Industrial Security Analyst - Level 3 or 4
Information security analyst job in Colorado Springs, CO
RELOCATION ASSISTANCE: No relocation assistance available CLEARANCE TYPE: Top SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
If forging a secure future excites you, look no further! Northrop Grumman's Space Sector provides an arena where your passion for innovation and quest for exploration are welcome. As an Industrial Security Analyst - Level 3 or Level 4 your role at Colorado Springs, CO will be pivotal in supporting missions critical to national and global security. This position is 100% onsite and cannot accommodate telecommute work. Ready to join forces with our visionary team?
In this job, you will:
Manage destruction, security education and awareness, compliance, create, maintain and leverage working relationships with internal and external customers
Develop and administer security programs and procedures for classified or proprietary materials, documents, and equipment
Utilize experience in program security, with knowledge of implementing a multi-disciplined security program (access control, personnel security, physical security, OPSEC etc.)
Study and implement federal security regulations that apply to company operations
Obtain rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies
Prepare manuals outlining regulations, and establish procedures for handling, storing, and keeping records, and for granting personnel and visitors' access to restricted records and materials
Conduct security education classes and related briefings
Investigate security violations and prepare reports specifying preventive action to be taken
Apply knowledge of ICD 705 and NISPOM
Other duties as assigned
This position can be filled at either a Level 3 or Level 4.
Basic Qualifications for Level 3:
Bachelor's degree with 5 years of professional experience - OR - Master's degree with 3 years of professional experience - OR - PhD with 1 year of professional experience
Will consider an additional 4+ years of experience in lieu of degree
Experience working with classified industrial security programs
Experience with NISPOM and ICD 705
Requires an active Top-Secret/Sensitive Compartmented Information (SCI) clearance at time of application with ability to obtain poly
Basic Qualifications for Level 4:
Bachelor's degree with 8 years of professional experience - OR - Master's degree with 6 years of professional experience - OR - PhD with 4 years of professional experience
Will consider an additional 4+ years of experience in lieu of degree
Experience working with classified industrial security programs
Experience with NISPOM and ICD 705
Requires an active Top-Secret/Sensitive Compartmented Information (SCI) clearance at time of application with ability to obtain poly
Preferred Qualifications:
Experience with DISS, SIMS, and Lenel
FSO Certification, ISP Certification and/or other security certifications
Curious about all the exciting developments with the Northrop Grumman Space Sector? Click the link below:
*************************************
Primary Level Salary Range: $85,600.00 - $128,400.00Secondary Level Salary Range: $103,200.00 - $154,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplyCyber Security Analyst - Full time must include working one weekend day (Sunday)
Information security analyst job in Colorado Springs, CO
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Cybersecurity, Event Security, Security Audit, Splunk (Inactive)
Certifications:
None
Experience:
8 + years of related experience
US Citizenship Required:
Yes
Job Description:
Cyber Security Analyst - Full time position, but must include working one weekend day (Sunday)
Own your career as a Cyber Security Analyst at GDIT. Here, you'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients' missions and ensuring we anticipate the threats of tomorrow.
At GDIT, people are our differentiator. As a Cyber Security Analyst you will help ensure today is safe and tomorrow is smarter. Our work depends on a Cyber Security Analyst joining our team of analysts, stationed in diverse CONUS and OCONUS locations tasked with monitoring and protecting the classified and unclassified systems of a major Intelligence Community Agency for fraud, waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity.
HOW A CYBER SECURITY ANALYST WILL MAKE AN IMPACT
Gather and handle forensic evidence in accordance with Rules of Evidence and perform forensic analysis of digital information.
Monitor, detect and report indicators of misuse, abuse, data spillage, insider threat, and security violations.
Identify acceptable use policy infractions.
Review event logs to determine events of interest.
Monitor for fraud, waste and abuse, including content inappropriate to the workplace, Illegal Activity, Productivity Loss and Non-Compliant Activity, as well as Identity Leakage (PII).
Prepare case evidence and incident reports.
Work on special projects as assigned.
WHAT YOU'LL NEED TO SUCCEED:
Bachelor's Degree and 8+ years of relevant experience, equivalent combinations of education, certifications, and experience will be considered.
DoD Approved Baseline 8570 IAT level III (CASP, CISSP, CISA, etc.) certification is required prior to start date.
DoD Approved Baseline 8570 CSSP Auditor (CEH, CySA, CISA, etc.) certification is required prior to start date.
Security Clearance Level: TS/SCI clearance and ability to obtain and maintain a Polygraph
Preferred Skills: Splunk, Microsoft O365, Fidelis, Solera, Windows, and Linux Operating Systems
Saturday and Sunday weekend Day Shift work required.
Willing to work holidays supporting your assigned shift.
Location: 100% On Customer Site
Bolling AFB, Washington D.C.
Reston, VA
Colorado Springs, CO
Riverdale, MD
Pearl Harbor, HI
Tampa is available for part time weekend only support
GDIT IS YOUR PLACE:
401K with company match
Comprehensive health and wellness packages
Internal mobility team dedicated to helping you own your career
Professional growth opportunities including paid education and certifications
Cutting-edge technology you can learn from
Rest and recharge with paid vacation and holidays
The likely hourly rate for this position is between $61.30 - $82.94. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
Less than 10%
Telecommuting Options:
Onsite
Work Location:
USA DC Washington
Additional Work Locations:
USA CO Colorado Springs, USA FL MacDill AFB, USA HI Pearl Harbor, USA MD Riverdale, USA VA Reston
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplySecret Mid-Level Cyber Threat Emulation Analyst
Information security analyst job in Colorado Springs, CO
A client of Insight Global's is looking for a Secret Mid-Level Cyber Threat Emulation Analyst, to join their team! This position will play a key role in supporting the Missile Defense Agency (MDA). Job Responsibilities: - Perform proactive and reactive cybersecurity duties on customer networks to strengthen enterprise-wide security posture.
- Analyze assets, threats, and vulnerabilities to identify weaknesses and enhance network defenses; measure effectiveness of defense-in-depth architecture.
- Develop, review, and update Defensive Cyber Operations (DCO) procedures, processes, manuals, and related documentation.
- Generate vulnerability assessment reports, escalate findings, and support enterprise-wide incident response in compliance with DoD regulations; lead cyber events and investigations from start to finish.
- Execute Cyber Threat Emulation (CTE) actions using automated validation tools; create dashboards and reports detailing vulnerabilities, remediation steps, and security posture assessments.
- Draft and submit Cyber Tasking Orders (CTOs) to address issues identified during CTE engagements; implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders as directed.
- Mentor and train analysts at all levels; collaborate with Cyberspace Domain Awareness (CDA) to develop evaluation criteria and methodologies aligned with HHQ and industry best practices.
This position is onsite full-time in Colorado Springs, CO or Huntsville, Alabama. This is a six month contract to hire opportunity and the salary range for this role is between $120,000 - $132,000/yr depending on years and level of experience, education, and certifications. This role requires an Active Secret Clearance or higher. Typical benefits offered include flexible work schedules, educational reimbursement, retirement benefits (401K match), employee stock purchase plan, health benefits, tax saving options, disability benefits, life and accident insurance, voluntary benefits, paid time off and paid holidays, and parental leave.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
- DoD Secret Security Clearance (Top Secret Preferred)
- DoD 8570.01-M IAT Level II certification with Continuing Education (CE) - (CySA+, GICSP, GSEC, Security+ CE, SSCP)
- 6+ years of general work experience
- 4 years of experience directly related to:
Performing manual or automated penetration test in an enterprise environment
Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments
Experience performing the full life cycle of incident response and enterprise-level monitoring
- 1+ years of management or leadership experience in a team environment
- Currently hold, or obtain within 6 months of start date, a PenTest+ certification - Bachelor's degree, or higher, in Cybersecurity, Computer Science or related field
- Experience working with Cyber Threat Emulation tools, policies, and procedures
- Experience operating custom software on top of a Linux platform
- Experience with security analysis and solutions in a WAN/LAN environment to include Routers, Switches, Network Devices, and Operating Systems (e.g., Windows, and Linux)
- Experience with other Security Operations Centers (SOC)/DCO tools/applications, such as Firewalls, Intrusion Detection Systems / Intrusion Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc.
- Experience performing security compliance scans across a WAN (ACAS/Nessus preferred)
- Background in configuration, troubleshooting, and deployment of host-based security (ESS preferred)
- Experience mentoring and training personnel in an evolving, high-paced environment
- Familiarity with DoD Security Operations Centers (SOC) (aka CSSP) and DCO/Cybersecurity Service Provider (CSSP)-guiding security policies and procedures
Cyber Threat Emulation Analyst
Information security analyst job in Colorado Springs, CO
or
Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10%
LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics.
What You'll Do
As a Mid-Level Cyber Threat Emulation Analyst, you will:
Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM)
Perform cybersecurity duties on customer networks to improve enterprise-wide security posture
Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture
Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation
Measure defense-in-depth effectiveness against known vulnerabilities
Generate vulnerability assessment reports and escalate findings for review
Support enterprise Incident Response in accordance with DoD regulations and instructions
Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting
Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans
Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly
Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction
Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs)
Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results
Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements
Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices
What You Bring
Basic Requirements:
Must have 6, or more, years of general (full-time) work experience
Must have 4 years of combined experience with:
Performing manual or automated penetration tests in an enterprise environment
Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments
Experience performing the full life cycle of incident response and enterprise-level monitoring
Must have 1 year of experience in management or leadership in a team environment
Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP)
Must have, or obtain within 6 months of start date, a PenTest+ certification
Must have an active DoD Secret Security Clearance
Desired Requirements:
Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field
Have experience with Cyber Threat Emulation tools, policies, and procedures
Have experience operating custom software on a Linux platform
Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux)
Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc.
Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred)
Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred)
Be able to mentor and train personnel in a high-paced environment
Be familiar with DoD Security Operations Centers (SOC/CSSP)
Be familiar with DCO/CSSP-guiding security policies and procedures
Have an active DoD Top Secret clearance
Why LaunchTech?
At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence.
We offer competitive benefits, including:
Medical, Dental, and Vision coverage
401(k) with company match
Paid Time Off (PTO)
Opportunities to make a meaningful impact while advancing your career
And more
Ready to Join the LaunchTech Crew?
If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you.
LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law.
Auto-ApplyInformation Security Analyst, Journeyman
Information security analyst job in Colorado Springs, CO
Journeyman Information Security Analyst Colorado Springs, CO (Onsite)
An organization is seeking a Journeyman Information Security Analyst to support the Data Transport Product Support Sustainment Logistics Maintenance (DSLM) contract. The DSLM effort provides sustaining, maintaining, and logistics support for the operational capability to transfer data for highly reliable and secure telemetry, tracking, command, control, and communications. DSLM primarily supports the Satellite Control Network (SCN). This position is on-site at a contractor facility in Colorado Springs, CO.
WHAT YOU CAN EXPECT TO DO:
Ensure cybersecurity controls for state-of-the-art secure operating systems, networks, and database products are applied IAW DoD cyber directives (including DoDI 8510.01 RMF, DoDI 8500.01, and NIST SP 800-37).
Conduct risk assessments and provide recommendations for application design.
Address a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
Utilize encryption technology, penetration and vulnerability analysis, and IT security research.
Prepare security reports to regulatory agencies as needed.
Duties & Responsibilities (include but are not limited to):
Develop and maintain cybersecurity artifacts for SCN mission systems.
Develop and implement an Anti-virus/Malware identification process for equipment transfers to/from SCN sites.
Coordinate with Software Maintenance Action (SWMA) IA patching team and program office IA architecture team on an IA/Cybersecurity Roadmap to identify non-compliant IA controls and propose corrective actions.
Employ system security engineering to design, develop, and implement secure applications and configurations in coordination with the Government.
Evaluate hardware, firmware, and software information security components for mission hardware acquisition.
Perform cybersecurity controls verification assessments IAW DoDI 8510.01 and DoDI 8500.01 annually.
Attend Cyber Technical Interchange Meetings during key project phases (Requirements, Design, etc.) to obtain Cyber community buy-in.
Develop and implement policies, procedures, and standards related to information security, privacy, and incident response; monitor compliance.
Provide technical engineering services for integrated security systems and solutions.
Use tools and processes to monitor information systems for security-related events.
Plan configuration changes for major security infrastructure platforms.
Maintain a library of security audit tools and processes for testing, audits, incident response, and diagnosing security issues.
Travel may be required.
WHAT THE TEAM REQUIRES:
BS Degree and 3 years of related experience or equivalent combination of education and experience, including 2 years of relevant Cybersecurity experience.
Active DoD Secret Security Clearance or the ability to obtain and maintain one.
Demonstrated traits: technical competence, strong decision-making and critical thinking, customer focus, self-motivation, desire to learn, effective interpersonal skills, pride in work, teamwork, and dedication.
WHAT THE TEAM PREFERS:
DoD 8140 Cyber Defense Analyst or Vulnerability Analyst Basic Qualification or certification (e.g., CEH, Security+), or a technical BS from an ABET-accredited or CAE-designated institution (as defined in DoD 8140).
SCN and/or DoD experience is preferred.
