New
Cybersecurity Engineer (hybrid)
![]() | |
![]() United States, Virginia, Quantico | |
![]() 27410 Hot Patch Road (Show on map) | |
![]() | |
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests.
Location: Quantico, VA. Candidates may work remotely one day per week
Clearance: Active TS Required
Required Responsibilities/Duties:
Minimum of 2 years of cybersecurity and information assurance activities and support at cleared facilities.
Demonstrate strong knowledge and experience installing/implementing, configuring, maintaining, and troubleshooting Linux (RHEL, and other distributions) in an enterprise environment.
Identify information protection needs for information systems and network environment.
Define information systems and network environment security requirements in accordance with applicable cybersecurity requirements.
Design security architectures for use within the information systems and network environment.
Design and develop cybersecurity-enabled products for use within an information systems and network environment.
Develop and implement security designs for new or existing information systems and network environment. Ensure that the design of hardware, operating systems, and software applications adequately address cybersecurity requirements for the information systems and network environment.
Design, develop, and implement network security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation.
Design, develop, and implement specific cybersecurity countermeasures for the information systems and network environment.
Develop interface specifications for the information systems and network environment.
Develop approaches to mitigate information systems and network environment vulnerabilities and recommend changes to network or network system components as needed.
Ensure that network system(s) designs support the incorporation of agency/customer directed cybersecurity vulnerability solutions.
Familiarity with the use and operation of security tools including Cisco, RSA, Tenable Nessus Manager/Professional, Tenable.sc, Trustwave AppDetectivePro, Qualys, BigFix, Titania Nipper, Nmap, Rapid7 Metasploit, CrowdStrike, Trustwave AppDetective, Microsoft Defender MDE Portal, Microfocus WebInspect and Fortify, Splunk, GRC tools [JCAM, Xacta, and RiskVision], SQL Server, Windows, and Linux, and/or similar applications.
Assist in conducting Security Audits of production environments within the accreditation boundary.
Demonstrate mastery of IT functions, security policies, technical security safeguards, and operational security measures.
Demonstrate mastery of information security procedures and best practices.
Apply new developments to previously unsolvable problems.
Demonstrate expertise of, and skill in applying, advanced IT principles, concepts, methods, standards, and practices sufficient to develop and interpret policies, procedures, and strategies governing the planning and delivery of services throughout the agency.
Provide expert technical advice, guidance, and recommendations to management and other technical specialists on critical IT issues.
Make recommendations that significantly influence important agency IT policies or program.
Demonstrate expertise of and skill in applying total infrastructure protection environment.
Demonstrate expertise of and skill in applying systems security certification and accreditation requirements and processes.
Demonstrate expertise of and skill in applying Federal information systems security protocols.
Integrate information systems security with other security disciplines.
Ensure coordination and/or collaboration on security activities.
Develop long-range plans for IT security systems that anticipate, identify, evaluate, mitigate, and minimize risks associated with IT systems vulnerabilities.
Coordinate the implementation of security programs across platforms.
Establish vulnerability reporting criteria.
Review and evaluate security incident response policies.
Identify need for changes based on new security technologies or threats.
Test and implement new policies and institute measures to ensure awareness and compliance.
Review proposed new systems, networks, and software designs for potential security risks.
Integrate security programs across disciplines.
Define the scope and level of detail for security plans and policies applicable to the security program.
Assess new systems design methodologies to improve software quality
Accurately represent customer requirements.
Present recommendations for adoption of new methodologies and lead implementation.
Demonstrate working knowledge of Federal government assessment and authorization (A&A) practices and policies, particularly Federal Information Security Management Act (FISMA), and National Institute of Standards and Technology (NIST) 800-53.
Demonstrate working knowledge of forensic and vulnerability assessment tools.
Demonstrate experience performing vulnerability analysis and working with the system administrators to resolve the vulnerabilities or to develop a system corrective action plan.
Release security incident information to Engineering and Operations team members for remediation of vulnerabilities.
Ensures all security patches are implemented in a timely manner and coordinate patching with Operations team.
Write documentation and implementation plans detailing the security posture and the proper security configuration of new software and hardware.
Evaluate new projects for FISMA and NIST requirements and coordinate with Operations team in security technical implementation guides (STIG) making recommendations to Engineering team on security measures needed prior to introducing new systems into the production environment.
Configure, upgrade, and maintain the intrusion detection system (IDS) and intrusion prevention system (IPS) equipment, signatures and sensors and monitor for new system and security patches.
Collect and evaluate system logs for all devices and applications, looking for intrusion attempts and report incidents to customer.
Evaluate cyber alerts from the Law Enforcement and Intelligence Communities and apply appropriate defense measures.
Coordinate team resources to diagnose and resolve operational issues that involve possible security threats, working closely with Operations and Engineering teams.
Required Qualifications:
Bachelor's degree in Computer Information Systems or related discipline, or equivalent education and experienc Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy
-
Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful
-
Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest
-
Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble
-
Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry
-
Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle
-
Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities Apply for this job |