
RenXTech | People-Focused. Mission-Obsessed.
At RenXTech, we're not just different, we're better. We handpick talent, ensuring every team member aligns with our mission and values. This selective approach means you’re surrounded by the best in the industry, working on impactful projects that match your skills and passion.
Join us and experience a workplace that truly puts you first.
Find out more: www.renxtech.com
RenXTech, a wholly owned subsidiary of Buchanan & Edwards, is an Equal Opportunity Employer. The information collected by this application is solely to determine suitability for employment, verify identity, and maintain employment statistics on applicants.
Â

The Cyber Security Subject Matter Expert (SME) will play a key role in ensuring the security and compliance of enterprise production applications within a cloud-based environment. The SME will work closely with the Development, Cloud, and DevSecOps teams, as well as the Information System Security Officer (ISSO), Information System Security Manager (ISSM), and Security Control Assessor (SCA), to support the full lifecycle of system authorization activities—including achieving and maintaining Authority to Operate (ATO) or Authority to Connect (ATC).
Â
The ideal candidate will provide expert guidance on cybersecurity architecture, coordinate CONOPS and design reviews, drive remediation of security findings, and develop cybersecurity standards and frameworks across the program—rooted in Zero Trust principles.
Duties:
•   ATO/ATC Support:
Lead and coordinate efforts to obtain and maintain ATO/ATC for production systems, ensuring compliance with applicable security frameworks.
•   Collaboration Across Teams:
Partner with Development, Cloud, and DevSecOps teams to integrate security throughout the SDLC and CI/CD pipelines, ensuring secure-by-design implementations.
•   Architecture & CONOPS Coordination:
Review and contribute to system architectures, data flows, and Concept of Operations (CONOPS) documents to ensure alignment with Zero Trust principles and organizational security policies.
•   Security Findings Management:
Support and track the remediation of vulnerabilities and deficiencies identified through scans, assessments, and audits; create and manage Plans of Action & Milestones (POA&Ms) as required.
•   Cybersecurity Standards Development:
Develop and maintain enterprise cybersecurity standards, guidelines, and best practices to ensure consistent implementation of security controls across all program systems.
•   Continuous Monitoring:
Support ongoing assessment and authorization (A&A) activities, including risk assessments, configuration management, and continuous monitoring reporting.
•   Zero Trust Implementation:
Guide teams in applying Zero Trust Architecture (ZTA) principles—identity-centric access control, micro-segmentation, least privilege, and continuous validation—to all system designs and processes.