Cybersecurity Solution Architect

Clearance Level
Systems Engineering
Doral, Florida
Onsite Workplace
Key Skills For Success

Business Architecture and Analysis

Business Process Re-Engineering (BPR)

Enterprise Architecture Development

Information Architecture

Organizational Change Management

REQ#: RQ148580
Requisition Type: Regular
Your Impact

Own your opportunity to work with the largest government agency in the nation. Make an impact by advancing the Department of Defense’s mission to keep our country safe and secure.

Job Description

Cybersecurity Solution Architect

Doral FL - Onsite Role (remote work is not available)

The Cybersecurity Solution Architect will provide guidance & support in the translation of Desired Functional/Technical/Operational Outcomes into actionable/deliverable requirements

  • Define/Maintain Cybersecurity conpliance Guidelines/Models across the Enterprise (DAO SOUTHCOM)

  • Understand, Communicate & Translate Cybersecurity Reengineering needs driven by Zero Trust transformation

  • Develop the End State Cybersecurity "Security Reference Architecture" IAW Application , Data, & Technology Architectures

  • Suggest, Monitor & Apply Cybersecurity Design & Deployment ‘Best Practice’ to DOA SOUTHCOM, USANEC, J6-5 (Office of the CIO)

  • Cybersecurity Guru, that is able to interpret DoD Zero Trust Strategy, Use Cases, Application Pillars/Capabilities/Activities etc. and adapt to/with the DAO SOUTHCOM Technologies, Processes, etc.

  • Develop & Maintain Cybersecurity Models / Maps / Deliverables

  • Collaborate w/ All Solution Architects, the Enterprise Architect, Functional & Technical SME’s (Military, Govt. & Contractors) & the PIE (Projects, Integration & Engineering) & JDOC Teams

Job Description
  • Identifies solutions based on business and technical criteria, analyzes alternatives based on trade space, and implements designs

  • Experienced with on-prem, cloud, hybrid-cloud enablement of "Cybersecurity" and able to make recommendations to SOUTHCOM decision makers

  • Research current and emerging Cybersecurity methodologies/frameworks (ZTA) and proposes changes and tailoring where needed

  • Assesses the architectures currently in place and works with staff to recommend improvements

  • Develops, enhances, and maintains established service design procedure and processes by applying Cybersecurity frameworks and methodologies

  • Prepares and presents training plans, test plans, presentations, and analyst briefings

  • Identifies customer Cybersecurity requirements, analyzes alternatives, and conducts recommendations related to organizational change management (Jobs/Roles/Responsibilities), applications, data/resource mappings, etc.

  • May coach and provide guidance to less-experienced technical professionals, as well as 'project managers' in the PIE Services Team (especially those in the DevSecOps software factory)

  • Recognized as a Subject Matter Expert in Cybersecurity architecture

Desired Cybersecurity Background: IT/DoD/Cybersecurity Domains including:

  • Security Management Practices;
  • Access Control Systems and Methodology;
  • Telecommunications and Networking Security;
  • Cryptography; Encryption
  • Security Architecture and Models;
  • Operations Security;
  • Application and Systems Development Security;
  • Physical Security;
  • Business Continuity and Disaster Recovery Planning; and
  • Laws, Investigation, and Ethics.

Ideal Candidate will have any/all of the following:

  • X-industry experience (Aerospace & Defense, Automotive, High Tech, Regulated Industries)
  • X-agency/component experience (DoD, Federal, State and/or Local Govt.)
  • Defense Federal Acquisition Regulation Supplement (DFARS) — Clause 252.204-7012 outlines the expectations for cyber hygiene for DIB organizations.
  • NIST 800-171 — Based on DFARS, NIST 800-171 provides detailed guidelines for companies to assess their cybersecurity practices.
  • CMMC — The CMMC provides a clear plan for DIB organizations to attain the cyber hygiene certification required to be an approved DoD vendor.

Desired Certifications (any/all)

  • CompTIA Network

  • CompTIA Security

  • EC-Council Certified Ethical Hacker

  • CompTIA CASP

  • ISC(2) CISSP


  • Secret Required to start. MUST be eligible to obtain TS/SCI


  • BA/BS (or equivalent experience in lieu of degree)

  • 15+ years of experience




Work Requirements
Years of Experience

15 + years of related experience

* may vary based on technical training, certification(s), or degree

Travel Required

Less than 10%


U.S. Citizenship Required

About Our Work

We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

COVID-19 Vaccination

GDIT does not have a vaccination mandate applicable to all employees. To protect the health and safety of its employees and to comply with customer requirements, however, GDIT may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on customer site requirements.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.