IA Support with Security Clearance

3 weeks ago


Shaw Air Force Base SC United States Agile Defense, Inc. Full time
At Agile Defense we know that action defines the outcome and new challenges require new solutions
That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests
Requisition #: IASUP004129 Job Title: IA Support Location: 850 Dryden Way Bldg 1923 Shaw AFB, South Carolina 29152 Clearance Level: Active DoD - Top Secret Required Certification(s): DoD IAM Level III Certification
SUMMARY Agile Defense is looking for IA Support for our Shaw AFB location
JOB DUTIES AND RESPONSIBILITIES
Shall support management, administration and implementation of 609 ACOMS and 609 EACOMS Cybersecurity Information Assurance programs to ensure confidentiality, availability, and integrity Enterprise and AOC networks, systems and information.
Serve as the information security subject matter expert and implement processes and controls in support of cybersecurity programs to ensure compliance with AFI 17-130, Cybersecurity Program Management, and other governing DoD, USAF and USAAFCENT directives and policy.
Plan, implement, upgrade and monitor security measures for the protection of communications and IT systems and information
Draft, review and coordinate local IA policies, procedures and operating instructions, and provide recommendations for revisions.
Identify and manage cybersecurity risks; and implement controls to ensure the security and delivery of mission critical services.
Monitor and detect cybersecurity events; and implement appropriate response and recovery actions.
Manage cybersecurity incident management handling, response, escalation and reporting IAW SPIN-C and other IA applicable regulations.
Maintain cybersecurity posture IAW SPIN-C and applicable DoD, AF and USAFCENT directives and policy.
Ensure all IT hardware/software products are configured IAW with Security Technical Implementation Guidance (STIG) and other relevant security configuration and implementation guidance.
Ensure no unauthorized hardware/software is installed or used on Enterprise and AOC networks and systems.
Utilize standard software tools to perform vulnerability scans of network equipment and software; and assist network, systems and client administrators in implementing corrective actions required when vulnerabilities are detected.
Develop, update and maintain certification and accreditation documentation, including but not limited to DoD Risk Management Framework (RMF) artifacts, Plan of Action and Milestones (POA&Ms), waivers, and vulnerability mitigation plans.
Assess the impact of changes on certification and accreditation packages, and advise the government accordingly.
Process and coordinate system access authorization requests, software approval requests, firewall and proxy exemption requests/waivers, and other IA-related documents.
Ensure IA-related documentation is current and accessible to authorized individuals.
Research security issues affecting network/systems hardware and software, and provide recommended solutions.
Ensure unit and individuals are in compliance with USAFCENT NOSC IA standards and guidance; and promote information security awareness.
Assist with the sensitive and/or classified hard drive and removable media tracking, sanitization and destruction.
Assist with the operation, management and administration of unit Communications Security (COMSEC) and Emissions Security (EMSEC), and Operations Security (OPSEC) programs, as required.
Perform technical support and O&M activities identified in PWS paragraph 3.3 for information assurance-related technical problems or requirements.
Attend and participate in cybersecurity and CM meetings, as required.
Develop and submit a Cybersecurity Monthly Status Report (Deliverable: Monthly Technical Status Report).
Develop and submit IA advisories and ad-hoc reports, as required by the government
QUALIFICATIONS Required Certifications
DoD 8570 Information Assurance Management (IAM) Level 3 (CISSP, GLSC or CISM) certification
Education, Background, and Years of Experience
Bachelor's degree in Computer Science or related field, and 5+ years' work experience
ADDITIONAL SKILLS & QUALIFICATIONS Required Skills
Excellent interpersonal, organization, writing, communicating, and briefing skills.
Strong self-starter attitude, team-oriented, and good communication skills are a must.
Strong/Natural understanding of and ability to demonstrate the Agile Defense Core Values: Happy, Helpful, Honest, Humble, Hungry, Hustle.
Must be well-organized and detail-oriented with the ability to coordinate, prioritize multiple tasks, and be adaptable to change to accomplish assignments.
Excellent Customer Focus/Satisfaction skills
WORKING CONDITIONS Environmental Conditions
Typical office environment
Strength Demands
Sedentary - 10 lbs
Maximum lifting, occasional lift/carry of small articles
Some occasional walking or standing may be required
Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met
Physical Requirements
Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; Stoop, Kneel, Crouch, or Crawl; See; Push or Pull; Climb (stairs, ladders) or Balance (ascend / descend, work atop, traverse)
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental
Our culture is alive and evolving, but it always stays true to its roots
Here, you are valued as a family member, and we believe that we can accomplish great things together
Agile Defense has been highly successful in the past few years due to our employees and the culture we create together
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do
Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions
It's how we show up every day
It's who we are
Happy - Be Infectious
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do
Helpful - Be Supportive
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated
Honest - Be Trustworthy
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support
Humble - Be Grounded
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task
Hungry - Be Eager
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges
Hustle - Be Driven
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success
These Core Values are present in all our employees and our organization's aspects
Learn more about us and our culture by visiting us here
COVID-19 Vaccination Requirements Agile Defense is subject to federal vaccine mandates or other customer/facility vaccination requirements as a federal contractor
As such, to protect its employees' health and safety and comply with customer requirements, Agile Defense may require employees in certain positions to be fully vaccinated against COVID-19
Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant
However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information
41 CFR 60-1.35 (c)
  • Cyber Security IA

    1 week ago


    Shaw Air Force Base, United States EPS Full time

    Job Title Cyber Security IA Location Shaw Air force Base SC, US (Primary) Job Type Full-time Education Associate Degree Career Level Experienced (Non-Manager) Category Information Technology Job Description EPS Corporation is looking for a Cyber Security Analyst with 6 years of experience. This position is dependent upon the Contract award. Requirements...

  • Security Architect

    2 days ago


    Scott Air Force Base, United States Centuria Inc. Full time

    Job Title: Security Architect (C&A Packaging) Location: Scott AFB Responsibilities: Provide engineering and technical support to ensure the 67 CW systems and their components achieve initial and recurring accreditation. Support and meet all requirements for Risk Management Framework (RMF) for DoD Information Technology (IT) and Federal Information...


  • Scott Air Force Base, United States TEKsystems co Allegis Group Full time

    Network Support Analyst @ Scott Air Force Base! PRIMARY RESPONSIBILITIES:•Provide technical support for the design, implementation, and integration of network changes and sustainment.•Assist in the planning and performing of analytical research, design development, and other assignments in conformance with design, engineering and customer specifications....


  • Hanscom Air Force Base, United States Abacus Technology Corporation Full time

    OverviewAbacus Technology is seeking a Systems Interoperability and Integration Engineer to provide technical support for the Command, Control, Communication, Intelligence and Networks (C3I&N) Directorate at Hanscom AFB. This is a full-time position.ResponsibilitiesProvide program oversight and management of the task order and implement knowledge in...


  • Scott Air Force Base, United States TEKsystems co Allegis Group Full time

    Top Skills' Details1. Secret clearance2. IAT level III cert3. 1-4 years for RMF, eMass Job DescriptionThe Security Engineer III provides technical support in the areas of vulnerability assessment, risk assessment, network security, product evaluation, and security implementation. Responsible for designing and implementing solutions for protecting the...


  • Scott Air Force Base, United States TEKsystems co Allegis Group Full time

    **MUST HAVE AN ACTIVE SECRET CLEARANCE & COMPTIA SECURITY + CERTIFICATION** Duties & Responsibilities: • Assists customers with IT requests and issues• Answers customer phone calls and emails, log incidents and conduct basic troubleshooting of hardware/software/network and peripheral device issues using FAQs, knowledge base and other guides• Provides...


  • Hill Air Force Base, United States SmoothStack Full time

    Smoothstack is recruiting for RMF Security Engineers for a contract to hire, onsite role at Hill AFB in Ogden, UT. This position will to support the Hill Component Enterprise Data Center IT Operations and Maintenance Services program located at Hill Air Force Base, Utah (HAFB). This program aims to modernize legacy USAF network infrastructure and migrate...


  • Eglin Air Force Base, United States DCS Corp Full time

    As a highly motivated and experienced ISSO supporting the USRL at the 513 EWS, the ideal candidate will have a solid understanding of information security concepts and be responsible for the day-to-day security operations of 513th EWS information systems.  (07v1) Essential Job Functions: Obtain Authorization to Operate (ATO) for networks Collaborate with...


