Information Technology Engineering LLC
Cyber Security Analyst
Information Technology Engineering LLC, Colorado Springs, Colorado, United States, 80509
Information Technology Engineering LLC provided pay range
This range is provided by Information Technology Engineering LLC. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.
Base pay range $100,000.00/yr - $130,000.00/yr
Disclaimer:
No third-party agencies will be considered. Please do not solicit our team.
Due to the nature of the position supporting a federal or government contract, candidates must be U.S. citizens and eligible to work on a W2 basis.
Active Secret Clearance is required.
Resumes without a clearly labeled clearance will not be considered
Cyber Threat Emulation Analyst (Mid-Level)
Clearance:
Active Secret Clearance Required
Key Responsibilities
Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties in accordance with the Evaluator Scoring Metrics (ESM).
Conduct manual and automated penetration testing in an enterprise environment.
Execute both proactive and reactive cybersecurity operations to enhance the customer’s security posture.
Analyze correlated threat, vulnerability, and asset data to assess adversary tactics and improve defenses.
Support the development, review, and continuous improvement of DCO procedures and documentation.
Measure and report on defense-in-depth architecture effectiveness against known vulnerabilities.
Generate vulnerability assessment reports and elevate findings for remediation.
Lead incident investigations from detection through closure, including analysis and reporting.
Provide mentorship and training for junior, mid, and senior analysts, contributing to the Exploitation Analyst training program.
Receive and execute Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders.
Conduct Cyber Threat Emulation (CTE) activities using Automated Security Validation toolsets.
Simulate adversary tactics, techniques, and procedures (TTPs) to assess toolset detection and network alerting.
Build custom dashboards and post-engagement reports summarizing vulnerabilities, remediation recommendations, and security posture findings.
Draft and submit Cyber Tasking Orders (CTOs) to address vulnerabilities identified in CTE engagements.
Collaborate with Cyberspace Domain Awareness (CDA) to align methodologies with HHQ inspection standards and best practices.
Basic Qualifications Candidates
must clearly show month and year dates
for all experience and employment history on their resumes.
6+ years
of full-time, professional work experience.
4+ years combined experience
performing: manual or automated penetration testing in an enterprise environment, vulnerability assessment, cybersecurity frameworks, or risk assessment activities, full lifecycle incident response and enterprise-level monitoring.
Full lifecycle
incident response
and
enterprise-level monitoring .
1+ year
of management or leadership experience in a team environment.
Certifications
Current
DoD 8570.01-M IAT Level II certification
with Continuing Education (CySA+, GICSP, GSEC, Security+ CE, or SSCP).
Must hold or obtain
PenTest+ certification within 6 months of start date .
Seniority level Mid-High level
Employment type Full-time
Job function Information Technology
Industries Defense and Space Manufacturing; Computer and Network Security
Referrals increase your chances of interviewing at Information Technology Engineering LLC by 2x
#J-18808-Ljbffr
Base pay range $100,000.00/yr - $130,000.00/yr
Disclaimer:
No third-party agencies will be considered. Please do not solicit our team.
Due to the nature of the position supporting a federal or government contract, candidates must be U.S. citizens and eligible to work on a W2 basis.
Active Secret Clearance is required.
Resumes without a clearly labeled clearance will not be considered
Cyber Threat Emulation Analyst (Mid-Level)
Clearance:
Active Secret Clearance Required
Key Responsibilities
Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties in accordance with the Evaluator Scoring Metrics (ESM).
Conduct manual and automated penetration testing in an enterprise environment.
Execute both proactive and reactive cybersecurity operations to enhance the customer’s security posture.
Analyze correlated threat, vulnerability, and asset data to assess adversary tactics and improve defenses.
Support the development, review, and continuous improvement of DCO procedures and documentation.
Measure and report on defense-in-depth architecture effectiveness against known vulnerabilities.
Generate vulnerability assessment reports and elevate findings for remediation.
Lead incident investigations from detection through closure, including analysis and reporting.
Provide mentorship and training for junior, mid, and senior analysts, contributing to the Exploitation Analyst training program.
Receive and execute Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders.
Conduct Cyber Threat Emulation (CTE) activities using Automated Security Validation toolsets.
Simulate adversary tactics, techniques, and procedures (TTPs) to assess toolset detection and network alerting.
Build custom dashboards and post-engagement reports summarizing vulnerabilities, remediation recommendations, and security posture findings.
Draft and submit Cyber Tasking Orders (CTOs) to address vulnerabilities identified in CTE engagements.
Collaborate with Cyberspace Domain Awareness (CDA) to align methodologies with HHQ inspection standards and best practices.
Basic Qualifications Candidates
must clearly show month and year dates
for all experience and employment history on their resumes.
6+ years
of full-time, professional work experience.
4+ years combined experience
performing: manual or automated penetration testing in an enterprise environment, vulnerability assessment, cybersecurity frameworks, or risk assessment activities, full lifecycle incident response and enterprise-level monitoring.
Full lifecycle
incident response
and
enterprise-level monitoring .
1+ year
of management or leadership experience in a team environment.
Certifications
Current
DoD 8570.01-M IAT Level II certification
with Continuing Education (CySA+, GICSP, GSEC, Security+ CE, or SSCP).
Must hold or obtain
PenTest+ certification within 6 months of start date .
Seniority level Mid-High level
Employment type Full-time
Job function Information Technology
Industries Defense and Space Manufacturing; Computer and Network Security
Referrals increase your chances of interviewing at Information Technology Engineering LLC by 2x
#J-18808-Ljbffr