Cross Domain Team Lead

Employer
CACI
Location
Springfield, VA, United States of America
Posted
Nov 23, 2022
Closes
Dec 23, 2022
Ref
272018
Function
IT
Hours
Full Time
Cross Domain Team Lead

Job Category: Information Technology

Time Type: Full time

Minimum Clearance Required to Start: TS/SCI with Polygraph

Employee Type: Regular

Percentage of Travel Required: Up to 10%

Type of Travel:

CACI is looking for Cross Domain Governance Professionals to lead a team in support of the customer's mission. Successful candidates will be knowledgeable, professional, and not afraid to roll sleeves up to get the job done. Years of experience, educational degree(s) and certification(s) will determine job level.

This position description is not an active opening but is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI.

What You'll Get to Do:
  • Develop and maintain business, systems, and information processes to support enterprise mission needs; develop information technology (IT) rules and requirements that describe baseline and target architectures.

More About the Role:
  • Define appropriate levels of system availability based on critical system functions and ensure that system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration.
  • Employ secure configuration management processes.
  • Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines.
  • Identify and prioritize critical business functions in collaboration with organizational stakeholders.
  • Provide advice on project costs, design concepts, or design changes. Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).
  • Analyze candidate architectures, allocate security services, and select security mechanisms.
  • Develop a system security context, a preliminary system security Concept of Operations (CONOPS),and define baseline system security requirements in accordance with applicable cybersecurity requirements. T0328: Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents.
  • Write detailed functional specifications that document the architecture development process.
  • Analyze user needs and requirements to plan architecture.
  • Capture and integrate essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.
  • Develop enterprise architecture or system components required to meet user needs.
  • Document and update as necessary all definition and architecture activities.
  • Integrate results regarding the identification of gaps in security architecture.
  • Plan implementation strategy to ensure that enterprise components can be integrated and aligned.
  • Translate proposed capabilities into technical requirements.
  • Document how the implementation of a new system or new interface between systems impacts the current and target environment including but not limited to security posture.
  • Integrate key management functions as related to cyberspace.

You'll Bring These Qualifications:
  • Current TS/SCI with polygraph clearance
  • Technical, mathematics, or engineering bachelor's degree or higher OR Offerings listed in DoD 8140 Training Repository OR applicable certifications, such as CND, GSEC, CASP+, CCSP, Cloud+, CSSLP, CISSP-ISSAP, or CISSP-ISSEP
  • Willing and able to support the greater amount of at least of at least 20 hours annually of continuous professional development, or the hours required to maintain certification.
  • Willing to work at customer site full-time.

These Qualifications Would be Nice to Have:
  • Active TS/SCI with polygraph clearance.
  • Experience with the specific customer.
  • Skill in applying and incorporating information technologies into proposed solutions.
  • Skill in designing the integration of hardware and software solutions. S0027: Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
  • Skill in design modeling and building use cases (e.g., unified modeling language).
  • Skill in writing code in a currently supported programming language (e.g., Java, C++).
  • Skill in the use of design methods.
  • Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • Skill to identify cybersecurity and privacy issues that stem from connections with internal and external customers and partner organizations.
  • Ability to apply the methods, standards, and approaches for describing, analyzing, and documenting an organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).
  • Ability to conduct vulnerability scans and recognize vulnerabilities in security systems.
  • Ability to apply an organization's goals and objectives to develop and maintain architecture.
  • Ability to optimize systems to meet enterprise performance requirements.
  • Ability to execute technology integration processes. A0060: Ability to build architectures and frameworks.
  • Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
  • Ability to set up a physical or logical sub-networks that separates an internal local area network (LAN) from other untrusted networks.


What We Can Offer You:

- We've been named a Best Place to Work by the Washington Post.

- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.

- We offer competitive benefits and learning and development opportunities.

- We are mission-oriented and ever vigilant in aligning our solutions with the nation's highest priorities.

- For over 55 years, the principles of CACI's unique, character-based culture have been the driving force behind our success.

Company Overview: At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.

As a federal contractor, CACI is subject to any federal vaccine mandates or other customer vaccination requirements. All new hires are required to report their vaccination status.

Similar jobs