Post job

Cyber security analyst jobs in Colorado Springs, CO - 40 jobs

All
Cyber Security Analyst
Information Security Analyst
Information Systems Security Officer
Cyber Security Engineer
Securities Analyst
Senior Security Engineer
Cyber Security Specialist
Security Engineer
Senior Cyber Security Analyst
  • Cyber Security Analyst - Full time must include working one weekend day (Sunday)

    GD Information Technology

    Cyber security analyst job in Colorado Springs, CO

    Type of Requisition: Regular Clearance Level Must Currently Possess: Top Secret/SCI Clearance Level Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management Job Qualifications: Skills: Cybersecurity, Event Security, Security Audit, Splunk (Inactive) Certifications: None Experience: 8 + years of related experience US Citizenship Required: Yes Job Description: Cyber Security Analyst - Full time position, but must include working one weekend day (Sunday) Own your career as a Cyber Security Analyst at GDIT. Here, you'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients' missions and ensuring we anticipate the threats of tomorrow. At GDIT, people are our differentiator. As a Cyber Security Analyst you will help ensure today is safe and tomorrow is smarter. Our work depends on a Cyber Security Analyst joining our team of analysts, stationed in diverse CONUS and OCONUS locations tasked with monitoring and protecting the classified and unclassified systems of a major Intelligence Community Agency for fraud, waste, and abuse, to include inappropriate content, illegal activity, Identity leakage, and Insider threat activity. HOW A CYBER SECURITY ANALYST WILL MAKE AN IMPACT Gather and handle forensic evidence in accordance with Rules of Evidence and perform forensic analysis of digital information. Monitor, detect and report indicators of misuse, abuse, data spillage, insider threat, and security violations. Identify acceptable use policy infractions. Review event logs to determine events of interest. Monitor for fraud, waste and abuse, including content inappropriate to the workplace, Illegal Activity, Productivity Loss and Non-Compliant Activity, as well as Identity Leakage (PII). Prepare case evidence and incident reports. Work on special projects as assigned. WHAT YOU'LL NEED TO SUCCEED: Bachelor's Degree and 8+ years of relevant experience, equivalent combinations of education, certifications, and experience will be considered. DoD Approved Baseline 8570 IAT level III (CASP, CISSP, CISA, etc.) certification is required prior to start date. DoD Approved Baseline 8570 CSSP Auditor (CEH, CySA, CISA, etc.) certification is required prior to start date. Security Clearance Level: TS/SCI clearance and ability to obtain and maintain a Polygraph Preferred Skills: Splunk, Microsoft O365, Fidelis, Solera, Windows, and Linux Operating Systems Saturday and Sunday weekend Day Shift work required. Willing to work holidays supporting your assigned shift. Location: 100% On Customer Site Bolling AFB, Washington D.C. Reston, VA Colorado Springs, CO Riverdale, MD Pearl Harbor, HI Tampa is available for part time weekend only support GDIT IS YOUR PLACE: 401K with company match Comprehensive health and wellness packages Internal mobility team dedicated to helping you own your career Professional growth opportunities including paid education and certifications Cutting-edge technology you can learn from Rest and recharge with paid vacation and holidays The likely hourly rate for this position is between $61.30 - $82.94. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range. Scheduled Weekly Hours: 40 Travel Required: Less than 10% Telecommuting Options: Onsite Work Location: USA DC Washington Additional Work Locations: USA CO Colorado Springs, USA FL MacDill AFB, USA HI Pearl Harbor, USA MD Riverdale, USA VA Reston Total Rewards at GDIT: Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.Join our Talent Community to stay up to date on our career opportunities and events at gdit.com/tc. Equal Opportunity Employer / Individuals with Disabilities / Protected Veterans
    $61.3-82.9 hourly Auto-Apply 54d ago
  • Job icon imageJob icon image 2

    Looking for a job?

    Let Zippia find it for you.

