Computer Network Defense Analyst
Colorado Springs, CO, United States
ISYS Technologies
I2X ISYS TECHNOLOGIES offers top-notch technology and engineering services with a focus on cyber security management. Contact us today!Minimum Clearance Required
SecretResponsibilities
I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, the Department of Defense and often focused on the space initiatives of our government customers.
Responsibilities:
The Computer Network Defense Analyst (CNDA) is responsible for implementing and enforcing national, DOD (8500.01, 6510, etc.), and security policies and directives. The CNDA is responsible for continuous network security monitoring, intrusion detection, and incident response actions to defend the Ballistic Missile Defense Communications Network (BMD COMNET) and mission systems and services. Develops a network defense visibility display and directs/executes time sensitive adjustments to the network security posture to minimize or counter operational risk. The CNDA collects stores and presents data and metrics for use by senior leaders to conduct Operational Risk Management (ORM) decisions on the network security posture and perform proactive security functions established to assist BMD organizations in deterring, detecting, isolating, containing, and recovering from information system (IS) and network security intrusions and mitigating known network vulnerabilities. The CNDA operates and administers the provided computer network defense suite of tools, to include firewalls, correlated log analysis, intruder alert and related services to protect system infrastructure and information services from internal and external threats.
Qualifications
Must possess a DoD 8570 certification at IAT Level II or higher (Security+, GSEC, SCNP, SSCP, CISSP, CISA, GSE, SCNA). The candidate will be responsible for maintaining DoD 8570 certification for the full contract period.
- Knowledge of and practical experience in the usage of an array of network and information security tools
- Knowledge of modern computer systems, client/server, LAN/WAN and Network concepts, modern network management and monitoring concepts
- Knowledge of hardware (Routers, CSU/DSU, bridges, multiplexers, servers and switches configuration)
- Previous experience in the monitoring/management of intrusion detection systems and firewall devices, including SideWinder, ArcSight, HBSS and/or Tripwire
- Experience securing network gear against known vulnerabilities"
Required:
- Minimum Active DoD Secret Clearance.
- Advanced degree and 0-1+ year experience or bachelor’s degree and 0-3+ years’ experience or equivalent
- Must be capable of obtaining a TS/SCI clearance and getting in indoctrinated into a higher than secret program
- Ability to recognize known worms/viruses based on their signatures
- Ability to recognize network intrusion events and to differentiate false positives
- Ability to recognize successful intrusions and compromises through review and analysis of relevant event logs and other detailed information
Desired Skills:
- TS/SCI Preferred
- Certified Ethical Hacker certification
- Unix and/or Microsoft operation system training
Essential Requirements:
US Citizenship is required.
I2X Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected Veteran status, or disability status.
In compliance with Colorado’s Equal Pay for Equal Work Act, the annual base salary range for this position is listed . Please note that the salary information is a general guideline only. I2X Technologies considers factors such as (but not limited to) scope and responsibilities of the position, candidate’s work experience, education/training, key skills, internal peer equity, as well as, market and business considerations when extending an offer.
Physical Demands:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation.
While performing the duties of this job, the employee will regularly sit, walk, stand and climb stairs and steps. May require walking long distance from parking to work station. Occasionally, movement that requires twisting at the neck and/or trunk more than the average person, squatting/ stooping/kneeling, reaching above the head, and forward motion will be required. The employee will continuously be required to repeat the same hand, arm, or finger motion many times. Manual and finger dexterity are essential to this position. Specific vision abilities required by this job include close, distance, depth perception and telling differences among colors. The employee must be able to communicate through speech with clients and public. Hearing requirements include conversation in both quiet and noisy environments. Lifting may require floor to waist, waist to shoulder, or shoulder to overhead movement of up to 20 pounds. This position demands tolerance for various levels of mental stress.
I2X Technologies is an Engineering and Information Technology Company focused on providing Services to the Federal and State Government. I2X offers a competitive compensation program and comprehensive benefits package to our employees.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: ArcSight CISA CISSP Clearance Clearance Required Compliance DoD DoDD 8570 Firewalls GSEC Incident response Intrusion detection Log analysis Monitoring Network security Risk management SSCP Tripwire TS/SCI UNIX Vulnerabilities
Perks/benefits: Competitive pay Equity / stock options Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.