About the Client
We are sourcing on behalf of a client who specializes in security training and preparedness solutions in the region. They focus on delivering adaptive, practical training programs and assessment platforms that address real-world operational challenges. Their approach emphasizes innovation and relevance, preparing professionals for complex and evolving security environments.
Role Purpose
Cyber Security Architect with proven expertise in designing and implementing secure infrastructure environments for handling classified data, including Top Secret, Secret, and Confidential classifications. The ideal candidate will have end-to-end experience architecting secure systems that enable data classification, protection, and controlled workflows for transferring sensitive information between classified and non-classified zones, across both on-premise and cloud environments.
Key Responsibilities
- Design and implement secure infrastructure architectures that comply with classified data handling requirements, covering on-premise, hybrid, and cloud environments.
- Develop and enforce data classification frameworks and ensure secure workflows for sensitive data transfer.
- Architect and secure cloud-native environments (IaaS, PaaS, SaaS) including multi-cloud and hybrid cloud deployments.
- Apply deep technical knowledge of security standards, controls, and compliance frameworks to infrastructure and cloud design.
- Collaborate with stakeholders to assess risks and establish secure design patterns for high-assurance environments.
- Conduct architecture reviews to ensure adherence to regulatory and compliance obligations.
Required Expertise
- Strong background in secure infrastructure design for classified and sensitive environments.
- Expertise in data classification methodologies and secure data workflow implementation.
- Familiarity with cross-domain solutions for secure data transfer between classified/non-classified systems.
- Deep understanding of cloud security architectures (AWS, Azure, GCP) including encryption, key management, secure configurations, and identity/access management.
- Experience implementing Zero Trust principles in hybrid and cloud environments.
- Hands-on knowledge of secure configuration, encryption, key management, and access control.
By applying to this position, you are granting us permission to process your CV and keep your profile on file for consideration for this and future opportunities.