Zero Trust Architect SME
Listed on 2026-03-02
-
IT/Tech
Cybersecurity, Systems Engineer
Type of Requisition
Regular
Clearance Level Must Currently PossessTop Secret
Clearance Level Must Be Able to ObtainTop Secret/SCI
Public Trust/Other RequiredNone
Job FamilyCyber and IT Risk Management
Job Qualifications SkillsIdentity and Access Managment (IAM), Secure Network Architecture, Zero Trust
CertificationsNone
Experience15 + years of related experience
US Citizenship RequiredYes
Job DescriptionAdvance your career while impacting our national security in cyber as a Zero Trust Architect Subject Matter Expert (SME) e, technologists have many paths to grow a meaningful career supporting cyber missions and operations across the federal government.
We are seeking a Zero Trust Architect SME to drive Zero Trust strategy, architecture, and implementation for a mission-critical defense program in Oahu, Hawaii. This individual will serve as the senior technical authority responsible for designing, integrating, and operationalizing Zero Trust principles across enterprise IT systems, cloud environments, tactical networks, and classified infrastructures.
The ideal candidate brings deep cybersecurity architecture expertise, strong knowledge of DoD Zero Trust guidance, and experience implementing identity-centric and data-centric security controls in complex environments.
Key Responsibilities- Design and implement Zero Trust architectures aligned with DoD Zero Trust Strategy and Reference Architecture.
- Develop phased implementation roadmaps for Zero Trust maturity progression.
- Architect identity, device, network, application, and data protections across multi-domain environments.
- Ensure alignment with enterprise cybersecurity, cloud, and network modernization initiatives.
- Architect and integrate identity-driven security controls including:
- Multi-factor authentication (MFA)
- Privileged Access Management (PAM)
- Identity governance and lifecycle management
- Conditional access policies
- Lead implementation of least privilege and continuous verification principles.
- Design micro-segmentation and software-defined perimeter solutions.
- Integrate Zero Trust principles into enterprise routing, switching, SD-WAN, and remote access solutions.
- Support secure access for hybrid and tactical environments.
- Architect data-centric security controls including:
- Data classification and labeling
- Data Loss Prevention (DLP)
- Encryption in transit and at rest
- Integrate endpoint detection and response (EDR/XDR) into Zero Trust framework.
- Ensure device compliance enforcement prior to resource access.
- Apply Zero Trust principles to hybrid cloud environments (e.g., AWS Gov Cloud, Azure Government).
- Secure containerized and virtualized workloads.
- Integrate Zero Trust controls into Dev Sec Ops pipelines.
- Ensure compliance with:
- DoD Zero Trust guidance
- Risk Management Framework (RMF)
- DISA STIG requirements
- Support ATO activities and cybersecurity inspections.
- Develop policy documentation and implementation standards.
- Active Top Secret clearance (SCI eligibility strongly preferred).
- Bachelor’s degree in Cybersecurity, Computer Science, Engineering, or related field (Master’s preferred).
- 15+ years of progressive cybersecurity experience.
- Demonstrated experience implementing Zero Trust principles in DoD or federal environments.
- Deep expertise in:
- Identity and Access Management (IAM)
- Micro-segmentation technologies
- Endpoint security (EDR/XDR)
- Secure network architecture
- Cloud security architecture
- Strong understanding of:
- DoD Zero Trust Strategy and Target Level framework
- RMF and ATO processes
- Cross-domain solutions
- Classified network environments (e.g., SIPR/JWICS)
- CISSP
- CISM or CRISC
- Certified Zero Trust Professional (CZTP) or equivalent
- CCSP (Cloud Security)
- CASP+
- Experience supporting Pacific or INDOPACOM-based missions.
- Experience transitioning legacy perimeter-based architectures to Zero Trust models.
- Experience integrating Zero Trust into operational/tactical environments.
- Familiarity with automation and policy-as-code security enforcement.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).