IT Security Support

Aberdeen Proving Ground, MD
Defense – Cyber/Security /
Temporary Employee /
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.

Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.

Requisition #: 371
Job Title: IT Security Support
Location: Rock Island Arsenal, Building 350Rock Island, Illinois61299-6500
Clearance Level: Active DoD - Top Secret SCI
Required Certification(s): 
·       CompTIA Security+ CE (or equivalent IAT-II certification; e.g., CompTIA Security+)

Agile Defense is seeking an IT Security Support technician to support the information system security and VTC requirements ensuring Army Sustainment Command and other AMC- wide SCIFs meet Defense Intelligence Agency (DIA) regulations and policies regarding IA, Cybersecurity and Incident Response.
The IT Security Support Specialist shall support RMF/A&A efforts for JWICS and SCIF ATO’s /ATCs. The information security support personnel assists in the management, scheduling, verifying and monitoring of JWICS VTCs and IT equipment.  The VTC support involves de-conflicting teleconference schedules and conducting installation and testing of VTC and VOIP equipment at HQ AMC and AMC subordinate. The IT Support effort involves managing the physical endpoint components of the infrastructure. This includes the computers, printers, VTCs, monitors, and peripheral devices. The candidate shall assist and coordinate with GISA and HQ AMC personnel regarding network devices such as switches, routers, and Taclanes for the entirety of their life cycle. This includes managing the request and approval process, projecting replacement equipment procurement and associated costs, life cycle management, redeployment, warranties and disposal management.

·       Ensure continued access to the JWICS computer network to include: resetting user passwords, unlocking user accounts, creating new user accounts and installing printers and network drives.
·       Provide weekly and monthly briefings or reports containing status of tasks and performance metrics.
·       Establish, maintain and collect, the Command Cybersecurity Standard Operating Procedures (SOPs) and Tactics, Techniques, and Procedures (TTPs), and update annually.
·       Establish and continuously maintain content management for the command Cybersecurity portal site where all key Cybersecurity products/technical documentation, briefings, and schedules are organized and posted.
·       Assess Plan of Action and Milestones (POA&M) individual corrective action implementation for demonstration that security controls have been implemented correctly and effectively, validating corrective action and/or mitigating factors.
·       Establish, maintain and collect, and update annually, the RMF Standard Operating Procedures (SOPs) and Tactics, Techniques and Procedures (TTPs), and corresponding artifacts.
·       Collaborate with the GISA Cybersecurity team to identify, fix, and provide information regarding resolving vulnerabilities, and computer incidents.
·       Perform content and document management activities to include configuring & managing document check-in/out, version history, document sets, content organizer rules, metadata to facilitate categorization, classification, & organization, permission constructs to control access to content, document review and approval processes, and document publication and disposition for all applicable SharePoint sites.
·       Provide continuous support to the design, development, maintenance, and administration of the CONOPS data repository and slide decks for use as the basis for ongoing reporting and briefings.
·       Provide accurate scheduling for all (3) AMC G2 SCIF conference rooms at HQ AMC and (2) SCIFS at HQ CECOM.
·       Responsible for daily management of site VTC and Conference Room systems such as scheduling VTC with external sites, problem resolution and configuring rooms to meet requirements for scheduled conferences.
·       Perform troubleshooting of VTC and conference room equipment and executes repair or initiates trouble ticket to the appropriate office for support of components and connections external to the site VTC system.
·       Perform routine performance testing to ensure VTC and other conference room equipment computer servers and workstations operate at optimal performance and capacity.
·       Travel AMC-wide to conduct end point system VTC installations (as needed). 
·       Provide basic user VTC training on all JWICS VTC equipment and processes. Can be on hands or can be via written documentation.
·       Provide daily updates via spreadsheet or individual communication.
·       Provide weekly status updates via Weekly Activities Report (WAR). 
·       Conduct a weekly meeting with the Government IT representative to discuss and obtain approval for any potential changes to the organization’s VTC baseline. 
·       Troubleshoot, diagnose and resolve issues with Windows Operating Systems, desktops, laptops, printers, digital senders, video teleconferences, VOIPs, and other standard office equipment.
·       Ensure system connectivity from AMC G2 sites to the JWICS network including, but not limited to, verification that ports are active and tracing of fiber from switch panel to the customer’s desk floor box.
·       Ensure proper labeling and documentation of all network and IT equipment.
·       Support the design and reorganization of user’s office space to meet their technology needs such as set up of IT systems to ensure appropriate separation and placement of cables and equipment.
·       Assist in troubleshooting circuits, switch, router, and taclane issues.
·       Co-ordinate, document, track and sustain IT equipment disposition per government direction, to include process and procedures and SOP creation.
·       Build and/or update monthly equipment trackers for AMC SCIF locations to include data for use in budget planning and life cycle refresh/replacement.
·       Participate in the sustainment of Network equipment to include wiring, switches, routers, and taclane devices per government direction.
·       Be responsible for Workstation hard drive imaging.
·       Be responsible for Cross domain transfers per JWICS Branch Chief direction.
·       Conduct and provide monthly reports on accomplishments, planned activities, problem areas, and program management to the responsible HQ AMC JWICS Branch Chief.
·       Provide monthly reports on the number and type of assets received or turned-in to the responsible HQ AMC JWICS Branch Chief. Conduct monthly comparison of IT assets lists and de-conflict if necessary.
·       Provide monthly reports on the number and types of assets needing to be replaced and the estimated replacement costs, if requested, to the responsible HQ AMC JWICS Branch Chief.
·       Manage and keep the organization’s IT System warranties accurate and current IAW each organization’s processes.
·       Provide monthly updates to AMC JWICS information technology hardware configuration standards.
·       Work with the Government IT representatives and GISA Cybersecurity team to assist, identify, and provide information regarding resolving vulnerabilities, and computer incidents and produce a trend analysis report outlining results of monthly monitoring activities.
·       Perform activities used for the development of plans, processes, and procedures to minimize impacts from events with the potential to disrupt mission essential functions by identifying and mitigating threats, vulnerabilities, and risks, provided such access is allowed/provided and/or information is provided by the infrastructure/hosting environment provider.
·       Create and update training materials when required by corrective, preventive or adaptive maintenance activities that change the Deployed and Operational Production Baseline.
·       Report daily any equipment failures to the JWICS Branch Chief so that an external vendor may be contacted for repair as needed. The Contractor should be familiar with the latest Microsoft Windows OS installed on the Government assets.
·       Coordinate with JWICS Branch Chief to train end-users on developed solutions leveraging available and necessary technologies. The training can be provided either face to face or video teleconference.
·       Draft technical documentation for developed solutions to capture and retain continuity.
·       Contribute to internal business processes for SharePoint customizations and lifecycle management to include documentation, requirements gathering and analysis, testing, and development of best practices.
·       Conduct a weekly meeting with the JWICS Branch Chief to discuss and obtain approval for any potential changes to the organization’s IT baseline. The status of all change requests shall be documented in weekly and monthly status reports.

