Posted today
Secret
Unspecified
Unspecified
IT - Security
Quantico, VA (On-Site/Office)
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests.
Requisition #: 1319
Job Tittle: Information Assurance & Compliance Specialist
Location: Quantico, VA
Required Clearance: Active Secret clearance
Certifications: DoD 8570 IAT II Level Certification Required (CCNA-Security, CySA, GICSP, GSEC, Security+CE, SSCP). Can start with lower level 8570 cert but must attain within 180 days.
General Summary
The successful candidate will provide Information Systems Security support for enterprise network assets. A strong understanding of DoD STIG/ IAVA and compliance processes are necessary in order to be successful in this position. Assured Compliance Assessment Solution (ACAS) is the primary tool used to facilitate a compliant and secure network.
The auditing environment consists of Cisco Identity Service Engine (ISE), SolarWinds, Marine Corps Database (MCD), Operational Directive Reporting System (OPDRS), RedSeal, DISA STIG Viewer, Enterprise Mission Assurance Support Service (eMASS), Microsoft Defender for Endpoint (MDE), and vulnerability scanning tools such as ACAS. Auditing compliance aligns with Defense Information Systems Agency (DISA) Secure Technical Implementations Guides (STIGs).
The successful candidate should also be able to have good attention to details in the review of account creation and modification tickets using the Remedy tool.
Duties
Conduct vulnerability scans on a regularly scheduled basis, and ad hoc, as directed.
Provide a regularly updated list of systems scanned and individual scan results.
Coordinate scans with respective system owners.
Provide scan results to system engineers for mitigation efforts.
As required, work directly with system engineers to clearly identify changes.
Maintaining configuration items and executing functions on vulnerability management platform, to include ACAS, Nessus, STIG Validation Scans and Manual Checks.
Creating essential documentation (procedures, scanning reports, remediation reports, etc.), providing analysis and metrics on vulnerabilities, and driving remediation of vulnerabilities throughout the organization.
Serve as a subject matter expert for vulnerability scanning and STIG Compliance procedures, ACAS 5.4 or higher execution/operation.
Assist system engineers by validating device configurations and completing STIG checklists quarterly.
Work closely with the A&A team to assist with the development of Risk Management Framework (RMF) plans.
Assist with Security Content Automation Protocol (SCAP) scans to validate compliancy.
Be able to assist with DODI 8500.2 IA Controls and reciprocity.
Attend meetings and provide recommendations concerning Risk Management and mitigation efforts for organizational assets.
Ability to develop and maintain metrics and reports on vulnerability findings and remediation compliance.
Facilitate proactive remediation of new vulnerabilities by collecting information from threat and vulnerability feeds, analyzing the impact/applicability to our environment and communicating applicable vulnerabilities and recommended remediation actions to the impacted teams.
Provide technical support to system and technology owners to propose mitigation and remediation solutions.
Document config deviations; validate against tickets and RFMs.
Provide assistance with Enterprise Mission Assurance Support Service (eMASS) package preparation and review.
Log into network devices using command line on a daily and as needed basis to assist in troubleshooting and to ensure the devices are pingable and to verify device information.
Track and maintain newly added or removed devices on the asset list (software versions, model, and serial numbers) and ensure the devices are being scanned in ACAS. Utilize Microsoft Defender for Endpoint (MDE) to track the overall security posture of network devices.
Education
Bachelor's degree, and 4-5 years of experience, or equivalent relevant work experience; e.g., each year of work experience may be substituted for each year of education required.
Certifications
DoD 8570 IAT II Level Certification Required (CCNA-Security, CySA, GICSP, GSEC, Security+CE, SSCP). Can start with lower level 8570 cert but must attain within 180 days.
Must have technical skills
High-level familiarity with Vulnerability Management tools such as ACAS and SCAP.
A Cyber Security Team team-player contributing to policy development, RMF package accreditation requirements
Preferred Technical skills
The ideal candidate has a background as an Information Systems Security Officer and/or Information Systems Security Engineer (ISSE) has a strong systems security mindset and is very detailed oriented with strong written and oral communication skills.
Non-Technical Skills
Good communication and interpersonal skills
Ability to follow policies and procedures
Ability to communicate in a clear speaking voice as well as the ability to respond clearly to questions
Aptitude to address negative situations, and resolve them in a positive manner
WORKING CONDITIONS
Environmental Conditions
• Possible off-hours work to support needs of the business.
Strength Demands
• Light - 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs. A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.
Physical Requirements
• Stand or Sit; Walk; Use Hands / Fingers to Handle or Feel; See
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests.
