Security Engineer III

Herndon, VA
Federal / Civilian – Cyber / Security /
Regular /
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.

Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.

Requisition #373
Job Title: Security Engineer III
Location: 380 Herndon Parkway Herndon, Virginia 20170
Clearance Level: Active DoD - Background Check
Required Certification(s): N/A

The Smithsonian Institution (SI) is a public trust whose mission is the increase and diffusion of knowledge. The Smithsonian was established by the United States Congress and includes 19 museums, the National Zoological Park, 9 research centers and numerous research programs. The Smithsonian’s assets include a variety of critical information resources, such as collections information, digital collections, research data, intellectual property, donor information, financial data and transactions, computing assets (hardware and software), etc.
Agile Defense is seeking a Security Engineer to support the Security Architecture and Engineering (SA&E) group within the Office of the Chief Information Officer (OCIO) IT Security Staff (ITSS) with IT Security engineering support working with the security architect to build and upkeep the Enterprise IT Security Architecture (EITSA) and other related architecture documents. Work on, and lead, assigned projects that improve SI’s security landscape. Projects may involve implementation of tools, technologies, processes, policies and/or other organizational changes. Also support the security architect in the review of security incidents, audit requests, and other security inquiries from the Smithsonian Institution by analyzing, researching, documenting, and remediating those requests. All work must be done in accordance with SI’s policies and procedures and follow the security rules and frameworks defined by OCIO.

· Support the SI security architect in all aspects of the security architecture program in all aspects of the Zero Trust Architecture program. This includes independently working to analyze, establish and implement processes and technologies in Identity and Access Management (IAM) and one or more of the following areas Network Security, Infrastructure security, Endpoint Security, Data Security, Cloud Security, Configuration Management, and Application Security.
· Work independently to research, analyze, plan, implement, and enhance solutions to improve and support the Smithsonian’s security architecture as assigned by the security architect.
· Support the SI security architect and ITSS in the creation of detailed project plans to align the Smithsonian Institution with governmental requirements and guidance for Zero Trust Architecture (ZTA).
· Assist with or independently analyze and establish the implementation of remediations to address findings from audits, assessments, and penetration tests.
· Research, review, and recommend new security solutions and technologies, technology extensions, and technology replacements.
· Assist with the development and enhancement of security policies, procedures, standards, strategies, and guidelines.
· Participate in and contribute to SI working groups as a representative of IT security.
· Provide security engineering advice and assistance to SI personnel.
· Assist the SI security architect in developing and maintaining the Enterprise IT Security Architecture and roadmap.
· Schedule, plan, and run meetings independently and take detailed notes and produce meeting minutes.
· Create requirements documentation based on investigation and stakeholder engagement to define necessary work as part of the project planning process. Maintain plans and provide regular updates on their status.
· Create detailed documentation during and after design and implementation efforts. Support security architect in the creation of security communication documents (presentations, white papers, decision documents) for ITSS, OCIO, and SI.
· Train SI personnel on the solutions, standards, policies, etc. that you develop/implement.
· Support ITSS and the security architect in investigating and resolving ad-hoc requests from OCIO leadership and other stakeholders as needed.
· Keep up to date with the latest security technologies and trends and communicate that information to others in the Smithsonian Institution as needed.
· Use SI’s Service Desk ticketing system to track and address assigned tickets.
· Collaborate and communicate effectively with project teams and customers. Develop effective working relationships with colleagues and project stakeholders.
· Perform all activities in compliance with SI policies and procedure

Required Certifications: N/A

Education, Background, and Years of Experience
· Security Engineer Level 2 = 5 years of technical experience + Bachelor's Degree
· Security Engineer Level 3 = 8 years of technical experience + Bachelor's Degree

Required Skills
· Domain expertise, represented by at least 5 years of experience, in IAM/ICAM and one or more of the following ZTA support areas: Network Security, Infrastructure security, Data Security, Application Security. These skills should, at a minimum, involve analysis and documentation of requirements, evaluation of existing technologies, comparison of alternatives, technical, hands-on experience implementing one or more tools, experience leading a full lifecycle implementation of a solution, and experience leading a project team in such an implementation.
· Ability to work both independently and collaboratively with teams. Must be responsible and capable of working with minimal supervision to effectively achieve the goals stated above, but also work well with others.
· Ability to read and understand complex documentation, including policy, process, frameworks, and technical documentation.
· Ability to quickly understand new technologies and processes and adapt them to organization needs.
· Experience documenting technical/security systems and/or issues for different audiences.
· Knowledge and experience working with computer security frameworks and guidelines.
· At least 3 years of experience working with computer security best practices, IT security architecture, and technical concepts. This would, preferably, include security realms outside of their area of domain expertise.
· Well-organized and capable of working both with strategic level concepts and detail-oriented technical work.
· Ability to coordinate, prioritize multiple tasks, and be adaptable to change to accomplish assignments.
· Excellent writing, interpersonal and communication skills. Must be able to effectively communicate with a variety of audiences in a broad range of formats to inform, collaborate and advise personnel throughout the organization.

Preferred Skills
· Experience in operations is desirable, but not required.
· Knowledge of NIST Frameworks such as the Risk Management Framework (RMF) and the CyberSecurity framework (CSF) are preferred
· Understanding of additional security frameworks and best practices such as PCI DSS, CIS, etc. is a plus.

Environmental Conditions
· Work will be performed during an agreed upon 8-hour workday during Smithsonian business hours (Monday-Friday between 7:00 am and 7:00 pm), except for occasional off hours work when specifically authorized and expected to perform a 40-hour work week. On occasion it may be necessary to work outside normal business hours. The primary office location is the Smithsonian’s Herndon, VA facility, with occasional local travel to other Smithsonian facilities in the Washington DC metro area. It is unlikely but possible that on rare occasions it may be necessary to travel to other Smithsonian facilities outside of the DC area.
· General office environment. Work is generally sedentary in nature but may require standing and walking for up to 10% of the time. The working environment is generally favorable. Lighting and temperature are adequate, and there are not hazardous or unpleasant conditions caused by noise, dust, etc. Work is generally performed within an office environment, with standard office equipment available.

Strength Demands
· Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.
Physical Requirements
· Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; See; Push or Pull
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.

Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.

Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.

Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.

Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.

Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.

Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)