Federal Working Group is always looking for dynamic and skilled professionals to join our growing team.

If you are looking for a place where you can put your creativity and experience to work, make a difference and be recognized for the value you offer, you’ve found it here.  Our entrepreneurial culture rewards employees who are willing to make a commitment and find dynamic solutions to complex problems.

  • Cyber Security Architect
  • Washington DC
  • Full-Time

Job Description


Federal Working Group Inc. is currently seeking Cyber Security Architect. As a Cyber Security Engineer/Architect directly supporting the customer, you will be trusted to provide critical technical support in addressing complicated IT-related issues and delivering exceptional customer service. In this role, the Security Engineer/Architect will work on the creation and maintenance of security-relevant documentation (Security Plans, briefings, revisions, and updates, etc.), act as an adviser to IT systems engineers, and propose changes to the enterprise technical architecture based on analysis of security requirements and new technology. The candidate will be responsible for providing expert-level guidance to projects team members to ensure systems under development are compatible with existing enterprise IT Solutions and adhere to complex security requirements.




Federal Working Group is a Northern Virginia-based small business committed to delivering value through trust and loyalty of our customers, retaining highly skilled and experienced professionals, practical application of structured management frameworks, and implementing current best practices.


Federal Working Group’s core competencies are Agile IT Programs, Project Management Services, Enterprise Portfolio Management & Governance Services, Infrastructure Strategy & Data Center Supports, and IT Security, Strategy & Operations.


Federal Working Group was established in 2004 as a competitive and high-performing company.  Federal Working Group has a proven track record in exceeding customers’ expectations, an outstanding solutions provider.




  • Expert evaluating security risk of applications, systems, and networks
  • Proven track record developing, writing, and maintaining Security plans for complex applications
  • Demonstrated experience engineering security solutions for large complex IT development efforts involving both software and hardware
  • Knowledgeable experience and knowledge of data protection levels and encryption standards
  • Exhibited experience navigating through the customer security A&A process
  • Excellent organizational skills and attention to detail
  • Excellent interpersonal and customer service skills




  • Working as part of a motivated, high-performing team
  • Resolving critical IT-related issues that negatively impact the customer’s mission
  • Collaborating with teammates and government customers to identify process improvements
  • Lending expertise and institutional knowledge to less experienced engineers to improve the overall technical excellence of the team
  • Serve as a subject matter expert in supporting Cisco, Palo Altos, and other network defense technologies
  • Provide architectural analysis of cybersecurity features as it relates to current and future needs
  • Design and develop new systems and application solutions for enterprise-wide cyber systems and networks.
  • Integrate new architectural features into existing infrastructure and design cybersecurity architectural artifacts
  • Ensure system security needs are established and maintained for operations development
  • Preserve, protect, recover and reconstitute friendly cyberspace capabilities before, during, and after network attacks
  • Provide engineering recommendations and resolve integration and testing issues
  • Participate in project management, planning, implementation, and installation to ensure configuration and integration conforms to baseline architecture
  • Assess network boundaries to provide intrusion detection, identification, and internal/external IT threat analysis
  • Prepare network or infrastructure Visio topology diagrams
  • Write Standard Operating Procedures (SOPs)
  • Plans and designs security solutions and capabilities that enable organizations to identify, protect, detect, respond and recover from cyber threats and vulnerabilities
  • Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems
  • Develops integration plans to protect existing infrastructure and to incorporate future solutions
  • Designs actions plans for policy creation and governance, system hardening, monitoring, incident response disaster recovery, and emerging cybersecurity threats
  • Utilizes a variety of security information and event management (SEIM) data loss prevention (DLP) intrusion prevention syste3mns (IPS) and other tools in the design
  • Partners with stakeholders to encourage the adoption of security-compatible software designs and best practices
  • Analyze Intrusion Detection Systems (IDS) to identify security issues for remediation
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information
  • Assists with implementation of countermeasures or mitigating controls
  • Conducts regular audits to ensure that systems are being operated securely and information systems security policies and procedures are being implemented as defined in security plans
  • Tests firewalls, intrusion detection systems, enterprise anti-virus systems, and software deployment tools
  • Safeguards the network against unauthorized infiltration, modification, destruction, or disclosure
  • Responds to queries and requests for computer security information and reports
  • Conducts investigations of computer security violations and incidents, reporting as necessary to management
  • Researches evaluate, tests, recommends, communicates, and implements new security software or devices
  • Implements enforce, communicates, and develops security policies or plans for data, software applications, hardware, and telecommunications
  • Develops materials for computer security education/awareness programs
  • Provides recommendations to clients on information assurance engineering standards, implementation dependencies, and changing information assurance-related technologies
  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system, and external Web integrity scans to determine compliance
  • Provides information to management regarding the negative impact on the business caused by theft, destruction, alteration, or denial of access to information
  • Provides advanced guidance and leadership to less-experienced team members
  • Provides information assurance project management, technical security staff oversight, and development of mission-critical technical documents


Required Qualifications:


  • Education: Bachelor’s degree in Computer Science, Engineering, a related technical discipline, or work experience
  • Minimum of 10 years related experience


Preferred Qualifications:


  • Proven track record with experience working with security testing tools and mechanisms
  • Knowledgeable with engineering and securing cloud base solutions
  • Demonstrated experience with engineering security solutions for service-oriented architecture (SOA) and multi-tier systems
  • Experience with the customer information security process and policies
  • Certified Information System Security Professional (CISSP) and/or Certified Information Security Manager (CISM)



Federal Working Group, Inc. is an Equal Opportunity Employer providing equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, national origin, age, gender, gender identity, sexual orientation, disability, or genetics. Federal Working Group, Inc. does and will take affirmative action to employ and advance in employment individuals with disabilities and protected veterans. Reasonable accommodation will enable an applicant with a disability to successfully apply for and/or perform the job’s essential duties.


Job Requirements
First Name

Last Name

Phone Number

Email Address



Acceptable file types: .doc, .docx, .pdf
Cover Letter

Acceptable file types: .doc, .docx, .pdf


Network Architect

Washington DC

Cyber Security Architect

Washington DC

Enterprise Architect

Suitland, MD