Role: Security Architect
Positions: 01
Work Mode: Hybrid
Experience : 5+
Client State: Virginia
As a Security Architect you will lead the design, implementation, and oversight of enterprise-wide security architecture that protects users information, infrastructure, and applications.
You will define and enforce security frameworks, guide secure system design, ensure regulatory compliance, and advise technical teams and leadership on security risks, best practices, and architectural decisions.
This is a hybrid role requiring collaboration with cybersecurity teams, cloud architects, application developers, network engineers, and business stakeholders to strengthen the agency s security posture and support modern IT initiatives.
Security Strategy & Architecture
Define, document, and maintain enterprise security architecture aligned to business objectives and risk tolerance.
Analyze legacy and new systems for security gaps; propose secure architectural solutions.
Lead threat modeling, risk analysis, and security control design across on-premises, hybrid, and cloud environments.
Security Implementation & Tooling
Evaluate, recommend, deploy, and manage security technologies to enforce defense-in-depth:
Firewalls, IDS/IPS, endpoint protection, encryption tools
SIEM/SOAR (e.g., Splunk, QRadar)
Vulnerability scanning and remediation (e.g., Rapid7, Qualys)
Identity & Access Management (IAM) and multi-factor authentication (2FA)
Frameworks, Compliance & Documentation
Ensure compliance with relevant frameworks & standards (e.g., NIST 800-53, IRS Pub 1075, state security policies).
Create and review System Security Plans (SSPs), security policies, security design documents, and architectural diagrams.
Cross-Team Collaboration
Act as a security advisor for IT teams including application developers throughout the SDLC.
Partner with DevOps, cloud, and infrastructure teams to implement secure CI/CD and Infrastructure as Code (IaC) practices.
Support incident response, audits, penetration testing, and remediation planning.
Security Monitoring & Reporting
Define metrics and dashboards to monitor security posture and report to leadership.
Review logs, alerts, and threat intelligence to identify, analyze, and respond to security events.