Logo
Isys Technologies

Security Operations Center (SOC) Defensive Cyber Operations (DCO) Analyst

Isys Technologies, Colorado Springs, Colorado, United States, 80509


Minimum Clearance Required

TS/SCI Responsibilities I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, including the Department of Defense.

We are seeking Security Operations Center (SOC) Defensive Cyber Operations (DCO) Analysts to support our customer’s operations in Colorado Springs, CO.

This effort provides our Government customer with cybersecurity support services.

This position will be on-site and will require an active TS/SCI Clearance.

Responsibilities:

Conducting security awareness training

Monitoring and analyzing security alerts

Performing penetration testing to identify system vulnerabilities

Developing and implementing security policies, performing security audits and assessments, and analyzing security incidents to determine root causes and recommend remediation actions

Implementing data management standards, developing and maintaining security documentation, and overseeing the implementation of security measures for information systems

Developing and executing security test plans, monitoring cloud-based systems, coordinating with external partners, and developing incident response plans

Managing encryption solutions, conducting forensic analysis of breaches, and developing cybersecurity architectures and designs

Qualifications Essential Requirements:

US Citizenship

Active TS/SCI Clearance

Required Experience:

Minimum 3 (Junior), 8 (Mid), or 12 (Senior) years' related experience

Has extensive experience with computer networking concepts, protocols, and network security methodologies, as well as risk management processes and methods for assessing and mitigating risk

Well-versed in laws, regulations, policies, and ethics related to cybersecurity and privacy, along with core cybersecurity principles and an understanding of cyber threats and vulnerabilities

Has expertise in cryptography, security event correlation techniques, incident response methodologies, and network traffic analysis

Experienced with the software development life cycle, network security measures such as encryption and firewalls, and advanced data analysis techniques

Proficient in penetration testing, database management, web content management, malware analysis, programming structures, application security threats, and wireless technologies

Skilled in using scripting languages such as Python, Perl, and PowerShell to automate tasks and processes

Proficient in conducting security audits and assessments, as well as using security information and event management (SIEM) tools for monitoring and analysis

Experienced in conducting vulnerability scans, recognizing vulnerabilities in security systems, and using intrusion detection and prevention systems (IDS/IPS)

Adept at using network analysis tools to identify and mitigate security threats and developing and implementing security policies and procedures

Education and Certifications:

A Bachelor of Science degree from an accredited college or university

Sr. Certifications: CySA+ or CFR or GCFA or GCIA or GDSA or GCIH or GICSP or CCE

Mid Certifications: CBROPS or FITSP-O or GISF or CCSP or CEH or Cloud+ or GCED or PenTest+ or Security+ or GSEC

Jr. Certifications: None

I2X Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected Veteran status, or disability status.

Salary bands have not yet been determined for this opportunity. I2X Technologies considers factors such as scope and responsibilities of the position, candidate’s work experience, education/training, key skills, internal peer equity, and market and business considerations when extending an offer.

Physical Demands:

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation.

While performing the duties of this job, the employee will regularly sit, walk, stand, and climb stairs and steps. May require walking long distance from parking to workstation. Occasionally, movement that requires twisting at the neck and/or trunk more than the average person, squatting/ stooping/kneeling, reaching above the head, and forward motion will be required. The employee will continuously be required to repeat the same hand, arm, or finger motion many times. Manual and finger dexterity are essential to this position. Specific vision abilities required by this job include close, distance, depth perception and telling differences among colors. The employee must be able to communicate through speech with clients and the public. Hearing requirements include conversation in both quiet and noisy environments. Lifting may require floor to waist, waist to shoulder, or shoulder to overhead movement of up to 20 pounds. This position demands tolerance for various levels of mental stress.

I2X Technologies is an Engineering and Information Technology Company focused on providing Services to the Federal and State Government. I2X offers a competitive compensation program and comprehensive benefits package to our employees.