Security Subject Matter Expert (SME)

Clearance Level
None
Category
Cyber and IT Risk Management
Location
Remote, Working from the USA
(Hybrid Workplace)
Key Skills For Success

Identity Access Management (IAM)

Platform Security

Single Sign-On (SSO)

Vulnerability Management

Zero Trust

REQ#: RQ211630
Public Trust: MBI (T2)
Requisition Type: Regular
Your Impact

Own your opportunity to work alongside federal civilian agencies. Make an impact by providing services that help the government ensure the well being of U.S. citizens.

Job Description

Security Subject Matter Expert (SME)

The Security Subject Matter Expert (SME) is the program’s security lead for a large, hybrid enterprise (on-prem data centers and multi-cloud). You will architect, implement, and operate a Zero Trust, RMF-aligned security solutions that keep systems reliable, data protected, and the program audit-ready at all times. You will own the end-to-end security operating model, identity and access (including PIV/FIDO and PAM), vulnerability and patch orchestration, logging and SIEM/SOAR, supply-chain integrity (SBOM/provenance), backup/DR resilience, and continuous monitoring.

Timeline: This is a contingent posting, expected to start in August, 2026

HOW the Security SME WILL MAKE AN IMPACT

You will convert compliance into a running capability rather than a paperwork cycle. By embedding controls in automation, policy-as-code in pipelines, signed artifacts with attestations, identity-centric access, and immutable backups, you will raise assurance while reducing toil and mean time to recover. You’ll drive continuous compliance with authoritative evidence from VA systems (ITSM/CMDB, SIEM/EDR, vulnerability tools), cut vulnerability aging against CISA KEV targets, and raise control pass rates without slowing delivery. During incidents, you will lead joint “swarm” response, contain issues quickly, and turn lessons into baseline changes, POA&Ms, and updated playbooks. For executives and non-technical stakeholders, you’ll translate risk into clear narratives - what happened, what changed, how we’re safer, and publish trend lines that connect security investments to fewer outages, cleaner audits, and lower total cost of ownership.

WHAT YOU’LL NEED TO SUCCEED:

  • Education: Bachelor's Degree. In lieu of a degree, an additional four years of related experience required
  • Experience:
    • 10+ years in enterprise cybersecurity engineering/operations with direct ownership of hybrid (data center + AWS/Azure) environments; 3+ years in regulated or federal programs (VA/DoD/DHS/HHS or equivalent).
    • Demonstrated delivery of Zero Trust architectures (per NIST SP 800-207/TIC 3.0), RMF/ATO sustainment (SP 800-53 Rev 5/53B baselines), and continuous monitoring at scale.
    • Hands-on leadership standing up SIEM/SOAR, EDR, vulnerability management, identity platforms (SSO/PIV/FIDO, PAM/JIT), and audited disaster recovery programs (SP 800-184).
    • Proven record improving outcomes: higher control pass, reduced critical vuln aging, faster MTTR, successful external assessments, and repeatable ATO renewals.
    • Experience operating within multi-vendor/SIAM models with cross-vendor OLAs and shared KPIs.
  • Technical skills:
    • Identity & Access (ICAM): SSO (SAML/OIDC), PIV/CAC and FIDO2, JIT/PAM, least-privilege for human and workload identities; directory hygiene and join/move/leave automation.
    • Network & Platform Security: Segmentation and micro-segmentation, SASE/SD-WAN patterns aligned to TIC 3.0; hardened baselines (STIG/CIS) for OS, containers, and Kubernetes/OpenShift (admission control, policy engines).
    • Logging, Detection, and Response: Event logging per OMB M-21-31, SIEM content engineering, SOAR playbooks, EDR tuning; run tabletop exercises and purple-team improvements.
    • Vulnerability & Patch Orchestration: Toolchain proficiency (e.g., Tenable/Qualys, WSUS/Linux lifecycle), KEV-driven prioritization, SLAs by criticality, and automated compliance evidence (SCAP).
    • Secure SDLC & Supply Chain: SSDF (SP 800-218) practices, artifact signing and provenance/attestations (SLSA/SBOM), trusted registries, policy-as-code gates in CI/CD; secrets management (KMS/Vault).
    • Data & Storage Protection: Encryption in transit/at rest (FIPS-140 validated), key management, DLP patterns, immutable/object-lock backups, tested DR with objective pass/fail artifacts.
    • Standards & Tooling Fluency: NIST CSF 2.0, SP 800-61 (IR), SP 800-53/53B, SP 800-207, SP 800-184, TIC 3.0, FIPS-140; OSCAL for machine-readable SSP/ConMon
  • Security clearance level: Public Trust
  • Skills and abilities:
    • Clear Communicator: Converts complex risk and telemetry into executive-ready, plain-language updates; writes crisp playbooks, runbooks, and policy one-pagers.
    • Outcome-Driven: Ties security work to measurable results, control pass rate, vuln aging, incident frequency/MTTR, DR test pass, and audit findings, published on a shared scorecard.
    • Builder’s Mindset: Designs controls that are easy to use and hard to bypass; prefers automation over manual checks; balances guardrails with delivery speed.
    • Facilitation & Influence: Leads cross-domain incident “swarming,” champions secure patterns with engineers, and negotiates trade-offs that protect both security and uptime.
    • Governance & Rigor: Runs change risk reviews, manages POA&Ms to closure, and keeps the ATO pipeline predictable with OSCAL-based evidence and scheduled assessments.
    • Mission Focus: Aligns security investments with VA outcomes including fewer disruptions for clinicians and staff, stronger protection of Veteran data, and demonstrable stewardship of taxpayer funds
  • Preferred Certifications:
    • CISSP
    • CCSP
    • CISM
    • CASP+
    • GIAC (GCIH/GCIA/GMON/GCSA/GPCS/GCED)
    • CEH
    • AWS/Azure security specialty
    • CAP or equivalent RMF credential
  • Location: Austin, TX – Hybrid Remote with periodic on-site meetings as required by the customer

GDIT IS YOUR PLACE:

  • Full-flex work week to own your priorities at work and at home
  • 401K with company match
  • Comprehensive health and wellness packages
  • Internal mobility team dedicated to helping you build your skills and own your career
  • Professional growth opportunities including paid education and certifications
  • Cutting-edge technology you can learn from
  • Rest and recharge with paid vacation and 10 company-paid holidays

If you are passionate about building secure-by-default, audit-ready operations that scale across data centers and clouds, and you enjoy turning standards into everyday practice for a mission that matters, we’d like to meet you.

Work Requirements
Years of Experience

10 + years of related experience

* may vary based on technical training, certification(s), or degree

Certification

Travel Required

Less than 10%

Salary and Benefit Information

The likely salary range for this position is $165,750 - $224,250. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
View information about benefits and our total rewards program.

About Our Work

We are GDIT. A global technology and professional services company that delivers technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across over 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, cloud, cyber and application development. Together with our customers, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc.

Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans