Skip to content
  Thursday 22 May 2025
Trending
April 3, 2024Major Security Vulnerability Discovered in Widely-Used LayerSlider WordPress Plugin August 2, 2024IT Cybersecurity Specialist (Direct-Hire Authority) February 2, 2024Get Complete Dominance of Your Digital Data for Just $40 with Offcloud January 6, 2025Watch out! Cybercriminals targeting Ethereum devs with fake npm packages! January 5, 20228 Best Free Torrent Clients for Windows 10/11 in 2022 February 8, 2024Decoding the Latest Evasion Methods: Researchers Unveil New Findings March 27, 2024NTIA Advocates for Independent Audits of AI Systems April 5, 2025Systems Engineer – Network & Cybersecurity March 19, 2024CISA Releases One Industrial Control Systems Advisory January 14, 2025In today’s digital age, social media has become an integral part of our daily lives. With the rise of platforms like Facebook, Instagram, and Twitter, we are constantly connected to our friends, family, and the world around us. However, while social media can be a powerful tool for communication and connection, it also has its drawbacks.<br /> <br /> One of the biggest issues with social media is the impact it can have on our mental health. Studies have shown that spending excessive time on social media can lead to feelings of loneliness, depression, and anxiety. The constant comparison to others and the pressure to portray a perfect life online can take a toll on our mental well-being.<br /> <br /> Furthermore, social media can also be a breeding ground for misinformation and fake news. With the spread of fake news on platforms like Facebook and Twitter, it has become increasingly difficult to discern fact from fiction. This can lead to a misinformed public and a lack of trust in traditional sources of news.<br /> <br /> Another concern with social media is the potential for cyberbullying and online harassment. With the anonymity that social media provides, people feel emboldened to make hurtful and harmful comments towards others. This can have serious consequences for the mental health and well-being of the victims.<br /> <br /> Despite these drawbacks, social media can also have positive impacts on our lives. It can be a valuable tool for staying connected with loved ones, sharing important information, and building communities. It’s important to strike a balance between using social media for its benefits while also being mindful of its potential negative effects on our mental health and well-being.
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Careers  Cybersecurity Engineer
Careers

Cybersecurity Engineer

SecuredyouadmSecuredyouadm—April 4, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Minimum Clearance Required: Top Secret Responsibilities:I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, the Department of Defense and often focused on the space initiatives of our government customers.I2X Technologies is seeking a CYBERSECURITY ENGINEER to support ongoing activities for a customer in COLORADO SPRINGS. This position will be on-site and will require an active TOP SECRET clearance.

  • Process and track user account forms and required training for privileged and non-privileged accounts, perform annual validation of accounts, and work with system administrator on creation, modification, and removal of accounts
  • Perform assessment of systems and networks within a virtual environment and identify where those systems deviate from acceptable configurations, enclave policy, or local policy
  • This is achieved through passive evaluations such as compliance audits using STIG Viewer, SCAP, etc and active evaluations such as vulnerability assessments utilizing ACAS.
  • Perform Security Technical Implementation Guide (STIG) assessments and hardening for both Windows, Red Hat Enterprise Linux (RHEL) systems, and networking equipment utilizing ConfigOS
  • Develop test plans reflecting how STIG checks are implemented and be able to show expected outcomes of those checks
  • Update Risk Management Framework (RMF) artifact documentation to ensure system hardening non-compliant is tracked and remediated.
  • Establish strict program control processes to ensure mitigation of risks and supports obtaining assessment and authorization of systems
  • Includes support of process, analysis, coordination, control certification test, compliance documentation, as well as investigations, software research, hardware introduction and release, emerging technology research, inspections, and periodic audits.
  • Assist in the implementation of the required government policy, making recommendations on process tailoring, participating in and documenting process activities.
  • Perform analyses to validate established cybersecurity controls and requirements and to recommend cybersecurity safeguards.
  • Support program test milestones through pre-test preparations, participating in the tests, analysis of the results, and preparation of required artifacts supporting authorization.
  • Prepare artifacts such as Test Results (TR), Authorization Boundary Diagrams (ABD), Network Topologies, Flow-diagrams, Hardware and Software listings, Ports, Protocols, and Services Management documentation, supporting Assessment and Authorization activities and maintain the Plan of Actions and Milestones (POA&M).
  • Periodically conduct a complete review of each program support and operational system’s audits and monitor corrective actions until all actions are closed.
  • Coordinate across the program to address identified deficiencies during RMF assessment activities.

