Bank Information Security Governance Senior
Security architect job in Colorado Springs, CO
Why USAA?
At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families.
Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful.
The Opportunity
We are seeking a dedicated Bank Information Security Governance Senior.
We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position.
What you'll do:
Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards.
Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank.
Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects.
Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures.
Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies.
Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives.
Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices.
Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments.
Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices.
Mentors junior members of the IS governance team, providing guidance and support in their professional development.
Enhances, and maintains awareness of the risk governance framework and its elements (RCSA).
Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks.
Prepares metrics reporting and participates in the metrics refresh process.
Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline.
Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures.
What you have:
Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree.
6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities
In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC
Experience working on and implementing IT and/or IS policies, standards, and procedures.
Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements.
A strong understanding of regulatory and compliance requirements applicable to the organization.
Ability to interpret complex IT/IS environments and detect early warning signals.
Experience in identifying potential failure points and simulating risk scenarios.
Proficiency in using data to identify trends, anomalies, and emerging risks.
Understanding of cloud, cybersecurity, and digital transformation risks.
Ability to articulate risk insights and influence stakeholders to take preventive actions.
Familiarity with GRC platforms, vulnerability management tools, and risk dashboards.
What sets you apart:
Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.).
Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS)
Work experience in highly regulated work environments including other large financial institutions
Experience with data-driven analysis using AI tools and collaborating to drive process innovation
Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision.
Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization.
Compensation range: The salary range for this position is: $114,080-$218,030.
USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.).
Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location.
Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors.
The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job.
Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals.
For more details on our outstanding benefits, visit our benefits page on USAAjobs.com.
Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting.
USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Auto-ApplyEnterprise Security Architect
Security architect job in Colorado Springs, CO
Ent Credit Union exists to improve the financial quality of life of the people we serve. This mission drives us every day, but we are more than our mission. We're also individuals using our unique abilities to make our organization, and the communities we serve, better than they were yesterday. We're a not-for-profit that puts people above profits and actively invests in our community. Our rapidly growing team is expanding our reach to serve more people throughout Colorado. To spread our mission far and wide, we need people like you. If you're interested in a paycheck with a purpose, apply with us today. Our people make the difference, and we truly believe you are our greatest asset.
Job Description
The Enterprise Security Architect is responsible for designing and implementing comprehensive security frameworks that protect the organization's information assets and ensure compliance with regulatory standards. This role involves assessing current security measures, identifying vulnerabilities, developing security strategy and roadmaps to mitigate risks, as well as developing security standards and best practices in collaboration with engineering teams and information security department for application development, cloud solutions and IT infrastructure. By collaborating with cross-functional teams and stakeholders, the Enterprise Security Architect plays a critical role in fostering a culture of security awareness and resilience within the organization.
Essential Functions
Security Strategy and Architecture: Develop Security Vision and Strategy: Design an overarching security architecture that aligns with the organization's business goals, ensuring it is adaptable to both current and emerging threats. Security Policy Assessment and Compliance: Participate in evaluating security policies, procedures, and controls to ensure compliance with industry regulations and organizational requirements. System and Application Security Design: Work with engineering, development, and IT teams to integrate security protocols into system design, application development, and IT infrastructure. Ensure adherence to principles like least privilege, secure coding, and secure system design.
Innovation and Emerging Technologies: Evaluate Emerging Technologies: Investigate new technologies, such as AI, ML, and blockchain, for potential applications to enhance security posture and processes. Drive Security Innovation: Encourage innovation within security practices and solutions, staying ahead of potential threats and adopting advanced security tools and technologies.
Risk Management and Third-Party Security: Risk Identification and Prioritization: Identify, analyze, and prioritize risks to the organization's IT environment, including data, systems, and networks. Develop Risk Mitigation Strategies: Create both preventive and reactive strategies to manage and mitigate security risks across systems. Third-Party Risk Management: Engage with the third-party risk management team to establish security protocols for data sharing, access control, and secure interactions with external partners.
Governance, Policy, and Compliance: Policy and Governance Frameworks: Develop and advise on policies, standards, and guidelines for data protection, compliance, privacy, and security governance. Policy Enforcement: Collaborate on the creation of a governance framework to enforce security policies and ensure adherence across departments. Stakeholder Engagement and Education: Educate and advise cross-functional teams, including IT, HR, legal, and executive leadership, on security practices and the business impact of cybersecurity.
Security Monitoring, Threat Intelligence, and Continuous Improvement: Security Monitoring Systems: Design and implement systems to detect, monitor, and respond to potential security threats in real-time, ensuring continuous protection. Threat Intelligence and Awareness: Stay informed about the latest cybersecurity threats, vulnerabilities, and trends, applying this knowledge to update and improve security measures. Continuous Improvement: Regularly assess and improve security protocols, systems, and policies to keep pace with evolving threats. Foster a culture of security awareness and adaptability within the organization.
Bank Secrecy Act: Remains cognizant of and adheres to Ent policies and procedures, and regulations pertaining to the Bank Secrecy Act.
Qualifications
Minimum Formal Qualifications for this Position
Bachelor's Degree in Information Technology, Computer Science, or related field. preferred
5+ years' working with security architectures, frameworks, and leading large-scale security initiatives Required
10+ years' experience in Cybersecurity preferred
7+ years' Security Engineering, Risk Management, Security Design preferred
3+ years' experience in cloud security, security governance, regulatory compliance preferred
Technical or Specialized Knowledge/Skills:
Understanding of security architecture frameworks (e.g., SABSA, NIST, ISO 27001).
In-depth knowledge of security technologies, including firewalls, intrusion detection systems, and encryption methods.
Familiarity with cloud security best practices and architectures across various cloud platforms (e.g., AWS, Azure, Google Cloud).
Awareness of compliance regulations (e.g., GDPR, HIPAA, PCI-DSS) and risk management principles.
Proficient in security assessment tools and methodologies (e.g., vulnerability scanning, penetration testing).
Analytical and problem-solving skills for identifying and addressing security vulnerabilities.
Knowledge of threat modeling and compliance to align security strategies with business objectives.
Communication skills, with the ability to convey technical concepts to non-technical stakeholders.
Ability to develop and maintain security documentation, including policies, standards, and incident response plans.
Project management skills, including the ability to coordinate security initiatives and meet deadlines.
Ability to evaluate and recommend new security technologies and tools that enhance overall security posture.
Ability to collaborate effectively with cross-functional teams and build strong relationships with stakeholders.
Capacity to mentor and guide junior security team members in security best practices and methodologies.
Ability to adapt to evolving threats and a willingness to stay current with industry trends.
Ability to think strategically and align security solutions with overall business objectives.
Competence in risk assessment and management related to security decisions and implementations.
