RiVidium Configuration Management Job Application

Applying for a Position



Enterprise Architect

Return to the jobs search page

Requisition #: 0058111021

Job Title: Enterprise Architect

Job Description:


Develops and maintains business, systems, and information processes to support enterprise mission needs; develops information technology (IT) rules and requirements that describe baseline and target architectures.


  • Define appropriate levels of system availability based on critical system functions and ensure that system requirements identify appropriate disaster recovery and continuity of operations requirements to include any appropriate fail-over/alternate site requirements, backup requirements, and material supportability requirements for system recover/restoration
  • Employ secure configuration management processes
  • Ensure that acquired or developed system(s) and architecture(s) are consistent with organization's cybersecurity architecture guidelines.
  • Identify and prioritize critical business functions in collaboration with organizational stakeholders
  • Provide advice on project costs, design concepts, or design changes
  • Provide input to the Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and maintenance training materials).
  • Analyze candidate architectures, allocate security services, and select security mechanisms
  • Develop a system security context, a preliminary system security Concept of Operations (CONOPS), and define baseline system security requirements in accordance with applicable cybersecurity requirements.
  • Evaluate security architectures and designs to determine the adequacy of security design and architecture proposed or provided in response to requirements contained in acquisition documents.
  • Write detailed functional specifications that document the architecture development process.
  • Analyze user needs and requirements to plan architecture
  • Capture and integrate essential system capabilities or business functions required for partial or full system restoration after a catastrophic failure event.
  • Develop enterprise architecture or system components required to meet user needs.
  • Document and update as necessary all definition and architecture activities
  • Integrate results regarding the identification of gaps in security architecture
  • Plan implementation strategy to ensure that enterprise components can be integrated and aligned
  • Translate proposed capabilities into technical requirements
  • Document how to implementation of a new system or new interface between systems impacts the current and target environment including but not limited to security posture
  • Integrate key management functions as related to cyberspace


  • In applying and incorporating information technologies into proposed solutions
  • In designing the integration of hardware and software solutions
  • In determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes
  • In design modeling and building use cases (e.g., unified modeling language)
  • In writing code in currently supported programming language (e.g., Java, C++)
  • In the use of design methods
  • To apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
  • To identify cybersecurity and privacy issues that stem from connections with internal and external and partner organizations.
  • IAT Level III Certified


  • To apply the methods, standards, and approaches for describing, analyzing, and documenting and organization's enterprise information technology (IT) architecture (e.g., Open Group Architecture Framework [TOGAF], Department of Defense Architecture Framework [DoDAF], Federal Enterprise Architecture Framework [FEAF]).
  • To conduct vulnerability scans and recognize vulnerabilities in security systems
  • To apply an organization's goals and objectives to develop and maintain architecture
  • To optimize systems to meet enterprise performance requirements
  • To execute technology integration processes
  • To build architectures and frameworks
  • To apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • To identify critical infrastructure systems with information communication technology that were designed without system security considerations
  • To set up a physical or logical sub-networks that separates an internal local area network (LAN) from other untrusted networks


  • TS/SCI with CI Poly


Please fill out the short application form below. If you have applied for a position with RiVidium in the past, we will know by querying your email address within our database once you submit the form. At that time we will ask you if you would like to use the resume we have on file to apply for the position described above. You will also have the option to submit a new resume if you wish to do so.

Please fill out application

  • select
    Please enter the chararacters

Back to the Top