Cybersecurity Engineer
Colorado Springs, CO, United States
Full Time Mid-level / Intermediate Clearance required USD 115K - 214K * est.
ISYS Technologies
I2X ISYS TECHNOLOGIES offers top-notch technology and engineering services with a focus on cyber security management. Contact us today!Minimum Clearance Required
SecretResponsibilities
I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, the Department of Defense and often focused on the space initiatives of our government customers.
I2X Technologies is seeking a CYBERSECURITY ENGINEER to support ongoing activities for a customer in COLORADO SPRINGS. This position will be *on-site* and will require an active Secret clearance
- Communicate and work closely with development teams, third party assessors and system owners, information technology management, cyber peers, Program Office, technical/management staff and other Functional Areas to track updates, modifications, prioritization and status of the Information System Configuration Baseline
- Work collaboratively across the various Cross-Functional Product Teams and with the Operational maintenance teams
- Duties may include technical documentation, assessing Configuration Compliance implementation and cybersecurity vulnerabilities to provide engineering responses for system POAMs, conducting risk analysis for Risk Acceptance Requests (RARs) and providing Cyber support to the program and customer meetings
- Travel is occasionally required to support meetings and work with distributed Functional Area personnel
Qualifications
- Advanced degree with 3+ years experience or bachelors with 5+ years experience or equivalent
- Active Secret clearance
- Requires IAT - LEVEL II Certification
- Demonstrated experience in DoD operational computing environments and possess the ability to work as part of an integrated cybersecurity team that works with various product development teams and third party assessors in order to ensure efficient and effective verification, evaluation, implementation update and maintenance of the Information System Configuration Compliance baseline using DISA Security Technical Implementation Guides (STIGs), Security Requirements Guides (SRGs), Program Guidance and/or Vendor Guidance
- Working knowledge of ACAS (Tenable.sc / Tenable Nessus), Evaluate STIG, Trivy, SCAP or other cyber scanning tools
- Working knowledge of cybersecurity technology and DoDI 8500.1, Cybersecurity
- Familiarity with security architecture design, Security Audit tools, security requirements generation, security testing, administration of security devices such as firewalls and intrusion detection systems desired
- Knowledge of UNIX/Linux, Windows, Juniper, CISCO, Firewall security configuration experience, ESS and other Cyber tools
- Must have a working knowledge of NIST SP 800-53, Security and Privacy Controls for Information Systems and Organizations, DoDI 8500.1 Cybersecurity, Common Criteria, National Information Assurance Partnership (NIAP) and Risk Management Framework (RMF) Security Controls
- Must be familiar with the software development lifecycle (SDLC) and its importance in designing, building and delivering high-quality software to the customer
Essential Requirements:
US Citizenship is required.
I2X Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected Veteran status, or disability status.
In compliance with Colorado’s Equal Pay for Equal Work Act, the annual base salary range for this position is listed . Please note that the salary information is a general guideline only. I2X Technologies considers factors such as (but not limited to) scope and responsibilities of the position, candidate’s work experience, education/training, key skills, internal peer equity, as well as, market and business considerations when extending an offer.
Physical Demands:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation.
While performing the duties of this job, the employee will regularly sit, walk, stand and climb stairs and steps. May require walking long distance from parking to work station. Occasionally, movement that requires twisting at the neck and/or trunk more than the average person, squatting/ stooping/kneeling, reaching above the head, and forward motion will be required. The employee will continuously be required to repeat the same hand, arm, or finger motion many times. Manual and finger dexterity are essential to this position. Specific vision abilities required by this job include close, distance, depth perception and telling differences among colors. The employee must be able to communicate through speech with clients and public. Hearing requirements include conversation in both quiet and noisy environments. Lifting may require floor to waist, waist to shoulder, or shoulder to overhead movement of up to 20 pounds. This position demands tolerance for various levels of mental stress.
I2X Technologies is an Engineering and Information Technology Company focused on providing Services to the Federal and State Government. I2X offers a competitive compensation program and comprehensive benefits package to our employees.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: ACAS Clearance Clearance Required Compliance DISA DoD Firewalls Intrusion detection Linux Nessus NIST NIST 800-53 Privacy Risk analysis Risk Assessment Report Risk management RMF SCAP SDLC STIGs UNIX Vulnerabilities Windows
Perks/benefits: Competitive pay Equity / stock options Startup environment Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.