Knowledge Manager

Colorado Springs, CO, United States

ISYS Technologies

I2X ISYS TECHNOLOGIES offers top-notch technology and engineering services with a focus on cyber security management. Contact us today!

View all jobs at ISYS Technologies

Apply now Apply later

Minimum Clearance Required

Top Secret SCI

Responsibilities

I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, including the Department of Defense. We are seeking a KM - Senior to support our customer’s operations in Colorado Springs, CO. This effort provides our government customer with cybersecurity support services. This position will be on-site and will require an active TS/SCI Clearance. 

 

Responsibilities:

 

  • Delivering advanced Knowledge Management services, including identifying, mapping, and analyzing operational processes to recommend improvements
  • Designing and implementing KM systems across various classification levels, maintaining a central IT services knowledge repository, and ensuring compliance with network policies
  • Responsible for providing on-the-job training to government personnel, managing the lifecycle of organizational data, and overseeing the processes for effective information sharing and control
  • Assisting users with authoritative data sources and tools to support Space Operations Command (SpOC) objectives

Qualifications

Essential Requirements:

  • US Citizenship
  • Active TS/SCI Clearance

Required Experience:

  • Minimum eight (8) years of experience
  • CKM, PMP, ITIL, CISSP, CISM, CISA

Education and Certifications:

  • A Bachelor of Science degree from an accredited college or university
  • Has cybersecurity expertise, including computer networking concepts, protocols, and network security methodologies, and risk management processes
  • Essential knowledge includes cybersecurity laws, regulations, policies, ethics, principles, and threats and vulnerabilities. Specific operational impacts of cybersecurity lapses, cyber defense and vulnerability assessment tools, application and web vulnerabilities, and secure coding techniques are also addressed.
  • Has knowledge of critical infrastructure systems, incident response, enterprise IT architecture, system administration, and security hardening techniques
  • Must be versed in system and application security threats, lifecycle management, security models, software development security, network traffic analysis, and cloud service models
  • Has the ability to conduct information searches, perform knowledge mapping, measure and report intellectual capital, and use knowledge management technologies effectively

 

I2X Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected Veteran status, or disability status. 

 

Salary bands have not yet been determined for this opportunity. I2X Technologies considers factors such as scope and responsibilities of the position, candidate’s work experience, education/training, key skills, internal peer equity, and market and business considerations when extending an offer. 

 

Physical Demands:

 

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation.

 

While performing the duties of this job, the employee will regularly sit, walk, stand, and climb stairs and steps. May require walking long distance from parking to workstation. Occasionally, movement that requires twisting at the neck and/or trunk more than the average person, squatting/ stooping/kneeling, reaching above the head, and forward motion will be required. The employee will continuously be required to repeat the same hand, arm, or finger motion many times. Manual and finger dexterity are essential to this position. Specific vision abilities required by this job include close, distance, depth perception and telling differences among colors. The employee must be able to communicate through speech with clients and the public. Hearing requirements include conversation in both quiet and noisy environments. Lifting may require floor to waist, waist to shoulder, or shoulder to overhead movement of up to 20 pounds. This position demands tolerance for various levels of mental stress.

 

I2X Technologies is an Engineering and Information Technology Company focused on providing Services to the Federal and State Government. I2X offers a competitive compensation program and comprehensive benefits package to our employees.

Apply now Apply later
  • Share this job via
  • 𝕏
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0
Category: Leadership Jobs

Tags: Application security CISA CISM CISSP Clearance Clearance Required Cloud Compliance Cyber defense Incident response ITIL Network security Risk management Top Secret TS/SCI Vulnerabilities

Perks/benefits: Competitive pay Equity / stock options

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.