Isys Technologies
Security Operations Center (SOC) Defensive Cyber Operations (DCO) Analyst
Isys Technologies, Colorado Springs, Colorado, United States, 80509
Minimum Clearance Required:TS/SCI
Responsibilities:
I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, including the Department of Defense.
We are seeking Security Operations Center (SOC) Defensive Cyber Operations (DCO) Analysts to support our customers operations in Colorado Springs, CO.
This effort provides our Government customer with cybersecurity support services.
This position will be on-site and will require an active TS/SCI Clearance.
Responsibilities:
Conducting security awareness trainingMonitoring and analyzing security alertsPerforming penetration testing to identify system vulnerabilitiesDeveloping and implementing security policies, performing security audits and assessments, and analyzing security incidents to determine root causes and recommend remediation actionsImplementing data management standards, developing and maintaining security documentation, and overseeing the implementation of security measures for information systemsDeveloping and executing security test plans, monitoring cloud-based systems, coordinating with external partners, and developing incident response plansManaging encryption solutions, conducting forensic analysis of breaches, and developing cybersecurity architectures and designs
Qualifications:Essential Requirements:US CitizenshipActive TS/SCI ClearanceRequired Experience:Minimum 3 (Junior), 8 (Mid), or 12 (Senior) years' related experienceHas extensive experience with computer networking concepts, protocols, and network security methodologies, as well as risk management processes and methods for assessing and mitigating riskWell-versed in laws, regulations, policies, and ethics related to cybersecurity and privacy, along with core cybersecurity principles and an understanding of cyber threats and vulnerabilitiesHas expertise in cryptography, security event correlation techniques, incident response methodologies, and network traffic analysisExperienced with the software development life cycle, network security measures such as encryption and firewalls, and advanced data analysis techniquesProficient in penetration testing, database management, web content management, malware analysis, programming structures, application security threats, and wireless technologiesSkilled in using scripting languages such as Python, Perl, and PowerShell to automate tasks and processesProficient in conducting security audits and assessments, as well as using security information and event management (SIEM) tools for monitoring and analysisExperienced in conducting vulnerability scans, recognizing vulnerabilities in security systems, and using intrusion detection and prevention systems (IDS/IPS)Adept at using network analysis tools to identify and mitigate security threats and developing and implementing security policies and proceduresEducation and Certifications:A Bachelor of Science degree from an accredited college or universitySr. Certifications: CySA+ or CFR or GCFA or GCIA or GDSA or GCIH or GICSP or CCE
Mid Certifications: CBROPS or FITSP-O or GISF or CCSP or CEH or Cloud+ or GCED or PenTest+ or Security+ or GSECJr. Certifications: NoneI2X Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected Veteran status, or disability status.Salary bands have not yet been determined for this opportunity. I2X Technologies considers factors such as scope and responsibilities of the position, candidates work experience, education/training, key skills, internal peer equity, and market and business considerations when extending an offer.Physical Demands:The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation.While performing the duties of this job, the employee will regularly sit, walk, stand, and climb stairs and steps. May require walking long distance from parking to workstation. Occasionally, movement that requires twisting at the neck and/or trunk more than the average person, squatting/ stooping/kneeling, reaching above the head, and forward motion will be required. The employee will continuously be required to repeat the same hand, arm, or finger motion many times. Manual and finger dexterity are essential to this position. Specific vision abilities required by this job include close, distance, depth perception and telling differences among colors. The employee must be able to communicate through speech with clients and the public. Hearing requirements include conversation in both quiet and noisy environments. Lifting may require floor to waist, waist to shoulder, or shoulder to overhead movement of up to 20 pounds. This position demands tolerance for various levels of mental stress.I2X Technologies is an Engineering and Information Technology Company focused on providing Services to the Federal and State Government. I2X offers a competitive compensation program and comprehensive benefits package to our employees.
Responsibilities:
I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, including the Department of Defense.
We are seeking Security Operations Center (SOC) Defensive Cyber Operations (DCO) Analysts to support our customers operations in Colorado Springs, CO.
This effort provides our Government customer with cybersecurity support services.
This position will be on-site and will require an active TS/SCI Clearance.
Responsibilities:
Conducting security awareness trainingMonitoring and analyzing security alertsPerforming penetration testing to identify system vulnerabilitiesDeveloping and implementing security policies, performing security audits and assessments, and analyzing security incidents to determine root causes and recommend remediation actionsImplementing data management standards, developing and maintaining security documentation, and overseeing the implementation of security measures for information systemsDeveloping and executing security test plans, monitoring cloud-based systems, coordinating with external partners, and developing incident response plansManaging encryption solutions, conducting forensic analysis of breaches, and developing cybersecurity architectures and designs
Qualifications:Essential Requirements:US CitizenshipActive TS/SCI ClearanceRequired Experience:Minimum 3 (Junior), 8 (Mid), or 12 (Senior) years' related experienceHas extensive experience with computer networking concepts, protocols, and network security methodologies, as well as risk management processes and methods for assessing and mitigating riskWell-versed in laws, regulations, policies, and ethics related to cybersecurity and privacy, along with core cybersecurity principles and an understanding of cyber threats and vulnerabilitiesHas expertise in cryptography, security event correlation techniques, incident response methodologies, and network traffic analysisExperienced with the software development life cycle, network security measures such as encryption and firewalls, and advanced data analysis techniquesProficient in penetration testing, database management, web content management, malware analysis, programming structures, application security threats, and wireless technologiesSkilled in using scripting languages such as Python, Perl, and PowerShell to automate tasks and processesProficient in conducting security audits and assessments, as well as using security information and event management (SIEM) tools for monitoring and analysisExperienced in conducting vulnerability scans, recognizing vulnerabilities in security systems, and using intrusion detection and prevention systems (IDS/IPS)Adept at using network analysis tools to identify and mitigate security threats and developing and implementing security policies and proceduresEducation and Certifications:A Bachelor of Science degree from an accredited college or universitySr. Certifications: CySA+ or CFR or GCFA or GCIA or GDSA or GCIH or GICSP or CCE
Mid Certifications: CBROPS or FITSP-O or GISF or CCSP or CEH or Cloud+ or GCED or PenTest+ or Security+ or GSECJr. Certifications: NoneI2X Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected Veteran status, or disability status.Salary bands have not yet been determined for this opportunity. I2X Technologies considers factors such as scope and responsibilities of the position, candidates work experience, education/training, key skills, internal peer equity, and market and business considerations when extending an offer.Physical Demands:The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation.While performing the duties of this job, the employee will regularly sit, walk, stand, and climb stairs and steps. May require walking long distance from parking to workstation. Occasionally, movement that requires twisting at the neck and/or trunk more than the average person, squatting/ stooping/kneeling, reaching above the head, and forward motion will be required. The employee will continuously be required to repeat the same hand, arm, or finger motion many times. Manual and finger dexterity are essential to this position. Specific vision abilities required by this job include close, distance, depth perception and telling differences among colors. The employee must be able to communicate through speech with clients and the public. Hearing requirements include conversation in both quiet and noisy environments. Lifting may require floor to waist, waist to shoulder, or shoulder to overhead movement of up to 20 pounds. This position demands tolerance for various levels of mental stress.I2X Technologies is an Engineering and Information Technology Company focused on providing Services to the Federal and State Government. I2X offers a competitive compensation program and comprehensive benefits package to our employees.