Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Defensive Cyber Operations Engineer.
United States Jobs Expertini

Urgent! Defensive Cyber Operations Engineer Job Opening In Aurora – Now Hiring ISYS Technologies

Defensive Cyber Operations Engineer



Job description

Minimum Clearance Required

Top Secret SCI

Responsibilities


I2X Technologies is a reputable technology services company to the Federal Government.

Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country.

We provide long-term growth and development.

Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states.

Our programs support multiple Federal agencies, the Department of Defense and often focused on the space initiatives of our government customers.


I2X Technologies is seeking a Sr. Defensive Cyber Operations Engineer to support ongoing activities for a customer in Buckley SFB, CO .This position will be on-site and will require an active * TS/SCI .


+ Operate with latitude in developing methodology and presenting solutions to problems.



+ Contribute to deliverables and performance metrics where applicable.



+ Consult on IT and cyber defensive architecture and technologies.



+ Assess assigned cyber key terrain to thoroughly understand the mission, architecture and associated threat.



+ Advise on technical design and implementation of DCO capabilities required to effectively protect, detect and respond to cyber threats and attacks.



+ Research cyber defense technologies for best fit based on mission, architecture and current threat.



+ Design, implement, configure and/or tune cyber defensive technology.



+ Author documentation to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc.

to support DCO.



+ Adapt technologies to meet the mission architecture and threat.




Qualifications


Required:

+ A minimum of a Bachelor's degree required

+ Must meet 8140 compliance standards:

+ BS Degree in Information Technology, Cybersecurity, Data Science, Information Systems or Computer Science is required

+ Needs to hold one of the following certifications, GFACT or GISF or Cloud+ or GCED or PenTest+ or Security+ or GSEC

+ Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future

+ Active Top Secret security clearance required

+ Experience using cyber reconnaissance to support a federal client

+ Experience working with cloud infrastructure

+ Experience utilizing software asset management

+ 5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.)

+ 5 years of professional technical experience (these years may be in conjunction with #2).

Experience years must come from at least 2 of the following areas:

+ Container or virtual environments (e.g. Docker, Kubernetes, VMware, AWS)

+ In-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)

+ Linux operating systems (Red Hat, Kali, etc.)

Desired

+ Prior professional services or federal consulting experience

+ Previous Security Operations Center experience

+ Experience in mobile and endpoint security
Essential Requirements:

US Citizenship is required.


In compliance with Colorado’s Equal Pay for Equal Work Act, the annual base salary range for this position is listed .

Please note that the salary information is a general guideline only.

I2X Technologies considers factors such as (but not limited to) scope and responsibilities of the position, candidate’s work experience, education/training, key skills, internal peer equity, as well as, market and business considerations when extending an offer.


Physical Demands:

The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation.


While performing the duties of this job, the employee will regularly sit, walk, stand and climb stairs and steps.

May require walking long distance from parking to work station.

Occasionally, movement that requires twisting at the neck and/or trunk more than the average person, squatting/ stooping/kneeling, reaching above the head, and forward motion will be required.

The employee will continuously be required to repeat the same hand, arm, or finger motion many times.

Manual and finger dexterity are essential to this position.

Specific vision abilities required by this job include close, distance, depth perception and telling differences among colors.

The employee must be able to communicate through speech with clients and public.

Hearing requirements include conversation in both quiet and noisy environments.

Lifting may require floor to waist, waist to shoulder, or shoulder to overhead movement of up to 20 pounds.

This position demands tolerance for various levels of mental stress.


I2X Technologies is an Engineering and Information Technology Company focused on providing Services to the Federal and State Government.

I2X offers a competitive compensation program and comprehensive benefits package to our employees.















Job ID14754

Job LocationsUS-CO-Aurora

MinUSD $135,000.00/Yr.

MaxUSD $171,000.00/Yr.



Required Skill Profession

Other General



Your Complete Job Search Toolkit

✨ Smart • Intelligent • Private • Secure

Start Using Our Tools

Join thousands of professionals who've advanced their careers with our platform

Rate or Report This Job
If you feel this job is inaccurate or spam kindly report to us using below form.
Please Note: This is NOT a job application form.


    Unlock Your Defensive Cyber Potential: Insight & Career Growth Guide


  • Real-time Defensive Cyber Jobs Trends in Aurora, United States (Graphical Representation)

    Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for Defensive Cyber in Aurora, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 7041 jobs in United States and 9 jobs in Aurora. This comprehensive analysis highlights market share and opportunities for professionals in Defensive Cyber roles. These dynamic trends provide a better understanding of the job market landscape in these regions.

  • Are You Looking for Defensive Cyber Operations Engineer Job?

    Great news! is currently hiring and seeking a Defensive Cyber Operations Engineer to join their team. Feel free to download the job details.

    Wait no longer! Are you also interested in exploring similar jobs? Search now: .

  • The Work Culture

    An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at ISYS Technologies adheres to the cultural norms as outlined by Expertini.

    The fundamental ethical values are:
    • 1. Independence
    • 2. Loyalty
    • 3. Impartiality
    • 4. Integrity
    • 5. Accountability
    • 6. Respect for human rights
    • 7. Obeying United States laws and regulations
  • What Is the Average Salary Range for Defensive Cyber Operations Engineer Positions?

    The average salary range for a varies, but the pay scale is rated "Standard" in Aurora. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.

  • What Are the Key Qualifications for Defensive Cyber Operations Engineer?

    Key qualifications for Defensive Cyber Operations Engineer typically include Other General and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.

  • How Can I Improve My Chances of Getting Hired for Defensive Cyber Operations Engineer?

    To improve your chances of getting hired for Defensive Cyber Operations Engineer, consider enhancing your skills. Check your CV/Résumé Score with our free Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.

  • Interview Tips for Defensive Cyber Operations Engineer Job Success
    ISYS Technologies interview tips for Defensive Cyber Operations Engineer

    Here are some tips to help you prepare for and ace your job interview:

    Before the Interview:
    • Research: Learn about the ISYS Technologies's mission, values, products, and the specific job requirements and get further information about
    • Other Openings
    • Practice: Prepare answers to common interview questions and rehearse using the STAR method (Situation, Task, Action, Result) to showcase your skills and experiences.
    • Dress Professionally: Choose attire appropriate for the company culture.
    • Prepare Questions: Show your interest by having thoughtful questions for the interviewer.
    • Plan Your Commute: Allow ample time to arrive on time and avoid feeling rushed.
    During the Interview:
    • Be Punctual: Arrive on time to demonstrate professionalism and respect.
    • Make a Great First Impression: Greet the interviewer with a handshake, smile, and eye contact.
    • Confidence and Enthusiasm: Project a positive attitude and show your genuine interest in the opportunity.
    • Answer Thoughtfully: Listen carefully, take a moment to formulate clear and concise responses. Highlight relevant skills and experiences using the STAR method.
    • Ask Prepared Questions: Demonstrate curiosity and engagement with the role and company.
    • Follow Up: Send a thank-you email to the interviewer within 24 hours.
    Additional Tips:
    • Be Yourself: Let your personality shine through while maintaining professionalism.
    • Be Honest: Don't exaggerate your skills or experience.
    • Be Positive: Focus on your strengths and accomplishments.
    • Body Language: Maintain good posture, avoid fidgeting, and make eye contact.
    • Turn Off Phone: Avoid distractions during the interview.
    Final Thought:

    To prepare for your Defensive Cyber Operations Engineer interview at ISYS Technologies, research the company, understand the job requirements, and practice common interview questions.

    Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the ISYS Technologies's products or services and be prepared to discuss how you can contribute to their success.

    By following these tips, you can increase your chances of making a positive impression and landing the job!

  • How to Set Up Job Alerts for Defensive Cyber Operations Engineer Positions

    Setting up job alerts for Defensive Cyber Operations Engineer is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!