26-1097: Device / Endpoint Security Engineer (Posture, Enforcement, EDR ) - Herndon, VA
Job ID#: 26-1097
Location: Herndon, VA
Clearance: Secret
Who We Are:
Since our inception back in 2006, Navitas has grown to be an industry leader in the digital transformation space, and we’ve served as trusted advisors supporting our client base within the commercial, federal, and state and local markets.
What We Do:
At our very core, we’re a group of problem solvers providing our award-winning technology solutions to drive digital acceleration for our customers! With proven solutions, award-winning technologies, and a team of expert problem solvers, Navitas has consistently empowered customers to use technology as a competitive advantage and deliver cutting-edge transformative solutions.
What you will do:
The Device / Endpoint Security Engineer owns the Devices pillar (PWS §5.3) for the Navitas-led USCIS ZTIS-2 effort. Designs, deploys, and operates endpoint posture, EDR, MDM/UEM, device-compliance enforcement, and centralized device threat-protection capabilities across agency-owned and BYOD endpoints (Windows, macOS, Linux, mobile). Drives USCIS Devices-pillar maturity from Initial → Advanced/Optimal per CISA ZTMM, and integrates device telemetry into SIEM/SOAR for automated quarantine and remediation.
Key Responsibilities
- Lead the Devices pillar (PWS §5.3) — Policy Enforcement & Compliance Monitoring, Asset & Supply-Chain Risk Management, Resource Access, and Device Threat Protection.
- Design, deploy, and operate the USCIS EDR / MDM / posture stack; tune detection content; maintain golden baseline images.
- Engineer automated quarantine and isolation playbooks integrated with Swimlane SOAR (PWS §5.7.3.b).
- Run continuous compliance monitoring; identify and remediate posture drift; integrate with vulnerability and patch management.
- Partner with Identity, Networks, and Visibility & Analytics pillar leads on cross-pillar enforcement chains (device posture → conditional access → micro-segmentation).
- Produce Devices-pillar ZTMM maturity evidence; support monthly PMR and Government deliverables.
- Support incident response from the endpoint perspective; participate in on-call rotation.
- Bachelor's degree in Computer Science, Cybersecurity, Information Systems, EE, or related discipline (4 additional years of relevant experience may substitute).
- 5+ years hands-on enterprise endpoint security engineering — design, deploy, and operate EDR, MDM/UEM, posture, and compliance tooling at scale (≥10K endpoints).
- Hands-on with at least two of: CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne, Tanium, or VMware Carbon Black.
- Experience with MDM / UEM platforms — Microsoft Intune, VMware Workspace ONE, Jamf (macOS), or IBM MaaS360.
- Experience with device posture / NAC / ZTNA enforcement platforms — Cisco ISE, Forescout, Palo Alto Prisma Access, Zscaler ZPA, Netskope Private Access, or equivalent.
- Working knowledge of Windows, macOS, and Linux endpoint hardening per DISA STIG and CIS Benchmarks.
- Experience with vulnerability management — Tenable.sc/.io, Nessus, Qualys, or Rapid7 — and integration with patch management (SCCM, Intune, Ivanti, BigFix).
- Familiarity with NIST SP 800-53 (CM, SI, RA control families), NIST SP 800-128, CISA ZTMM Devices pillar, and HSPD-12 PIV operations.
- DoD 8570/8140 IAT-II baseline certification — Security+ CE, CySA+, CCNA Security, GCIH, GMON, or CISSP — held or obtainable within 90 days of EOD.
- U.S. Citizenship required.
- Active DHS USCIS Public Trust clearance or Secret (or above) for reciprocity.
- Direct USCIS / DHS / federal-civilian experience operating multi-OS fleets at agency scale.
- EDR detection-content engineering — custom IOAs/IOCs, CrowdStrike Real-Time Response, Defender Live Response, or SentinelOne Storyline tuning.
- Continuous device attestation, TPM-based health, Microsoft Intune compliance policies, and Conditional Access integration with ZT identity (Entra ID, Okta, SailPoint, Ping).
- Software/asset management and software supply-chain controls — SBOM ingestion, code-signing enforcement, allow-listing (Microsoft App Control / WDAC, Jamf restrictions, AppLocker).
- Integration of endpoint telemetry into Splunk Enterprise Security and Swimlane SOAR for automated quarantine/isolation workflows (PWS §5.7.3.b).
- Production of Devices-pillar ZTMM Before/After maturity scorecards with quantified KPIs (% encrypted, % EDR-covered, MTTD, MTTR, mean-time-to-quarantine).
- BYOD enforcement design and policy tradeoffs in regulated federal environments.
- Familiarity with CISA CDM Phase 1 (HWAM/SWAM) and Phase 2 (CSM) data feeds and dashboards.
- Vendor certifications: CrowdStrike CCFA / CCFR / CCFH; Microsoft SC-200; Tanium TCAA; SentinelOne Vigilance.
- Advanced GIAC: GCED, GCFE, GCFA, GMON, GNFA.
- Experience with Mobile Threat Defense — Lookout, Zimperium, Wandera.
- Experience with IoT/OT visibility tooling — Armis, Claroty, Forescout eyeInspect — relevant to mixed agency device populations.
- AWS Certified Security – Specialty; Microsoft AZ-500.
Equal Employer/Veterans/Disabled
Navitas Business Consulting is an affirmative action and equal opportunity employer. If reasonable accommodation is needed to participate in the job application or interview process, to perform essential job functions, and/or to receive other benefits and privileges of employment, please contact Navitas Human Resources.
Navitas is an equal opportunity employer. We provide employment and opportunities for advancement, compensation, training, and growth according to individual merit, without regard to race, color, religion, sex (including pregnancy), national origin, sexual orientation, gender identity or expression, marital status, age, genetic information, disability, veteran-status veteran or military status, or any other characteristic protected under applicable Federal, state, or local law. Our goal is for each staff member to have the opportunity to grow to the limits of their abilities and to achieve personal and organizational objectives. We will support positive programs for equal treatment of all staff and full utilization of all qualified employees at all levels within Navitas.