We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Lead Cybersecurity Manager

Agile Defense, LLC
United States, Florida, Orlando
Mar 06, 2026
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That's why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests.
Requisition #: 1468
Job Title: Lead Cybersecurity Manager
Job Title for Careers Page: Lead Cybersecurity Manager
Location: Orlando/Hybrid
Clearance Level: Secret
Required Certification(s): (CAP, CompTIA Advanced Security Practitioner (CASP), GIAC Security Leadership (GSLC) (GLSC), Certified Information Systems Security Manager (CISSM), or Certified Information Systems Security Professional (CISSP)
JOB DUTIES AND RESPONSIBILITIES
Provide the cybersecurity support necessary to deliver systems that comply with Federal, DoD, and Army cybersecurity policies and standards. Develop and deliver cyber artifacts to support the RMF process for each modernization project. Provide the Government with all assessment artifacts necessary for technical and security review. Prior to production deployment, any recommended technology must receive formal approval from the Government and be authorized for incorporation into ATEC network boundaries. These include: network boundary diagram, hardware list, software list, completed Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs)/Security Requirements Guides (SRGs), list of cyber artifacts, encryption methods, system enterprise and information security architecture diagram, and information flow diagram. Ensure network components (including wireless and fiber technologies) are securely integrated into the existing Army environment. Ensure proper encryption, implement access controls and document cybersecurity controls for compliance and audit purposes.
Provide necessary artifacts to meet RMF requirements for the deployed systems under this TO. To accompany the capabilities deliverable, all artifacts which support obtaining an Army RMF Authorization to Operate (ATO) related to the network components must be provided to each site in accordance with the U.S. ARCYBER and U.S. Army NETCOM standards. These artifacts include: network boundary diagram, hardware list, software list, system enterprise and information security architecture diagram, information flow diagram, and created Plans of Actions and Milestones (POAMs) that capture rationale and mitigations for vulnerabilities or configurations that cannot be applied.
Perform patch management and security update operations support to maintain operating environment compliance until turnover of site is complete. Verify that unpatched vulnerabilities are documented and approved by the Authorizing Official via a POAM.
Responsible for patch and security update support, including:
a. Authoring and maintaining SOPs, policies, and appropriate patch/security documentation, including policies detailing patch and security update processes and procedures.
b. Providing oversight and periodic review of the patch management process.
c. Deploying and managing all patch/security update operations.
d. Performing patch and security update deployment testing.
e. Providing patch and security update status reports.
f. Complying with DoD rules and regulations governing patch and security update operations.
g. Ensuring end-point security tools operate in compliance with all devices and monitor, alert, troubleshoot non-compliance incidents.
h. Developing, updating, and maintaining existing and future baseline documentation of each system and application, including designs, build procedures, requirements documents, test procedures, problem reports, software code, and system knowledge base. Final documentation must be approved by the Government.
Safeguard all Government data according to Cybersecurity Maturity Model Certification (CMMC) standards and all applicable regulations regarding this subject. Follow the processes and procedures required for achieving CMMC Level 3 certifications and utilize authorized CMMC Level 2 Self Assessments to assess existing DoD cybersecurity requirements. Assessment results shall be uploaded to CMMC Enterprise Mission Assurance Support Service (eMASS) within ten business days. The Contractor shall safeguard and encrypt all DoD emails in order to conduct regular correspondence and send products that are related to projects and Government day-to-day operations over acceptable DoD means of communication.
QUALIFICATIONS
Required Certifications
(CAP, CompTIA Advanced Security Practitioner (CASP), GIAC Security Leadership (GSLC) (GLSC), Certified Information Systems Security Manager (CISSM), or Certified Information Systems Security Professional (CISSP) Possess an industry certification and demonstrated success executing deploying the technical solution in an environment similar in size and scope to the requirement.
Education, Background, and Years of Experience Minimum of five years' experience (within the last seven years) in the field of DoD Information Systems Security and/or Cybersecurity Minimum of five years' experience (within the last seven years) creating RMF packages and entering the data into eMASS to obtain an ATO/Authority to Connect, including all the ancillary artifacts. Minimum of one year experience working U.S. Army RMF processes.
ADDITIONAL SKILLS & QUALIFICATIONS
Required Skills
Experience as an ISSM, Information Systems Security Engineer (ISSE), and/or Information Systems Security Officer (ISSO). Experience in coordinating and conducting validation of security control implementation. Five years' experience maintaining and managing client interface at the senior levels of the client organization. Possess an industry certification and demonstrated success executing deploying the technical solution in an environment similar in size and scope of network and test site modernization.
WORKING CONDITIONS
Environmental Conditions
Typical office setting
Strength Demands
Typical office setting
Physical Requirements
Typical office setting
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together.
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
apply for this job
Applied = 0

(web-6bcf49d48d-j4skk)