Public Key Infrastructure (PKI) Policy/Governance SME
Fort Belvoir, VA, United States
Agil3Tech (Agil3 Technology Solutions)
Company Description
MUST BE A U.S. CITIZEN
A3T (Agil3 Technology Solutions, LLC), one of the fastest growing U.S. companies, specializes in Cybersecurity Operations, IT/Digital Modernization, Emerging Technology, and Professional Services. Join A3T and watch your career soar!
A3T is seeking a Public Key Infrastructure (PKI) Policy/Governance SME to support our critical customer mission. If you are experienced, hard-working and dedicated, apply today!
Job Description
A3T is seeking qualified candidates to work with our client and provide policy, oversite, compliance guidance, implementation, synchronization and execution services to meet the Government’s mission requirements. We will be providing quick-response services, such as document reviews and preparing technical and procedural information papers, as well as providing technical services in support of conferences and meetings as directed.
The Access Management SME (PKI) will support and conduct PKI Governance and Policy Analysis, PKI Modernization Analysis, and the performance of PKI initiatives for the strategic and tactical environments in support of Federal, Department of Defense (DoD) and Army mandates.
Responsibilities:
- Ensure that strategic and tactical PKI are aligned with modernization initiatives and support network and security performance requirements.
- Develop policy, standards, planning metrics, and strategy recommendations that ensure Army networks and systems are secure and emerging integrated capabilities meet prescribed regulatory guidelines.
- Analyze trends in DoD and Army PKI technology advancement and ensure PKI policy directives reflect technology advancements in a manner that sustains cybersecurity for the Army.
- PKI Policy and Governance Analysis:
- Support oversight, tracking, and validation of the Army’s PKI Modernization Initiatives and Integration efforts by coordinating with OSD, DoD CIO, National Security Agency (NSA) and the Army stakeholders.
- Participate with DoD, Army, NSA, Defense Information System Agency (DISA) and other Services in Integrated Process Team (IPT), configuration management, portfolio management, planning and strategy meetings, budget reviews, and coordination meetings.
- Analyze the Army’s cybersecurity posture as it relates to the DoD PKI/Public Key Enabled (PKE) infrastructure and program.
- Analyze and evaluate Registration Authority Operations to identify policy or strategy gap issues with Certificate Practice Statement (CPS) and/or Registration Practice Statement (RPS) compliance, and Army certificate management practices, such as but not limited to, Army smart card/ token audit responsibilities, identity verification of the requester/subscriber, certificate issuance (hard and soft), key recovery, certificate revocation, and suspensions.
- PKI Modernization:
- Analyze the Army’s PKI while concurrently tracking emerging Federal and DoD identification, authentication, and encryption technology (i.e. technologies that have not been fielded) requirements with respect to the technical recommendations, the contractor shall develop technical recommendations that allows the Army to meet, track, and report on Army-wide goals in the transformation of the Army networks across the enterprise.
- Provide PKI evaluation and assessment papers that focus on topics (such as but not limited to) test and evaluation of potential DoD / Army PKI strategic and tactical environment solutions, analysis of newly implemented technologies and how they are improving or impacting the Army and DoD PKI and reviews of the Army’s present-state PKI infrastructure.
- Research current-state technologies and develop analyses, bridging existing capabilities with future capabilities allowing Army to transform Army PKI software/hardware-based certificate technologies.
Qualifications
- Secret security clearance
- Demonstrate an understanding of current PKI technology capabilities implemented across both the Department of Defense and the Army
- Have knowledge of DoD and Army policies, public laws, regulations, procedures, and methods associated with PKI for both person and NPE
- Have knowledge of Federal, DoD and Army ICAM and PKI strategies, policies, mandates, directives, methodologies, and technologies
- Have knowledge/skills of Federal, DoD, and Army ICAM strategies, mandates, directives, policies, public laws, regulations, procedures, methodologies, and technologies
- Be a self-starter and able to drive projects to completion in a fast-moving complicated environment
- Have solid communications skills, both written and verbal
- Have ability to evaluate and make recommendations pertaining to divestiture areas and integrating new capabilities, operations and technologies to help chart the Army’s strategic ICAM and PKI direction
Additional Information
Agil3 Technology Solutions (A3T) offers a competitive benefits package to include: paid holidays, paid time off, medical, dental, vision, 401K, company paid long and short term disability and life insurance, referral bonuses, education/certification reimbursement program, and more.
It is the policy of A3T to provide equal opportunity in recruiting, hiring, training, and promoting individuals in all job categories without regard to race, color, religion, national origin, gender, age, disability, genetic information, veteran status, sexual orientation, gender identity, or any other protected class or category as may be defined by federal, state, or local laws or regulations.
A3T maintains a drug-free workplace and performs pre-employment substance abuse testing to include background checks.
Tags: Certificate management Clearance Compliance DoD Encryption Governance PKI Security Clearance SOAR Strategy
Perks/benefits: Career development Conferences Health care Insurance Salary bonus
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Security Operations Engineer jobs
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Product Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cybersecurity Consultant jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Cybersecurity Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Senior Security Architect jobs
- Open IT Security Engineer jobs
- Open Clearance-related jobs
- Open Windows-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Network security-related jobs
- Open Agile-related jobs
- Open Pentesting-related jobs
- Open Vulnerability management-related jobs
- Open GCP-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open IDS-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open Malware-related jobs
- Open Kubernetes-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open IPS-related jobs