Certifications Required:
Cert Info Sys Sec Pro preferred
Cert Info Sec Mgr preferred
Environmental, Physical and Psychological Requirements
Standing - Occasionally
Walking - Occasionally
Sitting - Frequently
Lifting - Rarely (40 Lbs)
Carrying - Rarely
Pushing - Rarely
Pulling - Rarely
Balancing - Rarely
Stooping - Rarely
Kneeling - Rarely
Crouching - Rarely
Crawling - Rarely
Reaching - Occasionally
Handling - Occasionally
Grasping - Occasionally
Feeling - Occasionally
Talking - Frequently
Hearing - Frequently
Repetitive Motions - Frequently
Eye/Hand/Foot Coordination - Occasionally
Noises louder than normal speaking volume - Occasionally
Temperature Changes - Rarely
Atmospheric Conditions - Rarely
Additional Information
The pay range for this position is: $151,590 to $167,564 per Year (CSF)
Final compensation for this position will be determined by various factors such as relevant work experience, specific skills and competencies, education, certifications, and internal pay equity.
This position is eligible for our corporate bonus program based on company performance.
Benefits Summary Sheet
At Ent Credit Union, we offer a comprehensive benefits package, including:
Health Benefits: Affordable insurance, 24/7 doctor access, and a nationwide provider network.
401(k): 3% automatic contribution after three months, plus up to 6% matching.
Paid Time Off: During your first year, enjoy 16 days of paid time off (PTO) plus 9 paid holidays. And it grows from there.
Volunteer Time Off: Paid time off to give back to the community.
Education Support: Up to $10,000 annually for higher education and assistance for certifications.
Exclusive Discounts: Significant savings on home, car, and personal loans.
For more information about our outstanding benefits please visit our careers page at ********************
We anticipate this position to close on 10/31/2025. Please submit your application at your earliest convenience to be considered.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities.
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
Information Systems Security Manager (ISSM) II
Security architect job in Colorado Springs, CO
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret/SCI
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management
Job Qualifications:
Skills:
Information Security, Information Security Management, Information System Security
Certifications:
None
Experience:
7 + years of related experience
US Citizenship Required:
Yes
Job Description:
Information Systems Security Manager (ISSM) II
The ISSM's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense, and Military Compartment efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures.
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint.
Special Access Program Implementation Guide (JSIG) authorization process.
Advise customer on Risk Management Framework (RMF) assessment and authorization issues.
Perform risk assessments and make recommendations to DoD agency customers.
Advise government program managers on security testing methodologies and processes.
Evaluate authorization documentation and provide written recommendations for authorization to government PMs.
Develop and maintain a formal Information Systems Security Program.
Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training to carry out their duties.
Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Develop and execute security assessment plans that include verification that the features and assurances required for each protection level functioning.
Maintain a and/or applicable repository for all system authorization documentation and modifications.
Institute and implement a Configuration Control Board (CCB) charter.
Develop policies and procedures for responding to security incidents, to include investigating and reporting security violations and incidents.
Ensure proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system.
Ensure that data ownership and responsibilities are established for each authorization boundary, to include accountability, access rights, and special handling requirements.
Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cyber security training.
Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed.
Assess changes in the system, its environment, and operational needs that could affect the authorization.
Ensure that authorization is accomplished a valid Authorization determination has been given for all authorization boundaries under your purview.
Review AIS assessment plans.
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization)
Conduct periodic assessments of the security posture of the authorization boundaries.
Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented.
Ensure periodic testing is conducted to evaluate the security posture of IS by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs)
Ensure that system recovery and reconstitution processes developed and monitored to ensure that the authorization boundary can be recovered based on its availability level determination.
Ensure all authorization documentation is current and accessible to properly authorized individuals.
Ensure that system security requirements are addressed during all phases of the system life cycle.
Develop Assured File Transfers (AFT) on accordance with the JSIG.
Participate in self-inspections.
Conduct the duties of the Information System Security Officer (ISSO) if one is not present and/or available.
Experience:
7+ years related experience.
Prior performance in roles such as ISSO or ISSM.
SAP experience required.
Education:
Bachelor's degree in related discipline OR Associate's degree in a related area + 2 years' experience OR equivalent experience (4 years)
Certifications:
IAT Level 3 or IAM Level 3 - within 6 months of hire
Security Clearance:
Required - Active/Curre TS/SCI
Must be able to obtain CI Poly.
#AirforceSAPOpportunities
The likely salary range for this position is $107,185 - $145,015. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.
Scheduled Weekly Hours:
40
Travel Required:
None
Telecommuting Options:
Onsite
Work Location:
USA CO Colorado Springs
Additional Work Locations:
Total Rewards at GDIT:
Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at
gdit.com/tc.
Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
Auto-ApplyISSO II - Information Systems Security Officer II
Security architect job in Colorado Springs, CO
Job Description
Come make your mark with Watermark!
🎖️ FOUNDED BY USAF VETERANS in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business. 🌎 SUBJECT MATTER EXPERTS specializing in security and risk management. We're intimately familiar with DOD security programs and mission requirements.
⭐ OUR CORE VALUES drive every action we take as a company. We strive to exhibit PERSPECTIVE, PASSION, COMMUNICATION, INTEGRITY AND ETHICS, and BALANCE in all we do.
💲 COMPETITIVE BENEFITS PACKAGE to address our employees' physical, mental, emotional, and financial well-being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first!
Information Systems Security Officer II
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
In this role you will…
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct continuous monitoring activities for authorization boundaries under your preview
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Experience Requirements:
2-5 years related experience
Prior performance in roles such as System, Network Administrator or ISSO
SAP experience
Education Requirements:
Bachelor's degree or equivalent experience (4 years)
Certification Requirements:
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.
Security Clearance Requirements:
Current Top Secret SCI Clearance with ability to obtain CI Poly
Other Requirements:
Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards.
Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Reports to a physical location which occasionally requires the ability to traverse between buildings
May require sedentary work at least 50% of the time
Must be able to regularly list up to 50 lbs
Ability to manage stress with a high degree of maturity/professionalism
Demonstrated critical thinking and leadership skills and the ability to work well with others
Effective verbal and written communication skills
All Level I & Level II positions - candidate should possess some Special Access Program (SAP) experience
All Level III positions -candidate should possess 2+ years of Special Access Program (SAP) experience
The anticipated compensation range for this position i
s
$
86,615 - $110,185
.
Multiple considerations are taken into account when determining the final salary/hour rate, including but not limited to, Contract Wage Determination, education and certifications, relevant work experience, related skills and competencies, as well as Federal Government Contract Labor categories. Central to Watermark's employment philosophy is the wellbeing of our employees which is why we offer a robust benefits package and wellness program alongside of annual base compensation.)
Watermark is an equal opportunity employer. All terms and conditions of employment are established without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, veteran status, or any other protected category under applicable federal, state, and local laws.
Powered by JazzHR
2b6sAWo78O
Information System Security Officer (ISSO) II
Security architect job in Colorado Springs, CO
Veteran-Owned Firm Seeking an Information Systems Security Officer (ISSO) II with TS/SCI for a role at Schriever Space Force Base (SFB) in Colorado Springs, CO. My name is Stephen Hrutka. I lead a Veteran-Owned management consulting firm in Washington, DC. We specialize in Technical and Cleared Recruiting for the Department of Defense (DoD), the Intelligence Community (IC), and other advanced defense agencies.
