Cyber Engineer

Mount Indie, LLC

Today
Secret
Unspecified
Unspecified
IT - Security
Colorado Springs, CO (On-Site/Office)

General Summary

Responsible for the design, test, operation, and implementation of secure operating systems, networks, and database products.

Principal Duties and Responsibilities (*Essential functions)

•Designs, develops, tests, and implements cyber and cryptographic applications, secure operating systems, and database products to find secure solutions for enterprise-wide cyber systems and networks.

•Manages the full range of security issues including architectures, firewalls, electronic data traffic, and network access.

•Performs research and analysis at the deepest levels of total system product to include concept, design, fabrication, test, installation, operation, maintenance, and disposal.

•Designs encryption, penetration testing, and vulnerability analysis solutions of various security technologies.*

•Integrates architectural features into existing infrastructures and designs cyber security architectural artifacts. *

•Provides full assessments of system's security posture.

•Performs security testing to verify cyber security integrity of the system. Designs and recommends mitigations.

•Conducts architectural analysis and relates existing system to future needs and trends.*

•Embeds advanced forensic tools and techniques for attack reconstruction.

•Develops security policies and procedures to be applied across multiple system architectures.

•Provides technical expertise, guidance, and supervision to more junior team members.

•May interface with external agencies (law enforcement, intelligence/government agencies, etc.).

Required Experience

•Bachelor's degree in computer science, information technology, cyber security, engineering, or related field or equivalent work experience

•Minimum of 10 or more years of experience in information security, cyber security, or a related field

•US Citizenship required; ability to obtain/maintain SECRET security clearance

•In-depth understanding of cyber security policy and tools, threat mitigation, network topologies, intrusion detection, cryptography/PKI, zero-trust architectures, data traffic, and secured networks

•Ability to develop and integrate cryptographic tools into new and existing virtualized and physical architectures

•Ability to clearly present and communicate technical approaches and findings
group id: 91082210

Match Score

Powered by IntelliSearchâ„¢
Create an account or Login to see how closely you match to this job!

Similar Jobs


Job Category
IT - Security
Clearance Level
Secret