Working Place: Colorado Springs, Colorado, United States Company : 2025 August 28th - Auria Space
Cyber Security Specialist
Information security analyst job in Colorado Springs, CO
Input Technology Solutions has an immediate opening for those ready for an exciting and dynamic career as an Cyber Security Specialist to to work with agile development teams to review application risks, identify weaknesses, and implement remediation actions. The ideal candidate is someone experienced with conducting security and vulnerability scans, and application security testing. Must have excellent attention to detail, strong analytic, and communication skills.
Clearance:
Active Secret
Requirements:
Essential Functions:
Configure and manage Tenable Security Center and Nessus Manager in an on-premises environment as part of DISA Assured Compliance and Assessment Solution (ACAS)
Administer and maintain McAfee ePolicy Orchestrator (ePO) and Enterprise Security System (ESS) point products
Monitor security logs and alerts from Elastic and Kibana (ELK Stack) and other system level audits
Support incident detection and conduct preliminary response actions to security incidents.
Configure and launch STIG compliance scans using SCAP Compliance Checker (SCC)
Administer Microsoft Windows Server and Red Hat Linux (RHEL) operating systems
Administer virtualization platforms using VMware and Microsoft Hyper-V
Monitor, assess, and report system security vulnerabilities, document corrective actions on the POA&M, and implement preventative actions to minimize the security vulnerabilities.
Identify and analyze emergent cybersecurity technologies and systems engineering methods to improve the system's cybersecurity posture.
Perform testing of all patches and fixes to ensure cybersecurity compliance prior to installation of new equipment.
Perform other duties as assigned.
Required Skills:
Experience in implementing and enforcing application cybersecurity and vulnerability management.
Required Experience:
Bachelor's degree in Cybersecurity, Information Technology, Computer Science or related field; or equivalent combination of education and experience.
Three (3) years or more of Cybersecurity related experience (hands on security engineering).
Assured Compliance Assessment Solution (ACAS) experience is mandatory.
Experience conducting Information Systems vulnerability assessment, risk mitigation, and application of mitigation strategies.
Understanding of RMF, eMASS, POA&Ms, ACAS, and Vulnerability Management.
Additional Eligibility Qualifications:
DoD 8570 IAT II or IAM II Certified (Security+ CE or equivalent) required at higher.
Cyber Systems Security Engineer Sr
Information security analyst job in Colorado Springs, CO
WHAT WE'RE DOING Do you want to be part of a culture that inspires employees to innovate, perform with excellence, and build incredible products? If you have the passion, drive, and courage to dream big, then we want to build a better tomorrow with you. Come and join our team!
Lockheed Martin's Rotary and Mission Systems' C4ISR team is looking for a proven and experienced cyber systems engineer to support the Peace Krypton (PK) program.
THE WORK
As a System Engineer - Cyber in this position, you will:
• Design and implement secure systems, including network architecture, system configuration, and security protocols.
• Conduct risk assessments and vulnerability analyses to identify potential security threats and develop mitigation strategies.
• Develop and implement security plans, including incident response plans, disaster recovery plans, and business continuity plans.
• Integrate multiple systems and subsystems, including hardware, software, and firmware, to meet customer requirements.
• Configure and maintain systems to meet DISA STIG requirements, including Windows, Linux, and network devices.
• Implement and maintain security controls, including firewalls, intrusion detection systems, and antivirus software.
• Develop and maintain system Plan of Action and Milestones (POAM).
• Conduct vulnerability assessments and remediation activities to ensure systems are secure and compliant with DISA STIG guidelines.
• Develop and maintain system documentation, including system configuration guides, security plans, and incident response plans.
• Collaborate with cross-functional teams, including systems engineering, software engineering, and test engineering, to ensure that systems meet customer requirements and industry standards.
• Develop and maintain system documentation, including system design documents, interface control documents, and test plans.
• Ensure compliance with industry standards and regulations, including NIST, ISO 27001, and DoD 8570.
• Collaborate with customers and stakeholders to understand security requirements and ensure that systems meet their needs.
Please note:
This position is based out of Colorado Springs, CO.
WHO WE ARE
Do you want to be part of a company culture that empowers employees to think big, lead with a growth mindset, and make the impossible a reality? We provide the resources and give you the flexibility to enable inspiration and focus. If you have the passion and courage to dream big, work hard, and have fun doing what you love then we want to build a better tomorrow with you.
On this team, you will collaborate with a geographically separated team of technical professionals including software developers, system engineers, and integration and test engineers. You will work with cross-functional team in a highly dynamic mission-focused environment.
WHO YOU ARE
• An experienced System Engineer with a focus on cyber security and integration.
• A candidate with a strong background in systems engineering, cyber security, and integration, with expertise in designing and implementing secure systems and integrating multiple systems and subsystems.
• You will be responsible for ensuring the security and integrity of the PK systems, as well as integrating multiple systems and subsystems to meet customer requirements.
WHY JOIN US
Joining our team offers you the opportunity to support a join a company and a team where your contributions are valued and you can develop your skills and expertise.
Our team also puts a high value on work-life balance. Striking a healthy balance between your personal and professional life is crucial to your happiness and success here, which is why we aren't focused on how many hours you spend at work or online.
Instead, we're happy to offer a flexible schedule so you can have a more productive and well-balanced life both in and outside of work, along with competitive pay, and comprehensive benefits.
Basic Qualifications
• Current CompTIA Security+ certification
• Bachelor's degree in Engineering, Computer Science, Information Assurance, or another STEM related field with 5+years related experience or related Master's degree with 3 years relevant experience.
• Strong background in cyber security principles, including network security, and threat analysis
• Strong understanding of STIGs and other security controls, including DISA STIGs and NIST guidelines
• Experience with security tools and technologies, including vulnerability scanners, intrusion detection systems, and firewalls
• Understanding of system integration and systems engineering principles.
• This position requires the ability to travel up to 20% including internationally. Must hold a valid U.S. Passport.
• This position requires the ability to obtain and maintain a DoD government clearance at the Secret level.
Desired skills
• Current CISSP Certification
• Experience with agile development methodologies and DevOps practices
• Experience with security information and event management (SIEM) systems and incident response tools
• Strong programming and scripting skills, including languages such as C# and PowerShell
• Knowledge of DO-178C - Software Considerations in Airborne Systems and Equipment Certification
• Familiarity with industry standards and regulations, including NIST, ISO 27001, and DoD 8570
• Strong communication and collaboration skills, with ability to work with cross-functional teams and customers
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
*
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Other Important Information
By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to work remotely
Part-time Remote Telework: The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility. The specific weekly schedule will be discussed during the hiring process.
Work Schedule Information
Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Security Clearance Information
This position requires a government security clearance, you must be a US Citizen for consideration.
Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $101,000 - $178,135. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
(Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year.
This position is incentive plan eligible.
Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $116,200 - $201,365. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.
Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays.
This position is incentive plan eligible.
DSS Information System Security Officer (ISSO) - (IDISSO092325.1)
Information security analyst job in Colorado Springs, CO
Cimarron is seeking a
DSS Information System Security Officer (ISSO)
to support the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract at Schriever Space Force Base in the Colorado Springs, CO area.
Key Duties:
Develop and maintain required security authorization package artifacts on MDA-designated systems for SAP program authorizations.
Create and implement policies, procedures, and control evidence for selected security controls.
Collaborate with hardware engineers, software engineers, and test teams to develop, test, and deploy cyber tools that support compliance initiatives on new platforms.
Assess and coordinate mitigation of system security threats and risks using DoD-approved tools (e.g., ACAS, Prisma, Trelix).
Lead efforts in security planning, assessment, risk analysis, risk management, certification, and awareness activities for MDSEA systems.
Prepare documentation and data in support of U.S. Government Assessment and Authorization (A&A) efforts to obtain new Cyber Security Authorizations to Operate (ATO).
Manage records for assigned enclaves and ensure baseline systems meet mission requirements for operation, function, and cyber posture.
Review and analyze system logs to identify performance or behavior anomalies, determine trends, and recommend proactive corrective actions.
Coordinate tasks and problem-solving efforts with team members, customers, stakeholders, and leadership to ensure solutions are developed with minimal mission impact.
Evaluate security vulnerabilities in various software and hardware platforms and recommend appropriate mitigations.
Maintain proficiency in cyber applications to effectively accomplish assigned tasks.
Requirements
Required Skills, Experience, and Education:
Due to facility security requirements, only U.S. citizens are eligible for consideration at the time.
This position requires access to federal facilities. Candidates must possess a valid, unexpired Real ID-compliant driver's license or state-issued identification card at the time of hire. If you are unsure whether your ID is Real ID-compliant, please check for the star symbol in the upper portion of your driver's license or state ID.
Active Top Secret clearance (or higher).
Ability to obtain a SCI clearance.
8 or more years of general, full-time work experience.
4 or more years of directly related work experience.
1 or more years of experience working in a management or leadership position.
Current DoD 8570 IAT Level II Certification (ex., Security+).
Experience with the Joint Special Access Program Implementation Guide (JSIG).
Experience in Risk Management Framework (RMF) accreditation and authorization (A&A) processes, including development of standard Body of Evidence (BoE) packages.
Experience delivering technical briefings to executive-level personnel.
Excellent verbal, written, interpersonal, and teamwork skills.
Ability to prioritize and perform work in a highly complex environment.
Desired Skills, Experience, and Education:
Active TS/SCI clearance.
Experience in defining cyber architecture, and then engineering and implementing that architecture.
Familiarity with the System Development Life Cycle (SDLC).
Familiarity with project management principles.
Experience with agile system development and DevSecOps tools and processes.
Ability to conduct research and develop white papers on security and other applicable topics.
Knowledge of container scanning vulnerability tools (e.g., JFrog Xray, Prisma).
Experience with cyber compliance tools such as ACAS, Trelix, Prisma, and Elastic.
Active DoD 8570 IAT Level III or IAM Level II certification (e.g., CISSP, CISM, CCISO).
Business Profile:
Cimarron is a global solutions company with a strategic partnering approach to satisfying customer-driven requirements. We ensure customer success with a modern approach and experienced leadership. Driven by an entrepreneurial spirit, Cimarron is fueled by highly skilled employees, developing new innovative technologies, and delivering superior products and services. We believe in recognizing employees' worth by offering competitive salaries and benefits, including health, dental, and vision insurance, 401(k) contributions, educational reimbursement, and much more. From company communication through Company-wide information meetings led by our President and CEO, to an Awards program designed to recognize our amazing employees and their accomplishments, you will not only feel like you are a part of a team, you will be a valued member of the Cimarron family. Cimarron is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, age, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or any other characteristic protected by federal, state, or local law.
Information Systems Security Manager (ISSM) II
Information security analyst job in Colorado Springs, CO
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Information Security, Information Security Management, Information System Security
Certifications:
Cisco Certified Network Associate (CCNA) Security - Cisco - Cisco, GIAC Security Leadership Certification - Global Information Assurance Certification - GIAC - Global Information Assurance Certification - GIAC, GSEC: GIAC Security Essentials Certification - Global Information Assurance Certification (GIAC) - Global Information Assurance Certification (GIAC)
Experience:
7 + years of related experience
US Citizenship Required:
Yes
Job Description:
Information Systems Security Manager (ISSM) II
The ISSM's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures.
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint.
Special Access Program Implementation Guide (JSIG) authorization process.
Advise customer on Risk Management Framework (RMF) assessment and authorization issues.
Perform risk assessments and make recommendations to DoD agency customers.
Advise government program managers on security testing methodologies and processes.
Evaluate authorization documentation and provide written recommendations for authorization to government PMs.
Develop and maintain a formal Information Systems Security Program.
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties.
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning.
Maintain a and/or applicable repository for all system authorization documentation and modifications.
Institute and implement a Configuration Control Board (CCB) charter.
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents.
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system.
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements.
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed.
Assess changes in the system, its environment, and operational needs that could affect the authorization.
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview.
Review AIS assessment plans.
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries.
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination.
Ensure all authorization documentation is current and accessible to properly authorized individuals.
Ensure that system security requirements are addressed during all phases of the system life cycle.
Develop Assured File Transfers (AFT) on accordance with the JSIG.
Participate in self-inspections.
Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available.
Experience:
7+ years related experience.
Prior performance in roles such as ISSO or ISSM.
SAP experience required.
Education:
Bachelor's degree in related discipline OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
Certifications:
IAT Level 3 or IAM Level 3 - within 6 months of hire
Security Clearance:
Required - Active/Curre TS/SCI
Must be able to obtain CI Poly.
#AirforceSAPOpportunities
The likely salary range for this position is $107,185 - $145,015. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
None
Telecommuting Options:
Onsite
Work Location:
USA CO Colorado Springs
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyInformation System Security Officer II
Information security analyst job in Colorado Springs, CO
Global Resource Solutions, Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Information System Security Officer II.
Job Descriptio n:
Summary: The ISSO II's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Essential Duties & Responsibilities:
Review, prepare, and update AIS authorization packages
Notify customer when changes occur that might affect AIS authorization
Perform AIS self-inspections, provide security coordination and review of all system test plans
Identify AIS vulnerabilities and implement countermeasures
Represent the customer on various technical review and inspection teams
Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system authorization packages
Coordinate, prepare, and track AIS inspections, reports, and responses
Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities
Prepare reports on the status of security safeguards applied to computer systems
Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices
Perform ISSO duties in support of in-house and external customers
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Review, track, and conduct AIS training
Requirement:
Four (4) years related experience
Bachelor's Degree in a related area or equivalent experience (Four (4) years)
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire.
