Showing results for 
Show  only  | Search instead for 
Did you mean: 
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Newcomer II

Opportunity - TDI Inc. - Cybersecurity Architect - Washington DC Area

Cybersecurity Architect

Apply via this link:


Tetrad Digital Integrity (TDI) is a leading-edge cybersecurity firm with a mission to safeguard and protect our customers from increasing threats and vulnerabilities in this digital age. With over 20 years of knowledge and expertise, our services have created innovative and business-improvement oriented solutions across a diverse and international market that includes both government and commercial clients.


We are seeking a Cybersecurity Architect to help ensure the continued operation of the systems that protect a client’s network against unauthorized access, modification of data, and malicious activity.  These systems require continuous management and monitoring to ensure they are functioning as expected and to analyze and respond to alerts as they occur.  


As a small business, we are committed to delivering excellence in our products and services, integrity in the way we conduct ourselves and respect in dealing with one and another. TDI values each and every employees' contribution to our continued growth and success. We recognize and value our employees and their individualism as we work to create a diverse work force. Join Team TDI and become a TDI Titan today!



  • Analyze user needs and requirements to plan system architecture supporting cybersecurity operations.  
  • Collaborate with system developers and users to select appropriate design solutions or ensure the compatibility of system components.  
  • Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.  
  • Design system architecture or system components required to meet user needs.  
  • Document and address organization's information security, cybersecurity architecture, and systems security engineering requirements throughout the acquisition lifecycle.  
  • Employ secure configuration management processes.  
  • Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines.  
  • Evaluate current or emerging technologies to consider factors such as cost, security, compatibility, or usability.  
  • Identify the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately.  
  • Perform security reviews, identify gaps in security architecture, and develop a security risk management plan.  
  • Plan system implementation to ensure that all systems components can be integrated and aligned (e.g., procedures, databases, policies, software, and hardware).  
  • Provide input on security requirements to be included in statements of work and other appropriate procurement documents.  
  • Provide input to the Risk Management Framework process activities and related documentation.  
  • Translate proposed technical solutions into technical specifications.  
  • Propose new technologies or procedures that could be used to advance the ability to detect and mitigate malicious activity.  



  • Bachelor’s degree in computer related field plus 5 (five) years of professional experience or equivalent work experience is required.  In lieu of a bachelor’s degree, at least eight (8) years of Information Technology security experience 
  • Security certifications such as CEH and/or CISSP, or other Cloud Security related certifications
  • Demonstrated experience and advanced knowledge of security systems analysis, testing, and documentation 
  • Knowledge of virtual environments, network operating systems, mobile device environments, and data encryption methods 
  • Demonstrated expertise in communication protocols, network operating systems, servers, firewall implementation, IPS/IDS systems, and advanced malware detection systems 
  • Demonstrated knowledge of TCP/IP, network fundamental, network security, NetFlow and knowledge of tools such as Wireshark.  
  • Demonstrated knowledge of NetWitness, FireEye, Splunk, AWS Direct Connect, Checkpoint/Barracuda Firewalls, StealthWatch, ThreatConnect, O365, Bro, AWS/AZURE Security Onion, Gigamon, and VMware. 


0 Replies