Security Subject Matter Expert; SME
Listed on 2026-01-17
-
IT/Tech
Cybersecurity, Systems Engineer
Req : RQ211630
Type of Requisition: Regular
Clearance Level Must Be Able to Obtain: None
Public Trust/Other
Required:
MBI (T2)
Job Family: Cyber and IT Risk Management
Skills:
Identity Access Management (IAM),Platform Security,Single Sign-On (SSO),Vulnerability Management,Zero Trust
Experience:
10 + years of related experience
Job Description:
Security Subject Matter Expert (SME)
The Security Subject Matter Expert (SME) is the program’s security lead for a large, hybrid enterprise (on-prem data centers and multi-cloud). You will architect, implement, and operate a Zero Trust, RMF-aligned security solutions that keep systems reliable, data protected, and the program audit-ready at all times. You will own the end-to-end security operating model, identity and access (including PIV/FIDO and PAM), vulnerability and patch orchestration, logging and SIEM/SOAR, supply-chain integrity (SBOM/provenance), backup/DR resilience, and continuous monitoring.
Timeline: This is a contingent posting, expected to start in August, 2026
HOW the Security SME WILL MAKE AN IMPACT
You will convert compliance into a running capability rather than a paperwork cycle. By embedding controls in automation, policy-as-code in pipelines, signed artifacts with attestations, identity-centric access, and immutable backups, you will raise assurance while reducing toil and mean time to recover. You’ll drive continuous compliance with authoritative evidence from VA systems (ITSM/CMDB, SIEM/EDR, vulnerability tools), cut vulnerability aging against CISA KEV targets, and raise control pass rates without slowing delivery.
During incidents, you will lead joint “swarm” response, contain issues quickly, and turn lessons into baseline changes, POA&Ms, and updated playbooks. For executives and non-technical stakeholders, you’ll translate risk into clear narratives - what happened, what changed, how we’re safer, and publish trend lines that connect security investments to fewer outages, cleaner audits, and lower total cost of ownership.
- Education: Bachelor's Degree. In lieu of a degree, an additional four years of related experience required
- Experience: 10+ years in enterprise cybersecurity engineering/operations with direct ownership of hybrid (data center + AWS/Azure) environments; 3+ years in regulated or federal programs (VA/DoD/DHS/HHS or equivalent).
- Demonstrated delivery of Zero Trust architectures (per NIST SP 800-207/TIC 3.0), RMF/ATO sustainment (SP 800-53 Rev 5/53B baselines), and continuous monitoring at scale.
- Hands‑on leadership standing up SIEM/SOAR, EDR, vulnerability management, identity platforms (SSO/PIV/FIDO, PAM/JIT), and audited disaster recovery programs (SP 800-184).
- Proven record improving outcomes: higher control pass, reduced critical vuln aging, faster MTTR, successful external assessments, and repeatable ATO renewals.
- Experience operating within multi‑vendor/SIAM models with cross‑vendor OLAs and shared KPIs.
- Identity & Access (ICAM): SSO (SAML/OIDC), PIV/CAC and FIDO2, JIT/PAM, least‑privilege for human and workload identities; directory hygiene and join/move/leave automation.
- Network & Platform Security:
Segmentation and micro‑segmentation, SASE/SD‑WAN patterns aligned to TIC 3.0; hardened baselines (STIG/CIS) for OS, containers, and Kubernetes/Open Shift (admission control, policy engines).
- Logging, Detection, and Response:
Event logging per OMB M-21-31, SIEM content engineering, SOAR playbooks, EDR tuning; run tabletop exercises and purple‑team improvements.
- Vulnerability & Patch Orchestration:
Toolchain proficiency (e.g., Tenable/Qualys, WSUS/Linux lifecycle), KEV‑driven prioritization, SLAs by criticality, and automated compliance evidence (SCAP).
- Secure SDLC & Supply Chain: SSDF (SP 800-218) practices, artifact signing and provenance/attestations (SLSA/SBOM), trusted registries, policy‑as‑code gates in CI/CD; secrets management (KMS/Vault).
- Data & Storage Protection:
Encryption in transit/at rest (FIPS‑140 validated), key management, DLP patterns, immutable/object‑lock backups, tested DR with objective pass/fail artifacts.
- Standards & Tooling Fluency: NIST CSF 2.0, SP 800-61 (IR), SP…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).