Security Engineer III

Washington, DC

Agile Defense

We are in the business of innovation through information technology and cybersecurity, delivered exceptionally.

View company page

Agile Defense provides leading-edge Digital Transformation solutions to support and advance our customers' mission. We deliver innovative and high-quality services to our customers worldwide through an empowered and engaged workforce.
Requisition #: 291
Job Title: Security Engineer III
Location: 1155 21st St NW Washington, District of Columbia 20581
Clearance Level: Active DHS - Public Trust
Required Certification(s): ·       Required to have current industry certifications related to ICAM such as but not limited to: (Certified System Engineer ICAM PACS (CSEIP), CISSP, CISM, AWS Certified Security – Specialty, Security+, CyberArk, CCSP, CSSLP, or others)
SUMMARYXOR Security, an Agile Defense Company is currently seeking a talented Identity Credential Access Management (ICAM) Lead to support an Agency-level cybersecurity program through the evolution of their long time ICAM solution.Your primary responsibility is coordinating an enterprise approach to ICAM and delivering technical solutions that centrally manage digital identities, credentials, and access to the CFTC’s resources. The ICAM Lead works with the client's business units, system owners, and project teams to coordinate and establish an enterprise approach to IAM throughout the client's environment and to deploy technology that supports IAM functions.

JOB DUTIES AND RESPONSIBILITIES Duties include but are not limited to providing support in the following areas:·       You will develop and maintain a roadmap, project schedules, work breakdown structures, status reports, meeting minutes, and other artifacts necessary to support the program. ·       You will interface with internal and external entities to ensure complete program success at CFTC.·       You will support the technical and functional evaluation of potential products and services.·       You will support deploying the full range of ICAM products and services, such as identity and access management or a multi-factor authentication system. Deployment activities will include requirements gathering, design, build customizations, and testing.·       You will operate and maintain all ICAM products and services. O&M includes patching and upgrading the suite of ICAM systems as well as the maintenance of integrations with CFTC applications and services that rely on ICAM services.·       You provide architecture and engineering support for integrating ICAM products, services, and processes with CFTC applications, business processes, and infrastructure.·       You will advise the client on ICAM matters by keeping abreast of developments in the ICAM space, such as emerging technology, industry consolidation, and federal policies, guidance, and requirements such as the FICAM Roadmap and Implementation Guidance, FIPS, and NIST special publications. ·       You will be responsible for driving awareness of ICAM matters by creating client's Intranet Wiki articles and producing technical advisory and assessment papers. By fulfilling this role, you have the power to shape understanding and decision-making around ICAM, making your contributions highly influential.·       You will provide other services in support of the ICAM program, such as developing processes to streamline on- or offboarding, creating training materials, or performing data quality analyses to identify issues or opportunities for improvement.
QUALIFICATIONS
Required Certifications·       Required to have current industry certifications related to ICAM such as but not limited to (Certified System Engineer ICAM PACS (CSEIP), CISSP, CISM, AWS Certified Security – Specialty, Security+, CyberArk, CCSP, CSSLP, or others)
Education, Background, and Years of Experience ·       Bachelor’s Degree required (preferred in Computer Science, Data Analytics, Business Information Systems, Mathematics, Statistics, or equivalent).·       Shall have seven (7) years direct experience and expertise in Identity, Credential, and Access Management.
ADDITIONAL SKILLS & QUALIFICATIONS
Required Skills·       Analytical Thinking and Problem-Solving·       Adaptability and Self-starter·       Innovation and Creativity·       Project Management and Complexity Handling·       Handling Ambiguous Requirements·       Effective Communication and Intercultural Competence·       Decision-Making and Values Alignment·       Microsoft Office Skills (especially Excel)·       Familiarity with Federal ICAM systems, including current and future architectures and services to include policies such as Zero Trust·       Understanding of end-user computing and collaboration tools and technologies·       Strong information security engineering skills and operational experience include identity and access management, network security, endpoint security, cloud security, mobility, API and application services, IoT, and end-user computing.
Preferred Skills·       Knowledgeable of various Cloud Service Providers, including but not limited to Azure, AWS, ServiceNow, M365, and other SaaS environments, their service offering, and how they integrate with the client's chosen ICAM solution. ·       Experience creating and implementing ICAM strategies, to-be architectures, concepts of operations, and transformation roadmaps to include hybrid architectures with both on-premises and cloud technologies.·       Experience assessing existing ICAM solutions, capturing technical requirements, and recommending best practices or enterprise-wide architecture improvements.·       Proven track record in crafting and delivering stakeholder-specific reports and presentations, adept at tailoring complex information for both technical and executive audiences, ensuring clear understanding and buy-in.·       Familiar with Visual Studio, C#, Scripting (Bash, Batch, WMI, PowerShell, KQL)·       Familiar with Network Protocols (SSH, Secure FTP, TLS/SSL) and network encryption algorithms. ·       Strong Excel background using various functions to parse and aggregate data.
WORKING CONDITIONS
Environmental Conditions·       Contractor site with 0%-10% travel possible. Possible off-hours work to support data updates. General office environment. Work is generally sedentary in nature but may require standing and walking for up to 10% of the time. The onsite working environment is generally favorable. Lighting and temperature are adequate, and there are no hazardous or unpleasant conditions caused by noise, dust, etc. Work onsite is generally performed within an office environment, with standard office equipment available.
Strength Demands·       Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles.  Some occasional walking or standing may be required.   Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.
Physical Requirements·       Stand or Sit; Repetitive Motion; SeeEmployees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. We believe several attributes are the root of our very best employees and extraordinary culture. We have named these attributes “The 6 H’s” – Happy, Helpful, Honest, Humble, Hungry, and Hustle.
Happy: We exhibit a positive outlook in order to create a positive environment.Helpful: We assist each other and pull together as teammates to deliver.Honest: We conduct our business with integrity.Humble: We recognize that success is not achieved alone, that there is always more to learn, and that no task is below us.Hungry: We desire to consistently improve.Hustle: We work hard and get after it.
These Core Values are present in all our employees and our organization's aspects. Learn more about us and our culture by visiting us here.
COVID-19 Vaccination RequirementsAgile Defense is subject to federal vaccine mandates or other customer/facility vaccination requirements as a federal contractor. As such, to protect its employees' health and safety and comply with customer requirements, Agile Defense may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.

Equal Opportunity Employer/Protected Veterans/Individuals with DisabilitiesThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Agile Analytics APIs AWS Azure Bash C CCSP CISM CISSP Clearance Cloud Computer Science Cyberark Data Analytics Encryption Endpoint security IAM Mathematics Network security NIST PowerShell SaaS Scripting SSH TLS Zero Trust

Perks/benefits: Team events

Region: North America
Country: United States
Job stats:  3  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.