Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
IT Security Engineer jobs in Castle Rock, CO | MyTurn.Careers image - Rise Careers
Job details

IT Security Engineer jobs in Castle Rock, CO | MyTurn.Careers

Imagine One Technology & Management is currently seeking an Information Security Analyst "contingent" on award of the associated work to the Imagine One Team. This position supports the U.S. Navy in Lexington Park, Maryland. The Information Security Analyst will plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. They may ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. They may also respond to computer security breaches and viruses.Experience Requirements:Qualifying candidates must possess ONE of the following required qualifications:Minimum of five (5) years of experience carrying out duties similar to the functions aboveNAVEDTRA 43350 (Malware)NAVEDTRA 43469 Watchstation 303 - Information Assurance Technician Level IIINAVEDTRA 43301-5B LCS Total Shipboard Computing Environment (TSCE)NAVEDTRA 43469 Watchstation 304 - Information Assurance ManagerJQR Incident Handling QC Analyst (306)JQR Incident Handling Trends Analyst (305)JQR Information Assurance Vulnerabilities Management (VAAP - Vulnerability Analysis and Assistance Program)Experience in the following areas:Enterprise Mission Assurance Support Service (eMASS)Vulnerability Remediation Asset Manager (VRAM)Navy Risk Management Framework (RMF) SOPsMicrosoft Defender for Endpoint (MDE)Continuous Monitoring and Risk Scoring (CMRS)Experience with performing STIG implementationExperience performing vulnerability assessments with the Assured Compliance Assessment Solution (ACAS) toolExperience remediating vulnerability findings to include implementing vendor patchesExperience reviewing RMF documentation such as system categorization, Security Plan, Implementation Plan, Security Assessment Plan, System Level Continuous Monitoring (SLCM) Plan, System POA&MEducational Requirements: Qualifying candidates must possess ONE of the following required educational qualifications:Bachelor's degreeCNSSI 4012-Senior Systems Managers/4013-System Administrators/4014-Information Systems Security Officers (ISSO) /4015-Systems Certifiers/4016-Risk AnalystsNDU CIO certificate-Chief Information Officer (CIO)Computer Hacking Forensic Investigator (CHFI)GIAC Reverse Engineering Malware (GREM)CISMGIAC Certified Incident Handler (GCIH)EC-Council Certified Incident Handler (ECIH)GIAC Certified Forensics Analyst (GCFA)CEHCISSPGSECLicensed Penetration Tester (LPT) *RetiredCASP+GSLCCSSLPNEC 741A Information System Security ManagerNEC 742A Network Security Vulnerability TechnicianNEC H10A Basic Cyber Analyst/OperatorNETW 4001 Security PlusSSC 6209-Network Operations and TechnologyHunt Methodologies Course (HMC)Intermediate Cyber Core (ICC)CYBR2100 Certified Ethical HackerCYBR2150CYBR3420 Intermediate Cyber CoreSecurity Requirements: Candidates must have U.S. CitizenshipCandidates must have an ACTIVE DoD Secret Clearance (or higher)Imagine One offers a full package of benefits and competitive salary, excellent group medical, vision and dental programs. 401K savings plan; $4K annual tuition reimbursement ($5K if pursuing Master's degree); employee training, development and education programs; profit sharing; advancement opportunities; and much more!Imagine One is an Employee-Owned BusinessISO 9001:2015, ISO 20000-1:2018, ISO 27001:2013CMMI Development Level 3Imagine One Technology & Management, Ltd., is an Equal Opportunity/Affirmative Action Employer. Protected veterans and individuals with disabilities encouraged to apply• Imagine One "Contingent" offers for employment may stipulate that one or more requirements be satisfied before final commitment between candidate and Imagine One is established; namely, award of contract to the Imagine One Team. Contingent requirements vary and may also include, but not be limited to additional factors (i.e., the position still being available after negotiations with the Government; final approval of your qualifications by the Government; or ability to successfully acquire and/or transfer a DoD security clearance). Imagine One Technology and Management Ltd
Spectrum Glassdoor Company Review
3.3 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
Spectrum DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Spectrum
Spectrum CEO photo
Chris Winfrey
Approve of CEO

Average salary estimate

Estimate provided by employer
$150000 / ANNUAL (est.)
min
max
$150K
$150K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About IT Security Engineer jobs in Castle Rock, CO | MyTurn.Careers, Spectrum

Join the team at Imagine One Technology & Management as an IT Security Engineer and be an integral part of supporting the U.S. Navy in ensuring robust cybersecurity measures. This position will be based in Lexington Park, Maryland, with its responsibilities hinging on securing vital computer networks and sensitive information. As an IT Security Engineer, you will focus on planning, implementing, and upgrading security protocols to safeguard digital assets against cyber threats. You’ll also be at the forefront of mitigating and responding to security breaches and vulnerabilities. To thrive in this role, candidates should bring at least five years of relevant experience, showcasing a solid grasp of Risk Management Frameworks and vulnerability assessment tools. Not only do we value your expertise, but we also encourage further professional development and education, with benefits such as tuition reimbursement available. Imagine One Technology & Management is committed to diversity and inclusion, welcoming applications from all qualified individuals. If you have the drive to protect and innovate within the IT landscape, this position could be your next career step. Join us in shaping a secure future while exploring exciting growth opportunities within our employee-owned culture!

