Keenbee Talent Soluitions
Colorado Springs, Colorado
Cyber Planner Location: Colorado Springs, CO Clearance Level: TS/SCI Position Type: Full-Time Overview We are seeking an experienced and highly skilled Cyber Operations Planner to support critical defense operations in the Colorado Springs, CO area. This position plays a key role in developing, assessing, and implementing cyberspace strategies, plans, and mission assurance activities to ensure the success of high-priority national security missions. The ideal candidate will bring deep technical expertise, mission-focused analytical skills, and hands-on experience supporting Department of Defense (DoD) or U.S. Space Force (USSF) cyber operations. Key Responsibilities The Cyber Operations Planner will: Analyze and overlay U.S. Space Force (USSF) mission and asset cyber terrain to identify risks and dependencies Coordinate with designated government entities to establish site access and ensure successful mission execution Develop cyberspace plans, strategies, and policies that align with organizational cyber objectives and mission initiatives Create detailed execution plans for multiple USSF locations, outlining SMEs, analysis timelines, and data collection objectives Assess cyberspace dependencies, vulnerabilities, and risks to mission systems and develop mitigation or defense measures Support Mission Assurance and Functional Mission Analysis Cyber (FMA-C) efforts for mission-critical systems Conduct in-depth analysis of cyber network activities, control systems, and operational processes to ensure mission continuity Provide mission analysis data to inform cyber defenders, mission owners, and program offices of potential security impacts Required Skills & Knowledge Strong understanding of the difference between critical and non-critical systems, network defense, and operational risk prioritization Experience performing system and network assessments to identify deviations from acceptable configurations or security policies Ability to measure the effectiveness of defense-in-depth architectures against known vulnerabilities Knowledge of Mission Assurance disciplines, including risk management, mission mapping, vulnerability assessments, and defensive cyber capabilities Proficiency with mission analysis techniques, FMA-C methodologies, and mission dependency analysis Experience supporting military or defense planning tasks and cyber strategy development Familiarity with tools such as the Mission Assurance Database Support System (MADSS) or other similar repositories Excellent verbal and written communication, time management, and interpersonal skills Minimum Qualifications 4+ years of experience performing mission analysis, information security, or supporting military/USSF cyber operations Active TS/SCI clearance CISSP or Security+ certification, and one of the following: GICSP, GCED, PenTest+, or GSEC certification OR a B.S. degree in Information Technology, Cybersecurity, Information Systems, Data Science, or Computer Science from an accredited or designated institution Preferred Qualifications Experience with Functional Mission Analysis Cyber (FMA-C) Familiarity with U.S. Space Force capabilities and mission systems Bachelors degree or higher from an accredited college or university Additional Information This position requires a proactive, analytical mindset and the ability to collaborate effectively with diverse teams in a classified environment. The Cyber Operations Planner will contribute directly to strengthening cyber defense postures and supporting mission assurance for space and defense operations.
12/27/2025
Cyber Planner Location: Colorado Springs, CO Clearance Level: TS/SCI Position Type: Full-Time Overview We are seeking an experienced and highly skilled Cyber Operations Planner to support critical defense operations in the Colorado Springs, CO area. This position plays a key role in developing, assessing, and implementing cyberspace strategies, plans, and mission assurance activities to ensure the success of high-priority national security missions. The ideal candidate will bring deep technical expertise, mission-focused analytical skills, and hands-on experience supporting Department of Defense (DoD) or U.S. Space Force (USSF) cyber operations. Key Responsibilities The Cyber Operations Planner will: Analyze and overlay U.S. Space Force (USSF) mission and asset cyber terrain to identify risks and dependencies Coordinate with designated government entities to establish site access and ensure successful mission execution Develop cyberspace plans, strategies, and policies that align with organizational cyber objectives and mission initiatives Create detailed execution plans for multiple USSF locations, outlining SMEs, analysis timelines, and data collection objectives Assess cyberspace dependencies, vulnerabilities, and risks to mission systems and develop mitigation or defense measures Support Mission Assurance and Functional Mission Analysis Cyber (FMA-C) efforts for mission-critical systems Conduct in-depth analysis of cyber network activities, control systems, and operational processes to ensure mission continuity Provide mission analysis data to inform cyber defenders, mission owners, and program offices of potential security impacts Required Skills & Knowledge Strong understanding of the difference between critical and non-critical systems, network defense, and operational risk prioritization Experience performing system and network assessments to identify deviations from acceptable configurations or security policies Ability to measure the effectiveness of defense-in-depth architectures against known vulnerabilities Knowledge of Mission Assurance disciplines, including risk management, mission mapping, vulnerability assessments, and defensive cyber capabilities Proficiency with mission analysis techniques, FMA-C methodologies, and mission dependency analysis Experience supporting military or defense planning tasks and cyber strategy development Familiarity with tools such as the Mission Assurance Database Support System (MADSS) or other similar repositories Excellent verbal and written communication, time management, and interpersonal skills Minimum Qualifications 4+ years of experience performing mission analysis, information security, or supporting military/USSF cyber operations Active TS/SCI clearance CISSP or Security+ certification, and one of the following: GICSP, GCED, PenTest+, or GSEC certification OR a B.S. degree in Information Technology, Cybersecurity, Information Systems, Data Science, or Computer Science from an accredited or designated institution Preferred Qualifications Experience with Functional Mission Analysis Cyber (FMA-C) Familiarity with U.S. Space Force capabilities and mission systems Bachelors degree or higher from an accredited college or university Additional Information This position requires a proactive, analytical mindset and the ability to collaborate effectively with diverse teams in a classified environment. The Cyber Operations Planner will contribute directly to strengthening cyber defense postures and supporting mission assurance for space and defense operations.
TS/SCI Clearance required The Senior All-Source Analyst will serve as a subject matter expert supporting global health infrastructure discovery, analysis, and reporting. Responsibilities include identifying no-strike health infrastructure, producing finished intelligence products, and creating or updating facility records within the Modernized Integrated Database (MIDB). Products may be published across multiple classified and unclassified platforms. The ideal candidate has extensive experience working with DIA tradecraft standards, MIDB tools, geospatial applications, and all-source methodologies to evaluate health facilities, operational status, and related intelligence of value. Responsibilities Essential Duties Prepare comprehensive all-source intelligence assessments and finished intelligence products that meet or exceed DIA/NCMI analytic and tradecraft standards. Communicate complex analytic findings clearly, both verbally and in written form, to senior leaders and mission stakeholders. Conduct open-source and classified research to identify military and civilian health systems, public health facilities, and medical infrastructure across priority countries. Collect and evaluate information from diverse sources such as academic research, professional journals, foreign ministries, media outlets, classified data repositories, and interagency collaboration. Create, update, populate, and maintain MIDB facility records associated with global health infrastructure. Perform both classified and unclassified research, data acquisition, quality control, and geospatial visualization supporting intelligence products and facility records. Use tools such as MIDB, NPW, RemoteView , ArcGIS, and other IC systems, as well as commercial applications including Google Earth, SketchUp, and geospatial PDF formats. Produce geospatially layered intelligence products depicting medical infrastructure within priority regions, tailored to classification levels on JWICS, SIPR, and NIPR. Conduct all-source assessments to identify no-strike health infrastructure and evaluate state or non-state actor use of medical facilities, ensuring intelligence value is accurately captured in MIDB records. Qualifications Required Skills & Knowledge Senior-level ability to analyze and integrate data from all available sources, including assessing foreign research, development, and acquisition of technologies relating to medical, biological, or human performance systems. Strong understanding of intelligence tradecraft, all-source analytic methodologies, and structured analytic techniques. Proficien
12/27/2025
TS/SCI Clearance required The Senior All-Source Analyst will serve as a subject matter expert supporting global health infrastructure discovery, analysis, and reporting. Responsibilities include identifying no-strike health infrastructure, producing finished intelligence products, and creating or updating facility records within the Modernized Integrated Database (MIDB). Products may be published across multiple classified and unclassified platforms. The ideal candidate has extensive experience working with DIA tradecraft standards, MIDB tools, geospatial applications, and all-source methodologies to evaluate health facilities, operational status, and related intelligence of value. Responsibilities Essential Duties Prepare comprehensive all-source intelligence assessments and finished intelligence products that meet or exceed DIA/NCMI analytic and tradecraft standards. Communicate complex analytic findings clearly, both verbally and in written form, to senior leaders and mission stakeholders. Conduct open-source and classified research to identify military and civilian health systems, public health facilities, and medical infrastructure across priority countries. Collect and evaluate information from diverse sources such as academic research, professional journals, foreign ministries, media outlets, classified data repositories, and interagency collaboration. Create, update, populate, and maintain MIDB facility records associated with global health