Posted by: Agile Defense on Feb 19, 2020
Job Title:ACAS Vulnerability Analyst
Location: Quantico, VA
Clearance Level: Active DoD - Secret
Required Certification(s): DoD 8570 IAT III or IAM II (CASP+CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, CAP, CISM, GSLC)
**Selected applicantsmay be subject to a government security investigation and must meet eligibility requirements for access to classified information. **
The Analyst shall operate and maintain the ACAS solution, to support network and application scanning and configuration assessments are conducted and incidents are resolved in accordance with the incident response table and client SOPs.
Ensure scheduled scans are covering 100% of intended assets and are being run successfully.Maintain the Nessus scanners and PVS’s connectivity with the associated Security Center (SC).Ensure SC is being updated either manually, via professional feed, or via a DISA-hosted feed.Address unsuccessful updates of the SC and identify the root cause of the unsuccessful update (corrected within four hours of discovery).Ensure anomalous activity identified by the PVS on each subnet/VLAN is reviewed and tasked to the incident handler, as appropriate, within two hours of identification of the anomalous activity.Develop and/or update the Standard Operating Procedures (SOP) to support each of the Marine Corps Enterprise Network (MCEN) ACAS solutions documented within the SharePoint Portal.Installation, monitoring, testing, troubleshooting, and administration of the Nessus and Passive Vulnerability Scanner applications.Configures, optimizes, and tests vulnerability scans against new and existing Operating Systems and platforms.Perform Nessus vulnerability scans, Nessus agent scans, and Passive vulnerability scans.Perform scan policy analysis & configuration to determine the impact of vulnerability scanning against target devices.Troubleshoot credential failure issues by performing configuration analysis against the target device.Create ACAS queries to optimize processes, procedures, and analysis.Conduct vulnerability analysis, research, and script analysis to verify potential false positives.
Education and Certifications:
2+ years’ experience providing back-end ACAS supportDoD 8570 IAT III or IAM II (CASP+CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, CAP, CISM, GSLC)Background Needed and Years of Experience:
2+ yrs Knowledge and experience with ACAS Security Center (SC) and Nessus Vulnerability Scanners (NVS)Possess understanding and experience with common cybersecurity toolsets and processes to include STIGS, CAS, IAVA Management and Implementation, and OPORD/FRAGO support.ADDITIONAL SKILLS & QUALIFICATIONS:
Technical Skills (Must Have):
ACAS AdministrationDoD 8570 IAT II certificationTechnical Skills (Preferred):
3+yrs ACAS administration in large environment5+ Yrs of related IA/data securityDoD 8570 IAT III or IAM II certification
Contractor site with 0%-10% travel possible. Possible off-hours work to support releases and outages. General office environment. Work is generally sedentary in nature, but may require standing and walking for up to 10% of the time. The working environment is generally favorable. Lighting and temperature are adequate, and there are not hazardous or unpleasant conditions caused by noise, dust, etc. Work is generally performed within an office environment, with standard office equipment available.
Strength Demands: Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.
Physical Requirements: Stand or Sit Walk Repetitive Motion Use hands/fingers to handle or feel Stoop, kneel, crouch, or crawl Talk/hear See Pushing or Pulling Climb (stairs, ladders) or balance (Ascend/Descend, Work atop, Traverse)
Agile Defense is an Information Technology Solutions provider committed to partnering with our customers to deliver the highest level of service to our customers. We provided Information Technology (IT) services to the U.S. Government, including several United States Civil agencies and various branches within the U.S. Department of Defense.
Agile Defense has established a solid reputation of partnering with our customers to deliver innovative IT solutions with our “Listen. Think. Innovate.” philosophy.
At Agile Defense, we know that our employees are our most important asset. We believe in our responsibility to our fellow employees, customers, company, and to our country. We promote teamwork, integrity, and creativity; we expect our fellow employees to also live these values.
Agile Defense, Inc. does not discriminate in practices or employment opportunities on the basis of an individual\u0027s race, color, national or ethnic origin, religion, age, sex, gender, sexual orientation, marital status, veteran status, disability, or any other proscribed category set forth in federal or state regulations.
HR. Website URL: