Responsibilities:
Oversee the operation and enhancement of the ACAS platform to support security monitoring and risk mitigation across cloud and enterprise IT systems.
Configure and fine-tune ACAS scanning tools and policies, utilizing automation scripts to troubleshoot and resolve technical challenges effectively.
Design tailored vulnerability detection criteria, generate automated alerts, and streamline ticketing workflows to improve incident tracking and resolution.
Analyze compliance data weekly by comparing vulnerability reports against scanning results to prioritize and address security weaknesses.
Contribute to cybersecurity assessments and compliance checks, ensuring alignment with applicable Department of Defense standards and certification requirements.
Collaborate with Information System Security Officers and Managers to maintain accurate authorization documentation, supporting ongoing system accreditation and monitoring efforts.
Engage in cross-team efforts to evaluate the security posture of critical systems in response to guidance from military cyber authorities.
Support the preparation and upkeep of essential cybersecurity documentation, including risk management plans, remediation schedules, and operational security guidelines.
Continuously evaluate and refine vulnerability handling procedures, incorporating insights from security events and adhering to government mandates and industry norms
Required Qualifications:
Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or a closely related discipline with 6 years of ACAS Cybersecurity experience
Current Secret clearance with eligibility to access sensitive government systems.
Certification aligned with DoD 8570 IAT Level II or higher, including but not limited to Security+, CySA+, CISSP (or Associate), CCNA Security, GSEC, CISA, or equivalent credentials.
Valid DISA ACAS certification
Demonstrated ability to produce key cybersecurity artifacts such as Plans of Action and Milestones (POA&M), Concepts of Operations (CONOPS), and system security plans to support compliance and risk management initiatives.
Comprehensive expertise in configuring and securing IT environments within federal defense contexts, demonstrating practical experience with ACAS platforms to uphold security standards across cloud and enterprise systems.
Knowledge of a range of cybersecurity tools such as ESS, Microsoft Defender, Splunk, Tanium, and Burp Suite, with an understanding of how these solutions integrate to enhance threat detection and response capabilities.
Proficient in both Linux and Windows operating systems, including the use of scripting languages like Bash and Python to automate tasks, troubleshoot issues, and tailor security tools for organizational objectives.
Skilled in analyzing vulnerability scan data, managing compliance workflows, and applying corrective actions to reduce risks and maintain system integrity.
Experienced in developing comprehensive security documentation and collaborating across teams to ensure sustained adherence to cybersecurity frameworks and policies.