Agile Defense

Deputy Program Manager

Agile Defense

full-time

Posted on:

Location Type: Hybrid

Location: RestonVirginiaUnited States

Visit company website

Explore more

AI Apply
Apply

Tech Stack

About the role

  • Serve as Deputy to the Program Manager of the CSOC Program to provide cyber defense capabilities to federal entities provide comprehensive Computer Network Defense support through security event monitoring, advanced analytics, cyber hunt, response and digital forensics, vulnerability assessment, and cyber intelligence activities in support of the SOC operational mission.
  • Maintain a 24x7x365 schedule and minimum-manning requirements.
  • Construct and optimize operational workflows for 24x7 teams across multiple shifts.
  • Develop, collect, analyze security operational metrics to optimize CSOC performance and minimize organizational risk.
  • Serve as a technical Cyber SME, onsite task lead, and primary point of contact for customer.
  • Lead efforts Planning, organization, scheduling and progress reporting of various projects.
  • Develop technical cyber security solutions in response to customer requests or in support of proposal solution development.
  • Support new Agile Defense engagements as transitional program or operations lead.
  • Support documentation of all business and workflow processes in this area.
  • Provides technical consultation in cyber security capability development.
  • Acts as a subject-matter expert to multiple tasks and/or programs.
  • Provide technical writing support in support of corporate response to RFPs/RFQs from various customers.

Requirements

  • Minimum of 5 years of direct operational and program management experience in delivery of Cybersecurity program or related projects
  • Minimum of 7 years of professional experience with a solid understanding of incident response, insider threat investigations, digital forensics, and cyber threats.
  • Minimum of 5 years of hands-on experience with experience in the last 2 years that includes host-based and network-based security monitoring, identifying and analyzing anomalous activities with familiarity in insider threat monitoring software, host-based forensic tools, intrusion detection systems, intrusion analysis functions, security information event management (SIEM) platforms, endpoint detection and response tools, security operations ticket management.
  • Bachelor’s degree in computer science, engineering, STEM or cybersecurity.
  • Ability to create insider threat focused dashboards, reports and workflow diagrams. Experience collecting data, chain of custody and reporting results; handling and escalating security issues or emergency situations appropriately; providing incident response capabilities to isolate and mitigate threats to maintain confidentiality, integrity, and availability for protected data. Experience with mentoring junior members in an open collaborative environment.
  • Preferred Skills or Certifications: One of the following GCFA, GREM, GCIH, OSCP, GPEN, GFCE or equivalent preferred.
Benefits
  • Competitive and comprehensive benefits package
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
cyber defensecomputer network defensesecurity event monitoringadvanced analyticsdigital forensicsvulnerability assessmentincident responseinsider threat investigationshost-based security monitoringnetwork-based security monitoring
Soft Skills
leadershiporganizationschedulingtechnical consultationcommunicationmentoringcollaborationreportingproblem-solvingworkflow optimization
Certifications
GCFAGREMGCIHOSCPGPENGFCE