Qualifications:

  • Advanced degree and 3+ years experience or bachelors with 5+ years experience or equivalent
  • Active Top Secret clearance
  • IAT – Level II certification
  • Security engineering skills with a working knowledge of cybersecurity technology and DoD/Federal cybersecurity policy (i.e., DoDI 8500.01, NIST SP 800-53, etc.).
  • Understanding and utilization of Enterprise Mission Assurance Support Service (eMASS)
  • Understanding of Risk Management Framework (RMF) Cybersecurity Lifecycle to include: identifying controls and overlays, generating testable requirements, identifying resilient architecture design, configuring, running, and scripting audit tools, providing analysis of vulnerability analyses, conducting verification testing for compliance assessment.
  • Knowledge of Software Assurance (SwA) static and dynamic code analysis (e.g. Fortify/SonarQube)
  • Windows and Red Hat Enterprise Linux (RHEL) system administration skills
  • Previous background working in a virtual environment.
  • Previous background working with dockers and containers
  • Administer ACAS and ESS (formally HBSS)
  • Previous experience with ConfigOS

Essential Requirements:US Citizenship is required.I2X Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected Veteran status, or disability status.In compliance with Colorado’s Equal Pay for Equal Work Act, the annual base salary range for this position is listed . Please note that the salary information is a general guideline only. I2X Technologies considers factors such as (but not limited to) scope and responsibilities of the position, candidate’s work experience, education/training, key skills, internal peer equity, as well as, market and business considerations when extending an offer.Physical Demands:The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation.While performing the duties of this job, the employee will regularly sit, walk, stand and climb stairs and steps. May require walking long distance from parking to work station. Occasionally, movement that requires twisting at the neck and/or trunk more than the average person, squatting/ stooping/kneeling, reaching above the head, and forward motion will be required. The employee will continuously be required to repeat the same hand, arm, or finger motion many times. Manual and finger dexterity are essential to this position. Specific vision abilities required by this job include close, distance, depth perception and telling differences among colors. The employee must be able to communicate through speech with clients and public. Hearing requirements include conversation in both quiet and noisy environments. Lifting may require floor to waist, waist to shoulder, or shoulder to overhead movement of up to 20 pounds. This position demands tolerance for various levels of mental stress.I2X Technologies is an Engineering and Information Technology Company focused on providing Services to the Federal and State Government. I2X offers a competitive compensation program and comprehensive benefits package to our employees.
Read More

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

Sr Enterprise Architect, Cybersecurity
Senior Cybersecurity Engineer
Related posts
  • Related posts
  • More from author
Careers

Cybersecurity Engineer (Top Secret Clearance Required)

May 22, 20250
Careers

Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

May 22, 20250
Careers

Cybersecurity Architect

May 22, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

Chinese Hackers Breach U.S. Government Networks using Trimble Cityworks Vulnerability

May 22, 20250
Industry News

Unpatched Versa Concerto Vulnerabilities Allow Hackers to Break Free from Docker and Hijack Host

May 22, 20250
Threat Advisories

New Best Practices Guide for Securing AI Data Released

May 22, 20250
Careers

Cybersecurity Engineer (Top Secret Clearance Required)

May 22, 20250
Careers

Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

May 22, 20250
Careers

Cybersecurity Architect

May 22, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Chinese Hackers Breach U.S. Government Networks using Trimble Cityworks Vulnerability
  • Unpatched Versa Concerto Vulnerabilities Allow Hackers to Break Free from Docker and Hijack Host
  • New Best Practices Guide for Securing AI Data Released
  • Cybersecurity Engineer (Top Secret Clearance Required)
  • Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures