Agile Defense4mo ago
ISSO/Information Assurance Specialist
SecurityOtherIsso
0 views0 saves0 applied
Quick Summary
Overview
About Agile Defense At Agile Defense we know that action defines the outcome and new challenges require new solutions.
Technical Tools
SecurityOtherIsso
About Agile Defense
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.
Requisition #: 1319
Job Tittle: Information Assurance & Compliance Lead
Location: Quantico, VA
Required Clearance: Active Secret clearance
Certifications: DoD 8570 IAT II Level Certification Required (CCNA-Security, CySA, GICSP, GSEC, Security+CE, SSCP). Can start with lower level 8570 cert but must attain within 180 days.
General Summary
The successful candidate will provide Information Systems Security support for enterprise network assets. A strong understanding of DoD STIG/ IAVA and compliance processes are necessary in order to be successful in this position. Assured Compliance Assessment Solution (ACAS) is the primary tool used to facilitate a compliant and secure network.
The auditing environment consists of Cisco Identity Service Engine (ISE), SolarWinds, Marine Corps Database (MCD), Operational Directive Reporting System (OPDRS), RedSeal, DISA STIG Viewer, Enterprise Mission Assurance Support Service (eMASS), Microsoft Defender for Endpoint (MDE), and vulnerability scanning tools such as ACAS. Auditing compliance aligns with Defense Information Systems Agency (DISA) Secure Technical Implementations Guides (STIGs).
The successful candidate should also be able to have good attention to details in the review of account creation and modification tickets using the Remedy tool.
Duties
Conduct vulnerability scans on a regularly scheduled basis, and ad hoc, as directed.
Provide a regularly updated list of systems scanned and individual scan results.
Coordinate scans with respective system owners.
Provide scan results to system engineers for mitigation efforts.
As required, work directly with system engineers to clearly identify changes.
Maintaining configuration items and executing functions on vulnerability management platform, to include ACAS, Nessus, STIG Validation Scans and Manual Checks.
Creating essential documentation (procedures, scanning reports, remediation reports, etc.), providing analysis and metrics on vulnerabilities, and driving remediation of vulnerabilities throughout the organization.
Serve as a subject matter expert for vulnerability scanning and STIG Compliance procedures, ACAS 5.4 or higher execution/operation.
Assist system engineers by validating device configurations and completing STIG checklists quarterly.
Work closely with the A&A team to assist with the development of Risk Management Framework (RMF) plans.
Assist with Security Content Automation Protocol (SCAP) scans to validate compliancy.
Be able to assist with DODI 8500.2 IA Controls and reciprocity.
Attend meetings and provide recommendations concerning Risk Management and mitigation efforts for organizational assets.
Ability to develop and maintain metrics and reports on vulnerability findings and remediation compliance.
Facilitate proactive remediation of new vulnerabilities by collecting information from threat and vulnerability feeds, analyzing the impact/applicability to our environment and communicating applicable vulnerabilities and recommended remediation actions to the impacted teams.
Provide technical support to system and technology owners to propose mitigation and remediation solutions.
Document config deviations; validate against tickets and RFMs.
Provide assistance with Enterprise Mission Assurance Support Service (eMASS) package preparation and review.
Log into network devices using command line on a daily and as needed basis to assist in troubleshooting and to ensure the devices are pingable and to verify device information.
Track and maintain newly added or removed devices on the asset list (software versions, model, and serial numbers) and ensure the devices are being scanned in ACAS. Utilize Microsoft Defender for Endpoint (MDE) to track the overall security posture of network devices.
Education
Bachelor's degree, and 5+ years of experience, or equivalent relevant work experience; e.g., each year of work experience may be substituted for each year of education required.
Certifications
DoD 8570 IAT II Level Certification Required (CCNA-Security, CySA, GICSP, GSEC, Security+CE, SSCP). Can start with lower level 8570 cert but must attain within 180 days.
Must have technical skills
High-level familiarity with Vulnerability Management tools such as ACAS and SCAP.
A Cyber Security Team team-player contributing to policy development, RMF package accreditation requirements
Preferred Technical skills
The ideal candidate has a background as an Information Systems Security Officer and/or Information Systems Security Engineer (ISSE) has a strong systems security mindset and is very detailed oriented with strong written and oral communication skills.
Non-Technical Skills
Good communication and interpersonal skills
Ability to follow policies and procedures
Ability to communicate in a clear speaking voice as well as the ability to respond clearly to questions
Aptitude to address negative situations, and resolve them in a positive manner
WORKING CONDITIONS
Environmental Conditions
· Possible off-hours work to support needs of the business.
Strength Demands
· Light – 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs. A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.
Physical Requirements
· Stand or Sit; Walk; Use Hands / Fingers to Handle or Feel; See
Listing Details
- Posted
- December 10, 2025
- First seen
- March 26, 2026
- Last seen
- April 25, 2026
Posting Health
- Days active
- 30
- Repost count
- 0
- Trust Level
- 33%
- Scored at
- April 25, 2026
Signal breakdown
freshnesssource trustcontent trustemployer trust

Agile Defense
lever
Agile Defense: Always Evolving. Agile Defense stands at the forefront of innovation, driving advanced capabilities and solutions tailored to the most critical national security and civilian missions.
View company profileExternal application · ~5 min on Agile Defense's site
Please let Agile Defense know you found this job on Jobera.
4 other jobs at Agile Defense
View all →Explore open roles at Agile Defense.
Similar Isso jobs
View all →A
AllegiantairEmergency Response Specialist
USD 55000–70000
Full-Time
Software Engineering Manager, Data Protection Platform
USD 250000-350000
1st and 2nd shift Outdoor Flex
NEW! Professional Security Officer - South Houston
Security Officer- Reading, PA
From $0k/yr
M
MetergysolutionsSenior Manager, Cloud Security, Compliance and Governance
CAD 140000–160000
Permanent (Non-Union)
Browse Similar Jobs
Manager2.3kFitness & Wellness2.1kData Collector1.9kAssistant Manager1.7kEngineer1.4kDirector1.3kAssociate1.1kConsultant1kSocial Work & Counseling1kBehavioral Health984Social Worker956Assistant899Social741Technician564Analyst549Operations Associate519Psychiatric Mental Health Nurse Practitioner462Coordinator454Staff Engineer403Development378
Newsletter
Stay ahead of the market
Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.
A
B
C
D
No spam. Unsubscribe at any time.