At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.
Requisition #: 1319
Job Tittle: Information Assurance & Compliance Specialist
Location: Quantico, VA
Required Clearance: Active Secret clearance
Certifications: DoD 8570 IAT II Level Certification Required (CCNA-Security, CySA, GICSP, GSEC, Security+CE, SSCP). Can start with lower level 8570 cert but must attain within 180 days.
General Summary
The successful candidate will provide Information Systems Security support for enterprise network assets. A strong understanding of DoD STIG/ IAVA and compliance processes are necessary in order to be successful in this position. Assured Compliance Assessment Solution (ACAS) is the primary tool used to facilitate a compliant and secure network.
The auditing environment consists of Cisco Identity Service Engine (ISE), SolarWinds, Marine Corps Database (MCD), Operational Directive Reporting System (OPDRS), RedSeal, DISA STIG Viewer, Enterprise Mission Assurance Support Service (eMASS), Microsoft Defender for Endpoint (MDE), and vulnerability scanning tools such as ACAS. Auditing compliance aligns with Defense Information Systems Agency (DISA) Secure Technical Implementations Guides (STIGs).
The successful candidate should also be able to have good attention to details in the review of account creation and modification tickets using the Remedy tool.
Duties
Conduct vulnerability scans on a regularly scheduled basis, and ad hoc, as directed.
Provide a regularly updated list of systems scanned and individual scan results.
Coordinate scans with respective system owners.
Provide scan results to system engineers for mitigation efforts.
As required, work directly with system engineers to clearly identify changes.
Maintaining configuration items and executing functions on vulnerability management platform, to include ACAS, Nessus, STIG Validation Scans and Manual Checks.
Creating essential documentation (procedures, scanning reports, remediation reports, etc.), providing analysis and metrics on vulnerabilities, and driving remediation of vulnerabilities throughout the organization.
Serve as a subject matter expert for vulnerability scanning and STIG Compliance procedures, ACAS 5.4 or higher execution/operation.
Assist system engineers by validating device configurations and completing STIG checklists quarterly.
Work closely with the A&A team to assist with the development of Risk Management Framework (RMF) plans.
Assist with Security Content Automation Protocol (SCAP) scans to validate compliancy.
Be able to assist with DODI 8500.2 IA Controls and reciprocity.
Attend meetings and provide recommendations concerning Risk Management and mitigation efforts for organizational assets.
Ability to develop and maintain metrics and reports on vulnerability findings and remediation compliance.
Facilitate proactive remediation of new vulnerabilities by collecting information from threat and vulnerability feeds, analyzing the impact/applicability to our environment and communicating applicable vulnerabilities and recommended remediation actions to the impacted teams.
Provide technical support to system and technology owners to propose mitigation and remediation solutions.
Document config deviations; validate against tickets and RFMs.
Provide assistance with Enterprise Mission Assurance Support Service (eMASS) package preparation and review.
Log into network devices using command line on a daily and as needed basis to assist in troubleshooting and to ensure the devices are pingable and to verify device information.
Track and maintain newly added or removed devices on the asset list (software versions, model, and serial numbers) and ensure the devices are being scanned in ACAS. Utilize Microsoft Defender for Endpoint (MDE) to track the overall security posture of network devices.
Education
Bachelor's degree, and 4-5 years of experience, or equivalent relevant work experience; e.g., each year of work experience may be substituted for each year of education required.
Certifications
DoD 8570 IAT II Level Certification Required (CCNA-Security, CySA, GICSP, GSEC, Security+CE, SSCP). Can start with lower level 8570 cert but must attain within 180 days.
Must have technical skills
High-level familiarity with Vulnerability Management tools such as ACAS and SCAP.
A Cyber Security Team team-player contributing to policy development, RMF package accreditation requirements
Preferred Technical skills
The ideal candidate has a background as an Information Systems Security Officer and/or Information Systems Security Engineer (ISSE) has a strong systems security mindset and is very detailed oriented with strong written and oral communication skills.
Non-Technical Skills
Good communication and interpersonal skills
Ability to follow policies and procedures
Ability to communicate in a clear speaking voice as well as the ability to respond clearly to questions
Aptitude to address negative situations, and resolve them in a positive manner
WORKING CONDITIONS
Environmental Conditions
· Possible off-hours work to support needs of the business.
Strength Demands
· Light – 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs. A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.
Physical Requirements
· Stand or Sit; Walk; Use Hands / Fingers to Handle or Feel; See