Systems Engineer with Security Clearance Engineering - Boulder, CO at Geebo

Systems Engineer with Security Clearance

Overview Stellar Solutions, a nationally recognized Great Place To Work, offers talented, energetic, and immediately productive resources to satisfy our customers' critical needs in systems engineering and integration, mission operations, program management and strategic planning.
With programs in the emerging United States Space Force, we are a trusted partner with robust technology, management, and expert solutions for Department of Defense customers related to space and missile systems for national protection and security.
Role/Responsibilities/Qualifications Applicant will leverage technical understanding of cyber security to create and apply solutions aligned to client's mission.
Applies specific functional knowledge, working and general industry knowledge.
Develops or contributes to solutions to a variety of problems of moderate scope and complexity.
Works independently with some guidance and may review or guide activities of junior teammates.
Responsibilities Include:
Perform the day-to-day mission execution of the intrusion detection monitoring and incident management and response activity Perform the day-to-day operation and maintenance of the intrusion detection monitoring and incident management tool suite Document changes to intrusion detection monitoring and incident management tools (e.
g.
, software installs, patching, software configuration changes, ) in accordance with Change Management policies and provide configuration management data on all of its managed systems according to the schedule and format directed by the Government Collect and provide the Government with monthly metrics on intrusion detection monitoring and incident management activity Collect and provide the Government with monthly metrics on cyber threat analysis activity Build and maintain continuity books, standard operating procedures (SOP), spreadsheets and visualization charts, such as Analyst Notebook, to ensure all research and background knowledge is captured and documented Participate in meetings, briefings, conferences and symposiums as directed Clearly and effectively communicate through written and verbal communications with senior government personnel ranging from intelligence analysts, planners and operators to senior decision-makers Required Qualifications:
Provide proactive and real-time monitoring, detection, analysis, response, and reporting capabilities of Cybersecurity events that pose a threat to the client's information and information systems.
Improve the security posture through Cyber readiness efforts.
Work closely with users and organizations to ensure that activities and incidents occurring on information systems and security enclaves are detected, contained, and mitigated.
Implement and operate defense-in-depth technologies that effectively detect, analyze, prevent, and isolate anomalous activity.
Provide rapid response, containment and mitigation of incidents to return compromised network resources to acceptable levels of confidentiality, integrity, and availability.
Triage, analyze, investigate, and eradicate Cybersecurity incidents through interactions with law enforcement, counter-intelligence, and security personnel.
Required Qualifications:
BS in related field 6
years of experience in the CND field 6
years of experience with Local and Wide Area Network technologies, networking protocols, file systems, ports and services, or Windows and Linux commands 5
years of experience with design, development, integration, implementation, operation, and analysis of Cybersecurity technologies used with the DoD, IC, and Federal Cybersecurity initiatives 2
years of experience with the interpretation and implementation of DoD and IC CND directives and manuals Knowledge of intelligence gathering, analysis, and dissemination techniques in a Cybersecurity area HS diploma or GED and 8 years of experience with Cybersecurity or BA or BS degree in CS, IT, or Information Assurance and 4 years of experience with Cybersecurity GIAC Certified Intrusion Analyst (GCIA), Certified Ethical Hacker (CEH), CIAC Certified Incident Handler (GCIH), or Computer Security Incident Handler (CSIH) Certification
Qualifications:
Experience with Federal, DoD, IC, and industry standards in the creation of best practices and standard operating procedures (SOPs) Experience with the development and implementation of computer network defense tactics, techniques, and procedures (TTPs) Experience with analyzing network traffic packet captures tools, including WireShark Experience with Network Intrusion Detection and Prevention Systems, including Cisco ASA, HP Tipping Point, or McAfee IntraShield and host-based IDS/IPS, including McAfee ePO and HBSS Experience with conducting vulnerability assessments using Retina, Nessus, WASSP or SECSCN, and subsequent remediation of security control deficiencies Experience with Web content filters and e-mail content filters, including McAfee Web Gateway and McAfee E-mail Gateway Experience with collecting and analyzing forensic images and other data tools, including EnCase Enterprise, EnCase CyberSecurity, LinEn and netcat, recovery CDs, and SysInternals tools Ability to pay strict attention to detail Possession of excellent oral and written communication skills Possession of excellent interpersonal, organizational, time management, analytic, and problem-solving skills Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Secret clearance required to start job.
Must be able to obtain TS/SCI clearance when missions requires.
Location:
Boulder, CO - On-site presence required The typical pay range for this position is USD $120,000 - $190,000 per year, total package.
Individual pay is determined by many factors including work location, job-related skills, experience, and relevant education or training.
This position is also eligible for a discretionary annual performance bonus, retirement plan and other benefits (all included as part of package).
Deliverable(s) Deliverables will be in the format of reports, briefings, spreadsheets, or other documents as directed by the Government, using government approved and/or mandated systems/software and processes governed by guidance/instructions/policy or direction.
Recommended Skills Analytical Attention To Detail Certified Ethical Hacker Change Management Cisco Pix Classified Information Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.