Frequently Asked Questions (FAQs) for IT Security Engineer jobs in Castle Rock, CO | MyTurn.Careers Role at Spectrum
What are the key responsibilities of an IT Security Engineer at Imagine One Technology & Management?

As an IT Security Engineer at Imagine One Technology & Management, your key responsibilities will encompass planning and implementing security measures for computer networks. You will monitor security protocols, respond to security breaches, and make sure appropriate controls are in place to safeguard sensitive information. Furthermore, you will work with tools like the Assured Compliance Assessment Solution (ACAS) to perform vulnerability assessments and implement necessary patches.

Join Rise to see the full answer
What qualifications are needed for the IT Security Engineer position at Imagine One Technology & Management?

To qualify for the IT Security Engineer position at Imagine One Technology & Management, candidates must have a minimum of five years of relevant experience in information security. Additionally, educational qualifications can include a Bachelor's degree or several specific certifications such as CISSP, GIAC, or equivalents that demonstrate expertise in cybersecurity practices.

Join Rise to see the full answer
Does Imagine One Technology & Management require a security clearance for its IT Security Engineer position?

Yes, Imagine One Technology & Management requires candidates for the IT Security Engineer position to have an active DoD Secret Clearance or higher. This is crucial to ensure that team members can handle sensitive government information safely and securely.

Join Rise to see the full answer
What benefits does Imagine One Technology & Management offer to IT Security Engineers?

Imagine One Technology & Management offers a comprehensive benefits package for its IT Security Engineers, including competitive salaries, group medical, vision, and dental coverage. Additionally, there’s a 401K savings plan, annual tuition reimbursement, and numerous professional development opportunities to continue growing in your cyber career.

Join Rise to see the full answer
How can I prepare for the IT Security Engineer role at Imagine One Technology & Management?

To prepare for the IT Security Engineer role at Imagine One Technology & Management, it's advisable to review fundamental cybersecurity principles, be well-versed in various assessment tools like eMASS and ACAS, and refresh your skills in vulnerability remediation. Additionally, obtaining relevant certifications and familiarizing yourself with the Navy Risk Management Framework SOPs will bolster your candidacy.

Join Rise to see the full answer
Common Interview Questions for IT Security Engineer jobs in Castle Rock, CO | MyTurn.Careers
Can you explain your experience with vulnerability assessments as an IT Security Engineer?

When answering this question, detail your hands-on experience with specific vulnerability assessment tools. Discuss your processes for identifying vulnerabilities, how you prioritized remediation efforts, and any quantitative success metrics you achieved. Use examples from past roles to illustrate your depth of knowledge.

Join Rise to see the full answer
How do you stay current with cybersecurity threats and security trends?

A solid response would include mentioning reputable sources like cybersecurity journals, webinars, and industry conferences. Whoever answers should also stress the importance of continual learning and sharing knowledge with colleagues, perhaps through organized training sessions or knowledge sharing within teams.

Join Rise to see the full answer
Describe a time you managed a security breach incident. What steps did you take?

This question invites storytelling. Structure the response following the STAR method (Situation, Task, Action, Result) to detail the incident, your role, the actions you took to mitigate the breach, and what the outcome was. Highlight how you communicated with stakeholders throughout the process.

Join Rise to see the full answer
What security frameworks are you familiar with and how have you applied them in your work?

Mention specific frameworks such as NIST, ISO 27001, and any military-specific frameworks you have worked with, like RMF. It’s beneficial to provide examples of how you aligned organizational processes to these frameworks and any measurable impacts these practices had on security posture.

Join Rise to see the full answer
How would you handle resistance to implementing a new security policy?

Discuss strategies such as engaging stakeholders to understand their concerns, conducting risk assessments to illustrate the importance of the policy, and providing training sessions. Stress the quality communication you’d maintain to ensure buy-in from all team members.

Join Rise to see the full answer
What is your approach to integrating new security technologies?

This question is best answered by discussing your assessment process for new technologies, including criteria you consider vital like usability, scalability, and cost-effectiveness. Give specific examples of past integrations and how they enhanced security measures.

Join Rise to see the full answer
Can you explain how you would conduct a risk assessment?

Provide a detailed overview of your methodology, which may include identifying assets, threat modeling, vulnerability analysis, and impact evaluation. Conclude by discussing how you would report findings and recommend mitigations based on the assessment.

Join Rise to see the full answer
Describe your experience with incident response planning.

Discuss the creation of an incident response plan, key components like roles and responsibilities, communication strategies, and regular testing drills. Illustrate your role in preparing and updating the plan, ensuring it aligns with best practices.

Join Rise to see the full answer
What tools do you typically use for continuous monitoring?

List the tools you’re proficient with, such as Microsoft Defender for Endpoint, ACAS, or any SIEM products. Provide context by describing how you’ve used these tools to enhance security monitoring and alerting for anomalies.

Join Rise to see the full answer
What strategies do you use for effective communication with non-technical teams regarding security topics?

Discuss tailoring your messaging to different audiences, simplifying technical jargon, and emphasizing the business impact of security decisions. Mention any training or awareness programs you've developed and their impact on organizational culture toward security.

Join Rise to see the full answer

Charter Communications, Inc. (NASDAQ:CHTR) is a leading broadband connectivity company and cable operator serving more than 31 million customers in 41 states through its Spectrum brand. Over an advanced communications network, the company offers a...

197 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 9, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!