This is a remote position.
We are looking for a Security compliance professional to lead the effort to harden the client s SaaS platform and produce an official Security Technical Implementation Guide (STIG) so it can be deployed in DoD environments. The consultant will translate those standards into automation documentation and evidence packages that satisfy the Risk Management Framework (RMF) and secure an Authorization to Operate (ATO).
Job Title: STIG Compliance Engineer/Project Manager
Location: REMOTE
Job Type: Contract
Start Date: Within 2 Weeks
Responsibilities
- Assess product architecture against applicable DISA STIGs and NIST SP 800-53 Rev 5 controls and document remediation plans
- Author vendor-specific STIG content (manual checks xCCDF/OVAL SCAP) and shepherd it through the DoDIN APL/STIG approval workflow
- Build Ansible/Terraform/InSpec pipelines to apply and validate STIG settings in CI/CD
- Produce RMF artifacts (SSP SAR POA&M) and coordinate with Security Control Assessors and Authorizing Officials
- Train developers and DevOps teams on secure-by-default patterns and continuous STIG sustainment
Requirements
- Security 5 years securing Windows Linux or containerized workloads
- DISA STIG & SRG 2 years hands-on experience including a proven track record creating or tailoring STIG content for commercial software and guiding it to DISA acceptance
- DoD Cybersecurity Framework Strong grasp of DoD RMF Steps 1 6 and NIST SP 800-53 Rev. 5 control families
- IaaS Automation Proficiency with Ansible Terraform and InSpec
- SCAP/OVAL Tools Proficient with STIG Viewer SCC and OpenSCAP
- Scripting Python PowerShell and Bash
- Integration Experience integrating security tasks into GitLab Jenkins or GitHub CI pipelines
- Documentation Exceptional technical writing for implementation guides and assessment evidence
Great to Have
- Prior success securing an ATO for DoD IL5/6 cloud or on-prem software
- Kubernetes hardening experience (K8s STIG NSA guidance)
- Certifications: Security (or higher per DoD 8570) CISSP CAP Red Hat RHCE or Microsoft MCP
- Active Secret clearance (or eligibility)
Security 5+ years securing Windows, Linux, or containerized workloads DISA STIG & SRGs 2+ years hands-on experience, including a proven track record creating or tailoring STIG content for commercial software and guiding it to DISA acceptance DoD Cybersecurity Framework Strong grasp of DoD RMF Steps 1 6 and NIST SP 800-53 Rev. 5 control families IaaS Automation Proficiency with Ansible, Terraform, and InSpec SCAP/OVAL Tools Proficient with STIG Viewer, SCC, and OpenSCAP Scripting Python, PowerShell, and Bash Integration Experience integrating security tasks into GitLab, Jenkins, or GitHub CI pipelines Documentation Exceptional technical writing for implementation guides and assessment evidence