Security Requirements:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Programs
Willingness to submit to a Counterintelligence Polygraph
Skills:
Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision
Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents
Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
Must be able to lift up to 50lbs
Physical Requirements : This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk.
Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English.
GRS is an Equal Opportunity Employer. GRS will continue to abide by obligations under VEVRRA and Section 503 physical or mental disability, protected veteran status, or any other characteristics that are protected by law.
Auto-ApplyInformation System Security Officer II
Information security analyst job in Colorado Springs, CO
Global Resource Solutions, Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Information System Security Officer II.
Job Descriptio n:
Summary: The ISSO II's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Essential Duties & Responsibilities:
Review, prepare, and update AIS authorization packages
Notify customer when changes occur that might affect AIS authorization
Perform AIS self-inspections, provide security coordination and review of all system test plans
Identify AIS vulnerabilities and implement countermeasures
Represent the customer on various technical review and inspection teams
Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system authorization packages
Coordinate, prepare, and track AIS inspections, reports, and responses
Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities
Prepare reports on the status of security safeguards applied to computer systems
Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices
Perform ISSO duties in support of in-house and external customers
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Review, track, and conduct AIS training
Requirement:
Four (4) years related experience
Bachelor's Degree in a related area or equivalent experience (Four (4) years)
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire.
Security Requirements:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Programs
Willingness to submit to a Counterintelligence Polygraph
Skills:
Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision
Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents
Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
Must be able to lift up to 50lbs
Physical Requirements : This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk.
Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English.
GRS is an Equal Opportunity Employer. GRS will continue to abide by obligations under VEVRRA and Section 503 physical or mental disability, protected veteran status, or any other characteristics that are protected by law.
Auto-ApplyCyber Security Engineer, Journeyman
Information security analyst job in Colorado Springs, CO
We have an exciting opportunity to join us in supporting one of our valued customers as a Cyber security Engineer, Journeyman to work out of Schriever SFB, CO. Pay: $142,000-$147,000 * Oversee the overall security, integrity and operations of assigned systems and networks IAW AFI 17-101, AFI 17-130, DoDMAN5200.02_AFMAN16-1405, AFMAN 17-1301, and local policies and procedures
* Collect and maintain data needed to meet Cybersecurity reporting requirements
* Ensure Security Technical Implementation Guide (STIG) configuration, patching, scanning and testing of systems
* Develop/review Communication System Requirement Document (CSRD) technical solutions to provide network, computer system, financial, installation, outside agency coordination, information assurance and customer assistance
* Develop/find technical solutions and work plans that are consistent with architectural and information system security guidelines
* Support the Government in the development of assessment and authorization (A&A) packages via the RMF, IAW DoD Instruction 8510.01, NIST SP 800-37, NIST SP 800-53, NIST SP 800-60, CNSSI 1253, AFPD 17-1, AFI 17-101, AFI 17-130, ICD 503 and additional Authorizing Official (AO) guidance and supports customers/users with their specific network and stand-alone system accreditations to include maintaining and updating Trusted Facility Manuals, system descriptions, security policies, user guides, system architectures and security-related documentation
* Monitor the current status of all accreditation packages and notify the Government when changes to current packages are required IAW applicable regulations, ensure all packages are submitted and coordinated with the appropriate accrediting authority for approval
* Maintain User Access Request forms according to network procedures
* Provide information to support System Administrators, Network Managers, users, procurement staff and security personnel and monitor, implement and report on all security/configuration patches/changes (i.e., NOTAM, IAVA and security/vulnerability advisories)
* Perform a weekly review of the audit trail for 12 DOSs systems IAW Air Force Policy Directive (AFPD) 17-1, DoD Instruction 8500.1, ICS 500-27, and ICS 700-02
* Conduct vulnerability testing and risk analysis as part of the overall assessment process on all networks and systems as determined by the Government
* Conduct data transfers IAW established government Standard Operating Procedures
* Obtain approval/inspect any IT-related equipment brought into or taken out of SCIFs
* Appropriately dispose of old system elements (hardware, software and peripherals) and documents in accordance with DODM 5200.01, Vol 3, DoD Information Security Program Protection of Classified Information
Required Qualifications:
* 5-10 years' experience in information system security development and management
Education/ Certification:
* Bachelor's degree in IT, Computer science or Engineering is preferred. Additional years of experience can be substituted for degree requirement.
* IAT Level 2 certification (Security+)
Required Clearance: Top Secret/SCI
Travel: TBD
In compliance with Colorado's Equal Pay for Equal Work Act, USfalcon considers several factors when extending an offer, including but not limited to, the role and associated responsibilities as well as a candidate's work experience, knowledge, skills, education, and training.
Benefits Offered: medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, EAP, parental leave, pet insurance, paid time off, and holidays.
USfalcon has grown from our roots in 1984 to become a mid-tier professional services company supporting a diverse and global customer base of DoD and Federal Agencies. We have been excelling in diverse platforms for almost 30 years and continue to be an industry leader. If you thrive in an organization that values integrity, commitment, stewardship, and service, we want to meet you. We deliver core capabilities in Aviation, Space, Information Technology, and Business Operations and continue to grow and expand our competencies, contracts and customer base, adding to our long history of supporting customer and community needs. Learn more at *************************
Information Systems Security Officer II
Information security analyst job in Colorado Springs, CO
Job DescriptionDescription:
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Requirements:
Experience:
2 - 5 years related experience
Prior performance in roles such as System/Network Administrator or ISSO
Education:
Bachelor's degree or equivalent experience (4 years)
Certifications:
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must be able to regularly lift up to 50 lbs
Cyber Security Test Engineer
Information security analyst job in Colorado Springs, CO
Acuity Innovations LLC is a small, defense contracting company that provides enterprise architecture, solution design, digital engineering, defensive cyberspace operations, system integration, and test and evaluation products and services that improve performance and decrease decision timelines. Our fundamental, repeatable service offering is bound in architecting, designing, securing, integrating, and verifying the operational readiness of data ecosystems.
Do you want to be part of a unique, small business that differentiates itself by:
Delivering the best products, integrated systems, and mission capabilities for the warfighter
Building long-term relationships and treating its employees as family
Deploying small but powerful High-Performance Teams, like elite Special Forces teams to each task
Collaborating within and across the Acuity Innovations teams as well as with the customer
Providing a growth path to partnership/ownership opportunities
If you have this type of passion and desire to be part of a collaborative team environment with the innovation, initiative, and confidence to make things better, then Acuity Innovations may be the right place to realize your personal and professional goals.
Package includes:
Competitive salary
3 weeks paid time off
11 Federal Holidays
Flexible Hours
Benefits
Career Development/Mentorship Opportunities
Company Sponsored Social Events
We seek technical individuals who will succeed in a highly collaborative work environment.
