We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Information Security Specialist

Agile Defense, LLC
vision insurance, paid holidays, 401(k)
United States, Virginia, Quantico
27410 Hot Patch Road (Show on map)
Feb 10, 2026
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests.
Requisition #: 1413
Job Title: Information Security Specialist
Clearance: Active TS Required
Location: Quantico, VA - 100% on-site
Travel: Not anticipated
Overview:
Agile Defense is an award-winning national security company looking for a Senior Systems Engineer to support our contract with a federal law enforcement agency.
This position will offer you a chance to support a federal agency by assessing, improving, monitoring, and documenting the security posture for an enterprise IT system. The Information Security Specialist will be part of a Project Management Office (PMO) and responsible for providing information security support to meet the needs and support the missions of the agency.
As a direct employee of Agile Defense, you would receive a benefit package that includes health/dental/vision insurance coverage, 401K with company match, PTO & paid holidays, and annual tuition/training assistance.
Clearance:
* Active Top Secret clearance required
Responsibilities/Duties:
* Manage, monitor, and maintain IT infrastructure to ensure system uptime and optimal performance.
* Maintain performance to ensure that the throughput of the system does not degrade unexpectedly as the volume of work increases
* Perform regular system backups, recovery procedures, and data management tasks.
* Provide technical support and assistance to users.
* Develop and maintain system documentation, including configurations, procedures, and troubleshooting guides.
* Plan and implement software updates, hardware upgrades, and migrations with minimal disruption to operations.
* Provide technical support for systems and applications.
* Monitor and optimize the performance of the infrastructure.
* Develop and implement backup and recovery strategies.
* Ensure compliance with security and regulatory standards.
* Create, Modify, Disable User Accounts in accordance with Account Management Procedures.
* Monitor and review audit logs for suspicious activity
* Develop and/or update Standard Operation Procedures (SOPs) for all activities
* Collaborate and provide supporting artifacts and documentation to ISSO to support RMF process and ATO packages.
- Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information.
- Possess a strong understanding of the NIST Risk Management Framework (NIST SP 800-37), NIST Cybersecurity Framework, NIST Security and Privacy Controls for Information Systems and Organizations (NIST SP 800-53 revisions 5), Zero Trust Architecture (NIST SP 800-207), Standards for Security Categorization of Federal Information and Information Systems (FIPS-199) and Minimum Security Requirements for Federal Information and Information Systems (FIPS 200).
- Possess familiarity with STIG Viewer, SCAP Compliance Checker (SCC), and Visio applications.
- Perform and review Tenable Security Center scans.
- Maintain hardware/software lists.
- Perform operating system, application, hardware/infrastructure, etc. hardening using DISA Security Technical Implementation Guidelines (STIGs) and/or SRGs as applicable for all appropriate systems.
- Implement the latest applicable Security Requirements Guide (SRG), STIG, and/or benchmarks. Utilize the latest Security Content Automation Protocol (SCAP) tool and manual SRGs, STIGs, and/or benchmarks. Analyze latest STIG updates on a minimum of a quarterly basis.
- Collaborate with System Administrators, Network Operations, etc. to address system vulnerabilities, track progress and ensure security measures are implemented effectively.
- Conduct security control assessments and validations of a system's technical and non-technical security features to mitigate known threats and vulnerabilities effectively. These assessments should comprehensively identify and assess impacts while also considering existing risk mitigation strategies.
- Ensure the completion of all necessary RMF products and reporting in accordance with policy and in collaboration with the Information System Security Officer/Security Control Assessor.
- Assist in updating any documentation related to risk assessments (such as Risk Assessment Reports, Plan of Actions & Milestones (POA&M), etc.) based on the results of assessments.
- Conduct the necessary vulnerability analysis to facilitate the mitigation and determination of residual risk as required.
- Provide support for the continuous monitoring program as needed, especially when System Level Continuous Monitoring results are essential to meet ongoing authorization requirements.
- Assist in contingency planning, testing, and execution as necessary.
- Support the incident response process and actively participate in meetings with the program team, offering updates on project status.
Required Qualifications:
* Education: Bachelor's degree in related fields (e.g. Computer Management Information Systems, Computer Science) and four (4) years related experience, or six (6) years applicable experience, which should include four (4) years specialized experience.
* Certification: ISC2 CGRC, ISC2 SSCP, CompTIA CySA+, CompTIA Security+ CE, or ISC2 Certified in Cybersecurity
Preferred Qualifications:
* BigFix, Nutanix, Splunk, Tenable Security Center, Security Compliance Checker, Security Technical Implementation Guide (STIG) Viewer, NMAP, Nipper, Wireshark, Microsoft Defender for Endpoint, RSA Authentication Manager, Microsoft Windows Active Directory, CISCO Firepower Management Center
* Microsoft Certified Professional (MCP), Cisco Certified Network Associate (CCNA), and/or VMware Data Center Virtualization
About Us:
Agile Defense delivers IT strategy, cloud, cybersecurity, application, data and analytics, enterprise IT, intelligence analysis, and mission operation support services to accelerate technical performance and efficiency for Defense, Civilian, and National Security & Federal Law Enforcement clients.
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Apply for this job
Applied = 0

(web-54bd5f4dd9-d2dbq)