  • Cyber Security SME (IA)

    KBR 4.7company rating

    Cyber security analyst job in Colorado Springs, CO

    Title: Cyber Security SME (IA) KBR's National Security Solutions team provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security communities. In this position, your work will have a profound impact on the country's most critical role - protecting our national security. Why Join Us? Innovative Projects: KBR's work is at the forefront of engineering, logistics, operations, science, program management, mission IT and cybersecurity solutions. Collaborative Environment: Be part of a dynamic team that thrives on collaboration and innovation, fostering a supportive and intellectually stimulating workplace. Impactful Work: Your contributions will be pivotal in designing and optimizing defense systems that ensure national security and shape the future of space defense. KBR is seeking a Cyber Security SME (IA) to join our team in Colorado Springs, CO. Active TS/SCI clearance required. The Cyber Security SME (IA) IT Security Analyst provides Information Assurance/Cybersecurity subject matter expertise for WSOMS. Dedicated to the Wideband C-SSE in Colorado Springs, CO. Ensures WSOMS compliance with AFI 17-130 and DoDD 8500.01E. Includes NIPRNet, SIPRNet, VI/VTC, WSOMS control and subsystems; and WSOMS external connections-networks and equipment. ROLES AND RESPONSIBILITIES: Leads and performs cybersecurity operations support services spanning hardware, software, sensors, and network perimeters-including incident response, compliance reporting, vulnerability assessment, logging, RMF support, and CSSP coordination. Provides cyber critic assessment and management, safeguarding networks and systems against unauthorized infiltration, modification, destruction, or disclosure. Performs system administration and cybersecurity functions, ensuring SIPR and other networks comply with USAF/USSF cybersecurity requirements and directives. Develops, tests, and operates firewalls, intrusion detection systems, enterprise anti-virus platforms, and software deployment tools to maintain mission assurance. Conducts vulnerability assessments and management activities, including periodic and on-demand scans, analyzing trends, reporting results, and recommending remediation actions. Leads preparation and maintenance of RMF artifacts and ATO documentation; implements, monitors, and reports on security controls, directives, POA&Ms, and cyber posture in authoritative systems of record. Evaluates and tests security patches, new or replacement hardware/software, and configuration changes to ensure compatibility with security baselines. Implements, enforces, and manages security policies, procedures, and configuration management processes for data, applications, hardware, and telecommunications systems. Provides cyber lifecycle support to all tasks, from acquisition through sustainment, ensuring adherence to DoD and USAF/USSF cybersecurity frameworks and standards. Researches, evaluates, tests, and recommends new security tools, techniques, and technologies to improve defensive capabilities and operational efficiency. Responds to cybersecurity incidents, performing analysis, containment, eradication, and recovery actions, and develops countermeasures to limit impact. Supports security incident response team requirements, including inspections, audits, policy reviews, and strategic recommendations to enhance the organization's security posture. Participates in cybersecurity working groups, provides documentation support, and assists in the creation and maintenance of mission-critical site documentation. Provides recommendations for IA and risk mitigation improvements, accommodating evolving cybersecurity threats and emerging technologies. Maintains Communications Security (COMSEC) material and ensures proper handling in accordance with applicable policies. Supports legacy system migration, AFI 17-130 implementations, and ongoing logistics modernization initiatives. Mentors junior cybersecurity personnel, contributes to process improvement, and provides technical expertise across multiple projects and mission areas. BASIC QUALIFICATIONS: Education and Experience: BA/BS degree with 8+ years of relevant experience (or equivalent combination of education and experience). One or more of the following certifications: CISSP, SecurityX (CASP+), Security+, GSEC, or equivalent DoD 8570/8140 baseline certification; ABET-accredited or CAE-designated degree acceptable in lieu. Citizenship and Clearance: US Citizen. Active Top Secret security clearance with ability to obtain TS/SCI is required. Technical Knowledge: Proficient in virtualization platforms, including VMware and Hyper-V. Familiar with the Enterprise Mission Assurance Support Service (eMASS) and RMF workflow management. Experienced with virtualization protocols, system hardening, and baseline management. Working knowledge of cybersecurity toolsets, including vulnerability scanners, SIEMs, and endpoint defense solutions. PREFERRED QUALIFICATIONS: Experience supporting NIPRNet, SIPRNet, VI/VTC, control system environments. Understanding of database and system administration is a plus. Experience with maintaining Communications Security (COMSEC) and COMSEC material IAW DAFMAN 17-1302-O, COMSEC Operations. Working knowledge in satellite communications environment highly desired. Exhibits exceptional degree of ingenuity, creativity, and resourcefulness for problem solving and customer service, excellent written and verbal communications skills. SCHEDULED WEEKLY HOURS: Work Schedule: 0730 - 1630 (Monday - Friday, 40 hours per week). TRAVEL: May require CONUS and OCONUS travel (approximately 10%). This position is contingent upon contract award. Basic Compensation: $142,700 - $178,300 This range is for the CO area only. Ready to Make a Difference? If you're excited about making a significant impact in the field of space defense and working on projects that matter, we encourage you to apply and join our team at KBR. Let's shape the future together KBR Benefits KBR offers a selection of competitive lifestyle benefits which could include 401K plan with company match, medical, dental, vision, life insurance, AD&D, flexible spending account, disability, paid time off, or flexible work schedule. We support career advancement through professional training and development. Belong, Connect and Grow at KBR At KBR, we are passionate about our people and our Zero Harm culture. These inform all that we do and are at the heart of our commitment to, and ongoing journey toward being a People First company. That commitment is central to our team of team's philosophy and fosters an environment where everyone can Belong, Connect and Grow. We Deliver - Together. KBR is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, disability, sex, sexual orientation, gender identity or expression, age, national origin, veteran status, genetic information, union status and/or beliefs, or any other characteristic protected by federal, state, or local law.
    $142.7k-178.3k yearly Auto-Apply 28d ago
  • Secret Mid-Level Cyber Threat Emulation Analyst

