IA Support

Shaw AFB, SC
Defense – Information Technology /
Regular /
On-site
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.

Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.

Requisition #: IASUP004129

Job Title: IA Support

Location: 850 Dryden Way Bldg 1923 Shaw AFB, South Carolina 29152

Clearance Level: Active DoD - Top Secret

Required Certification(s): 
DoD IAM Level III Certification.

SUMMARY
Agile Defense is looking for IA Support for our Shaw AFB location.
 
JOB DUTIES AND RESPONSIBILITIES
Shall support management, administration and implementation of 609 ACOMS and 609 EACOMS Cybersecurity Information Assurance programs to ensure confidentiality, availability, and integrity Enterprise and AOC networks, systems and information.
Serve as the information security subject matter expert and implement processes and controls in support of cybersecurity programs to ensure compliance with AFI 17-130, Cybersecurity Program Management, and other governing DoD, USAF and USAAFCENT directives and policy.
Plan, implement, upgrade and monitor security measures for the protection of communications and IT systems and information. Draft, review and coordinate local IA policies, procedures and operating instructions, and provide recommendations for revisions.
Identify and manage cybersecurity risks; and implement controls to ensure the security and delivery of mission critical services.
Monitor and detect cybersecurity events; and implement appropriate response and recovery actions.
Manage cybersecurity incident management handling, response, escalation and reporting IAW SPIN-C and other IA applicable regulations.
Maintain cybersecurity posture IAW SPIN-C and applicable DoD, AF and USAFCENT directives and policy.
Ensure all IT hardware/software products are configured IAW with Security Technical Implementation Guidance (STIG) and other relevant security configuration and implementation guidance.
Ensure no unauthorized hardware/software is installed or used on Enterprise and AOC networks and systems.
Utilize standard software tools to perform vulnerability scans of network equipment and software; and assist network, systems and client administrators in implementing corrective actions required when vulnerabilities are detected.
Develop, update and maintain certification and accreditation documentation, including but not limited to DoD Risk Management Framework (RMF) artifacts, Plan of Action and Milestones (POA&Ms), waivers, and vulnerability mitigation plans.
Assess the impact of changes on certification and accreditation packages, and advise the government accordingly.
Process and coordinate system access authorization requests, software approval requests, firewall and proxy exemption requests/waivers, and other IA-related documents.
Ensure IA-related documentation is current and accessible to authorized individuals.
Research security issues affecting network/systems hardware and software, and provide recommended solutions.
Ensure unit and individuals are in compliance with USAFCENT NOSC IA standards and guidance; and promote information security awareness.
Assist with the sensitive and/or classified hard drive and removable media tracking, sanitization and destruction.
Assist with the operation, management and administration of unit Communications Security (COMSEC) and Emissions Security (EMSEC), and Operations Security (OPSEC) programs, as required.
Perform technical support and O&M activities identified in PWS paragraph 3.3 for information assurance-related technical problems or requirements.
Attend and participate in cybersecurity and CM meetings, as required.
Develop and submit a Cybersecurity Monthly Status Report (Deliverable: Monthly Technical Status Report).
Develop and submit IA advisories and ad-hoc reports, as required by the government.

QUALIFICATIONS

Required Certifications
DoD 8570 Information Assurance Management (IAM) Level 3 (CISSP, GLSC or CISM) certification.

Education, Background, and Years of Experience
Bachelor's degree in Computer Science or related field, and 5+ years’ work experience.

ADDITIONAL SKILLS & QUALIFICATIONS

Required Skills
Excellent interpersonal, organization, writing, communicating, and briefing skills.
Strong self-starter attitude, team-oriented, and good communication skills are a must.
Strong/Natural understanding of and ability to demonstrate the Agile Defense Core Values: Happy, Helpful, Honest, Humble, Hungry, Hustle.
Must be well-organized and detail-oriented with the ability to coordinate, prioritize multiple tasks, and be adaptable to change to accomplish assignments.
Excellent Customer Focus/Satisfaction skills.

WORKING CONDITIONS

Environmental Conditions
Typical office environment.

Strength Demands
Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required.   Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.

Physical Requirements
Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; Stoop, Kneel, Crouch, or Crawl; See; Push or Pull; Climb (stairs, ladders) or Balance (ascend / descend, work atop, traverse).
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.

Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.

Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.

Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.

Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.

Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.

Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)