Cybersecurity Operations Watch 1

Shift
Colorado Springs, CO
Posted 4 months ago

E&M Technologies, Inc. is dedicated to recruiting and developing diverse, high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers’ mission and quest for professional growth. E&M provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do.

E&M Technologies, Inc. is currently seeking a Level 1 Cybersecurity Operations Watch Officer to support a Federal Government client.

Job Responsibilities

  • Work independently to achieve day-to-day objectives with significant impact to the overall NORAD/USNORTHCOM Government mission.
  • Engage with NORAD/USNORTHCOM Government customers, internal customers, team members and management, to fulfill cyber security requirements.
  • Take responsibility for development and fielding efforts including testing/installation of operating systems and application lock-down consistent with the current status of cyber security regulations.
  • Analyze current cyber and Risk Management Framework (RMF) protocols to complex server, network and interconnected systems to resolve and satisfy the conditions necessary to achieve an Authority to Operate.
  • Take responsibility for multiple systems, function interchangeably within a team of engineers and support a cross functional approach to resolving the myriad of issues confronting applications and systems operating within a highly complex and interconnected networked environment.
  • Take ownership of a segment of the solution and pursues the implementation across multiple technical areas.
  • Use your deep understanding of and ability to apply principles, theories, and concepts of technical domain and has broad understanding of other related specialty areas experience with the application of DISA Security Technical Implementation Guides (STIGs) to operating Systems, Information Assurance Vulnerability Alert (IAVA) monitoring and application, system vulnerability scanning and mitigation of findings, and remediation of findings.
  • Design, develop, and implement solutions that meet network and system security requirements and perform vulnerability/risk analyses of computer systems, networks and applications in conjunction with the tasking being simultaneously performed by the other cyber professionals, network staff, other corporate teammates and resident Government staff.
  • Define solutions, communicates it to the stakeholders.
  • Present the solution and the adequacy of the solution to the stakeholders to ensure their acceptance,and then implement it within the context of a larger effort.
  • Evaluate the network to identify potential issues of network, system, and user cyber threat activity.
  • Recommend appropriate countermeasures to deter and stop cyber threat.
  • Conduct cyber vulnerability analysis and response.
  • Enact and execute downward directed Defensive Cyber Operations actions.
  • Execute Information Condition (INFOCON) or Cyber Protection Condition (CPCON) Maintain up to date IP space tracking with subordinate boundaries.
  • Ensure access to the NOC and the CWOC-DCO watch.
  • Identify and update lists of point of contact for all system/IP inquiries from the CWOC for the entireN&NC IP space.
  • Provide expertise on technical and mission impact assessments and liaise with the CWOC and JCC for all Cybersecurity related incidents.
  • Conduct technical course of action analysis for cyber threat response based on vulnerabilities, architecture, and defense in depth strategies in place.
  • Determine which action analysis are appropriate.
  • Develop solutions and determines process improvements by providing root cause analysis for vulnerability exploitation and attack realization.
  • Report any security vulnerability produced as a result of the implementation of defensive cyber efforts to the CWOC.
  • Provide and compile daily reports to track new and ongoing issues, status of implementation of solutions, results of various analysis, activities, observations, and determine upcoming actions
  • Monitor systems and directives and ensures compliance.
  • Develop appropriate tactics, techniques, and procedures (TTPs) for response to cyber threats, cybersecurity, and access-related incidents, downward directed tasks, and insider threat triggers.

Minimum Qualifications

  • B.S. Degree and 2+ years relevant experience or a M.S. Degree with less than 2 years of experience. Additional years of applicable experience will be accepted in lieu of degree.
  • Ability to obtain certification in Certified Ethical Hacker (CEH) or Cybersecurity Analyst (CySA+) within 4 months of start date.
  • Must possess a current DoD 8570 IAM III security certification (CISSP, CISM); OR must have the ability to obtain one within 6 months of start date.
  • Must be a U.S. Citizen.
  • Must have or be capable of obtaining a U.S. Department of Defense (DoD) Top Secret/SCI security clearance.

Preferred Qualifications

  • Experience recommending additional security requirements and safeguards.
  • Experience supporting the formal Cybersecurity/IA testing required by government accrediting authorities and preparing System Security Plans.
  • Familiarity with NORAD/USNORTHCOM systems.
  • Experience in development of end user operating manuals and documentation.
  • Experience in training of end users in Operating System and SW application installation and operation.
  • Familiarity with Virtualization, particularly VMware/Vsphere.
To Apply for this Position

You must have the Minimum Qualifications in your resume to be selected as a candidate.

Employees may be eligible for a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. In addition, E&M Technologies, Inc. provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays, and paid time off (PTO) for vacation and/or personal business. More benefit details here.

The health and safety of our employees and their families is a top priority. With the continuing impacts of COVID-19 around the world, we are taking action to protect the health and well-being of our colleagues and maintain the safety of the communities where we operate. As a federal contractor, and consistent with Executive Order 14042 (https://www.saferfederalworkforce.gov/contractors/) we will require all newly hired employees in the United States to be fully vaccinated by January 18, 2022, or by your start date if it is after January 18th. Federal guidance allows for disability/medical and religious accommodations with respect to the vaccine requirement. Any requested accommodations must be reviewed and approved (if applicable) in advance of your start date.

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. U.S. Citizenship is required for most positions.

Job Features

Job Category

Cybersecurity

Req. ID

EM08-001

Citizenship

United States Citizen

Clearance Type

Secret

Travel Required

None

Shift

1st Shift

Apply Online

A valid email address is required.
A valid phone number is required.