Ia Sec Spec Iii

Connecting Employers With Military Veterans!

Posted by: Agile Defense on Feb 19, 2020


Quantico , VA

Job Description:

Requisition #: IASEC01953
Job Title: IA Sec Spec III
Location:Quantico, VA
Clearance:Active DoD - Top Secret SCI
DoD 8570 Certification Requirements:DoD 8570 IAT III Level Certification Required (CISA, GCIH, GCED, CISSP/Associate)
**Selected applicantsmay be subject to a government security investigation and must meet eligibility requirements for access to classified information. **

The successful candidate will provide IA Vulnerability Assessment support for enterprise assets. A strong understanding of DoD STIG/ IAVA and compliance processes are necessary in order to be successful in this position. Assured Compliance Assessment Solution (ACAS) is the primary tool used to facilitate a compliant and secure network.
Conduct vulnerability scans on a regularly scheduled basis, and ad hoc, as directed.Provide a regularly updated list of systems scanned and individual scan results.Coordinate scans with respective system owners.Provide scan results to system engineers for mitigation efforts.As required, work directly with system engineers to clearly identify changes.Maintaining configuration items and executing functions on vulnerability management platform, to include ACAS, Nessus, STIG Validation Scans and Manual Checks.Assist in annual Command Cyber Operational Readiness Inspection and provide risk assessment analysis support, as required.Creating essential documentation (procedures, scanning reports, remediation reports, etc.), providing analysis and metrics on vulnerabilities, and driving remediation of vulnerabilities throughout the organization.Serve as a subject matter expert for vulnerability scanning and STIG Compliance procedures, ACAS 5.4 or higher execution/operation.Attend meetings and provide recommendations concerning Risk Management and mitigation efforts for organizational assets.Ability to develop and maintain metrics and reports on vulnerability findings and remediation compliance.Facilitate proactive remediation of new vulnerabilities by collecting information from threat and vulnerability feeds, analyzing the impact/applicability to our environment and communicating applicable vulnerabilities and recommended remediation actions to the impacted teams.Provide technical support to system and technology owners to propose mitigation and remediation solutions.Provide input to leadership for enhancing the vulnerability and risk management strategies.Serve as a subject matter expert for McAfee Host Based Security modules and administration of ePO 5.3 or higher.
Active Top Secret clearanceDoD 8570 IAT III Level Certification Required (CISA, GCIH, GCED, CISSP/Associate)BACKGROUND NEEDED AND YEARS OF EXPERIENCE:
3+ Years of Information Security Experience, working with Vulnerability management toolsDemonstrated ability to work effectively in an ambiguous environmentStrong oral and written communications skillsADDITIONAL SKILLS & QUALIFICATIONS:
Must Have Technical Skills:
Strong knowledge of threats and vulnerabilities associated with network securityHigh-level familiarity with Vulnerability Management tools such as ACAS, SCAP, and SCCM.Basic level familiarity with DoD and other Cyber Security Regulatory Compliance bodiesAbility to drive automation of vulnerability management platform and processesUnderstanding of how to classify and prioritize the risk of new vulnerabilities based on the operating environmentA Cyber Security Team team-player contributing to policy development, RMF package accreditation requirementsTechnical Skills (Preferred):
The ideal candidate has a background in Systems Administration or Systems Engineering, has a strong systems security mindset, and is very detailed oriented with strong written and oral communication skills.Non-Technical Skills:
Good communication and interpersonal skillsAbility to follow policies and proceduresAbility to communicate in a clear speaking voice as well as the ability to respond clearly to questionsAptitude to address negative situations, and resolve them in a positive manner
Contractor site with 0%-10% travel possible. Possible off-hours work to support releases and outages. General office environment. Work is generally sedentary in nature, but may require standing and walking for up to 10% of the time. The working environment is generally favorable. Lighting and temperature are adequate, and there are not hazardous or unpleasant conditions caused by noise, dust, etc. Work is generally performed within an office environment, with standard office equipment available.
Strength Demands: Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.
Physical Requirements: Stand or Sit Walk Repetitive Motion Use hands/fingers to handle or feel Stoop, kneel, crouch, or crawl Talk/hear See Pushing or Pulling Climb (stairs, ladders) or balance (Ascend/Descend, Work atop, Traverse)
About Us!
Agile Defense is an Information Technology Solutions provider committed to partnering with our customers to deliver the highest level of service to our customers. We provided Information Technology (IT) services to the U.S. Government, including several United States Civil agencies and various branches within the U.S. Department of Defense.
Agile Defense has established a solid reputation of partnering with our customers to deliver innovative IT solutions with our “Listen. Think. Innovate.” philosophy.
At Agile Defense, we know that our employees are our most important asset. We believe in our responsibility to our fellow employees, customers, company, and to our country. We promote teamwork, integrity, and creativity; we expect our fellow employees to also live these values.
Agile Defense, Inc. does not discriminate in practices or employment opportunities on the basis of an individual\u0027s race, color, national or ethnic origin, religion, age, sex, gender, sexual orientation, marital status, veteran status, disability, or any other proscribed category set forth in federal or state regulations.

Pay Rate:


HR. Website URL:


Sign Up to Apply to this position
(if you already have a CGO account, just press the button below)

About Agile Defense, Inc.

Agile Defense is a leading information technology (IT) services business in Reston, VA, with a number of U.S. Government clients, including several United States Civil agencies and various branches within the U.S. Department of Defense. We are in the business of innovation through information technology. We actively and directly engage our customers to shape innovative information technology offerings that create value and meet their end-users’ needs. Our innovation occurs through partnering with our customers to develop their innovation vision – aligned with their enterprise-wide capabilities and their overall business strategy. These practices have worked well for both our customers and ourselves, and we intend to do more. In order to serve our customers still better, we recently have made significant investments in people, processes, systems, and innovation capabilities that have transformed us from a start-up company to a strong growth business. We continually strive to be an innovation leader: sit down with us and see how we can advance the mission of your agency. Company Win Themes Agile Defense is a leading IT services company where our mission is to deliver quality services to our customers. We achieve success by: Listening, reflecting, and delivering innovative solutions Partnering with our customers to solve complex problems Demonstrating that teamwork and collaboration is an unbeatable combination Being responsive and proactive in all that we do Treating our employees as our most important asset

Please visit this employer's Public Profile to see more jobs offered by Agile Defense, Inc.