infrastructure. Perform both classified and unclassified research, data acquisition, quality control, and geospatial visualization supporting intelligence products and facility records. Use tools such as MIDB, NPW, RemoteView , ArcGIS, and other IC systems, as well as commercial applications including Google Earth, SketchUp, and geospatial PDF formats. Produce geospatially layered intelligence products depicting medical infrastructure within priority regions, tailored to classification levels on JWICS, SIPR, and NIPR. Conduct all-source assessments to identify no-strike health infrastructure and evaluate state or non-state actor use of medical facilities, ensuring intelligence value is accurately captured in MIDB records. Qualifications Required Skills & Knowledge Senior-level ability to analyze and integrate data from all available sources, including assessing foreign research, development, and acquisition of technologies relating to medical, biological, or human performance systems. Strong understanding of intelligence tradecraft, all-source analytic methodologies, and structured analytic techniques. Proficien
Keenbee Talent Soluitions
Colorado Springs, Colorado
A leading federal contractor is seeking a highly skilled Mission Relevant Terrain Cyber (MRT-C) Analyst to support cyberspace mission assurance activities for high-priority U.S. Space Force (USSF) operations. This role plays a critical part in identifying mission dependencies, assessing cyber vulnerabilities, and enabling defensive cyber actions that directly support national security missions. The ideal candidate brings deep experience in mission analysis, cybersecurity, and space mission systems, with the ability to translate technical findings into actionable insights for mission owners, cyber operators, and program offices. Responsibilities Essential Duties Conduct MRT-C analysis on mission systems and coordinate follow-on defensive cyber actions supporting top-priority USSF missions and assets. Perform mission analysis to identify cyber dependencies, vulnerabilities, and develop mission-focused defense strategies. Analyze cyberspace activities affecting command, control, operational processes, and dependent space mission systems to ensure mission success. Identify , evaluate, and implement mitigation strategies for risks within cyberspace terrain critical to mission accomplishment. Develop mission thread data supporting mission owners, cybersecurity personnel, defensive cyber operators, and program teams in assessing acceptable mission risk caused by cybersecurity deficiencies. Produce and deliver Operational Risk Assessments (ORA) and Asset Defense Plans (ADP) (link removed)> Evaluate MRT-C results against system vulnerabilities and threat activity to identify Key Terrain Cyber (KT-C) for each USSF mission. Support MRT-C teams in analyzing mission systems to determine cyber dependencies, security risks, mission vulnerabilities, and protective measures. Accurately enter and maintain mission data within the Mission Assurance Decision Support System (MADSS) (link removed)> Qualifications Required Skills & Knowledge Strong understanding of critical vs. non-critical systems and networks, including how organizations defend, respond, and prioritize security actions. Experience conducting assessments to identify deviations from acceptable configurations, enclave policies, or security baselines.
12/27/2025
A leading federal contractor is seeking a highly skilled Mission Relevant Terrain Cyber (MRT-C) Analyst to support cyberspace mission assurance activities for high-priority U.S. Space Force (USSF) operations. This role plays a critical part in identifying mission dependencies, assessing cyber vulnerabilities, and enabling defensive cyber actions that directly support national security missions. The ideal candidate brings deep experience in mission analysis, cybersecurity, and space mission systems, with the ability to translate technical findings into actionable insights for mission owners, cyber operators, and program offices. Responsibilities Essential Duties Conduct MRT-C analysis on mission systems and coordinate follow-on defensive cyber actions supporting top-priority USSF missions and assets. Perform mission analysis to identify cyber dependencies, vulnerabilities, and develop mission-focused defense strategies. Analyze cyberspace activities affecting command, control, operational processes, and dependent space mission systems to ensure mission success. Identify , evaluate, and implement mitigation strategies for risks within cyberspace terrain critical to mission accomplishment. Develop mission thread data supporting mission owners, cybersecurity personnel, defensive cyber operators, and program teams in assessing acceptable mission risk caused by cybersecurity deficiencies. Produce and deliver Operational Risk Assessments (ORA) and Asset Defense Plans (ADP) (link removed)> Evaluate MRT-C results against system vulnerabilities and threat activity to identify Key Terrain Cyber (KT-C) for each USSF mission. Support MRT-C teams in analyzing mission systems to determine cyber dependencies, security risks, mission vulnerabilities, and protective measures. Accurately enter and maintain mission data within the Mission Assurance Decision Support System (MADSS) (link removed)> Qualifications Required Skills & Knowledge Strong understanding of critical vs. non-critical systems and networks, including how organizations defend, respond, and prioritize security actions. Experience conducting assessments to identify deviations from acceptable configurations, enclave policies, or security baselines.