Acuity Innovations LLC: Overview | LinkedIn
****************************
Brief Job Description:
Acuity Innovations is seeking a Cyber Security Test Engineer to join our team. Applicant must be a US Citizen and be able to obtain a DoD SECRET Security Clearance.
The candidate will provide support to the cyber security operations staff in resolving cyber security issues as requested. Also, the candidate will assist in the identification of non-compliant system settings, exploitable threats, and other system vulnerabilities.
We seek technical individuals who will thrive in a highly collaborative work environment of small teams, using the most modern tools and methodologies to tackle the challenges of integrating complex space and ground communications systems.
Responsibilities:
Assist in authoring technical documentation including test plans, test procedures, technical white papers, and test reports
Use industry accepted and in-house developed tools to collect and aggregate cyber security data for use in identifying non-compliant system settings, exploitable threats, and other system vulnerabilities
Assist in the communication with system developers to further understanding of cyber security concepts and implemented controls
Provide the collected data to Information Systems Security Engineers (ISSE) in support of their assessment of system cyber security posture and support the cyber security operations staff in resolving complex cyber security issues as requested
Assist in the authoring and peer-reviews cyber security test plans and detailed test procedures that include step-by-step instructions for using advanced cyber security tools
Enhance cyber security testing processes and procedures through feedback and implementation
Assist in the reporting on cyber security program activities to upper management as requested
Travel: approximately 10%
Required Skills & Experiences:
Bachelor's degree in engineering, mathematics, physics, computer science, or Cyber discipline
Understand fundamentals of Security Technical Implementation Guides (STIG) and benchmarks
Understand fundamentals of various Operating Systems
Ability to troubleshoot problems involving complex systems
Within 6 months of hire, must meet position and certification requirements outlined in DoDD 8140 and DoDD 8570.01-M for Information Assurance
Excellent oral and written communication skills
Must be a US Citizen and be able to obtain a DoD SECRET Security Clearance
Preferred Skills & Experiences:
Understand fundamental concepts of software design and implementation
Ability to undertake new challenges with limited guidance
Basic knowledge with Secure Content Automation Protocol (SCAP) Compliance Checker (SCC) and STIG Viewer
Knowledge of Assured Compliance Assessment Solution (ACAS), Command-Line-Interface (CLI), and Linux and Windows systems
Knowledge of developing and maintaining scripts (primarily PowerShell)
Clearance:
All applicants selected will be subject to a background check and a security investigation and will need to meet eligibility requirements for access to classified information.
NL-25-086 Sustainment Cyber Security Test Engineer
Information security analyst job in Colorado Springs, CO
nLogic is seeking a Sustainment Cyber Security Test Engineer to support the MSEIT contract at Space Systems Command (SSC). The MILSATCOM Systems Engineering, Integration, and Test (MSEIT) effort provides leading edge Systems Engineering & Integration (SE&I) for the US Space Force's Space Systems Center (SSC). We support the Space Force's acquisition of state of the art satellite communications systems, providing global secure, survivable, and protected communications for our nation's warfighters. We seek technical individuals who will thrive in a highly collaborative work environment of small teams, using the most modern tools and methodologies to tackle the challenges of integrating complex space and ground communications systems.
Required Skills and Qualifications:
An active Secret Clearance is required for this role
Bachelor's degree in engineering, mathematics, physics, computer science, or equivalent technical discipline
Understand fundamentals of various Operating Systems
Ability to troubleshoot problems involving complex systems
Within 6 months of hire, must meet position and certification requirements outlined in DoDD 8140 and DoDD 8570.01-M for Information Assurance
Excellent oral and written communication skills
Motivated, self-starter capable of autonomous on-the-job learning/improvement with minimal supervision
Familiarity with Information Assurance Vulnerability Management (IAVM) processes
Familiarity in military, aerospace, DoD government, academia, or industry
Familiarity using Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) and benchmarks
Preferred Skills and Qualifications:
International Council on Systems Engineering (INCOSE) Certification (i.e. ASEP, CSEP, ESEP)
Understanding of fundamental concepts of software design and implementation
Ability to undertake new challenges with limited guidance
Knowledge of DoD mission system sustainment
Experience with Secure Content Automation Protocol (SCAP) Compliance Checker (SCC) and STIG Viewer
Experience with Assured Compliance Assessment Solution (ACAS)
Experience using the Command-Line-Interface (CLI)
Experience with administrating Linux and Windows systems
Experience with Database Management (e.g. Microsoft SQL Server)
Experience with Cisco network devices
Experience with developing and maintaining scripts (primarily PowerShell)
Experience with working in a highly competitive multi-contractor environment
Familiarity with software vulnerability assessment and code analysis
Familiarity with DoD RMF Assessment and Authorization (A&A) process
Familiarity with AF/DoD/CNSSI/NIST security policy/manuals and other guiding policy documents
Familiarity with penetration testing methodology and tools
Work Conditions:
Work Model: On-Site
Travel: Minimal
Working Hours: Standard
Candidate must be a U.S. Citizen and hold an active Secret Clearance. This is a full-time position in Colorado Springs, CO. The pay range for this position in Colorado is $75,000 to $95,000. We offer a comprehensive benefits package including health insurance, Employee Stock Ownership Plan (ESOP), 401(k) retirement plan, paid time off, and additional supplemental benefits, such as professional development support.
Qualified candidates should complete their application to be considered for the opportunity.
Senior Security Engineer*
Information security analyst job in Colorado Springs, CO
Full-time Description
Are you looking to take the next steps in your career as a Cleared EEC XSOAR Senior Security Engineer? Let's chat and see if we are a good match!
Opportunity:
Virtual Service Operations is searching for a Cleared EEC XSOAR Security Engineer to join our team in Colorado Springs, CO. As an EEC XSOAR, you are a critical part of our customers' adoption of Cloud security integrations. You may be engaged with multiple clients as the subject matter expert, establishing relationships with them to ensure best practices for their secure cloud environments throughout the lifecycle of their journey with our products. You'll guide them for quick and consistent adoption, accelerated integrations with new cloud security products, and real-time support and strategy.
You'll act as their trusted advisor, providing strategic guidance around complex systems to secure a digital environment. Interacting directly with the client, you'll partner closely with client personnel to guide them on their cloud security journey. Your thorough understanding of our product integrations contributes to the development of new principles and concepts - providing detailed analysis around what's working, what's not, and what could be better.
You enjoy implementation work, are proactive about resolving potential concerns, and operate well around strict best practices that enable our clients on their road to a more secure digital world. You're creative, innovative, and you love a challenge - learning how integrations might work better around new products and technologies.
Responsibilities:
Lead security automation technical implementations in a customer environment.
Translate complex business requirements into best practice solutions.
Identify and document operational business processes for automated playbook development.
