Information Assurance & Compliance Specialist

Agile DefenseQuantico, VA
24d

About The Position

At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next. Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests. The successful candidate will provide Information Systems Security support for enterprise network assets. A strong understanding of DoD STIG/ IAVA and compliance processes are necessary in order to be successful in this position. Assured Compliance Assessment Solution (ACAS) is the primary tool used to facilitate a compliant and secure network. The auditing environment consists of Cisco Identity Service Engine (ISE), SolarWinds, Marine Corps Database (MCD), Operational Directive Reporting System (OPDRS), RedSeal, DISA STIG Viewer, Enterprise Mission Assurance Support Service (eMASS), Microsoft Defender for Endpoint (MDE), and vulnerability scanning tools such as ACAS. Auditing compliance aligns with Defense Information Systems Agency (DISA) Secure Technical Implementations Guides (STIGs). The successful candidate should also be able to have good attention to details in the review of account creation and modification tickets using the Remedy tool.

Requirements

  • Required Clearance: Active Secret clearance
  • Certifications: DoD 8570 IAT II Level Certification Required (CCNA-Security, CySA, GICSP, GSEC, Security+CE, SSCP). Can start with lower level 8570 cert but must attain within 180 days.
  • Bachelor's degree, and 4-5 years of experience, or equivalent relevant work experience; e.g., each year of work experience may be substituted for each year of education required.
  • High-level familiarity with Vulnerability Management tools such as ACAS and SCAP.
  • A Cyber Security Team team-player contributing to policy development, RMF package accreditation requirements
  • Good communication and interpersonal skills
  • Ability to follow policies and procedures
  • Ability to communicate in a clear speaking voice as well as the ability to respond clearly to questions
  • Aptitude to address negative situations, and resolve them in a positive manner

Nice To Haves

  • The ideal candidate has a background as an Information Systems Security Officer and/or Information Systems Security Engineer (ISSE) has a strong systems security mindset and is very detailed oriented with strong written and oral communication skills.

Responsibilities

  • Conduct vulnerability scans on a regularly scheduled basis, and ad hoc, as directed.
  • Provide a regularly updated list of systems scanned and individual scan results.
  • Coordinate scans with respective system owners.
  • Provide scan results to system engineers for mitigation efforts.
  • As required, work directly with system engineers to clearly identify changes.
  • Maintaining configuration items and executing functions on vulnerability management platform, to include ACAS, Nessus, STIG Validation Scans and Manual Checks.
  • Creating essential documentation (procedures, scanning reports, remediation reports, etc.), providing analysis and metrics on vulnerabilities, and driving remediation of vulnerabilities throughout the organization.
  • Serve as a subject matter expert for vulnerability scanning and STIG Compliance procedures, ACAS 5.4 or higher execution/operation.
  • Assist system engineers by validating device configurations and completing STIG checklists quarterly.
  • Work closely with the A&A team to assist with the development of Risk Management Framework (RMF) plans.
  • Assist with Security Content Automation Protocol (SCAP) scans to validate compliancy.
  • Be able to assist with DODI 8500.2 IA Controls and reciprocity.
  • Attend meetings and provide recommendations concerning Risk Management and mitigation efforts for organizational assets.
  • Ability to develop and maintain metrics and reports on vulnerability findings and remediation compliance.
  • Facilitate proactive remediation of new vulnerabilities by collecting information from threat and vulnerability feeds, analyzing the impact/applicability to our environment and communicating applicable vulnerabilities and recommended remediation actions to the impacted teams.
  • Provide technical support to system and technology owners to propose mitigation and remediation solutions.
  • Document config deviations; validate against tickets and RFMs.
  • Provide assistance with Enterprise Mission Assurance Support Service (eMASS) package preparation and review.
  • Log into network devices using command line on a daily and as needed basis to assist in troubleshooting and to ensure the devices are pingable and to verify device information.
  • Track and maintain newly added or removed devices on the asset list (software versions, model, and serial numbers) and ensure the devices are being scanned in ACAS. Utilize Microsoft Defender for Endpoint (MDE) to track the overall security posture of network devices.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service