Job Responsibilities
- Utilize cyber security tools and applications, including ACAS, HBSS, Microsoft Defender for Endpoint (MDE), Microsoft Defender for Identity (MDI), and Splunk, to monitor, analyze, and remediate security events.
- Configure, implement, and maintain firewall policies in accordance with security requirements and approved configurations.
- Manage and assess network ports and protocols to ensure secure and authorized communications.
- Perform risk assessments and risk mitigation analyses to reduce threats and vulnerabilities to acceptable levels.
- Support and execute Security Test and Evaluation (ST&E) activities to validate system security controls and compliance.
- Develop, maintain, and support contingency planning activities, including backup, recovery, and continuity of operations.
- Manage and assess network ports and protocols to ensure secure and authorized communications.
- Perform day-to-day Vulnerability Remediation Asset Management (VRAM) activities to track, prioritize, and resolve identified vulnerabilities. Enter and maintain system baseline configurations in VRAM by uploading and validating vulnerability scan results from representative baseline systems.
- Apply computer security (CS) and information security (INFOSEC) concepts, principles, and requirements to protect enterprise IT systems and data.
- Ensure compliance with cybersecurity requirements including FISMA, DoDD 8100.02, DoDI 8500.01, DoDI 8520, DoDI 8530, DoDI 8531, SECNAVINST 5239 series, OPNAVINST 5239 series, and NIST Special Publication 800 series.
- Maintain full qualification in accordance with DoD 8570.01-M requirements.
Required Skills
- Demonstrated experience supporting cyber metrics analysis and reporting.
- Experience conducting incident response and mitigation activities.
- Experience performing risk mitigation analysis and developing corrective action recommendations.
- Experience developing and supporting contingency plans to ensure system resilience and continuity of operations.
Education & Certification Requirements
- Bachelor’s degree in an IT-related discipline (or IAT Level II Certification) with a minimum of 4 years of security experience.
Clearance Requirements
- Active DoD Top Secret clearance is required in order to be considered for this position.
Top Skills
What We Do
INflow Federal was founded in 2013. The “INflow difference” begins with a simple belief encompassing the importance of employee culture. We are obsessed with our people and have demonstrated year-over-year that our employee-focused approach leads to customer success.
As a leading Small Disadvantaged Business (SDB) innovator, we offer proven expertise in Network Modernization, Cybersecurity, Digital Modernization and Joint Force Mission Operations. We serve our federal government customers in over 20 states domestically to include the United States Navy (USN), United States Marine Corps (USMC), National Reconnaissance Office (NRO) and Joint Forces.
At INflow, US Military Veterans have continuously paved the path ahead for our customers. We developed a homegrown “Veteran Outreach Program” focused around attracting and hiring transitioning military personnel and has resulted in veterans representing over 50% of our company.
Simplifying the customer experience requires everyone within our organization to work together. Our leadership communicates transparently with our team on a regular basis with a commitment to do the right thing for all those we serve. Our customers recognize doing business with INflow means working with people who consistently deliver with agility, passion and integrity.
This is how INflow continues to evolve, grow and accompany our customers into the future of mission systems and operations.
Visit us at www.INflowFed.com.