Prepare capacity planning, deployment, business continuity and configuration guides.
Ability to communicate effectively in various situations with all levels of an organization from Engineering/Operations to CIO/CISO audiences.
Present technical information to non-technical personnel.
Train and enable customer teams to be successful with our products.
Develop key performance indicators (KPIs), understand critical success factors, and continuously measure performance.
Engage with the account team to allow them to clearly understand the customer's business & technical requirements as you learn through active engagement with the client.
Qualifications:
Experience with security automation platforms and orchestration tools (SOAR).
Familiarity with IDS/IPS, SIEM, and endpoint solutions.
Experience managing complex automated security solutions in large environments.
Deep understanding of security threats, internet protocols and cybersecurity tools and applications.
Project leadership experience; ability to drive organizations and resources to complete required tasks in service of end goals.
Detailed experience in the installation, configuration, operation and documentation of security solutions to prevent cybersecurity threats.
Experience working in a Security Operations Center (SOC) and documenting operational workflows.
Excellent written and verbal communication skills, with confirmed ability to communicate to senior leaders and technical peers.
Some understanding of Linux or Unix and network troubleshooting analysis.
Preferred experience in Python and/or Javascript.
Preferred experience in cybersecurity incident response.
Previous experience with STIGs, RMF, NIST publications and/or SCAP.
GCIA, CISSP , CEH, and/or Security+ certifications is a plus.
Requirements
Must possess an active Secret Clearance.
Please note that pursuant to a government contract, this specific position requires U.S. citizenship status
Minimum of 7 years of experience using Cortex EEC XSOAR
Minimum of 5 years of experience with Palo Alto
What is Important to Us:
You are an excellent communicator in writing and speaking.
You have the ability to work independently but also value teamwork.
Your problem-solving skills are excellent.
You are looking for a job where performance appraisals occur regularly, and you look forward to advancing your career.
You seek a community of virtue-centered co-workers and clients.
What we offer you:
As part of the VSO company, you will be part of a virtue-centered team who value their work and teammates.
This is a no-jerk zone
. We provide ongoing learning and development opportunities to foster continuous growth. We offer competitive salaries, health benefits, and flexible work arrangements.
More About VSO:
VSO is a hybrid cloud and managed services consulting firm. Much of VSO's success can be attributed to our deep partnerships with IT services industry leaders such as AWS, IBM, Microsoft and others. VSO leverages numerous other partner relationships so as to provide our customers with optimal support. Additionally, we take pride in taking care of our employees. We offer a wide variety of benefits for eligible employees related to health, retirement, professional development, and more! For more information, please visit our website at ***************************
Salary Description $150,000 - $175,000
Senior Security Engineer*
Information security analyst job in Colorado Springs, CO
Are you looking to take the next steps in your career as a Cleared EEC XSOAR Senior Security Engineer? Let's chat and see if we are a good match!
Opportunity:
Virtual Service Operations is searching for a Cleared EEC XSOAR Security Engineer to join our team in Colorado Springs, CO. As an EEC XSOAR, you are a critical part of our customers' adoption of Cloud security integrations. You may be engaged with multiple clients as the subject matter expert, establishing relationships with them to ensure best practices for their secure cloud environments throughout the lifecycle of their journey with our products. You'll guide them for quick and consistent adoption, accelerated integrations with new cloud security products, and real-time support and strategy.
You'll act as their trusted advisor, providing strategic guidance around complex systems to secure a digital environment. Interacting directly with the client, you'll partner closely with client personnel to guide them on their cloud security journey. Your thorough understanding of our product integrations contributes to the development of new principles and concepts - providing detailed analysis around what's working, what's not, and what could be better.
You enjoy implementation work, are proactive about resolving potential concerns, and operate well around strict best practices that enable our clients on their road to a more secure digital world. You're creative, innovative, and you love a challenge - learning how integrations might work better around new products and technologies.
Responsibilities:
Lead security automation technical implementations in a customer environment.
Translate complex business requirements into best practice solutions.
Identify and document operational business processes for automated playbook development.
Prepare capacity planning, deployment, business continuity and configuration guides.
Ability to communicate effectively in various situations with all levels of an organization from Engineering/Operations to CIO/CISO audiences.
Present technical information to non-technical personnel.
Train and enable customer teams to be successful with our products.
Develop key performance indicators (KPIs), understand critical success factors, and continuously measure performance.
Engage with the account team to allow them to clearly understand the customer's business & technical requirements as you learn through active engagement with the client.
Qualifications:
Experience with security automation platforms and orchestration tools (SOAR).
Familiarity with IDS/IPS, SIEM, and endpoint solutions.
Experience managing complex automated security solutions in large environments.
Deep understanding of security threats, internet protocols and cybersecurity tools and applications.
Project leadership experience; ability to drive organizations and resources to complete required tasks in service of end goals.
Detailed experience in the installation, configuration, operation and documentation of security solutions to prevent cybersecurity threats.
Experience working in a Security Operations Center (SOC) and documenting operational workflows.
Excellent written and verbal communication skills, with confirmed ability to communicate to senior leaders and technical peers.
Some understanding of Linux or Unix and network troubleshooting analysis.
Preferred experience in Python and/or Javascript.
Preferred experience in cybersecurity incident response.
Previous experience with STIGs, RMF, NIST publications and/or SCAP.
GCIA, CISSP , CEH, and/or Security+ certifications is a plus.
Requirements
Must possess an active Secret Clearance.
Please note that pursuant to a government contract, this specific position requires U.S. citizenship status
Minimum of 7 years of experience using Cortex EEC XSOAR
Minimum of 5 years of experience with Palo Alto
What is Important to Us:
You are an excellent communicator in writing and speaking.
You have the ability to work independently but also value teamwork.
Your problem-solving skills are excellent.
You are looking for a job where performance appraisals occur regularly, and you look forward to advancing your career.
You seek a community of virtue-centered co-workers and clients.
What we offer you:
As part of the VSO company, you will be part of a virtue-centered team who value their work and teammates.
This is a no-jerk zone
. We provide ongoing learning and development opportunities to foster continuous growth. We offer competitive salaries, health benefits, and flexible work arrangements.