  • Eglin Air Force Base, United States DCS Corp Full time

    As a highly motivated and experienced ISSO supporting the USRL at the 513 EWS, the ideal candidate will have a solid understanding of information security concepts and be responsible for the day-to-day security operations of 513th EWS information systems.  (07v1). Essential Job Functions: Obtain Authorization to Operate (ATO) for networks. Collaborate with...


  • Eglin Air Force Base, United States DCS Corp Full time

    As a highly motivated and experienced ISSO supporting the USRL at the 513 EWS, the ideal candidate will have a solid understanding of information security concepts and be responsible for the day-to-day security operations of 513th EWS information systems.  (07v1) Essential Job Functions: Obtain Authorization to Operate (ATO) for networks Collaborate with...


  • Luke Air Force Base, United States Crew Training International Full time

    Requisition # 10003000_COMPANY_1 Job Title Information System Security...


  • Robins Air Force Base, United States TEKsystems co Allegis Group Full time

    Top Skills' Details• Active DoD Top Secret/SCI Clearance• BS in Computer Science, Software Engineering, or Computer/Electrical Engineering.• Security+CE Certificate• CCNP or JNCIA Certificate• Minimum 6 years’ experience with DCGS network design and management. Manager is still willing to look at candidate with no DCGS experience)• Experience...


  • Offutt Air Force Base, United States Apex Systems Full time

    Job Title: SharePoint Technical Support AnalystLocation: Offutt AFB, NEPay: $100k - $130kCert: IAT II certification (Sec, CCNA, etc.)Clearance: Active Secret Clearance Responsibilities:• Conduct research in design, development, testing and utilization of electronic data processing software.• Troubleshoot issues with DOD365 applications, including...


  • Peterson Air Force Base, United States TEKsystems Full time

    TEKsystems is seeking a Security Operations Center (SOC) Analyst to support NORAD-USNORTHCOM on Peterson SFB in Colorado Springs, CO. This position requires candidates with a Top Secret Clearance and SCI eligibility (TS/SCI) as well as a CompTIA Security + or equivalent. This position also includes shift work in a 24/7 environment. Job DescriptionSOC Analyst...


  • Scott Air Force Base, United States TEKsystems co Allegis Group Full time

    RIMARY RESPONSIBILITIES:• This position is responsible for monitoring the entire lifecycle of trouble tickets.• Demonstrates working knowledge of high visibility customer ticket.• Analyze status of tickets and verify next action is clear and concise.• Monitor ticket queue to ensure contract performance goals are met.• Design reports to track and...


  • Bolling Air Force Base, United States 99999 Consulting LLC Full time

    Please Note: The start date for this position has shifted to Q3 2024 99999 Consulting LLC is seeking to add a Firewall Administrator to our team in the Washington DC area (not downtown). We're looking for a methodical, security-minded individual who is passionate about crafting filtering paradigms and rulesets that maximize security while enabling required...


  • Peterson Air Force Base, United States TEKsystems co Allegis Group Full time

    Our customer maintains a highly demanding mission and requires our support to provide expert technical and professional management support to the commands enterprise Information Technology (IT) services. The Network Operations Technician will support a program that provides sustainment, maintenance, Problem and Change management services to help ensure...


  • Vandenberg Air Force Base, United States Cre8 Teams Full time

    • Plans, organizes, and oversees all security activities needed to ensure successful Program Integration Office (PIO) actions.• Formulates security program goals, plans, policies, and procedures related to the development and construction of Sensitive Compartmented Information (SCI), Special Access Program (SAP), and Information Protection (IP)...


  • Robins Air Force Base, United States TEKsystems co Allegis Group Full time

    Top Skills' Details• Active DoD Top Secret/SCI Clearance.• US Citizen required per contract.• BS in Data Science or Computer Science.• Minimum 4 years’ experience in Artificial intelligence design, development, and maturation. (manager is willing to look a a good data person who has some AI exposure)• Experience in implementing and training...


  • Cannon Air Force Base, United States Planned Systems International Full time

    Overview:Work in a collaborative and innovative environment support Air Force Special Operations Command (AFSOC). This is an amazing opportunity to directly support the global Command and Control Mission Support (C2MS) program. You will be a critical part of the Network/System Administration team, maintaining the C2MS networks in our Florida and New Mexico...