Isys Technologies-posted 3 days ago
Full-time • Mid Level
Onsite

I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, the Department of Defense and often focused on the space initiatives of our government customers. I2X Technologies is seeking a Mid-Level Defensive Cyber Operations Engineer to support ongoing activities for a customer at Patrick Space Force Base, FL. This position will be on-site and will require an active Top Secret clearance, SCI eligible. Require a Defensive Cyber Operations (DCO) with a desire to actively defend the mission systems critical to our national defense. Lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments. Assignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks. Leads the development of DCO methodologies and presents solutions to problems. Contributes to deliverables and performance metrics where applicable. Consults on IT and cyber defensive architecture and technologies. Assesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat. Advises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks. Researches cyber defense technologies for best fit based on mission, architecture and current threat. Leads the design, implementation, configuration and/or tuning of cyber defensive technology. Authors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO. Adapts technologies to meet the mission architecture and threat.

  • Lead individuals towards common goals and work with engineers to apply extensive expertise on multiple complex work assignments.
  • Assignments may be broad in nature, requiring originality and innovation in determining how to accomplish tasks.
  • Leads the development of DCO methodologies and presents solutions to problems.
  • Contributes to deliverables and performance metrics where applicable.
  • Consults on IT and cyber defensive architecture and technologies.
  • Assesses assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat.
  • Advises on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks.
  • Researches cyber defense technologies for best fit based on mission, architecture and current threat.
  • Leads the design, implementation, configuration and/or tuning of cyber defensive technology.
  • Authors documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc. to support DCO.
  • Adapts technologies to meet the mission architecture and threat.
  • Bachelor's degree (hard requirement) with 5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.).
  • 5 years of professional technical experience (these years may be in conjunction with #2)
  • Experience years must come from at least 2 of the following areas:
  • Container or virtual environments (e.g. Docker, Kubernetes, VMware, AWS)
  • In-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)
  • Data storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.)
  • Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)
  • Agile frameworks for software development,
  • Linux operating systems (Red Hat, Kali, etc.)
  • Windows operating systems
  • Network infrastructure
  • Security applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)
  • US Citizenship is required.
  • active Top Secret clearance, SCI eligible
  • I2X offers a competitive compensation program and comprehensive benefits package to our employees.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service