At HRUCKUS, we support fellow Veteran-Owned businesses by helping them recruit for positions across organizations such as the VA, SBA, HHS, DARPA, and other leading-edge R&D-focused defense agencies.
We seek to fill an Information Systems Security Officer (ISSO) II position at Schriever Space Force Base (SFB) in Colorado Springs, CO.
The ideal candidate must hold an active TS/SCI clearance and have 2-5 years of experience in roles such as System Administrator, Network Administrator, or ISSA. They must also obtain a DoD Directive 8570.01-M certification for Information Assurance Technician Level II or Information Assurance Manager II.
If you're interested, I'll gladly provide more details about the role and discuss your qualifications further.
Thanks,
Stephen M Hrutka
Principal Consultant
HRUCKUS LLC
Executive Summary: HRUCKUS seeks an Information Systems Security Officer (ISSO) II for a role supporting the Department of the Air Force at Schriever Space Force Base (SFB) in Colorado Springs, CO.
Position Description: The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Position Job Duties:
* Assist the ISSM in meeting their duties and responsibilities
* Prepare, review, and update authorization packages
* Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
* Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
* Conduct periodic reviews of information systems to ensure compliance with the security authorization package
* Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
* Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
* Ensure all IS security-related documentation is current and accessible to properly authorized individuals
* Ensure audit records are collected, reviewed, and documented (to include any anomalies)
* Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
* Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
* Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
* Prepare reports on the status of security safeguards applied to computer systems
* Perform ISSO duties in support of in-house and external customers
* Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Position Qualifications:
* 2 - 5 years related experience
* Prior performance in roles such as System, Network Administrator or ISSA
Education:
* Bachelor's degree or equivalent experience (4 years)
Certifications:
* Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire
Security Clearance:
* Must possess current Top Secret/Special Compartmented Information (TS/SCI) eligibility
* Eligibility for access to Special Access Program Information
* Willingness to submit to a Counterintelligence polygraph
Details:
* Job Title: Information Systems Security Officer (ISSO) II
* Location: Schriever SFB, CO
* Security Clearance Requirement: TS/SCI
* Assignment Type: Full-time
* Salary: Dependent on the candidate's experience, with a target range of up to $109,000.
Information Network Security Architect
Security architect job in Colorado Springs, CO
About us: We (our client) inspire and support discoveries that advance the quality of life. We provide life science, diagnostic and applied market laboratories worldwide with instruments, services, consumables, applications and expertise.
Most of all we are an equal opportunity employer and value diversity at our company.
We are looking for expert level networks and security engineer with extensive expertise in Cisco (firewall, switching, routing), Juniper, Palo Alto Networks and other technologies.
Job Description
Your responsibilities when you are on board:
You will define and manage security infrastructure roadmap in collaboration with the Networks and Security organization.
You will lead and contribute in projects to implement next generation access and security infrastructure components.
Provide technical design, implementation planning, testing and troubleshooting expertise.
Design, develop and lead implementation of new technical security infrastructures.
Responsible for technical planning, design, development and modification of new solution specifications and implementation.
Manage large information technology vendors in the technical aspects of designing, developing and implementing solutions.
Qualifications
We'd love to speak to you, if:
You hold a Bachelors or Masters Degree or University Degree.
You've more than 8 years with some technology certifications.
You've in-depth expertise in Network and Security technologies.
What can we offer:
A base salary of $95,000 - $123,000 + Full benefits
Relocation Assistance
Additional Information
I love talking to passionate people. Please do not hesitate to reach out to me at shruthi.n at roljobs dot com
Systems Security Engineer III
Security architect job in Lone Tree, CO
Are you looking for an opportunity to deepen your IT skills in a meaningful work environment that supports and protects explorers and heroes? Join our team! As a Systems Security Engineer III, you will be using your skills and expertise to design, test, and implement our secure operating systems, networks, security monitoring, and tuning. You'll be responsible for the management of our IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls. You'll research, evaluate, and recommend new security tools, techniques, and technologies in alignment with our IT security strategy and introduce them to the enterprise.
The ISR (Intelligence, Surveillance & Reconnaissance), Aviation, and Security (IAS) business area is a leader in ISR and aviation, it is a leading prime manned and unmanned aircraft systems integrator for innovative, high-performance ISR and aviation systems. Its end-to-end Command, Control, Computers, Communications and Intelligence, Surveillance & Reconnaissance (C4ISR) capabilities encompass design, integration, test, certification, ground/flight training and complete logistics support. IAS tailors solutions to customer cost, performance, and schedule requirements and designs to consistently exceed expectations - with an unrivaled record of on time and on (or under) budget deliveries.
**Qualifications You Must Have:**
+ Bachelor's degree in Systems Security, Network Engineering, Information Technology, or related Engineering discipline and typically 6 years of relevant experience
+ Relevant experience may be considered in lieu of required education
**Qualifications We Prefer:**
+ ISSM CAP, CISSP, or CISM Certification
+ ISSE CAP, CISSP-ISSEP Certification
+ ISSO Security+, CISA, or CASP+ Certification
+ MCSE, Linux, and/or CCNP Security Certification
At Sierra Nevada Company, LLC (SNC) we deliver customer-focused technology and best-of-breed integrations in the aerospace and defense sectors. SNC has been honored as one of the most innovative U.S. companies in space, a Tier One Superior Supplier for the U.S. Air Force, and as one of America's fastest-growing companies. Learn more about SNC (*********************************************
This posting will be open for application for a minimum of 5 days and may be extended based on business needs.
Estimated Starting Salary Range: $108,496.89 - $149,183.22. Compensation varies depending on a wide array of factors, such as candidates' key skills, relevant work experience, and education/training/certifications. The disclosed range estimate may be adjusted for any applicable geographic differential associated with the location at which the position may be filled.
SNC offers a generous benefit package, including medical, dental, and vision plans, 401(k) with 150% match up to 6%, life insurance, 3 weeks paid time off, tuition reimbursement, and more (********************************************** .
**IMPORTANT NOTICE:**
This position requires current/active Secret U.S. Security Clearance. U.S. Citizenship status is required as this position needs an active U.S. Security Clearance for employment. Non-U.S. Citizens may not be eligible to obtain a security clearance. The Department of Defense Consolidated Adjudications Facility (DoD CAF), a federal government agency, handles the adjudicative aspects of the security clearance eligibility process for industry applicants. Adjudicative factors which affect the outcome of the eligibility determination include, but are not limited to, allegiance to the U.S., foreign influence, foreign preference, criminal conduct, security violations and illegal drug use.
Learn more about the background check process for Security Clearances. (****************************
SNC is a global leader in aerospace and national security committed to moving the American Dream forward. We're known and respected for our mission and execution focus, agility, and disruptive and rapid innovation. We provide leading edge technologies and transformative solutions that support our nation's most critical security needs. If you are mission-focused, thrive in collaborative environments, and want to make our country stronger with state-of-the-art technologies that safeguard freedom, join our team!
SNC is an Equal Opportunity Employer committed to an environment free of discrimination. Employment decisions are made based on merit without regard to race, color, age, religion, sex, national origin, disability, status as a protected veteran or other characteristics protected by law.
Senior Cloud Security Engineer
Security architect job in Colorado Springs, CO
A new space race has begun. True Anomaly seeks those with the talent and ambition to build innovative technology that solves the next generation of engineering, manufacturing, and operational challenges for space security and sustainability.
OUR MISSION
The peaceful use of space is essential for continued prosperity on Earth-from communications and finance to navigation and logistics. True Anomaly builds innovative technology at the intersection of spacecraft, software, and AI to enhance the capabilities of the U.S., its allies, and commercial partners. We safeguard global security by ensuring space access and sustainability for all.
OUR VALUES
Be the offset.
We create asymmetric advantages with creativity and ingenuity
What would it take?
We challenge assumptions to deliver ambitious results
It's the people.
Our team is our competitive advantage and we are better together
YOUR MISSION
As a Senior Cloud Security Engineer, you will be at the forefront of securing the heart of our satellite mission control software. You will play a pivotal role in fortifying our cloud infrastructure, ensuring the safety of our critical space operations. If you enjoy pioneering solutions to novel security challenges, this mission is for you.
RESPONSIBILITIES
Design and implement secure cloud infrastructure solutions that meet regulatory and compliance requirements.
Implement security strategies via automation to maximize control efficacy and user experience.
Conduct security assessments and audits to ensure compliance with industry standards and best practices.
Collaborate with cross-functional teams to provide security guidance and support.
Stay current with emerging security threats, technologies, and regulations affecting cloud platforms and services.
Provide expert guidance and lead response efforts for cloud security incidents.
Operate vulnerability discovery tools for operating systems, containers, and software libraries.
Build, deploy, and manage production security tools and services to monitor networks, endpoints, and cloud workloads.
Design and operate scalable processes to provision cloud access and maintain least-privilege.
Maintain a secure, reliable and low-touch infrastructure using technologies such as Terraform, Kubernetes, and immutable images.
QUALIFICATIONS
5+ years of experience in a cloud or infrastructure security role.
Security experience with Docker/Kubernetes and how to secure those environments.
Experience with any of the three major cloud providers (AWS, Azure, GCP).
Experience with Terraform, Python, Bash or similar scripting language.
Experience building secure CI/CD pipelines with either GitHub Actions, Jenkins, GitLab.
Experience managing vulnerability management and scanning tools.
Experience with public key infrastructure and management of secrets.
Understanding of real-time threat detection, secrets management, security considerations within build, release, CI/CD and other similar tooling.
U.S. Citizen and eligible for DoD Secret or TS/SCI clearance.
PREFERRED SKILLS AND EXPERIENCE
Experience working in startups with hybrid cloud and on-prem environments.
Experience implementing and managing security controls in accordance with Department of War Impact Levels, NIST 800-53 and Security Technical Implementation Guides.
Certifications including CEH, Security+, OSCP.
Ability to maintain or obtain TS/SCI clearance.
COMPENSATION
California Base Salary: $160,000-$225,000
Colorado Base Salary: $155,000-$215,000
Washington D.C. Base Salary: $160,000-$225,000
Remote: Compensation for remote employees will vary based on location and local market data.
Equity + Benefits including Health, Dental, Vision, HRA/HSA options, PTO and paid holidays, 401K, Parental Leave
Your actual level and base salary will be determined on a case-by-case basis and may vary based on the following considerations: job-related knowledge and skills, education and experience.
ADDITIONAL REQUIREMENTS
Work Location: Ideally, candidates will be based near Denver, Colorado Springs, Long Beach, or Washington, D.C., as some work requires on-site collaboration. Remote candidates will also be considered but should anticipate occasional travel for in-person work.
Work environment is in a standard office, working at a desk or in a production factory.
Physical demands may include frequent standing, sitting, walking, bending, and lifting or carrying items up to 20lbs.
This position will be open until it is successfully filled. To submit your application, please follow the directions below. #LI-Hybrid
To conform to U.S. Government space technology export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a U.S. citizen, lawful permanent resident of the U.S., protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the U.S. Department of State.
True Anomaly is committed to equal employment opportunity on any basis protected by applicable state and federal laws. If you have a disability or additional need that requires accommodation, please do not hesitate to let us.
Auto-ApplyInformation System Security Officer II
Security architect job in Colorado Springs, CO
Job DescriptionSalary: Up to $47.95/hourly
Colorado Springs, Colorado
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide day-to-day support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Performance shall include:
Assist the ISSM in meeting their duties and responsibilities.
Prepare, review, and update authorization packages.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Notify ISSM when changes occur that might affect the authorization determination of the information system(s).
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans.
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems.
Perform ISSO duties in support of in-house and external customers.
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries.
EDUCATION:
Bachelor's Degree
CLEARANCE:
TS/SCI
EXPERIENCE MANDATORY:
2-5 years related experience, especially in developing RMF packages or bodies of evidence; Prior performance in roles such as System/Network Administrator or ISSO; SAP experience; TRAINING: DoD 8570.01-M IAM Level II (in lieu of IAT-Level II).
BENEFITS:
We offer a competitive compensation package including a generous PTO and Flexible holiday package, tax-free healthcare cost reimbursement, and an immediate vesting 401K with 4% matching.
COMPENSATION:
Negotiable unto $47.95/hr
Cybersecurity System Security Engineer II - Management
Security architect job in Colorado Springs, CO
Job Description
The System Security Engineer's primary function is working within Special Access Programs (SAPs) supporting SMC and AFSPC acquisition programs. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities to meet NIST Cybersecurity requirements for system assessment & authorization.
Responsibilities include, but are not limited to:
Serve as the RMF Cybersecurity Specialist for the organization's Systems.
Maintain Day-to-Day security analysis of RMF packages to ensure timely updates and notifications.
Update RMF Security Control Families as required and properly process through eMASS.
Maintain thorough understating of NIST 800-53 and NIST 800-171 controls and determine which controls are applicable to the application, as well as document implementation in Security Controls Tractability Matrix.
Provide support and recommendations to Program Managers and Security Authorities to maintain appropriate information assurance (IA) posture(s) for programs and systems.
Conduct reviews to identify and mitigate potential security weaknesses and ensure that all security features applied to a system are implemented and functional.
Monitor and resolve Plan of Action and Milestones (POA&M) to mitigate system vulnerabilities on assigned Information Systems.
Draft and/or prepare and maintain security Assessment and Authorization documentation (e.g. IA SOP, SSP, MSSP, RAR and SCTM)
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration with existing SAP network infrastructures
Develop and provide IA risk management recommendations to the customer
Represent the Government Program Manager in various SSE related working groups, advisory groups, and advisory council meetings
Basic Qualifications:
Experience:
6-8 years total experience, including minimum 4 years' experience within SCI or SAR environment. Minimum 2 years of SAP relevant experience highly desired.
