At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.
Requisition #: 1319
Job Tittle: Information Assurance & Compliance Specialist
Location: Quantico, VA
Required Clearance: Active Secret clearance
Certifications: DoD 8570 IAT II Level Certification Required (CCNA-Security, CySA, GICSP, GSEC, Security+CE, SSCP). Can start with lower level 8570 cert but must attain within 180 days.
General Summary
The successful candidate will provide Information Systems Security support for enterprise network assets. A strong understanding of DoD STIG/ IAVA and compliance processes are necessary in order to be successful in this position. Assured Compliance Assessment Solution (ACAS) is the primary tool used to facilitate a compliant and secure network.
The auditing environment consists of Cisco Identity Service Engine (ISE), SolarWinds, Marine Corps Database (MCD), Operational Directive Reporting System (OPDRS), RedSeal, DISA STIG Viewer, Enterprise Mission Assurance Support Service (eMASS), Microsoft Defender for Endpoint (MDE), and vulnerability scanning tools such as ACAS. Auditing compliance aligns with Defense Information Systems Agency (DISA) Secure Technical Implementations Guides (STIGs).
The successful candidate should also be able to have good attention to details in the review of account creation and modification tickets using the Remedy tool.
Duties
Conduct vulnerability scans on a regularly scheduled basis, and ad hoc, as directed.
Provide a regularly updated list of systems scanned and individual scan results.
Coordinate scans with respective system owners.
Provide scan results to system engineers for mitigation efforts.
As required, work directly with system engineers to clearly identify changes.
Maintaining configuration items and executing functions on vulnerability management platform, to include ACAS, Nessus, STIG Validation Scans and Manual Checks.
Creating essential documentation (procedures, scanning reports, remediation reports, etc.), providing analysis and metrics on vulnerabilities, and driving remediation of vulnerabilities throughout the organization.
Serve as a subject matter expert for vulnerability scanning and STIG Compliance procedures, ACAS 5.4 or higher execution/operation.
Assist system engineers by validating device configurations and completing STIG checklists quarterly.
Work closely with the A&A team to assist with the development of Risk Management Framework (RMF) plans.
Assist with Security Content Automation Protocol (SCAP) scans to validate compliancy.
Be able to assist with DODI 8500.2 IA Controls and reciprocity.
Attend meetings and provide recommendations concerning Risk Management and mitigation efforts for organizational assets.
Ability to develop and maintain metrics and reports on vulnerability findings and remediation compliance.
Facilitate proactive remediation of new vulnerabilities by collecting information from threat and vulnerability feeds, analyzing the impact/applicability to our environment and communicating applicable vulnerabilities and recommended remediation actions to the impacted teams.
Provide technical support to system and technology owners to propose mitigation and remediation solutions.
Document config deviations; validate against tickets and RFMs.
Provide assistance with Enterprise Mission Assurance Support Service (eMASS) package preparation and review.
Log into network devices using command line on a daily and as needed basis to assist in troubleshooting and to ensure the devices are pingable and to verify device information.
Track and maintain newly added or removed devices on the asset list (software versions, model, and serial numbers) and ensure the devices are being scanned in ACAS. Utilize Microsoft Defender for Endpoint (MDE) to track the overall security posture of network devices.
Education
Bachelor's degree, and 4-5 years of experience, or equivalent relevant work experience; e.g., each year of work experience may be substituted for each year of education required.
Certifications
DoD 8570 IAT II Level Certification Required (CCNA-Security, CySA, GICSP, GSEC, Security+CE, SSCP). Can start with lower level 8570 cert but must attain within 180 days.
Must have technical skills
High-level familiarity with Vulnerability Management tools such as ACAS and SCAP.
A Cyber Security Team team-player contributing to policy development, RMF package accreditation requirements
Preferred Technical skills
The ideal candidate has a background as an Information Systems Security Officer and/or Information Systems Security Engineer (ISSE) has a strong systems security mindset and is very detailed oriented with strong written and oral communication skills.
Non-Technical Skills
Good communication and interpersonal skills
Ability to follow policies and procedures
Ability to communicate in a clear speaking voice as well as the ability to respond clearly to questions
Aptitude to address negative situations, and resolve them in a positive manner
WORKING CONDITIONS
Environmental Conditions
· Possible off-hours work to support needs of the business.
Strength Demands
· Light – 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs. A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.
Physical Requirements
· Stand or Sit; Walk; Use Hands / Fingers to Handle or Feel; See
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.
Campus is hiring a Director of IT & Infrastructure to architect, secure, and scale cloud, network, and identity systems that enable rapid multi-site growth and mission-driven student outcomes.
Senior Cloud Architect needed to lead multi-cloud architecture, migrations, cost optimization, and DevOps practices for Ascend Learning (NASM) in a hybrid/remote role.
Experienced security professional sought to administer Workday security and secure enterprise systems in a hybrid-role supporting a mission-driven nonprofit.
Angi is hiring a Senior IAM Engineer to architect and operate Okta-based identity solutions, automate provisioning and workflows, and ensure secure, compliant access across the enterprise.
A hybrid summer internship at Wellmark for STEM students to gain practical cloud connectivity experience working with AWS, automation tools, and cross-functional teams.
Bilingual English/Japanese TechLine Analyst providing remote first-contact IT support for NBCUniversal employees across Windows, Mac, Office 365, Active Directory and mobile platforms.
Node.Digital seeks a cleared Junior Incident Manager in Arlington, VA to produce and brief cyber threat intelligence that drives vulnerability management decisions.
Provide afterhours remote and occasional on-site IT support for One Medical’s nationwide teams, resolving incidents across Windows, macOS, Chrome OS and corporate networks.
Lead the design and delivery of Best Egg's bot mitigation and automated-abuse prevention strategy to protect high-scale web systems and APIs across the customer funnel.
Indiana State University is hiring a Senior Systems Integrator to lead design, integration, and day-to-day maintenance of campus server, virtualization, storage, and cloud infrastructure.
Senior Manager, Information Security needed to lead AppSec, cloud and security operations for a remote-first education-technology organization with occasional travel to Massachusetts offices.
Metro Physical & Aquatic Therapy is hiring an IT Support Specialist to maintain desktops, Meraki networking, and user-facing IT services across its clinics while providing exceptional customer-focused technical support.
Medical Guardian is hiring a Lead Infrastructure Engineer to lead Azure cloud infrastructure, on-prem networking, identity, and incident response across hybrid environments.
Agile Defense's mission is to transform our government customers' organizations using Information Technology so that they can meet their mission's deadlines with efficiency and quality.
6 jobs