ISYS Technologies, Inc.

Security Operations Center (SOC) Defensive Cyber Operations (DCO) Analyst

Job ID
14257
Job Locations
US-CO-Colorado Springs

Minimum Clearance Required

TS/SCI

Responsibilities

I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, including the Department of Defense. We are seeking Security Operations Center (SOC) Defensive Cyber Operations (DCO) Analysts to support our customer’s operations in Colorado Springs, CO. This effort provides our Government customer with cybersecurity support services. This position will be on-site and will require an active TS/SCI Clearance. 

 

Responsibilities:

 

  • Conducting security awareness training
  • Monitoring and analyzing security alerts
  • Performing penetration testing to identify system vulnerabilities
  • Developing and implementing security policies, performing security audits and assessments, and analyzing security incidents to determine root causes and recommend remediation actions
  • Implementing data management standards, developing and maintaining security documentation, and overseeing the implementation of security measures for information systems
  • Developing and executing security test plans, monitoring cloud-based systems, coordinating with external partners, and developing incident response plans
  • Managing encryption solutions, conducting forensic analysis of breaches, and developing cybersecurity architectures and designs

Qualifications

Essential Requirements:

  • US Citizenship
  • Active TS/SCI Clearance

Required Experience:

  • Minimum 3 (Junior), 8 (Mid), or 12 (Senior) years' related experience
  • Has extensive experience with computer networking concepts, protocols, and network security methodologies, as well as risk management processes and methods for assessing and mitigating risk
  • Well-versed in laws, regulations, policies, and ethics related to cybersecurity and privacy, along with core cybersecurity principles and an understanding of cyber threats and vulnerabilities
  • Has expertise in cryptography, security event correlation techniques, incident response methodologies, and network traffic analysis
  • Experienced with the software development life cycle, network security measures such as encryption and firewalls, and advanced data analysis techniques
  • Proficient in penetration testing, database management, web content management, malware analysis, programming structures, application security threats, and wireless technologies
  • Skilled in using scripting languages such as Python, Perl, and PowerShell to automate tasks and processes
  • Proficient in conducting security audits and assessments, as well as using security information and event management (SIEM) tools for monitoring and analysis
  • Experienced in conducting vulnerability scans, recognizing vulnerabilities in security systems, and using intrusion detection and prevention systems (IDS/IPS)
  • Adept at using network analysis tools to identify and mitigate security threats and developing and implementing security policies and procedures

Education and Certifications:

  • A Bachelor of Science degree from an accredited college or university
  • Sr. Certifications: CySA+ or CFR or GCFA or GCIA or GDSA or GCIH or GICSP or CCE
  • Mid Certifications: CBROPS or FITSP-O or GISF or CCSP or CEH or Cloud+ or GCED or PenTest+ or Security+ or GSEC
  • Jr. Certifications: None

 

I2X Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected Veteran status, or disability status. 

 

Salary bands have not yet been determined for this opportunity. I2X Technologies considers factors such as scope and responsibilities of the position, candidate’s work experience, education/training, key skills, internal peer equity, and market and business considerations when extending an offer. 

 

Physical Demands:

 

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation.

 

While performing the duties of this job, the employee will regularly sit, walk, stand, and climb stairs and steps. May require walking long distance from parking to workstation. Occasionally, movement that requires twisting at the neck and/or trunk more than the average person, squatting/ stooping/kneeling, reaching above the head, and forward motion will be required. The employee will continuously be required to repeat the same hand, arm, or finger motion many times. Manual and finger dexterity are essential to this position. Specific vision abilities required by this job include close, distance, depth perception and telling differences among colors. The employee must be able to communicate through speech with clients and the public. Hearing requirements include conversation in both quiet and noisy environments. Lifting may require floor to waist, waist to shoulder, or shoulder to overhead movement of up to 20 pounds. This position demands tolerance for various levels of mental stress.

 

I2X Technologies is an Engineering and Information Technology Company focused on providing Services to the Federal and State Government. I2X offers a competitive compensation program and comprehensive benefits package to our employees.

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed