Posted 1 day ago
Secret
Unspecified
Unspecified
IT - Security
Fort Huachuca, AZ (On-Site/Office)
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests.
Requisition #: 1354
Job Title: Telecommunications Specialist
Location: Fort Huachuca
Clearance Level: Secret
Required Certification(s): Sec+
SUMMARY
Performs cybersecurity related tasks designed to safeguard the security of systems and information assets by protecting against unauthorized access, modification, or destruction. Manages information systems security, including disaster recovery, database protection and software development. Performs technical support focused on the development, operation, management, and enforcement of security capabilities for systems and networks.
Analyzes information security systems and applications then recommends and develops effective security measures. Identifies, reports, and resolves security violations. Evaluates IT infrastructure in terms of risk to the organization and establishes controls to mitigate loss. Determines and recommends improvements in current risk management controls and implementation of systems changes or upgrades Works with end users to determine needs, implements policies and procedures, and tracks compliance through the organization. Establishes, plans, and administers the overall policies, goals and procedures for the information security function. Implements network security policies and procedures, ensures network (LAN/WAN, telecommunications, and voice) security access, and protects against unauthorized access, modification, or destruction.
JOB DUTIES AND RESPONSIBILITIES
Support the JITC's Authorization to Operate (ATO) by providing focused input into the systems that document JITC authorization efforts. Collect, investigate, monitor, update, review and catalog documentation. Documentation includes but is not limited to drawings, written artifacts, procedures POA&Ms, and similar documents needed for JITC to meet requirements for JITC IA Controls of the Risk Management Framework (RMF) as well as any Operational Orders or Directives when presented to the Command for response (data calls). The contractor will ensure the collected artifacts meet the standards established by the Government for accuracy, format, timeliness and integrity.
Provide weekly status updates on all tasks within requirement. Provide monthly status updates on all tasks within requirement. Provide monthly funding updates for requirements. Ensure all deliverables are in the correct format and contain proper capitalization, use of typefaces, numerals, compound words, spacing before and after dashes and symbols, and correct spelling and grammar. Ensure the document has no incomprehensible statements, broken links, missing material, or other issues.
Responsible for the semi-annual review and update of documents used as compelling evidence required by Risk Management Framework process and then imported into the eMASS database to be submitted to the Authorizing Official in requests for Authorization. Use standard applications such as MS Word, PowerPoint, Excel, MS Visio, and Adobe Pro. Must meet expectations to obtain a recommendation for authorization from the Security Compliance Assessor (SCA) from DISA Risk Executive Office.
Maintain a repository, accessible via DoDNET for tracking draft and signed copies of documents such as: Plans of Action and Milestones (POAM), Change Requests (CR), Standing Operating Procedures (SOP),
Cybersecurity Architecture Descriptions (CAD), Risk Assessments, topology/diagrams, hardware/software lists, ports, protocols and service tables and other authorization information as required for compliance.
Update DoD, DISA, and JITC repositories and databases. This includes Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS), Ports, Protocols, Services, Management (PPSM), for oversight of the JITC cyber posture.
Coordinate with the Government in the collection of drawings, standard operating procedures, STIG checklists, ACAS reports, POA&M updates, PPSM updates, briefings, and other artifacts. The contractor shall ensure artifacts are obtained using in-person methods, when required.
Conduct physical location and system reviews utilizing SCAP, ACAS/Nessus, and other such tools as applicable, on physical workstations, servers, switches, routers, firewalls
physical and virtual to include other security devices as required, including those requesting permission to operate or connect to the JITC infrastructure.
Conduct continual review of assets with tools such as STIG checklists, and ACAS data for completeness to maintain eMASS records, ensure reports from tools are provided according to the Deliverable table below, provide raw data to the Government for reporting purposes and assist the Government in meeting FISMA and RME requirements.
QUALIFICATIONS Recommended Certifications
Sec +, CISSP, CCSP, CISA
Education, Background, and Years of Experience
Requires a Bachelor's degree; or an Associate's degree and at least 2 years of experience; a minimum of 60 semester hours of formal education working towards an Associate's or Bachelor's degree and at least 4 years of experience; or at least 6 years of experience is required. Additional certificates (other than those required for the position) in the area of specialization may be substituted for experience or education but varies by certification. The degree must be in a relevant technical curriculum and experience must be related to the job duties.
ADDITIONAL SKILLS & QUALIFICATIONS Required Skills
Perform cybersecurity related tasks designed to safeguard the security of systems and information assets by protecting against unauthorized access, modification, or destruction. Manage information systems security, including disaster recovery, database protection and software development. Perform technical support focused on the development, operation, management, and enforcement of security capabilities for systems and networks.
Analyze information security systems and applications then recommend and develop effective security measures. Identify, report, and resolve security violations. Evaluate IT infrastructure in terms of risk to the organization and establish controls to mitigate loss. Determine and recommend improvements in current risk management controls and implementation of systems changes or upgrades. Work with end users to determine needs, implement policies and procedures, and track compliance through the organization. Establish, plan, and administer the overall policies, goals and procedures for the information security function. Implement network security policies and procedures, ensure network (LAN/WAN, telecommunications, and voice) security access, and protect against unauthorized access, modification, or destruction.
Preferred Skills
Familiarity and knowledge of ACAS, eMASS, STIGing, and POA&Ms a plus.
WORKING CONDITIONS
Environmental Conditions
Indoor atmosphere
Strength Demands
Minimal possible occasional lift requirements
Physical Requirements
Sit, stand, climb stairs, repetitive motion
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests.