Position Summary The IT Security Engineer is responsible for ensuring the availability, security, confidentiality, and integrity of the organizations Information Technology assets. This role oversees daily IT security operations, performs threat and risk assessments, and provides critical recommendations for threat-response strategies. The engineer serves as the primary advisor on information security matters, proactively enhancing and configuring the security infrastructure to mitigate evolving threats. This position also upholds World-Class Guest Service standards for all guests and stakeholders. Guest Service Commitment All team members are expected to demonstrate full commitment to delivering and maintaining World-Class Guest Service standards established by the organization. Essential Functions and Responsibilities This list is illustrative only and does not encompass all duties performed in this role. Tasks may vary based on operational needs. Maintains IT security and technical knowledge by participating in classes or educational workshops. Proactively monitors the organizations network, critical systems, and databases for intrusions using SIEM/SOAR, EDR, and other security tools. Collects and analyzes data to assist in reducing risk and resolving performance issues. Researches and recommends new technologies to enhance security operations. Conducts risk assessments and evaluates business impacts of new systems and technologies. Designs, develops, and enhances security tools and system architectures. Defines security requirements for computer systems and recommends implementation solutions. Performs vulnerability management and collaborates with the Infrastructure team to remediate findings and audit patch compliance. Conducts phishing-simulation campaigns. Leads cybersecurity awareness training initiatives, including developing content, materials, and delivering training sessions. Leads IT security projects using industry-standard project management methodologies to strengthen the organizations security posture. Pe
12/27/2025
Position Summary The IT Security Engineer is responsible for ensuring the availability, security, confidentiality, and integrity of the organizations Information Technology assets. This role oversees daily IT security operations, performs threat and risk assessments, and provides critical recommendations for threat-response strategies. The engineer serves as the primary advisor on information security matters, proactively enhancing and configuring the security infrastructure to mitigate evolving threats. This position also upholds World-Class Guest Service standards for all guests and stakeholders. Guest Service Commitment All team members are expected to demonstrate full commitment to delivering and maintaining World-Class Guest Service standards established by the organization. Essential Functions and Responsibilities This list is illustrative only and does not encompass all duties performed in this role. Tasks may vary based on operational needs. Maintains IT security and technical knowledge by participating in classes or educational workshops. Proactively monitors the organizations network, critical systems, and databases for intrusions using SIEM/SOAR, EDR, and other security tools. Collects and analyzes data to assist in reducing risk and resolving performance issues. Researches and recommends new technologies to enhance security operations. Conducts risk assessments and evaluates business impacts of new systems and technologies. Designs, develops, and enhances security tools and system architectures. Defines security requirements for computer systems and recommends implementation solutions. Performs vulnerability management and collaborates with the Infrastructure team to remediate findings and audit patch compliance. Conducts phishing-simulation campaigns. Leads cybersecurity awareness training initiatives, including developing content, materials, and delivering training sessions. Leads IT security projects using industry-standard project management methodologies to strengthen the organizations security posture. Pe
Position Summary Responsible for ensuring the availability, safety, confidentiality, and integrity of the organizations Information Technology assets. This role oversees the development, recommendation, and implementation of information security policies and procedures. The position manages day-to-day IT security operations, conducts threat and risk analyses, and provides essential recommendations for threat response. Serves as a primary advisor on all information security matters. All team members are expected to demonstrate full commitment to delivering and maintaining World-Class Guest Service standards established by the organization. Essential Functions and Responsibilities Provides guidance, direction, and oversight while participating in cybersecurity systems planning and application security strategy. Oversees the development, implementation, and evaluation of the organizations information security program. Proactively monitors the network, critical systems, and databases for intrusions and security anomalies. Collects and analyzes security data to support risk reduction and performance optimization. Advises on Risk Management Framework assessments and security-related findings. Researches and recommends new security technologies to enhance organizational capabilities. Designs and develops security features within system architectures. Conducts vulnerability testing, identifies weaknesses, and implements remediation strategies. Defines security requirements for computer systems and recommends implementation solutions. Collaborates with Network and Systems Administrators to identify vulnerabilities, validate patch requirements, and ensure compliance. Installs, configures, and manages security systems including antivirus, anti-malware, firewalls, and IDS/IPS tools. Develops and maintains Business Continuity and Disaster Recovery plans related to cybersecurity threats. Designs cybersecurity training materials and conducts training sessions for team members. Performs other duties as assigned. Knowledge, Skills, and Abilities Knowledge of IT security concepts, principles, and practices; computer/server operations; and user environments. Thorough understanding of relevant regulatory frameworks, including NIGC MICS and POIGRA, along with departmental and organizational policies. In-depth understanding of vulnerability management and common security applications. Strong technical, analytical, and problem-solving skills. Strong organizational and time-management abilities with careful attention to detail. High level of customer service, professionalism, and interpersonal communication skills. Ability to apply analytical and problem-solving skills while working independently, managing projects, installing and configuring systems, monitoring performance, and guiding team members. Ability to manage multiple tasks accurately in high-pressure environments with minimal supervision. Ability to learn and work within multiple system programs. Ability to develop clear, comprehensive reports and maintain organized documentation. Education and Experience Bachelors degree in Computer Science, MIS, IT, or a related field preferred. Certification in at least one of the following (or equivalent) within a designated timeframe after hire: SSCP, CISSP, CISM, or similar security credential. Four (4) years of hands-on experience with network and infrastructure systems. Four (4) years of IT security experience.
12/27/2025
Position Summary Responsible for ensuring the availability, safety, confidentiality, and integrity of the organizations Information Technology assets. This role oversees the development, recommendation, and implementation of information security policies and procedures. The position manages day-to-day IT security operations, conducts threat and risk analyses, and provides essential recommendations for threat response. Serves as a primary advisor on all information security matters. All team members are expected to demonstrate full commitment to delivering and maintaining World-Class Guest Service standards established by the organization. Essential Functions and Responsibilities Provides guidance, direction, and oversight while participating in cybersecurity systems planning and application security strategy. Oversees the development, implementation, and evaluation of the organizations information security program. Proactively monitors the network, critical systems, and databases for intrusions and security anomalies. Collects and analyzes security data to support risk reduction and performance optimization. Advises on Risk Management Framework assessments and security-related findings. Researches and recommends new security technologies to enhance organizational capabilities. Designs and develops security features within system architectures. Conducts vulnerability testing, identifies weaknesses, and implements remediation strategies. Defines security requirements for computer systems and recommends implementation solutions. Collaborates with Network and Systems Administrators to identify vulnerabilities, validate patch requirements, and ensure compliance. Installs, configures, and manages security systems including antivirus, anti-malware, firewalls, and IDS/IPS tools. Develops and maintains Business Continuity and Disaster Recovery plans related to cybersecurity threats. Designs cybersecurity training materials and conducts training sessions for team members. Performs other duties as assigned. Knowledge, Skills, and Abilities Knowledge of IT security concepts, principles, and practices; computer/server operations; and user environments. Thorough understanding of relevant regulatory frameworks, including NIGC MICS and POIGRA, along with departmental and organizational policies. In-depth understanding of vulnerability management and common security applications. Strong technical, analytical, and problem-solving skills. Strong organizational and time-management abilities with careful attention to detail. High level of customer service, professionalism, and interpersonal communication skills. Ability to apply analytical and problem-solving skills while working independently, managing projects, installing and configuring systems, monitoring performance, and guiding team members. Ability to manage multiple tasks accurately in high-pressure environments with minimal supervision. Ability to learn and work within multiple system programs. Ability to develop clear, comprehensive reports and maintain organized documentation. Education and Experience Bachelors degree in Computer Science, MIS, IT, or a related field preferred. Certification in at least one of the following (or equivalent) within a designated timeframe after hire: SSCP, CISSP, CISM, or similar security credential. Four (4) years of hands-on experience with network and infrastructure systems. Four (4) years of IT security experience.
Job Summary An established federal contractor is seeking an Information Technology Specialist to join a team of skilled professionals supporting Department of Defense (DoD) operations. In this role, you will work under the guidance of senior technicians to perform IT maintenance, troubleshoot and repair computer systems and peripheral equipment, and manage service requests through a ticketing system. You will install and configure PCs, servers, uninterruptible power supplies (UPS), printers, scanners, telephony equipment, and audiovisual systems, including video teleconferencing operations. The role also includes ensuring connectivity, security compliance, and adherence to manufacturer specifications. Responsibilities include monitoring, securing, and patching network devices, maintaining hardware and software accountability, and coordinating equipment setup, moves, and disposal in accordance with security regulations. The position may require limited travel. Additional duties include troubleshooting access card issues, assisting in user training, and supporting general IT operations as needed. Key Responsibilities The Information Technology Specialist will: Support PCs, hardware, wireless networking, and softwareinstallation, testing, configuration, and operations Maintain workstations, network access, and system documentation Perform Video Teleconference (VTC) system administration, scheduling, and configuration Provide network and client support, including account creation, modification, and deletion Deliver multi-tier Help Desk support, troubleshooting hardware and software issues Perform hardware/software system upgrades, modifications, and configurations Configure and support desktops and laptops Analyze and troubleshoot system anomalies Prepare systems for operational use and support testing activities Manage IT workflows and service tickets efficiently Required Skills & Experience Active Top Secret clearance with SCI eligibility (TS/SCI) Minimum 9 months of experience working in a SAP or SCI environment within the past five years 3+ years of relevant DoD IT experience Experience supporting an IT Help Desk and providing direct customer support Strong communication and interpersonal skills, with the ability to work effectively in a dynamic environment Education & Certifications Required: Bachelors degree in Arts or Science (or equivalent work experience) CompTIA Network+ or equivalent certification (DoDM 8140.03 Tech Support Specialist Level I) Preferred: Security+ or equivalent certification (DoDM 8140.03 compliance) must obtain within six months of hire Benefits Medical, dental, vision, disability, and life insurance Flexible Spending Accounts 401(k) plan Paid Time Off (PTO) Paid Parental Leave Tuition reimbursement Paid federal holidays
12/27/2025
Job Summary An established federal contractor is seeking an Information Technology Specialist to join a team of skilled professionals supporting Department of Defense (DoD) operations. In this role, you will work under the guidance of senior technicians to perform IT maintenance, troubleshoot and repair computer systems and peripheral equipment, and manage service requests through a ticketing system. You will install and configure PCs, servers, uninterruptible power supplies (UPS), printers, scanners, telephony equipment, and audiovisual systems, including video teleconferencing operations. The role also includes ensuring connectivity, security compliance, and adherence to manufacturer specifications. Responsibilities include monitoring, securing, and patching network devices, maintaining hardware and software accountability, and coordinating equipment setup, moves, and disposal in accordance with security regulations. The position may require limited travel. Additional duties include troubleshooting access card issues, assisting in user training, and supporting general IT operations as needed. Key Responsibilities The Information Technology Specialist will: Support PCs, hardware, wireless networking, and softwareinstallation, testing, configuration, and operations Maintain workstations, network access, and system documentation Perform Video Teleconference (VTC) system administration, scheduling, and configuration Provide network and client support, including account creation, modification, and deletion Deliver multi-tier Help Desk support, troubleshooting hardware and software issues Perform hardware/software system upgrades, modifications, and configurations Configure and support desktops and laptops Analyze and troubleshoot system anomalies Prepare systems for operational use and support testing activities Manage IT workflows and service tickets efficiently Required Skills & Experience Active Top Secret clearance with SCI eligibility (TS/SCI) Minimum 9 months of experience working in a SAP or SCI environment within the past five years 3+ years of relevant DoD IT experience Experience supporting an IT Help Desk and providing direct customer support Strong communication and interpersonal skills, with the ability to work effectively in a dynamic environment Education & Certifications Required: Bachelors degree in Arts or Science (or equivalent work experience) CompTIA Network+ or equivalent certification (DoDM 8140.03 Tech Support Specialist Level I) Preferred: Security+ or equivalent certification (DoDM 8140.03 compliance) must obtain within six months of hire Benefits Medical, dental, vision, disability, and life insurance Flexible Spending Accounts 401(k) plan Paid Time Off (PTO) Paid Parental Leave Tuition reimbursement Paid federal holidays
A leading organization is seeking an experienced Information Systems Security Manager to join its classified security team. This role is responsible for overseeing and managing the organizations information security program, including the development and implementation of security policies, standards, and procedures. The ISSM will support full lifecycle information system activities, including preparing accreditation and certification packages in accordance with applicable regulations and standards, monitoring and maintaining operational systems, supporting system upgrades and feature enhancements, and managing system decommissioning and de-certification processes. The ideal candidate will have demonstrated experience developing Risk Management Framework accreditation packages and ensuring information systems are operated and maintained in compliance with organizational and customer security requirements. The ISSM will also maintain Authorization to Operate certifications for networked systems and applications by developing required documentation such as system security plans, privacy plans, executive summaries, security and privacy control assessments, risk assessments, equipment specifications, and plans of action and milestones. This position offers competitive compensation and benefits, including medical and dental coverage, 401(k) profit sharing, life and long-term disability insurance, performance bonuses, and professional development opportunities. Basic Qualifications Active secret clearance with the ability to obtain a top-secret clearance 57 years of related information security experience Previous experience as an ISSO/ISSM DoD 8570.1 IAM Level II (or higher) certification Familiarity with 32 CFR Part 117, DAAPM, NIST RMF, DoDM 5205.07, and/or JSIG requirements Experience investigating security incidents, including data spills, data integrity issues, and malicious code incidents Experience with compliance and certification of multiple operating systems Proficiency with Windows, Windows Server, and Linux/Unix environments Preferred Education Bachelors degree or higher
12/27/2025
A leading organization is seeking an experienced Information Systems Security Manager to join its classified security team. This role is responsible for overseeing and managing the organizations information security program, including the development and implementation of security policies, standards, and procedures. The ISSM will support full lifecycle information system activities, including preparing accreditation and certification packages in accordance with applicable regulations and standards, monitoring and maintaining operational systems, supporting system upgrades and feature enhancements, and managing system decommissioning and de-certification processes. The ideal candidate will have demonstrated experience developing Risk Management Framework accreditation packages and ensuring information systems are operated and maintained in compliance with organizational and customer security requirements. The ISSM will also maintain Authorization to Operate certifications for networked systems and applications by developing required documentation such as system security plans, privacy plans, executive summaries, security and privacy control assessments, risk assessments, equipment specifications, and plans of action and milestones. This position offers competitive compensation and benefits, including medical and dental coverage, 401(k) profit sharing, life and long-term disability insurance, performance bonuses, and professional development opportunities. Basic Qualifications Active secret clearance with the ability to obtain a top-secret clearance 57 years of related information security experience Previous experience as an ISSO/ISSM DoD 8570.1 IAM Level II (or higher) certification Familiarity with 32 CFR Part 117, DAAPM, NIST RMF, DoDM 5205.07, and/or JSIG requirements Experience investigating security incidents, including data spills, data integrity issues, and malicious code incidents Experience with compliance and certification of multiple operating systems Proficiency with Windows, Windows Server, and Linux/Unix environments Preferred Education Bachelors degree or higher
As a key member of our cybersecurity team, you will be instrumental in guiding the application of IT security controls that ensure the confidentiality, integrity, and availability of system data and resources. Your solutions will align with existing system and network configurations, collaborating closely with configuration managers to maintain seamless security integration. In this position, you will lead critical functions related to the Risk Management Framework (RMF), overseeing the approval, sustainment, and disposition of Department of Defense (DoD) Information Systems. This includes continuous monitoring, vulnerability assessments, and coordination with Certified Defense Contractors to ensure compliance. You will also facilitate changes, maintenance approvals, and work alongside the Security Control Assessor (SCA) and Authorizing Official Designated Representative (AODR). Additionally, you will maintain organizational networks, manage accounts, audit systems, and conduct vulnerability scans. Your expertise will serve as a key resource, providing vital cybersecurity insights and guidance to civilian and military personnel, and senior leadership. You'll play an essential role in government inspections and audits, ensuring that all systems comply with the highest regulatory standards. Skills / Experience Required Top Secret with Sensitive Compartmented Information (TS/SCI) eligible May be required to consent to and successfully complete a Government Counterintelligence Scope Polygraph 10+ years of relevant experience within the Department of Defense 4+ years experience in SAP/SCI environment and worked in this environment within the last five years Ability to work in a dynamic environment with a diverse group of individuals focused on the accomplishment of a common objectives Provide recommendations to senior leadership to help ensure mission success Capable of conveying complex information in a simplistic manner Able to take proactive measures to prevent problems rather than reactive by nature Excellent written and oral interpersonal skills and attention to detail Strong critical thinking and problem-solving skills Education / Certifications Master of Arts/Master of Science/Master of Engineering in Computer Science, Cybersecurity, MIS, or related degree Relevant work experience/training certifications may be considered in lieu of a degree Minimum 1 year of experience using Risk Management Framework (RMF) IT security controls and policies Minimum DoD 8140/DoD 8570 IASAE Level II Certification Benefits Medical, dental, vision, disability, and life insurance Flexible Spending Accounts 401(k) PTO Paid Parental leave Tuition reimbursement Paid federal holidays Keenbee Talent Solutions is a Native Alaskan Women owned sdb specializing in the placement of highly skilled professionals in Accounting and Finance, IT/MIS and Biomedical. Keenbee has been in business since 1997 servicing New Mexico and the surrounding states with high results. Keenbee Talent Solutions is an equal opportunity employment agency. We do not discriminate based on race, color, national origin, religion, ancestry, sex, age, disability, serious medical condition, spousal affiliation, sexual orientation, gender identity, or other classifications protected under the law.
12/27/2025
As a key member of our cybersecurity team, you will be instrumental in guiding the application of IT security controls that ensure the confidentiality, integrity, and availability of system data and resources. Your solutions will align with existing system and network configurations, collaborating closely with configuration managers to maintain seamless security integration. In this position, you will lead critical functions related to the Risk Management Framework (RMF), overseeing the approval, sustainment, and disposition of Department of Defense (DoD) Information Systems. This includes continuous monitoring, vulnerability assessments, and coordination with Certified Defense Contractors to ensure compliance. You will also facilitate changes, maintenance approvals, and work alongside the Security Control Assessor (SCA) and Authorizing Official Designated Representative (AODR). Additionally, you will maintain organizational networks, manage accounts, audit systems, and conduct vulnerability scans. Your expertise will serve as a key resource, providing vital cybersecurity insights and guidance to civilian and military personnel, and senior leadership. You'll play an essential role in government inspections and audits, ensuring that all systems comply with the highest regulatory standards. Skills / Experience Required Top Secret with Sensitive Compartmented Information (TS/SCI) eligible May be required to consent to and successfully complete a Government Counterintelligence Scope Polygraph 10+ years of relevant experience within the Department of Defense 4+ years experience in SAP/SCI environment and worked in this environment within the last five years Ability to work in a dynamic environment with a diverse group of individuals focused on the accomplishment of a common objectives Provide recommendations to senior leadership to help ensure mission success Capable of conveying complex information in a simplistic manner Able to take proactive measures to prevent problems rather than reactive by nature Excellent written and oral interpersonal skills and attention to detail Strong critical thinking and problem-solving skills Education / Certifications Master of Arts/Master of Science/Master of Engineering in Computer Science, Cybersecurity, MIS, or related degree Relevant work experience/training certifications may be considered in lieu of a degree Minimum 1 year of experience using Risk Management Framework (RMF) IT security controls and policies Minimum DoD 8140/DoD 8570 IASAE Level II Certification Benefits Medical, dental, vision, disability, and life insurance Flexible Spending Accounts 401(k) PTO Paid Parental leave Tuition reimbursement Paid federal holidays Keenbee Talent Solutions is a Native Alaskan Women owned sdb specializing in the placement of highly skilled professionals in Accounting and Finance, IT/MIS and Biomedical. Keenbee has been in business since 1997 servicing New Mexico and the surrounding states with high results. Keenbee Talent Solutions is an equal opportunity employment agency. We do not discriminate based on race, color, national origin, religion, ancestry, sex, age, disability, serious medical condition, spousal affiliation, sexual orientation, gender identity, or other classifications protected under the law.