural patterns that expedite ATO by pre‑meeting control requirements.
- Collaborate with the Cybersecurity Authorizations & Compliance Branch to design systems supporting cATO, reduce ATO processing times, provide data‑call responses, and participate in working groups.
- Design and deploy native cloud security services across AWS, Azure, and Google Cloud.
- Lead the development of enterprise cloud security blueprints, including security in Infrastructure‑as‑Code (IaC) templates.
- Conduct proofs‑of‑value for cloud‑native, COTS, third‑party, or open‑source security tools.
- Provide security architecture input for Dev Sec Ops strategy, including vulnerability scanning, automated assessments, and implementation of security controls.
- Conduct requirements‑gathering sessions and cATO current‑state assessments.
- Recommend security requirements, architectural direction, and support testing for enterprise initiatives such as: cATO, automated assessments, ZTA, SASE, CASB, SWG, TIC 3.0, ICAM, CMDB, etc.
- Collaborate with operational teams to improve cloud security monitoring, including ingestion and analysis of API, application, database, and flow logs into SIEM platforms.
- Support development of cloud event analysis and alert tuning to increase detection fidelity.
- Identify vulnerabilities across the SDLC and help contain, minimize, and remediate associated risks.
- Provide system engineering and architectural design support, including:
- Studies and analyses of operational changes;
End‑to‑end architecture trade‑off assessments - Development of strategic and tactical plans;
Evaluation of new program requirements - Research and assessment of new technologies for operational enhancement
- Studies and analyses of operational changes;
- Conduct architectural risk assessments, threat modeling, and secure design reviews.
- Support backlog refinement, sprint planning, capacity planning, and retrospectives.
- Ensure teams deliver high‑value increments meeting the Definition of Done.
- Facilitate stakeholder collaboration as…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).