Defensive Cyber Trainer at ISYS Technologies
Colorado Springs, CO 80921, USA -
Full Time


Start Date

Immediate

Expiry Date

03 Dec, 25

Salary

135400.0

Posted On

03 Sep, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Penetration Testing, Ilt, Ccnp Security, Guides, Hands On Training, Cisa, Ethical Hacking, Vulnerability, Instructor Led Training, Incident Response, Cissp, Security+, Critical Infrastructure, Training, Job Aids, Cyber Operations

Industry

Information Technology/IT

Description

Minimum Clearance Required: Top Secret SCI Responsibilities:
I2X Technologies is a reputable technology services company to the Federal Government. Whether the focus is on space exploration, national security, cyber security, or cutting-edge engineering applications, I2X is ready to offer you the chance to make a real-world impact in your field and for your country. We provide long-term growth and development. Headquartered in Colorado, I2X is engaged in programs across the country and in more than 20 states. Our programs support multiple Federal agencies, the Department of Defense and often focused on the space initiatives of our government customers.

I2X Technologies is seeking a Defensive Cyber Trainer to support ongoing activities for a customer in Colorado Springs, CO. This position will be on-site and will require an active *TS/SCI.

  • The Cyber Defense Trainer will serve as the Cybersecurity Curriculum Developer/Instructor and will design and develop training objectives, guides, job aids, course outlines and other course material utilizing instructional design models.
  • Provide support in the development of a Weapons and Tactics program in the areas of mission planning methodology, threat mitigation, tool kit employment evaluations, training objectives, and tactics development.
  • Provide in-depth instruction on current cyber Tactics, Techniques, and Procedures (TTPs), including offensive and defensive strategies, incident response protocols, and best practices in cyber operations.
  • Organize and conduct simulated cyber events to immerse students in real-world cyber scenarios, fostering practical skills and decision-making abilities.
  • Develop and facilitate scenario-based exercises that challenge students to apply their cyber skills in real-world scenarios, enhancing their problem-solving abilities.
  • Develop recommendations for crew structure for all cyberspace units, to include defining roles and responsibilities for each position, experience requirements, and crew progression.
  • Instruct students on identifying, analyzing, and mitigating cyber threats, including strategies for protecting networks, data, and critical infrastructure.
  • Offer training in offensive cyber operations, including penetration testing, ethical hacking, and vulnerability assessment techniques.
  • Prepare students for effective incident response by providing hands-on training in detecting, analyzing, and mitigating cyber incidents

Qualifications:

  • Minimum Bachelors Degree required
  • Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
  • Active TS/SCI security clearance required
  • IAT II Certification (such as Security+ or higher such as CASP+ CE, CCNP Security, CISA, CISSP, GCED, GCIH)
  • 3+ years of experience with instructor-led training (ILT), training and development, web-based training and training content and delivery.

Preferred:
US Air Force Weapons School graduate

ESSENTIAL REQUIREMENTS:

US Citizenship is required.
In compliance with Colorado’s Equal Pay for Equal Work Act, the annual base salary range for this position is listed . Please note that the salary information is a general guideline only. I2X Technologies considers factors such as (but not limited to) scope and responsibilities of the position, candidate’s work experience, education/training, key skills, internal peer equity, as well as, market and business considerations when extending an offer.

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities

Please refer the Job description for details

Loading...