Recent Searches

You haven't searched anything yet.

24 Cybersecurity Operations Analyst II with Security Clearance - Now Hiring Jobs in Colorado, CO

SET JOB ALERT
Details...
Jacobs
Colorado, CO | Full Time
$118k-147k (estimate)
1 Month Ago
Aerospace
Colorado, CO | Full Time
$77k-94k (estimate)
1 Month Ago
Leidos
Colorado, CO | Full Time
$54k-80k (estimate)
1 Month Ago
IC-CAP
Colorado, CO | Full Time
$108k-141k (estimate)
11 Months Ago
Parsons
Colorado, CO | Full Time
$88k-118k (estimate)
1 Month Ago
Jacobs
Colorado, CO | Full Time
$83k-103k (estimate)
1 Month Ago
Base 2 Solutions
Colorado, CO | Full Time
$83k-114k (estimate)
1 Month Ago
Aerospace
Colorado, CO | Full Time
$53k-78k (estimate)
1 Month Ago
Constellis
Colorado, CO | Full Time
$42k-55k (estimate)
1 Month Ago
Kratos Defense
Colorado, CO | Full Time
$99k-117k (estimate)
1 Month Ago
Jacobs
Colorado, CO | Full Time
$77k-95k (estimate)
11 Months Ago
Axient
Colorado, CO | Full Time
$116k-136k (estimate)
1 Month Ago
Kratos Defense
Colorado, CO | Full Time
$93k-112k (estimate)
1 Month Ago
Cybersecurity Operations Analyst II with Security Clearance - Now Hiring
$77k-101k (estimate)
Full Time | IT Outsourcing & Consulting 11 Months Ago
Save

Invictus International Consulting is Hiring a Cybersecurity Operations Analyst II with Security Clearance - Now Hiring Near Colorado, CO

Title: Cybersecurity Operations Analyst II Location: Colorado Springs, CO Clearance: TS/SCI with the ability to obtain and maintain a CI polygraph Job Details: * Performs forensic analysis of digital information and gathers and handles evidence * Monitor systems and networks for intrusions and proactively identify security flaws and vulnerabilities, and then develop plans of action to remediate security issues * Performs data analysis and evidence collection and assess and mitigate threats, both past present and future * May use programming skills to help reverse engineer malicious code and help create fixes for vulnerable applications or services on the network * Perform security audits, risk analysis, network forensics and penetration testing in order to analyze, develop, and recommend courses of action * Responsible for the full lifecycle of security incidents involving enterprise systems and data including personally identifiable information (PII) breaches * Manage and respond to computer security incidents through detection, investigation, analysis, remediation, and reporting of cybersecurity incidents in a timely manner with high quality * Help improve the overall security posture through obtaining the knowledge of the enterprise systems, and to ensure the timely dissemination of security information to the appropriate stakeholders * Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, IDS logs) to identify possible threats to network security * Respond to cyber incidents, including responding to IR phone calls and emails, and preparing situational awareness reports and escalate incidents as needed * Investigate phishing and other user self-identified potential cyber threats * Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation * Correlate incident data to identify specific vulnerabilities and make recommendations * Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies through monitoring of vulnerability scanning devices * Identifies network computer intrusion evidence and perpetrators, and coordinates with other government agencies to record and report incidents * Conduct cyber trend analysis as well as malware analysis * Identify and analyze anomalies in network traffic using metadata * Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise * Track incidents thoroughly and communicate with end users and management effectively * Participate regularly in working group sessions, to include idea generation for new content rules for security alerting and reduction of false positives * Evaluate the current Computer Security Incident Response Capability (CSIRC) to ensure compliance with federal mandates for incident response and reporting * Maintain CSIRC specific Standard Operation Procedures and Incident Response Plans Requirements: * Bachelor's degree from an accredited institute in an area applicable to the position; an additional 4 years of experience be substituted in lieu of a degree * Minimum four (4) years of relevant experience in addition to education level * Must possess current DoD 8570 IAT II or IAM II certification * Experience working in a DoD or IC environment desired * Current active TS/SCI clearance, with the ability to obtain and maintain a CI polygraph Equal Opportunity Employer/Veteran/Disabled

Job Summary

JOB TYPE

Full Time

INDUSTRY

IT Outsourcing & Consulting

SALARY

$77k-101k (estimate)

POST DATE

05/24/2023

EXPIRATION DATE

05/21/2024

WEBSITE

invictusic.com

HEADQUARTERS

ALEXANDRIA, VA

SIZE

200 - 500

FOUNDED

2014

CEO

JAMES KELLY

REVENUE

$50M - $200M

INDUSTRY

IT Outsourcing & Consulting

Related Companies
About Invictus International Consulting

Invictus International Consulting is a leading cybersecurity company to the national security and defense communities world-wide. We are a Service-Disabled Veteran-Owned Small Business (SDVOSB) based in Alexandria, VA, specializing in information assurance, cybersecurity services, and intelligence analysis to the national security, intelligence, and homeland security communities. To learn more, visit us at www.invictusic.com

Show more

Invictus International Consulting
Full Time
$99k-121k (estimate)
2 Weeks Ago
Invictus International Consulting
Full Time
$82k-102k (estimate)
1 Month Ago