~~~ This is an EVERGREEN POSITION, not currently open. If you wish to apply then it will be for purposes of being considered in the future ~~~
Cybersecurity Engineer III
Location: Colorado Springs, CO
Clearance: TS/SCI with the ability to obtain and maintain a CI polygraph
Compensation: $165-175K depending upon experience.
Requirements:
- Bachelor's degree from an accredited institute in an area applicable to the position; an additional 4 years of experience be substituted in lieu of a degree
- Minimum six (6) years of relevant experience in addition to education level
- Must possess current DoD 8570 IAT II or IAM II certification
- Experience working in a DoD or Intelligence Community Environment desired
- Current active TS/SCI clearance, with the ability to obtain and maintain a CI polygraph
Job Details:
- Perform security engineering, develops security architecture artifacts, oversees penetration testing and security exercises, performs computer OS forensic analysis, supports network security, and automates security compliance for systems
- Responsible for engineering security into system design documentation, performing cyber hunt activities, and configuring SIEM and Splunk tools
- Engineer systems and solutions to include the software, hardware, and communications to support the total requirements with emphasis on security as well as provide for present and future cross-functional requirements and interfaces
- Identify, assess, and present options for meeting the functional and technical requirements including hardware and software updates or upgrades
- Deploy and operate cybersecurity tools
- Lead performance of penetration testing and security exercises
- Secure network systems and participates in vulnerability scans using Tenable Nessus
- Utilize tools such as Zeek and ELSA to perform network security monitoring
- Implement solutions to automate security compliance of systems
- Collect and review security analytic measures and oversees security incident detection activities
- Responsible for developing high level system design diagrams
- Ensure that the operating environment is security compliant
- Evaluate IT enclave systems and assess risk posture and system security findings and recommends mitigation
- Evaluate analytical and systematic problems of workflows, organization and planning and develops appropriate corrective action
Equal Opportunity Employer/Veteran/Disabled