Requisition #: 1354
Job Title: Telecommunications Specialist
Location: Fort Huachuca
Clearance Level: Secret
Required Certification(s): Sec+
SUMMARY
Performs cybersecurity related tasks designed to safeguard the security of systems and information assets by protecting against unauthorized access, modification, or destruction. Manages information systems security, including disaster recovery, database protection and software development. Performs technical support focused on the development, operation, management, and enforcement of security capabilities for systems and networks.
Analyzes information security systems and applications then recommends and develops effective security measures. Identifies, reports, and resolves security violations. Evaluates IT infrastructure in terms of risk to the organization and establishes controls to mitigate loss. Determines and recommends improvements in current risk management controls and implementation of systems changes or upgrades Works with end users to determine needs, implements policies and procedures, and tracks compliance through the organization. Establishes, plans, and administers the overall policies, goals and procedures for the information security function. Implements network security policies and procedures, ensures network (LAN/WAN, telecommunications, and voice) security access, and protects against unauthorized access, modification, or destruction.
JOB DUTIES AND RESPONSIBILITIES
Support the JITC's Authorization to Operate (ATO) by providing focused input into the systems that document JITC authorization efforts. Collect, investigate, monitor, update, review and catalog documentation. Documentation includes but is not limited to drawings, written artifacts, procedures POA&Ms, and similar documents needed for JITC to meet requirements for JITC IA Controls of the Risk Management Framework (RMF) as well as any Operational Orders or Directives when presented to the Command for response (data calls). The contractor will ensure the collected artifacts meet the standards established by the Government for accuracy, format, timeliness and integrity.
Provide weekly status updates on all tasks within requirement. Provide monthly status updates on all tasks within requirement. Provide monthly funding updates for requirements. Ensure all deliverables are in the correct format and contain proper capitalization, use of typefaces, numerals, compound words, spacing before and after dashes and symbols, and correct spelling and grammar. Ensure the document has no incomprehensible statements, broken links, missing material, or other issues.
Responsible for the semi-annual review and update of documents used as compelling evidence required by Risk Management Framework process and then imported into the eMASS database to be submitted to the Authorizing Official in requests for Authorization. Use standard applications such as MS Word, PowerPoint, Excel, MS Visio, and Adobe Pro. Must meet expectations to obtain a recommendation for authorization from the Security Compliance Assessor (SCA) from DISA Risk Executive Office.
Maintain a repository, accessible via DoDNET for tracking draft and signed copies of documents such as: Plans of Action and Milestones (POAM), Change Requests (CR), Standing Operating Procedures (SOP),
Cybersecurity Architecture Descriptions (CAD), Risk Assessments, topology/diagrams, hardware/software lists, ports, protocols and service tables and other authorization information as required for compliance.
Update DoD, DISA, and JITC repositories and databases. This includes Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS), Ports, Protocols, Services, Management (PPSM), for oversight of the JITC cyber posture.
Coordinate with the Government in the collection of drawings, standard operating procedures, STIG checklists, ACAS reports, POA&M updates, PPSM updates, briefings, and other artifacts. The contractor shall ensure artifacts are obtained using in-person methods, when required.
Conduct physical location and system reviews utilizing SCAP, ACAS/Nessus, and other such tools as applicable, on physical workstations, servers, switches, routers, firewalls
physical and virtual to include other security devices as required, including those requesting permission to operate or connect to the JITC infrastructure.
Conduct continual review of assets with tools such as STIG checklists, and ACAS data for completeness to maintain eMASS records, ensure reports from tools are provided according to the Deliverable table below, provide raw data to the Government for reporting purposes and assist the Government in meeting FISMA and RME requirements.
QUALIFICATIONS Recommended Certifications
Sec +, CISSP, CCSP, CISA
Education, Background, and Years of Experience
Requires a Bachelor's degree; or an Associate's degree and at least 2 years of experience; a minimum of 60 semester hours of formal education working towards an Associate's or Bachelor's degree and at least 4 years of experience; or at least 6 years of experience is required. Additional certificates (other than those required for the position) in the area of specialization may be substituted for experience or education but varies by certification. The degree must be in a relevant technical curriculum and experience must be related to the job duties.
ADDITIONAL SKILLS & QUALIFICATIONS Required Skills
Perform cybersecurity related tasks designed to safeguard the security of systems and information assets by protecting against unauthorized access, modification, or destruction. Manage information systems security, including disaster recovery, database protection and software development. Perform technical support focused on the development, operation, management, and enforcement of security capabilities for systems and networks.
Analyze information security systems and applications then recommend and develop effective security measures. Identify, report, and resolve security violations. Evaluate IT infrastructure in terms of risk to the organization and establish controls to mitigate loss. Determine and recommend improvements in current risk management controls and implementation of systems changes or upgrades. Work with end users to determine needs, implement policies and procedures, and track compliance through the organization. Establish, plan, and administer the overall policies, goals and procedures for the information security function. Implement network security policies and procedures, ensure network (LAN/WAN, telecommunications, and voice) security access, and protect against unauthorized access, modification, or destruction.
Preferred Skills
Familiarity and knowledge of ACAS, eMASS, STIGing, and POA&Ms a plus.
WORKING CONDITIONS
Environmental Conditions
Indoor atmosphere
Strength Demands
Minimal possible occasional lift requirements
Physical Requirements
Sit, stand, climb stairs, repetitive motion
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
group id: 10180220