Job Requirements
Radford, VA
Secret Polygraph not specified
Senior Level Career (10+ yrs experience)
$130,000 - $150,000
Job Description
REMOTE with Travel to Radford VA
Position Duties:
• Deploy, configure, and manage cybersecurity tools for Kubernetes environments, including vulnerability scanners, runtime security tools, and compliance frameworks.
• Administer and oversee Kubernetes-native security tools, such as ACA S(Nessus), AESS(Army Endpoint Security System), Kube-Bench, Kube-Hunter, and Falco, to ensure cluster security and compliance .
• Implement and monitor Role-Based Access Control (RBAC) policies and Pod Security Standards (PSS) to enforce least privilege and workload isolation.
• Harden Kubernetes clusters and containerized workloads using industry best practices and DoD Security Technical Implementation Guides (STIGs).
• Perform regular container image scanning using tools like Trivy, Clair, or Anchore to identify vulnerabilities in container images.
• Conduct Infrastructure as Code (IaC) scanning for Kubernetes manifests, Helm charts, and Terraform scripts using tools like Checkov, KubeLinter, or Polaris.
• Ensure compliance with DoD RMF by using tools like Kube-Bench and OpenSCAP.
• Deploy, configure, and manage Security Information and Event Management (SIEM) solutions, such as Splunk or Elasticsearch, to monitor Kubernetes clusters and containerized workloads.
• Develop and integrate rules, queries, and dashboards to detect and respond to security incidents in real time.
• Monitor runtime security using tools like Falco, Sysdig Secure, or Aqua Security to detect anomalous behavior in containers and Kubernetes clusters.
• Collaborate with the Cyber Incident Response Team to investigate and remediate security incidents.
• Integrate security tools into the CI/CD pipeline to automate security scans for code, container images, and IaC configurations.
• Work with DevOps teams to implement security gates in the pipeline, ensuring that only secure and compliant workloads are deployed.
• Automate routine administrative tasks using tools like Ansible, Terraform, or scripting languages (e.g., Python, Bash).
• Collaborate with internal and external teams, including developers, Kubernetes administrators, and Army Cybersecurity Service Providers, to ensure security requirements are met.
• Review and respond to Army Cyber Tasking Orders (CTOs), ensuring timely implementation of required changes.
• Create and maintain documentation for security configurations and standard processes.
• Provide regular reports on the security posture of the Kubernetes environment, including vulnerability assessments and compliance status.
• Responsible for assessment of threats and vulnerabilities to organizational computing assets and developing/integrating rules, queries, and filtering techniques to produce meaningful risk analysis for responses.
• Coordinate with PL ALTESS team to ensure all devices and components report all relevant logs to the SIEM solution and perform troubleshooting of non-reporting assets.
• Work with a team to review Army Cyber Tasking Orders (CTOs), determine applicability and response, and incorporate required changes.
• Review proposed SIEM configuration changes for security impact.
• Interact with Army Cyber Security Service Providers and customer ISSOs/ISSMs on a regular basis.
Required Skills:
• Expertise in securing Kubernetes clusters and containerized workloads.
• Experience with Kubernetes-native security tools, such as Kube-Bench, Kube-Hunter, Falco, or similar.
• Proficiency in container image scanning tools (e.g., Trivy, Clair, Anchore) and VM scanning tools like ACAS and AESS.
• Knowledge of Infrastructure as Code (IaC) scanning tools (e.g., Checkov, KubeLinter, Polaris).
• Experience with runtime security tools (e.g., Falco, Sysdig Secure, Aqua Security).
• Familiarity with DevSecOps frameworks and integrating security tools into CI/CD pipelines.
• Experience implementing and monitoring RBAC, Pod Security Standards (PSS), and network policies in Kubernetes.
• Familiarity with compliance frameworks such as CIS Benchmarks, NIST 800-53, and PCI DSS.
• Experience implementing, tuning, and monitoring SIEM solutions (e.g., Splunk, Elasticsearch).
• Strong understanding of common cyber threat patterns, indicators of compromise, and defenses.
• Proficiency in automation tools like Ansible, Terraform, and scripting languages (e.g., Python, Bash).
Desired Skills:
• Working knowledge of DoD STIGs, and IA Vulnerability Management (IAVM).
• Basic understanding of DOD Risk Management Framework Assessment & Authorization (RMF A&A).
Required Certifications:
· DoD 8140 Cybersecurity ISSM (722 role or similar)
Resource must possess Baseline certification as defined in DoD Instruction 8570.01-M (generally Security+ CE).
· Must have (or obtain within 6 months of hire) a computing environment certification as defined in DoD 8570.01-M, such as:
Certified Kubernetes Security Specialist (CKS)
Certified Kubernetes Administrator (CKA)
Red Hat Certified Specialist in OpenShift Administration
Cloud Native Security Certification (CNSC)
GIAC Kubernetes and Cloud Security (GCKS)
AWS Certified Security – Specialty
Microsoft Certified: Azure Security Engineer Associate
Any other related certification to the role of this position
Position Duties:
• Deploy, configure, and manage cybersecurity tools for Kubernetes environments, including vulnerability scanners, runtime security tools, and compliance frameworks.