More About VSO:
VSO is a hybrid cloud and managed services consulting firm. Much of VSO's success can be attributed to our deep partnerships with IT services industry leaders such as AWS, IBM, Microsoft and others. VSO leverages numerous other partner relationships so as to provide our customers with optimal support. Additionally, we take pride in taking care of our employees. We offer a wide variety of benefits for eligible employees related to health, retirement, professional development, and more! For more information, please visit our website at ***************************
Salary Description $150,000 - $175,000
F5 Security Engineer - Active TS/SCI with CI Poly
Information security analyst job in Colorado Springs, CO
Job Description
Participate in the development and support of customer technical requirements
Champion a collaborative, team-based environment, sharing standard methodologies and success and building positive relationships
Plan, Design, Develop, Implement and Operate F5 products such as LTM, ASM, BIG-IQ and APM
Manage the configuration on multiple physical and virtual F5 across multiple data centers
Develop scripts and tools to automate configuration of a large number of network security devices distributed across multiple data centers
Propose and implement system enhancements that will improve the performance and reliability of the network security infrastructure
Applies capacity planning configuration changes as demanded by the business
Address performance, scalability, and service architecture administration issues
Design, install, configure, maintain network security services, equipment and devices
Plan and support network security infrastructure
Provide clear technical documentation and written procedures for issues identified and addressed
Monitoring and troubleshooting of platform and OS based problems, network security infrastructure and connectivity issues
Perform launch testing for new software releases and the introduction of new features
Coordinate equipment orders including physical or virtual appliances, as well as upgrading, monitoring, testing and servicing the systems as needed
Demonstrates knowledge of a broad range of technology towers i.e.: Storage, Virtualization, Intel, Networking, Data Center Migration and Disaster Recovery
Knowledge of risk and controls landscape, ensuring company-wide standards are met
Participate in change and incident management
Anticipating potential problems and acting to minimize the impact they may have on the project or unit
Ability to collaborate with different technology towers to achieve common goals
Requirements
Bachelor's degree in computer science, information systems, telecommunications, or an engineering focused field
Must have an Active TS/SCI and willing to obtain a CI Poly
5+ years of relevant F5 experience with F5 LTM, ASM, BIG-IQ, and/or APM administration and life cycle management including experience with advanced iRule creation and troubleshooting
Ability to handle multiple complex F5 configurations and deployments at once
Understanding of networking at all layers of the OSI model; and Previous experience with web application technologies
Experience deploying, managing, and troubleshooting network systems, switching, and routing protocol standards such as: TCP/IP, MPLS, OSPF, BGP, SDN, and 802.1x.
Experience managing and troubleshooting DNS, DHCP, IPAM, and NTP in a large multi-site environment
Ability to manage multiple stands of work simultaneously.
Executes within a customer-centric environment.
Excellent verbal and written communication skill Hands on experience with Python and APIs
Self-driven with the ability to manage workload without direct supervision
Must have the F5 201 certification
8570 IAT Level II Certification required
Preferred Skills/Qualifications
Experience with Infoblox DDI, Microsoft DNS, Dyn, VMWare Automation products (vRO, vRA)
Benefits
Essential Network Security (ENS) Solutions, LLC
is a service-disabled veteran owned, highly regarded IT consulting and management firm. ENS consults for the Department of Defense (DoD) and Intelligence Community (IC) providing innovative solutions in the core competency area of Identity, Credential and Access Management (ICAM), Software Development, Cyber and Network Security, System Engineering, Program/Project Management, IT support, Solutions, and Services that yield enduring results. Our strong technical and management experts have been able to maintain a standard of excellence in their relationships while delivering innovative, scalable and collaborative infrastructure to our clients.
Why ENS?
Free Platinum-Level Medical/Dental/Vision coverage, 100% paid for by ENS
401k Contribution from Day 1
PTO + 11 Paid Federal Holidays
Long & Short Term Disability Insurance
Group Term Life Insurance
Tuition, Certification & Professional Development Assistance
Workers' Compensation
Relocation Assistance
Information Systems Security Officer II
Information security analyst job in Colorado Springs, CO
Full-time Description
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Requirements
Experience:
2 - 5 years related experience
Prior performance in roles such as System/Network Administrator or ISSO
Education:
Bachelor's degree or equivalent experience (4 years)
Certifications:
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must be able to regularly lift up to 50 lbs
Sr. Endpoint Security Solution (ESS) Engineer (Colorado Springs)
Information security analyst job in Colorado Springs, CO
Job Description
or
Huntsville, AL - Redstone Arsenal Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10%
LaunchTech is seeking a Sr. Endpoint Security Solution (ESS) Engineer to support the Missile Defense Agency (MDA). In this role, you will lead a team of engineers responsible for endpoint security across the enterprise, ensure compliance, strengthen cyber defenses, and oversee the design and performance of the Trellix Endpoint Security environment and related cybersecurity tools.
What You'll Be Doing
The Sr. ESS Engineer will:
Lead a team of engineers ensuring the security and compliance of all endpoints within the MDA
Be responsible for the design, implementation, and management of the endpoint security infrastructure, with a primary focus on Trellix Endpoint Security
Provide operational and maintenance support for cybersecurity applications within the MDA environment
Obtain required training and certifications to manage privileged accounts and perform O&M tasks
Administer and maintain the cybersecurity suite, including account management, patching, troubleshooting, and deployment
Plan and implement new cybersecurity tools to enhance overall security posture
Troubleshoot complex technical issues independently or collaboratively
Generate after-action, root cause, status, and activity reports
Develop and maintain cybersecurity documentation, including Standard Operating Procedures
Lead and mentor ESS Engineers, coordinate patching, troubleshooting, compliance activities, and support after-hours maintenance as needed
What You Bring
Basic Requirements:
Must have a Bachelor's Degree in Computer Science, Information Security, or a related field
Must have 8, or more, years of general (full-time) work experience
Must have 6, or more, years of directly related Endpoint Security experience
Must have 2, or more, years of experience working in a management or leadership role
Must have, or obtain within 3 months of start date, an HBSS administrator training certification
Must be able to support after-hour and weekend work, as needed
Must be able to maintain a restricted badge and work on site 4+ days per week
Must have a current Security+ and be enrolled in Continuing Education (CE)
Must have, or be able to obtain, an active Secret Clearance
Desired Requirements:
Have experience managing and leading a team of engineers
Have experience with Endpoint Security Solutions (ESS) such as Trellix (formerly McAfee), Tanium, or Elastic
Have an advanced understanding of cybersecurity principles and best practices
Have experience with Windows and/or Linux environment troubleshooting
Have experience with STIGs, IAVMs, CTOs, OPORDs, and DISA Endpoint Security requirements
Be familiar with scripting languages (PowerShell, Python)
Have experience working in a DoD environment
Have experience with Network Discovery tools, vulnerability discovery and remediation, virtualization technologies (Citrix, VDI, Cisco, Linux/UNIX, VMware), scripting, firewall rules, and SQL Server tuning and administration
Why LaunchTech?
LaunchTech is built on a single commitment: Excellence, Period.
You will support mission-critical cyber operations, lead engineering teams, and strengthen enterprise security for national defense.
We offer:
Medical, Dental, and Vision
401(k) with company match
Paid Time Off (PTO)
Career advancement tied to mission impact
And more
Ready to Join the LaunchTech Crew?
LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law.
Powered by JazzHR
C93Qc6a1Yn