Performs detailed architecture and technical design reviews on the full stack for vendor solutions.
Conducts architecture reviews of Cloud Service Providers (CSPs) authorization packages to validate the secure design, alignment to FedRAMP and agency requirements.
Completes comprehensive review and comments on documents of CSPs FedRAMP documentation, including but not limited to system security plans, policies and procedures.
Perform detailed architecture and technical design reviews on the full stack for vendor solutions
Complete comprehensive review and comment documents of CSPs FedRAMP documentation
Work alongside the agency FedRAMP Lead and provide security engineering services
Valiant Solutions is a security-focused IT solutions provider with public clients nationwide. They are named one of the fastest growing privately held companies, and pride themselves on providing their employees with great benefits and career development opportunities.
Lead the end-to-end Certification & Authorization (C&A) process for information systems.
Maintain and update System Security Plans (SSPs), POA&Ms, and other FedRAMP/GovRAMP/NIST documentation artifacts.
Oversee control gap analysis and drive remediation efforts across technical and administrative domains.
EBSCO Information Services (EBSCO) delivers a fully optimized research experience, seamlessly integrated with a powerful discovery platform to support the information needs of our end-users. Headquartered in Ipswich, MA, EBSCO employs more than 2,700 people worldwide, with most embracing hybrid or remote work models.
IFS is a billion-dollar revenue company with 7000+ employees on all continents. Their leading AI technology is the backbone of their award-winning enterprise software solutions, enabling customers to be their best when it really matters–at the Moment of Service™.
Manage and develop staff members under Product Compliance.
Oversee and contribute to the vulnerability management lifecycle.
Assess and serve as a subject matter expert for regulatory and compliance requirements.
ExtraHop is a company that focuses on network detection and response (NDR) to help organizations stay ahead of emerging threats. They integrate network threat detection, network performance management, intrusion detection, and packet forensics into a single console.
Develops and refines performance methodologies that support the cybersecurity requirements.
Oversee independent assessments and review Security Impact Analyses (SIA).
Incorporate compliance data into the Governance, Risk, and Compliance Tool (GRCT).
SkyePoint Decisions is a leading Cybersecurity Architecture and Engineering, Critical Infrastructure and Operations, and Applications Development and Maintenance IT service provider. It is an established ISO 9001:2015 and ISO/IEC 27001:2013 certified small business and appraised at CMMI Level 3 for Services and Development.
Own and lead the FedRAMP High authorization program.
Serve as the primary point of accountability for government compliance programs.
Manage compliance roadmaps, milestones, dependencies, risks, and remediation efforts.
Commvault is the gold standard in cyber resilience. The company empowers customers to uncover, take action, and rapidly recover from cyberattacks – keeping data safe and businesses resilient. For over 25 years, more than 100,000 organizations and a vast partner ecosystem have relied on Commvault to reduce risks, improve governance, and do more with data.
Design and implement authorized Google Cloud solutions that support the full spectrum of Dark Wolf capabilities.
Architect scalable mission solutions and platforms that enable Agile software teams to deploy code rapidly while maintaining rigorous compliance standards.
Lead the design of born-authorized cloud environments that inherently meet federal compliance standards without sacrificing usability.
Dark Wolf's Google Cloud Solutions Architects define the technical vision and architecture for complex, authorized cloud implementations in the U.S. Public Sector. Dark Wolf is an EEO/AA employer.
Conduct structured interviews with partner organizations, operational teams, and technical stakeholders.
Documents end‑to‑end operational workflows and surface implicit, non‑documented practices.
Identify workflow fragility zones, handoff risks, and transition‑period vulnerabilities.
Element serves as a partner at the intersection of innovation and our clients' needs, efficiently crafting meaningful user experiences for government and commercial customers. Our talented professionals bring unparalleled energy engagement, setting a higher standard for impactful work.
Own end-to-end operational delivery for Keeper’s U.S. Federal deployments.
Serve as a hands-on technical lead for federal platform operations.
Lead cross-functional execution to align Engineering, Security, Product, QA, and Customer Success.
Keeper Security transforms cybersecurity for organizations globally with zero-trust privileged access management. Keeper’s intuitive solutions are built with end-to-end encryption and trusted by federal agencies including the Departments of Justice and Energy.