|Knowledge of organization’s enterprise information security architecture system.
|Knowledge of engineering concepts as applied to computer architecture and associated computer hardware/software.
|Knowledge of enterprise messaging systems and associated software.
|Knowledge of cybersecurity principles and methods that apply to software development.
|Ability to build architectures and frameworks.
|Knowledge of mathematics, including logarithms, trigonometry, linear algebra, calculus, and statistics.
|Knowledge of software debugging principles.
|Knowledge of software design tools, methods, and techniques.
|Knowledge of software development models, methodologies, and practices (Waterfall Model, Spiral, Agile, DevSecOps).
|Knowledge of software engineering.
|Knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization [ISO] guidelines) relating to system design.
|Knowledge of system life cycle management principles, including software security and usability.
|Knowledge of the enterprise information technology (IT) architectural concepts and patterns to include baseline and target architectures.
|Knowledge of integrating the organization’s goals and objectives into the architecture.
|Skill in configuring and optimizing software.
|Skill in designing the integration of hardware and software solutions.
|Analyze the results of software, hardware, or interoperability testing.
|Analyze user needs and requirements to plan architecture.
|Analyze user needs and software requirements to determine feasibility of design within time and cost constraints.
|Analyze security needs and software requirements to determine feasibility of design within time and cost constraints and security mandates.
|Consult with engineering staff to evaluate interface between hardware and software.
|Develop enterprise architecture or system components required to meet user needs.
|Document and update as necessary all definition and architecture activities.
|Prepare detailed workflow charts, models, and diagrams that describe input, output, and logical operation.
|Design countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities in system and elements.
|Knowledge of Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.
|Knowledge of use cases related to collaboration and content synchronization across platforms (e.g., Mobile, PC, Cloud).
|Develop data management capabilities (e.g., cloud based, centralized cryptographic key management) to include support to the mobile workforce.
|Leverage enterprise-wide version control system while designing and developing secure applications.
|Consult with customers about software system design and maintenance.
|Direct software programming and development of documentation.
|Ability to use and understand complex mathematical concepts (e.g., discrete math).
|Provide Cloud and Cloud Security guidance to leadership.
|Develop a company’s cloud computing strategy.
|Develop and implements cloud strategies.
|Convert the technical requirements of a project into the architecture and design that will guide the final product.
|Design and implement cloud computing solutions, including designing the cloud infrastructure, the cloud application architecture, and the cloud security architecture.
|Knowledge of cloud service models and possible limitations for an incident response.
|Knowledge of both cloud computing and how it is applied in a variety of industries.