Education:
Bachelor's degree in a related discipline or equivalent additional experience (4 years)
Certifications:
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 1 and Information Assurance Manager Level 2 within 6 months of the date of hire
Security Clearance Requirements:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents
Full understanding of Risk Management Framework (RMF) and Joint SAP Implementation Guide (JSIG) processes for system accreditation, along with legacy (DITSCAP, DIACAP) processes
Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partner
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision
Willingness to travel within the organizational Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
Physical Requirements:
Must be able to lift up to 50 pounds
Compensation:
The projected compensation range for this position is $132,600-$172,600. There are differentiating factors that can impact a final salary rate, including, but not limited to, Contract Wage Determination, relevant work experience, skills and competencies that align to the specified role, geographic location, education and certifications as well as Federal Government Contract Labor categories. In addition, K2 Group invests in its employees beyond just compensation.
Benefits:
K2 Group's benefit offerings include: Medical/ Dental/ Vision Insurance; FSA Medical & FSA Dependent Care; Pre-tax 401(k) & ROTH 401(k) plans; Profit Sharing Plan; Life & Accidental Death Insurance; Short Term/ Long Term Disability; Voluntary Group Life Insurance option; Tuition Reimbursement; Job-related Course Reimbursement; Holiday Pay; and Paid Time-Off.
Powered by JazzHR
R1d6jQhBwE
Information Systems Security Officer (L3)
Security architect job in Colorado Springs, CO
A leading federal contractor is seeking a qualified and motivated Cybersecurity Information System Security Officer (ISSO) Level 3 to support a mission-critical Department of Defense (DoD) program. This role offers the opportunity to join a team of professionals committed to cybersecurity excellence and national defense.
As an ISSO, you will apply and manage IT security controls to protect the confidentiality, integrity, and availability of DoD systems and data. You will ensure alignment with current hardware and software configurations and coordinate with system and network configuration managers.
This position supports the full Risk Management Framework (RMF) lifecycle-including assessment, authorization, sustainment, and system disposition. You'll collaborate with Certified Defense Contractors to uphold continuous monitoring standards and meet change management requirements. Close coordination with the Security Control Assessor (SCA) and Authorizing Official Designated Representative (AODR) is essential to obtain and maintain security approvals.
Additional duties include account management, auditing, vulnerability scanning, and advising both civilian and military personnel on cybersecurity matters. The role also supports compliance efforts and audit readiness.
This is an excellent opportunity for an experienced cybersecurity professional to contribute technical knowledge and strategic insight in a mission-focused environment.
Responsibilities / Required Skills
Active Top Secret clearance with SCI eligibility (TS/SCI)
Willing and able to submit to a Counterintelligence (CI) polygraph
10+ years of relevant DoD experience
4+ years of experience in SAP and/or SCI environments within the past 5 years
Willingness to travel as needed
Subject Matter Expert in RMF, cyber engineering, and project management
Strong communication skills, both verbal and written
Ability to convey complex technical concepts clearly and concisely
Proven ability to anticipate and mitigate potential issues
Highly organized with strong problem-solving and critical-thinking skills
Strategic mindset with the ability to support senior leadership
Education / Certifications
MA/MS/ME in Computer Science, Cybersecurity, MIS, or related field
Relevant certifications or equivalent experience may be considered in lieu of a degree
1+ year of experience implementing RMF IT security controls and policies
DoD 8140 / DoD 8570 IASAE Level II certification
Security Professional Education Development (SPēD) certification
Benefits
Employer-paid medical insurance
Dental and vision insurance
401(k)
Paid time off (PTO)
Tuition reimbursement
Security Clearance
Applicants must be U.S. Citizens with an active Top Secret clearance and SCI eligibility. Final hiring is contingent upon successful completion of a security investigation and the ability to meet eligibility requirements for access to classified government information.
Information System Security Officer
Security architect job in Colorado Springs, CO
Job Description
Information Systems Security Officer (ISSO), Senior
Clearance and Eligibility:
Security Clearance: Active Top Secret/SCI clearance required.
Additional Requirements: Candidate must be SAP-eligible. Clearance and eligibility must be maintained throughout employment.
Position Overview:
We are seeking a Senior Information Systems Security Officer (ISSO) to join our team supporting the U.S. Space Force under the newly awarded 5-year LAN Integration Program contract. As a Senior ISSO, you will ensure the appropriate operational security posture is maintained for U.S. Space Force information systems and work in close collaboration with the Information Systems Security Manager (ISSM) and Information System Owner (ISO). You will be responsible for compliance with security authorization packages, conducting security reviews, and ensuring system security standards are upheld.
Key Responsibilities:
Security Posture Management:
Ensure operational security posture is maintained for assigned information systems by working closely with the ISSM and ISO.
Assist in developing physical or logical topologies for systems to ensure compliance with DoD policies and security guidelines.
Authorization Package Management:
Prepare, review, and update authorization packages in accordance with Risk Management Framework (RMF) and Joint Special Access Program (SAP) Implementation Guide (JSIG) standards.
Coordinate changes or modifications to system hardware, software, or firmware with the ISSM and AO/DAO prior to any alterations.
Security Audits and Reviews:
Conduct periodic reviews and audits of information systems to ensure compliance with security authorization packages.
Ensure that security-related documentation is current and accessible to authorized individuals and review audit records to identify and document any anomalies.
Incident Response and System Recovery:
Monitor system recovery processes to ensure that security features and procedures are properly restored after incidents.
Participate in cybersecurity self-inspections and help identify vulnerabilities, ensuring the implementation of appropriate countermeasures.
Documentation and Compliance:
Maintain up-to-date documentation for system security and ensure all system assessment plans are reviewed regularly.
Ensure audit records, security impact analyses, and configuration management changes are properly documented and aligned with authorization boundaries.
Training and Continuous Monitoring:
Attend required technical and security training related to assigned duties.
Conduct continuous monitoring of authorization boundaries and assist with RMF efforts across DoD, National Agency, and Contractor organizations.
Support for DoD and National Agencies:
Perform ISSO duties in support of internal and external customers, including assisting with security impact analysis and authorization efforts.
Travel up to 10 days annually to support program functions, all within CONUS.
Experience and Required Skills:
Experience:
5-7 years of experience in ISSO, Systems Administration, or Network Administration roles within high-security DoD environments.
Strong working knowledge of DoD 8570, RMF, and JSIG standards.
Experience managing system security in compliance with NIST SP 800 and DoDI 8500 series guidelines.
Technical Skills:
Familiarity with network security principles, DoD policies for implementing and executing system/network administration.
Extensive experience solving technical problems quickly, automating repetitive processes, and applying best practices to security operations.
Experience working with compliance tools and maintaining audit records for system security.
Security and Compliance Expertise:
Strong understanding of Risk Management Framework (RMF) and Joint Special Access Program (SAP) Implementation Guide (JSIG).
Expertise in conducting security reviews, audits, and documentation of system configurations and security safeguards.
Soft Skills:
Ability to work both independently and collaboratively in a team environment.
Attention to detail, with a focus on accuracy and quality in maintaining security compliance.
Required Certifications:
DoD 8570 IAT Level II certification required (e.g., Security+ CE, GSEC, CCNA-Security, CySA+, SSCP).
CISSP, CISM, or equivalent certifications required, meeting DoD 8570 IAM III or equivalent.
Travel Requirements:
Up to 10% - 20% travel within CONUS. Occasional travel is expected to support program functions, with no trips exceeding 10 days.