Requisition #: 1319
Job Tittle: Information Assurance & Compliance Specialist
Location: Quantico, VA
Required Clearance: Active Secret clearance
Certifications: DoD 8570 IAT II Level Certification Required (CCNA-Security, CySA, GICSP, GSEC, Security+CE, SSCP). Can start with lower level 8570 cert but must attain within 180 days.
General Summary
The successful candidate will provide Information Systems Security support for enterprise network assets. A strong understanding of DoD STIG/ IAVA and compliance processes are necessary in order to be successful in this position. Assured Compliance Assessment Solution (ACAS) is the primary tool used to facilitate a compliant and secure network.
The auditing environment consists of Cisco Identity Service Engine (ISE), SolarWinds, Marine Corps Database (MCD), Operational Directive Reporting System (OPDRS), RedSeal, DISA STIG Viewer, Enterprise Mission Assurance Support Service (eMASS), Microsoft Defender for Endpoint (MDE), and vulnerability scanning tools such as ACAS. Auditing compliance aligns with Defense Information Systems Agency (DISA) Secure Technical Implementations Guides (STIGs).
The successful candidate should also be able to have good attention to details in the review of account creation and modification tickets using the Remedy tool.
Duties
Conduct vulnerability scans on a regularly scheduled basis, and ad hoc, as directed.
Provide a regularly updated list of systems scanned and individual scan results.
Coordinate scans with respective system owners.
Provide scan results to system engineers for mitigation efforts.
As required, work directly with system engineers to clearly identify changes.
Maintaining configuration items and executing functions on vulnerability management platform, to include ACAS, Nessus, STIG Validation Scans and Manual Checks.
Creating essential documentation (procedures, scanning reports, remediation reports, etc.), providing analysis and metrics on vulnerabilities, and driving remediation of vulnerabilities throughout the organization.
Serve as a subject matter expert for vulnerability scanning and STIG Compliance procedures, ACAS 5.4 or higher execution/operation.
Assist system engineers by validating device configurations and completing STIG checklists quarterly.
Work closely with the A&A team to assist with the development of Risk Management Framework (RMF) plans.
Assist with Security Content Automation Protocol (SCAP) scans to validate compliancy.
Be able to assist with DODI 8500.2 IA Controls and reciprocity.
Attend meetings and provide recommendations concerning Risk Management and mitigation efforts for organizational assets.
Ability to develop and maintain metrics and reports on vulnerability findings and remediation compliance.
Facilitate proactive remediation of new vulnerabilities by collecting information from threat and vulnerability feeds, analyzing the impact/applicability to our environment and communicating applicable vulnerabilities and recommended remediation actions to the impacted teams.
Provide technical support to system and technology owners to propose mitigation and remediation solutions.
Document config deviations; validate against tickets and RFMs.
Provide assistance with Enterprise Mission Assurance Support Service (eMASS) package preparation and review.
Log into network devices using command line on a daily and as needed basis to assist in troubleshooting and to ensure the devices are pingable and to verify device information.
Track and maintain newly added or removed devices on the asset list (software versions, model, and serial numbers) and ensure the devices are being scanned in ACAS. Utilize Microsoft Defender for Endpoint (MDE) to track the overall security posture of network devices.
Education
Bachelor's degree, and 4-5 years of experience, or equivalent relevant work experience; e.g., each year of work experience may be substituted for each year of education required.
Certifications
DoD 8570 IAT II Level Certification Required (CCNA-Security, CySA, GICSP, GSEC, Security+CE, SSCP). Can start with lower level 8570 cert but must attain within 180 days.
Must have technical skills
High-level familiarity with Vulnerability Management tools such as ACAS and SCAP.
A Cyber Security Team team-player contributing to policy development, RMF package accreditation requirements
Preferred Technical skills
The ideal candidate has a background as an Information Systems Security Officer and/or Information Systems Security Engineer (ISSE) has a strong systems security mindset and is very detailed oriented with strong written and oral communication skills.
Non-Technical Skills
Good communication and interpersonal skills
Ability to follow policies and procedures
Ability to communicate in a clear speaking voice as well as the ability to respond clearly to questions
Aptitude to address negative situations, and resolve them in a positive manner
WORKING CONDITIONS
Environmental Conditions
• Possible off-hours work to support needs of the business.
Strength Demands
• Light - 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs. A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.
Physical Requirements
• Stand or Sit; Walk; Use Hands / Fingers to Handle or Feel; See
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
group id: 10180220