- August 4, 2022
- Posted by: sortman
Location: Colorado Springs, CO
Type: On Site
Experience Level: 4 years+
Note: This job involves Shift Work
Minimum Qualifications: Active TS/SCI. Fully certified IAW DoD 8570 IAT Level II or equivalent information assurance certifications. Bachelor’s degree or equivalent combination of experience and education related to specific functional area. Demonstrated substantive knowledge and significant experience relevant to the functional area of at least 4 years (may substitute 4 years of experience in lieu of Bachelor’s degree, or substitute Master’s degree in lieu of 2 years of experience). Experience working collaboratively with staff at all experience levels to deliver short-term commitments. Experience completing and coordinate tasks across cross-functional teams in a supporting role.
Experience leading and developing and delivering complex capabilities and processes in one or more of the following areas: Experience supporting cybersecurity oversight, collection, and analysis of threat intelligence, event analysis, and incident response. Experience supporting 24x7x365 operations in a cybersecurity, IT or related watch environment. Experience supporting reporting on daily performance and health metrics to provide ongoing situational awareness to Government leadership. Experience using incident case management systems to document and report on incidents. Experience following and improving Standard Operating Procedures (SOPs). Experience supporting vulnerability management, cyber threat intelligence, and fusion. Understanding of classified Government networks, technology stacks, and cybersecurity operations. Experience working individually as well as actively participating on integrated teams.
Performs a variety of Information Assurance (IA) and Computer Network Defense (CND) functions which are broad in nature and support multi-tier IA and CND functions to include, but not limited to, systems engineer, audit/inspection, infrastructure support, certification and accreditation, vulnerability management, detection and response support services. Provides support for a program, organization, system, or enclave’s information assurance program. Provides security certification test and evaluation of assets, vulnerability management and response, security assessments, and customer support. Provides support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-to-day security operations of the system. Evaluates security solutions to ensure they meet security requirements for processing classified information. Performs vulnerability/risk assessment analysis to support certification and accreditation. Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Assessment and Authorization (A&A) packages, and Security Control Traceability Matrices (SCTMs). Executes policies and guidance provided by senior functional/technical leads. Interact with customers, Information Technology (IT) staff, and high-level corporate officers to define and achieve required IA objectives. Provide daily oversight and direction to contractor Cybersecurity Officers. Serve as an Information Systems Security Manager (ISSM).
To apply, email your resume and job title you are interested in to email@example.com