Information Systems Security Officer (ISSO) II
Security architect job in Colorado Springs, CO
Job Description
gTANGIBLE Corporation (gTC), ****************** is an S corporation and a registered Government contractor that provides services and solutions in:
National Security Programs
Professional, Administrative, and Management Support
Mission and Warfighter Support
We are a Service-Disabled Veteran Owned Small Business (SDVOSB) and the founder has years of successful experience in the Government contracting arena. Our leadership team is an exceptional group of Government contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position.
Requisition Type: Contingent (Open)
Position Status: Full Time
Position Title: Information Systems Security Officer (ISSO) II
Location: Colorado Springs, CO
Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for Counterintelligence polygraph
Duties and Responsibilities
The Air Force (AF) Special Access Program (SAP) Security Support Services
(SSS) assists the AF cognizant security authority in oversight of enhanced National Security Objectives supporting AF SAP interests through active and integrated security operations, processes, mechanisms, and management. This support provides multi- disciplinary security support, including specialized analytical/program protection support, while being responsive and flexible to dynamic SAP security situations.
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Duties include the following:
Develop physical or logical topologies for a system.
Assist the ISSM in meeting their duties and responsibilities.
Prepare, review, and update authorization packages.
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media.
Conduct periodic reviews of information systems to ensure compliance with the security authorization package.
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change.
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly.
Ensure all IS security-related documentation is current and accessible to properly authorized individuals.
Ensure audit records are collected, reviewed, and documented (to include any anomalies).
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties.
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans.
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them.
Prepare reports on the status of security safeguards applied to computer systems.
Perform ISSO duties in support of in-house and external customers.
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries.
Knowledge and Qualifications
Bachelor's degree and 2-5 years of related experience or Associates degree and 4-7 years of related experience or 6-9 years of related experience without a degree.
Related experience especially in developing RMF packages or body of evidence.
Prior performance in roles such as System, Network Administrator, or ISSO.
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire.
Must be able to regularly lift up to 50 lbs.
SAP experience required.
Prior active duty in the U.S. Air Force a plus.
Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category under applicable federal, state, and local laws.
Information System Security Officer III
Security architect job in Colorado Springs, CO
Summary: The ISSO III's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
Essential Duties & Responsibilities:
Review, prepare, and update AIS authorization packages
Notify customer when changes occur that might affect AIS authorization
Perform AIS self-inspections, provide security coordination and review of all system test plans
Identify AIS vulnerabilities and implement countermeasures
Represent the customer on various technical review and inspection teams
Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system authorization packages
Coordinate, prepare, and track AIS inspections, reports, and responses
Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities
Prepare reports on the status of security safeguards applied to computer systems
Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices
Perform ISSO duties in support of in-house and external customers
Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts
Review, track, and conduct AIS training
Provide leadership, mentoring, and quality assurance for Team Members
Requirement:
Five (5) to Seven (7) years related experience
Bachelor's Degree in a related area or equivalent experience (Four (4) years)
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire.
Security Requirements:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Programs
Willingness to submit to a Counterintelligence Polygraph
Skills:
Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision
Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents
Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
Must be able to lift up to 50lbs
Physical Requirements: This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk.
Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English.
GRS is an Equal Opportunity Employer. GRS will continue to abide by obligations under VEVRRA and Section 503 physical or mental disability, protected veteran status, or any other characteristics that are protected by law.
Auto-ApplySenior Security Engineer*
Security architect job in Colorado Springs, CO
Are you looking to take the next steps in your career as a Cleared EEC XSOAR Senior Security Engineer? Let's chat and see if we are a good match!
Opportunity:
Virtual Service Operations is searching for a Cleared EEC XSOAR Security Engineer to join our team in Colorado Springs, CO. As an EEC XSOAR, you are a critical part of our customers' adoption of Cloud security integrations. You may be engaged with multiple clients as the subject matter expert, establishing relationships with them to ensure best practices for their secure cloud environments throughout the lifecycle of their journey with our products. You'll guide them for quick and consistent adoption, accelerated integrations with new cloud security products, and real-time support and strategy.
You'll act as their trusted advisor, providing strategic guidance around complex systems to secure a digital environment. Interacting directly with the client, you'll partner closely with client personnel to guide them on their cloud security journey. Your thorough understanding of our product integrations contributes to the development of new principles and concepts - providing detailed analysis around what's working, what's not, and what could be better.
You enjoy implementation work, are proactive about resolving potential concerns, and operate well around strict best practices that enable our clients on their road to a more secure digital world. You're creative, innovative, and you love a challenge - learning how integrations might work better around new products and technologies.
Responsibilities:
Lead security automation technical implementations in a customer environment.
Translate complex business requirements into best practice solutions.
Identify and document operational business processes for automated playbook development.
Prepare capacity planning, deployment, business continuity and configuration guides.
Ability to communicate effectively in various situations with all levels of an organization from Engineering/Operations to CIO/CISO audiences.
Present technical information to non-technical personnel.
Train and enable customer teams to be successful with our products.
Develop key performance indicators (KPIs), understand critical success factors, and continuously measure performance.
Engage with the account team to allow them to clearly understand the customer's business & technical requirements as you learn through active engagement with the client.
Qualifications:
Experience with security automation platforms and orchestration tools (SOAR).
Familiarity with IDS/IPS, SIEM, and endpoint solutions.
Experience managing complex automated security solutions in large environments.
Deep understanding of security threats, internet protocols and cybersecurity tools and applications.
Project leadership experience; ability to drive organizations and resources to complete required tasks in service of end goals.
Detailed experience in the installation, configuration, operation and documentation of security solutions to prevent cybersecurity threats.
Experience working in a Security Operations Center (SOC) and documenting operational workflows.
Excellent written and verbal communication skills, with confirmed ability to communicate to senior leaders and technical peers.
Some understanding of Linux or Unix and network troubleshooting analysis.
Preferred experience in Python and/or Javascript.
Preferred experience in cybersecurity incident response.
Previous experience with STIGs, RMF, NIST publications and/or SCAP.
GCIA, CISSP , CEH, and/or Security+ certifications is a plus.
Requirements
Must possess an active Secret Clearance.
Please note that pursuant to a government contract, this specific position requires U.S. citizenship status
Minimum of 7 years of experience using Cortex EEC XSOAR
Minimum of 5 years of experience with Palo Alto
What is Important to Us:
You are an excellent communicator in writing and speaking.
You have the ability to work independently but also value teamwork.
Your problem-solving skills are excellent.
You are looking for a job where performance appraisals occur regularly, and you look forward to advancing your career.
You seek a community of virtue-centered co-workers and clients.
What we offer you:
As part of the VSO company, you will be part of a virtue-centered team who value their work and teammates.
This is a no-jerk zone
. We provide ongoing learning and development opportunities to foster continuous growth. We offer competitive salaries, health benefits, and flexible work arrangements.
More About VSO:
VSO is a hybrid cloud and managed services consulting firm. Much of VSO's success can be attributed to our deep partnerships with IT services industry leaders such as AWS, IBM, Microsoft and others. VSO leverages numerous other partner relationships so as to provide our customers with optimal support. Additionally, we take pride in taking care of our employees. We offer a wide variety of benefits for eligible employees related to health, retirement, professional development, and more! For more information, please visit our website at ***************************
Salary Description $150,000 - $175,000
Senior Security Engineer*
Security architect job in Colorado Springs, CO
Full-time Description
Are you looking to take the next steps in your career as a Cleared EEC XSOAR Senior Security Engineer? Let's chat and see if we are a good match!
Opportunity:
Virtual Service Operations is searching for a Cleared EEC XSOAR Security Engineer to join our team in Colorado Springs, CO. As an EEC XSOAR, you are a critical part of our customers' adoption of Cloud security integrations. You may be engaged with multiple clients as the subject matter expert, establishing relationships with them to ensure best practices for their secure cloud environments throughout the lifecycle of their journey with our products. You'll guide them for quick and consistent adoption, accelerated integrations with new cloud security products, and real-time support and strategy.
You'll act as their trusted advisor, providing strategic guidance around complex systems to secure a digital environment. Interacting directly with the client, you'll partner closely with client personnel to guide them on their cloud security journey. Your thorough understanding of our product integrations contributes to the development of new principles and concepts - providing detailed analysis around what's working, what's not, and what could be better.
You enjoy implementation work, are proactive about resolving potential concerns, and operate well around strict best practices that enable our clients on their road to a more secure digital world. You're creative, innovative, and you love a challenge - learning how integrations might work better around new products and technologies.
Responsibilities:
Lead security automation technical implementations in a customer environment.
Translate complex business requirements into best practice solutions.
Identify and document operational business processes for automated playbook development.
Prepare capacity planning, deployment, business continuity and configuration guides.
Ability to communicate effectively in various situations with all levels of an organization from Engineering/Operations to CIO/CISO audiences.
Present technical information to non-technical personnel.
Train and enable customer teams to be successful with our products.
Develop key performance indicators (KPIs), understand critical success factors, and continuously measure performance.
Engage with the account team to allow them to clearly understand the customer's business & technical requirements as you learn through active engagement with the client.
Qualifications:
Experience with security automation platforms and orchestration tools (SOAR).
Familiarity with IDS/IPS, SIEM, and endpoint solutions.
Experience managing complex automated security solutions in large environments.
Deep understanding of security threats, internet protocols and cybersecurity tools and applications.
Project leadership experience; ability to drive organizations and resources to complete required tasks in service of end goals.
Detailed experience in the installation, configuration, operation and documentation of security solutions to prevent cybersecurity threats.
Experience working in a Security Operations Center (SOC) and documenting operational workflows.
Excellent written and verbal communication skills, with confirmed ability to communicate to senior leaders and technical peers.
Some understanding of Linux or Unix and network troubleshooting analysis.
Preferred experience in Python and/or Javascript.
Preferred experience in cybersecurity incident response.
Previous experience with STIGs, RMF, NIST publications and/or SCAP.
GCIA, CISSP , CEH, and/or Security+ certifications is a plus.
Requirements
Must possess an active Secret Clearance.
Please note that pursuant to a government contract, this specific position requires U.S. citizenship status
Minimum of 7 years of experience using Cortex EEC XSOAR
Minimum of 5 years of experience with Palo Alto
What is Important to Us:
You are an excellent communicator in writing and speaking.
You have the ability to work independently but also value teamwork.
Your problem-solving skills are excellent.
You are looking for a job where performance appraisals occur regularly, and you look forward to advancing your career.
You seek a community of virtue-centered co-workers and clients.
What we offer you:
As part of the VSO company, you will be part of a virtue-centered team who value their work and teammates.
This is a no-jerk zone
. We provide ongoing learning and development opportunities to foster continuous growth. We offer competitive salaries, health benefits, and flexible work arrangements.
More About VSO:
VSO is a hybrid cloud and managed services consulting firm. Much of VSO's success can be attributed to our deep partnerships with IT services industry leaders such as AWS, IBM, Microsoft and others. VSO leverages numerous other partner relationships so as to provide our customers with optimal support. Additionally, we take pride in taking care of our employees. We offer a wide variety of benefits for eligible employees related to health, retirement, professional development, and more! For more information, please visit our website at ***************************
Salary Description $150,000 - $175,000
Senior Information Security Analyst
Security architect job in Colorado Springs, CO
Please note that this position is contingent upon the successful award of a contract currently under bid. Nisga'a CIOPS provides hands-on experienced services to civilian and DoD programs worldwide. Delivering highly skilled, cleared personnel who provide services on five continents for a portfolio of customers.
Summary:
The Senior Information Security Analyst is responsible for identifying and mitigating security risks, monitoring systems for vulnerabilities, and ensuring compliance with industry standards and regulatory requirements. The ideal candidate will have a strong technical background, excellent analytical skills, and the ability to work collaboratively across departments to strengthen the organization's security posture.
Responsibilities
Essential Job Functions:
* Responsible for all activities relating to RMF control remediation and artifact gathering for specified systems.
* Works with an engineering team to ensure that information security is reflected properly in deployed systems (to include handling Technical Order and Time Compliant Technical Order).
* Develop information systems assurance programs to include vulnerability and threat management, and control guidelines.
* Advises other sections regarding internal controls and security procedures.
* Prepares activity and progress reports relating to the information systems audit function.
* Access to eMASS (system used to log RMF activities) may be required.
Qualifications
Necessary Skills and Knowledge:
* Shall have knowledge and experience in cybersecurity tools, network topologies, intrusion detection, PKI, and secured networks.
* Knowledge of security practices and roles necessary to support networks, software, and hardware deployments and implementation.
* Strong problem-solving skills and attention to detail.
Minimum Qualifications:
* At least 5 years of experience in the field or in a related area.
* IAT or IAM Level II Certification.
* Experience with cybersecurity policies and threat mitigation.
* Must have active TS/SCI
Preferred Qualifications:
* Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field.
* Experience working in federal or defense environments.
* Industry standard information security certifications.
#CJ
Pay and Benefits
The salary range for this position is $112,000.00 to $126,000.00 annually.
At Goldbelt, we value and reward our team's dedication and hard work. We provide a competitive base salary commensurate with your qualifications and experience. As an employee, you'll enjoy a comprehensive benefits package, including medical, dental, and vision insurance, a 401(k) plan with company matching, tax-deferred savings options, supplementary benefits, paid time off, and professional development opportunities.
Auto-ApplyF5 Security Engineer - Active TS/SCI with CI Poly
Security architect job in Colorado Springs, CO
Job Description
Participate in the development and support of customer technical requirements
Champion a collaborative, team-based environment, sharing standard methodologies and success and building positive relationships
Plan, Design, Develop, Implement and Operate F5 products such as LTM, ASM, BIG-IQ and APM
Manage the configuration on multiple physical and virtual F5 across multiple data centers
Develop scripts and tools to automate configuration of a large number of network security devices distributed across multiple data centers
Propose and implement system enhancements that will improve the performance and reliability of the network security infrastructure
Applies capacity planning configuration changes as demanded by the business
Address performance, scalability, and service architecture administration issues
Design, install, configure, maintain network security services, equipment and devices
Plan and support network security infrastructure
Provide clear technical documentation and written procedures for issues identified and addressed
Monitoring and troubleshooting of platform and OS based problems, network security infrastructure and connectivity issues
Perform launch testing for new software releases and the introduction of new features
Coordinate equipment orders including physical or virtual appliances, as well as upgrading, monitoring, testing and servicing the systems as needed
Demonstrates knowledge of a broad range of technology towers i.e.: Storage, Virtualization, Intel, Networking, Data Center Migration and Disaster Recovery
Knowledge of risk and controls landscape, ensuring company-wide standards are met
Participate in change and incident management
Anticipating potential problems and acting to minimize the impact they may have on the project or unit
Ability to collaborate with different technology towers to achieve common goals
Requirements
Bachelor's degree in computer science, information systems, telecommunications, or an engineering focused field
Must have an Active TS/SCI and willing to obtain a CI Poly
5+ years of relevant F5 experience with F5 LTM, ASM, BIG-IQ, and/or APM administration and life cycle management including experience with advanced iRule creation and troubleshooting
Ability to handle multiple complex F5 configurations and deployments at once
Understanding of networking at all layers of the OSI model; and Previous experience with web application technologies
Experience deploying, managing, and troubleshooting network systems, switching, and routing protocol standards such as: TCP/IP, MPLS, OSPF, BGP, SDN, and 802.1x.
Experience managing and troubleshooting DNS, DHCP, IPAM, and NTP in a large multi-site environment
Ability to manage multiple stands of work simultaneously.
Executes within a customer-centric environment.
Excellent verbal and written communication skill Hands on experience with Python and APIs
Self-driven with the ability to manage workload without direct supervision
Must have the F5 201 certification
8570 IAT Level II Certification required
Preferred Skills/Qualifications
Experience with Infoblox DDI, Microsoft DNS, Dyn, VMWare Automation products (vRO, vRA)
Benefits
Essential Network Security (ENS) Solutions, LLC
is a service-disabled veteran owned, highly regarded IT consulting and management firm. ENS consults for the Department of Defense (DoD) and Intelligence Community (IC) providing innovative solutions in the core competency area of Identity, Credential and Access Management (ICAM), Software Development, Cyber and Network Security, System Engineering, Program/Project Management, IT support, Solutions, and Services that yield enduring results. Our strong technical and management experts have been able to maintain a standard of excellence in their relationships while delivering innovative, scalable and collaborative infrastructure to our clients.
Why ENS?
Free Platinum-Level Medical/Dental/Vision coverage, 100% paid for by ENS
401k Contribution from Day 1
PTO + 11 Paid Federal Holidays
Long & Short Term Disability Insurance
Group Term Life Insurance
Tuition, Certification & Professional Development Assistance
Workers' Compensation
Relocation Assistance
Cyber Security Systems Engineer
Security architect job in Colorado Springs, CO
Provides technical knowledge and analysis of complex problems that require an understanding of current best practices and government-mandated policies for the effective development and implementation of cybersecurity solutions. Develop and implement system security plans, policies, and controls in accordance with DoD and NIST standards (e.
g.
, RMF, NIST SP 800-53).
Support architecture and design reviews from a security perspective.
Coordinate with cross-functional teams to ensure cybersecurity is integrated early in the systems engineering process.
Assist with security test and evaluation (ST&E), including validation, verification, and accreditation efforts (e.
g.
, ATO/ATC).
Contribute to Program Protection Plans (PPPs), Security Classification Guides (SCGs), and related security documentation.
Provides technical expertise in areas such as Cloud Systems Architecture, Information Systems Integration, Software Development Methodologies, Security Engineering, Network Systems Management, etc.
Provides technical expertise in areas that have system security and/or cybersecurity touch points, such as defensive cyberspace operations, joint operations planning, policy, and technical intelligence.
Initiates action for providing support to various working groups such as system security working groups, cybersecurity working groups, change management boards, etc.
Minimum of 7 years of experience in cybersecurity or systems security engineering within a DoD environment.
Experience supporting system accreditation packages and security documentation.
Familiarity with RMF, NIST SP 800 series, and DoDI 8510.
01.
Demonstrated experience with applicable IC and DoD policies, procedures, and operating instructions related to program security, information assurance, information management, configuration management, and cyber defense.
Experience working closely with ISSMs/ISSEs and government security stakeholders.
DoD 8570 IAT Level II or III certification (e.
g.
, Security+, CISSP, CASP+, Network+).
Relevant experience and knowledge of Defensive Cyber Operations (DCO).
Familiarity with cybersecurity tools such as ACAS, Nessus, STIG Viewer, and Splunk.
Experience within the National Security Space and/or the Ground Systems Mission Areas.
Experience with SDA SW.
Experience with Infrastructure, Platforms, Networks, and Data.
B.
S.
in a related field.
M.
S.
in a related field (desired).
Place of work is the Garden of the Gods, Colorado Springs, CO.
This role is a hybrid role (on-site/telework).
May require travel up to 15% of the time within the continental United States.
Auto-ApplyInformation Systems Security Officer (ISSO) II (TS, w/ SCI Eligibility
Security architect job in Ellicott, CO
Job DescriptionSECURITY CLEARANCE REQUIREMENT: TS, WITH SCI ELIGIBILITY REQUIRES US CITIZENSHIP*** Information Systems Security Officer (ISSO) II The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities.
We are seeking an Information Systems Security Officer (ISSO) II to carry out the following duties and responsibilities:
Assist the ISSM in meeting their duties and responsibilities
Prepare, review, and update authorization packages
Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media
Notify ISSM when changes occur that might affect the authorization determination of the information system(s)
Conduct periodic reviews of information systems to ensure compliance with the security authorization package
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change
Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly
Ensure all IS security-related documentation is current and accessible to properly authorized individuals
Ensure audit records are collected, reviewed, and documented (to include any anomalies)
Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans
Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them
Prepare reports on the status of security safeguards applied to computer systems
Perform ISSO duties in support of in-house and external customers
Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries
Qualifications:
Required:
2 - 5 years related experience in developing RMF packages or bodies of evidence
Prior performance in roles such as System, Network Administrator or ISSO
SAP experience
DoD 8570.01-M IAM Level II training (in lieu of IAT Level II)
Must be able to regularly lift up to 50 lbs
Desired:
Bachelor's degree or equivalent experience (4 years)
Security Clearance:
Current clearance as defined in the Task Order
Eligibility for access to Special Access Program (SAP) Information
Willingness to submit to a Counterintelligence polygraph
Employee Benefits:
Competitive salary for well qualified applicants
401(k) plan
Annual performance bonus
Certification and advanced degree attainment bonuses
Student Loan / Tuition reimbursement
Health Care Insurance (medical, dental, vision)
Up to four weeks of paid vacation
11 Federal Holidays, and 3 Floating Holidays
Team bonding events
RedTrace Technologies is an EOE employer
Powered by JazzHR
6EEO6lxcTR