• Administer and oversee Kubernetes-native security tools, such as ACA S(Nessus), AESS(Army Endpoint Security System), Kube-Bench, Kube-Hunter, and Falco, to ensure cluster security and compliance .
• Implement and monitor Role-Based Access Control (RBAC) policies and Pod Security Standards (PSS) to enforce least privilege and workload isolation.
• Harden Kubernetes clusters and containerized workloads using industry best practices and DoD Security Technical Implementation Guides (STIGs).
• Perform regular container image scanning using tools like Trivy, Clair, or Anchore to identify vulnerabilities in container images.
• Conduct Infrastructure as Code (IaC) scanning for Kubernetes manifests, Helm charts, and Terraform scripts using tools like Checkov, KubeLinter, or Polaris.
• Ensure compliance with DoD RMF by using tools like Kube-Bench and OpenSCAP.
• Deploy, configure, and manage Security Information and Event Management (SIEM) solutions, such as Splunk or Elasticsearch, to monitor Kubernetes clusters and containerized workloads.
• Develop and integrate rules, queries, and dashboards to detect and respond to security incidents in real time.
• Monitor runtime security using tools like Falco, Sysdig Secure, or Aqua Security to detect anomalous behavior in containers and Kubernetes clusters.
• Collaborate with the Cyber Incident Response Team to investigate and remediate security incidents.
• Integrate security tools into the CI/CD pipeline to automate security scans for code, container images, and IaC configurations.
• Work with DevOps teams to implement security gates in the pipeline, ensuring that only secure and compliant workloads are deployed.
• Automate routine administrative tasks using tools like Ansible, Terraform, or scripting languages (e.g., Python, Bash).
• Collaborate with internal and external teams, including developers, Kubernetes administrators, and Army Cybersecurity Service Providers, to ensure security requirements are met.
• Review and respond to Army Cyber Tasking Orders (CTOs), ensuring timely implementation of required changes.
• Create and maintain documentation for security configurations and standard processes.
• Provide regular reports on the security posture of the Kubernetes environment, including vulnerability assessments and compliance status.
• Responsible for assessment of threats and vulnerabilities to organizational computing assets and developing/integrating rules, queries, and filtering techniques to produce meaningful risk analysis for responses.
• Coordinate with PL ALTESS team to ensure all devices and components report all relevant logs to the SIEM solution and perform troubleshooting of non-reporting assets.
• Work with a team to review Army Cyber Tasking Orders (CTOs), determine applicability and response, and incorporate required changes.
• Review proposed SIEM configuration changes for security impact.
• Interact with Army Cyber Security Service Providers and customer ISSOs/ISSMs on a regular basis.
Required Skills:
• Expertise in securing Kubernetes clusters and containerized workloads.
• Experience with Kubernetes-native security tools, such as Kube-Bench, Kube-Hunter, Falco, or similar.
• Proficiency in container image scanning tools (e.g., Trivy, Clair, Anchore) and VM scanning tools like ACAS and AESS.
• Knowledge of Infrastructure as Code (IaC) scanning tools (e.g., Checkov, KubeLinter, Polaris).
• Experience with runtime security tools (e.g., Falco, Sysdig Secure, Aqua Security).
• Familiarity with DevSecOps frameworks and integrating security tools into CI/CD pipelines.
• Experience implementing and monitoring RBAC, Pod Security Standards (PSS), and network policies in Kubernetes.
• Familiarity with compliance frameworks such as CIS Benchmarks, NIST 800-53, and PCI DSS.
• Experience implementing, tuning, and monitoring SIEM solutions (e.g., Splunk, Elasticsearch).
• Strong understanding of common cyber threat patterns, indicators of compromise, and defenses.
• Proficiency in automation tools like Ansible, Terraform, and scripting languages (e.g., Python, Bash).
Desired Skills:
• Working knowledge of DoD STIGs, and IA Vulnerability Management (IAVM).
• Basic understanding of DOD Risk Management Framework Assessment & Authorization (RMF A&A).
Required Certifications:
· DoD 8140 Cybersecurity ISSM (722 role or similar)
Resource must possess Baseline certification as defined in DoD Instruction 8570.01-M (generally Security+ CE).
· Must have (or obtain within 6 months of hire) a computing environment certification as defined in DoD 8570.01-M, such as:
Certified Kubernetes Security Specialist (CKS)
Certified Kubernetes Administrator (CKA)
Red Hat Certified Specialist in OpenShift Administration
Cloud Native Security Certification (CNSC)
GIAC Kubernetes and Cloud Security (GCKS)
AWS Certified Security – Specialty
Microsoft Certified: Azure Security Engineer Associate
Any other related certification to the role of this position
group id: 10112344
Defining Company Culture