What are the responsibilities and job description for the ZERO TRUST APPLICATIONS AND WORKLOADS SME position at Hiring Our Heroes?
Job Description
Job Description
ZERO TRUST APPLICATIONS AND WORKLOADS SME
MILITARY FRIENDLY & PREFERRED - HOH SPONSOR
Zermount Inc. is seeking a Zero Trust (ZT) Applications and Workloads SME to assist in providing security to one of our federal clients. The ZT Applications and Workloads SME will be part of the implementation of ZT principles across the pillars of ZT (identity, device, network, application and workload, and data) to assist the client in meeting the requirements set forth by EO 14028 and OMB M 22-09. The ZT Applications and Workloads SME will be responsible for leading the design, development, and assessment of virtualization and application security solutions in alignment with Zero Trust principles. You will collaborate with cross-functional teams to understand business requirements and translate them into secure and scalable technical solutions. Your expertise in virtualization technologies, application development, cloud security, and Zero Trust principles will be crucial in ensuring the organization's systems and applications are resilient, secure, and compliant.
Duties & Responsibilities :
The ZT Applications and Workloads SME will ensure the Zermount ZT solutions and services secure federal networks and meet the objectives of EO 14028 and other Federal requirements. Additionally, the ZT Applications and Workloads SME will provide support and services to include :
- Lead the design, development, and implementation of applications and workloads solutions aligned with Zero Trust principles.
- Support the architecture and design of innovative solutions and services to secure client networks, and provide leadership with recommendations on the right technologies, solutions, and processes required to meet the objectives of EO 14028 and other Federal requirements.
- Map ZT capabilities, requirements, and existing client capabilities, and new or approved capabilities required for the applications and workloads pillar as outlined by CISA, M-21-31, M-22-01, M-22-09, EO 14028, NIST 800-207, and any future memoranda, EO's, and standards.
- Collaborate with cross-functional teams to understand business requirements and translate them into technical solutions.
- Provide expertise for the secure development of applications, ensuring that security is integrated into the Software Development Lifecycle (SDLC) from the beginning and driving DevSecOps practices.
- Provide expertise for segmenting workloads to isolate them from each other, reducing the attack surface and minimizing the impact of potential breaches.
- Provides expertise for establishing continuous monitoring solutions and capabilities to detect and respond to anomalies and potential security threats within applications and workloads.
- Provides expertise to ensure the secure integration of applications and workloads across various environments (e.g., cloud, on premises, and hybrid).
- Provide expertise in the review, assessment, and solution recommendation for Zero Trust maturity evaluations.
- Stay up to date with emerging technologies and industry trends related to application security, application access controls, application threat protections, and secure application development.
- Provide technical guidance and mentorship to junior team members.
Qualifications :
Zero Trust Specific Qualifications : System Maturity Model
Demonstrated experience in automating application access decisions with enhanced contextual information and enforced expiration conditions to ensure adherence to the principle of least privilege.
Extensive experience in implementing advanced threat protections into all application workflows, providing real-time visibility and monitoring.
Successful track record in delivering all relevant applications over open public networks to authorized users and devices, ensuring accessibility as needed.
Expertise in integrating application security testing throughout the software development lifecycle across the entire enterprise, including routine automated testing of deployed applications.
Education :
Relevant years of experience may be used in substitution for situations where the candidate does not have a Bachelor's degree in the required field.
Certifications :
Certified Authorization Professional (CAP);
Clearance level :