ICAM Program Lead

Washington, D.C.
Federal / Civilian – Cyber / Security /
Regular /
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.

Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.

Requisition #: 291

Job Title: Security Engineer III

Location: 1155 21st St NW Washington, District of Columbia 20581

Clearance Level: Active DHS - Public Trust

Required Certification(s): 
·       Required to have current industry certifications related to ICAM such as but not limited to: (Certified System Engineer ICAM PACS (CSEIP), CISSP, CISM, AWS Certified Security – Specialty, Security+, CyberArk, CCSP, CSSLP, or others)

Agile Defense Company is currently seeking a talented Identity Credential Access Management (ICAM) Lead to support an Agency-level cybersecurity program through the evolution of their long time ICAM solution.
Your primary responsibility is coordinating an enterprise approach to ICAM and delivering technical solutions that centrally manage digital identities, credentials, and access to the CFTC’s resources. The ICAM Lead works with the client's business units, system owners, and project teams to coordinate and establish an enterprise approach to IAM throughout the client's environment and to deploy technology that supports IAM functions.

Duties include but are not limited to providing support in the following areas:
·       You will develop and maintain a roadmap, project schedules, work breakdown structures, status reports, meeting minutes, and other artifacts necessary to support the program.
·       You will interface with internal and external entities to ensure complete program success at CFTC.
·       You will support the technical and functional evaluation of potential products and services.
·       You will support deploying the full range of ICAM products and services, such as identity and access management or a multi-factor authentication system. Deployment activities will include requirements gathering, design, build customizations, and testing.
·       You will operate and maintain all ICAM products and services. O&M includes patching and upgrading the suite of ICAM systems as well as the maintenance of integrations with CFTC applications and services that rely on ICAM services.
·       You provide architecture and engineering support for integrating ICAM products, services, and processes with CFTC applications, business processes, and infrastructure.
·       You will advise the client on ICAM matters by keeping abreast of developments in the ICAM space, such as emerging technology, industry consolidation, and federal policies, guidance, and requirements such as the FICAM Roadmap and Implementation Guidance, FIPS, and NIST special publications.
·       You will be responsible for driving awareness of ICAM matters by creating client's Intranet Wiki articles and producing technical advisory and assessment papers. By fulfilling this role, you have the power to shape understanding and decision-making around ICAM, making your contributions highly influential.
·       You will provide other services in support of the ICAM program, such as developing processes to streamline on- or offboarding, creating training materials, or performing data quality analyses to identify issues or opportunities for improvement.


Required Certifications
·       Required to have current industry certifications related to ICAM such as but not limited to (Certified System Engineer ICAM PACS (CSEIP), CISSP, CISM, AWS Certified Security – Specialty, Security+, CyberArk, CCSP, CSSLP, or others)

Education, Background, and Years of Experience 
·       Bachelor’s Degree required (preferred in Computer Science, Data Analytics, Business Information Systems, Mathematics, Statistics, or equivalent).
·       Shall have seven (7) years direct experience and expertise in Identity, Credential, and Access Management.


Required Skills
·       Analytical Thinking and Problem-Solving
·       Adaptability and Self-starter
·       Innovation and Creativity
·       Project Management and Complexity Handling
·       Handling Ambiguous Requirements
·       Effective Communication and Intercultural Competence
·       Decision-Making and Values Alignment
·       Microsoft Office Skills (especially Excel)
·       Familiarity with Federal ICAM systems, including current and future architectures and services to include policies such as Zero Trust
·       Understanding of end-user computing and collaboration tools and technologies
·       Strong information security engineering skills and operational experience include identity and access management, network security, endpoint security, cloud security, mobility, API and application services, IoT, and end-user computing.

Preferred Skills
·       Knowledgeable of various Cloud Service Providers, including but not limited to Azure, AWS, ServiceNow, M365, and other SaaS environments, their service offering, and how they integrate with the client's chosen ICAM solution.
·       Experience creating and implementing ICAM strategies, to-be architectures, concepts of operations, and transformation roadmaps to include hybrid architectures with both on-premises and cloud technologies.
·       Experience assessing existing ICAM solutions, capturing technical requirements, and recommending best practices or enterprise-wide architecture improvements.
·       Proven track record in crafting and delivering stakeholder-specific reports and presentations, adept at tailoring complex information for both technical and executive audiences, ensuring clear understanding and buy-in.
·       Familiar with Visual Studio, C#, Scripting (Bash, Batch, WMI, PowerShell, KQL)
·       Familiar with Network Protocols (SSH, Secure FTP, TLS/SSL) and network encryption algorithms.
·       Strong Excel background using various functions to parse and aggregate data.


Environmental Conditions
·       Contractor site with 0%-10% travel possible. Possible off-hours work to support data updates. General office environment. Work is generally sedentary in nature but may require standing and walking for up to 10% of the time. The onsite working environment is generally favorable. Lighting and temperature are adequate, and there are no hazardous or unpleasant conditions caused by noise, dust, etc. Work onsite is generally performed within an office environment, with standard office equipment available.

Strength Demands
·       Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles.  Some occasional walking or standing may be required.   Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.

Physical Requirements
·       Stand or Sit; Repetitive Motion; See
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.

Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.

Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.

Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.

Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.

Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.

Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)