Required Certifications
·       CompTIA Security+ CE (or equivalent IAT-II certification; e.g., CompTIA Security+)

Education, Background, and Years of Experience
·       Bachelor's degree in related field (e.g. Computer Management Information Systems, Computer Science) and  two (2) years related experience, or four (4) years applicable experience, which should include one (1) to three (3) years specialized experience.
·       Experience performing all of the requested services. 
·       Experience assessing, mitigating, and tracking risks and vulnerabilities.
·       Excellent written and verbal communication skills.
·       1-3 years experience in audio video teleconference support.
·       IT background highly desired.
·        Ability to learn environment quickly and be a productive member of the team.

Required Skills
·       Good working knowledge of the National Institute of Technology (NIST) Risk Management Framework (RMF).
·      Strong technical background with strong understanding of network architectures and communications, operating systems, web platforms, and databases 
·       Ability to identify and assess risks and recommend appropriate remediation strategies.
·       Experience developing and updating Plans of Actions and Milestones (POA&Ms) and overseeing efforts to rectify issues found as a result of security vulnerabilities and security controls analysis.
·      Ability to evaluate proposed changes to IT systems for potential security risks and impacts and advise system stakeholders on those risks and proposed mitigations.
·      Basic knowledge of VTC equipment.
·       Microsoft Windows Operating System training/experience    


Environmental Conditions
·       Government site with 0%-5% travel possible; telework optional up to 2 days per week.  Possible off-hours work to support releases and outages. General office environment.  Work generally requires movement of equipment, which includes getting under desks to troubleshoot and trace cabling.  The working environment is generally favorable.  Lighting and temperature are adequate, and there are not hazardous or unpleasant conditions caused by noise, dust, etc.  Work is generally performed within an office environment, with standard office equipment available.
Strength Demands
·       Light – 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs.  A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.
Physical Requirements
·       Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; Stoop, Kneel, Crouch, or Crawl; See; Push or Pull; Climb (stairs, ladders) or Balance (ascend / descend, work atop, traverse).
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.

Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.

Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.

Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.

Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.

Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.

Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)