Public Key Infrastructure (PKI) Policy/Governance SME

Fort Belvoir, VA, United States

Applications have closed

Agil3Tech (Agil3 Technology Solutions)

View company page

Company Description

MUST BE A U.S. CITIZEN

A3T (Agil3 Technology Solutions, LLC), one of the fastest growing U.S. companies, specializes in Cybersecurity Operations, IT/Digital Modernization, Emerging Technology, and Professional Services. Join A3T and watch your career soar!   

A3T is seeking a Public Key Infrastructure (PKI) Policy/Governance SME to support our critical customer mission.  If you are experienced, hard-working and dedicated, apply today!

Job Description

A3T is seeking qualified candidates to work with our client and provide policy, oversite, compliance guidance, implementation, synchronization and execution services to meet the Government’s mission requirements. We will be providing quick-response services, such as document reviews and preparing technical and procedural information papers, as well as providing technical services in support of conferences and meetings as directed.

The Access Management SME (PKI) will support and conduct PKI Governance and Policy Analysis, PKI Modernization Analysis, and the performance of PKI initiatives for the strategic and tactical environments in support of Federal, Department of Defense (DoD) and Army mandates.

 

Responsibilities:

  • Ensure that strategic and tactical PKI are aligned with modernization initiatives and support network and security performance requirements.
  • Develop policy, standards, planning metrics, and strategy recommendations that ensure Army networks and systems are secure and emerging integrated capabilities meet prescribed regulatory guidelines.
  • Analyze trends in DoD and Army PKI technology advancement and ensure PKI policy directives reflect technology advancements in a manner that sustains cybersecurity for the Army.

 

  • PKI Policy and Governance Analysis:
    • Support oversight, tracking, and validation of the Army’s PKI Modernization Initiatives and Integration efforts by coordinating with OSD, DoD CIO, National Security Agency (NSA) and the Army stakeholders.
    • Participate with DoD, Army, NSA, Defense Information System Agency (DISA) and other Services in Integrated Process Team (IPT), configuration management, portfolio management, planning and strategy meetings, budget reviews, and coordination meetings.
    • Analyze the Army’s cybersecurity posture as it relates to the DoD PKI/Public Key Enabled (PKE) infrastructure and program.
    • Analyze and evaluate Registration Authority Operations to identify policy or strategy gap issues with Certificate Practice Statement (CPS) and/or Registration Practice Statement (RPS) compliance, and Army certificate management practices, such as but not limited to, Army smart card/ token audit responsibilities, identity verification of the requester/subscriber, certificate issuance (hard and soft), key recovery, certificate revocation, and suspensions.

 

  • PKI Modernization:
    • Analyze the Army’s PKI while concurrently tracking emerging Federal and DoD identification, authentication, and encryption technology (i.e. technologies that have not been fielded) requirements with respect to the technical recommendations, the contractor shall develop technical recommendations that allows the Army to meet, track, and report on Army-wide goals in the transformation of the Army networks across the enterprise.
    • Provide PKI evaluation and assessment papers that focus on topics (such as but not limited to) test and evaluation of potential DoD / Army PKI strategic and tactical environment solutions, analysis of newly implemented technologies and how they are improving or impacting the Army and DoD PKI and reviews of the Army’s present-state PKI infrastructure.
    • Research current-state technologies and develop analyses, bridging existing capabilities with future capabilities allowing Army to transform Army PKI software/hardware-based certificate technologies.

Qualifications

  • Secret security clearance
  • Demonstrate an understanding of current PKI technology capabilities implemented across both the Department of Defense and the Army
  • Have knowledge of DoD and Army policies, public laws, regulations, procedures, and methods associated with PKI for both person and NPE
  • Have knowledge of Federal, DoD and Army ICAM and PKI strategies, policies, mandates, directives, methodologies, and technologies
  • Have knowledge/skills of Federal, DoD, and Army ICAM strategies, mandates, directives, policies, public laws, regulations, procedures, methodologies, and technologies
  • Be a self-starter and able to drive projects to completion in a fast-moving complicated environment
  • Have solid communications skills, both written and verbal
  • Have ability to evaluate and make recommendations pertaining to divestiture areas and integrating new capabilities, operations and technologies to help chart the Army’s strategic ICAM and PKI direction

Additional Information

Agil3 Technology Solutions (A3T) offers a competitive benefits package to include: paid holidays, paid time off, medical, dental, vision, 401K, company paid long and short term disability and life insurance, referral bonuses, education/certification reimbursement program, and more.

It is the policy of A3T to provide equal opportunity in recruiting, hiring, training, and promoting individuals in all job categories without regard to race, color, religion, national origin, gender, age, disability, genetic information, veteran status, sexual orientation, gender identity, or any other protected class or category as may be defined by federal, state, or local laws or regulations.

A3T maintains a drug-free workplace and performs pre-employment substance abuse testing to include background checks.

Tags: Certificate management Clearance Compliance DoD Encryption Governance PKI Security Clearance SOAR Strategy

Perks/benefits: Career development Conferences Health care Insurance Salary bonus

Region: North America
Country: United States
Job stats:  9  0  0
Category: Compliance Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.