    Insight Global

    Cyber security analyst job in Colorado Springs, CO

    A client of Insight Global's is looking for a Secret Mid-Level Cyber Threat Emulation Analyst, to join their team! This position will play a key role in supporting the Missile Defense Agency (MDA). Job Responsibilities: - Perform proactive and reactive cybersecurity duties on customer networks to strengthen enterprise-wide security posture. - Analyze assets, threats, and vulnerabilities to identify weaknesses and enhance network defenses; measure effectiveness of defense-in-depth architecture. - Develop, review, and update Defensive Cyber Operations (DCO) procedures, processes, manuals, and related documentation. - Generate vulnerability assessment reports, escalate findings, and support enterprise-wide incident response in compliance with DoD regulations; lead cyber events and investigations from start to finish. - Execute Cyber Threat Emulation (CTE) actions using automated validation tools; create dashboards and reports detailing vulnerabilities, remediation steps, and security posture assessments. - Draft and submit Cyber Tasking Orders (CTOs) to address issues identified during CTE engagements; implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders as directed. - Mentor and train analysts at all levels; collaborate with Cyberspace Domain Awareness (CDA) to develop evaluation criteria and methodologies aligned with HHQ and industry best practices. This position is onsite full-time in Colorado Springs, CO or Huntsville, Alabama. This is a six month contract to hire opportunity and the salary range for this role is between $120,000 - $132,000/yr depending on years and level of experience, education, and certifications. This role requires an Active Secret Clearance or higher. Typical benefits offered include flexible work schedules, educational reimbursement, retirement benefits (401K match), employee stock purchase plan, health benefits, tax saving options, disability benefits, life and accident insurance, voluntary benefits, paid time off and paid holidays, and parental leave. We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: **************************************************** Skills and Requirements - DoD Secret Security Clearance (Top Secret Preferred) - DoD 8570.01-M IAT Level II certification with Continuing Education (CE) - (CySA+, GICSP, GSEC, Security+ CE, SSCP) - 6+ years of general work experience - 4 years of experience directly related to: Performing manual or automated penetration test in an enterprise environment Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments Experience performing the full life cycle of incident response and enterprise-level monitoring - 1+ years of management or leadership experience in a team environment - Currently hold, or obtain within 6 months of start date, a PenTest+ certification - Bachelor's degree, or higher, in Cybersecurity, Computer Science or related field - Experience working with Cyber Threat Emulation tools, policies, and procedures - Experience operating custom software on top of a Linux platform - Experience with security analysis and solutions in a WAN/LAN environment to include Routers, Switches, Network Devices, and Operating Systems (e.g., Windows, and Linux) - Experience with other Security Operations Centers (SOC)/DCO tools/applications, such as Firewalls, Intrusion Detection Systems / Intrusion Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc. - Experience performing security compliance scans across a WAN (ACAS/Nessus preferred) - Background in configuration, troubleshooting, and deployment of host-based security (ESS preferred) - Experience mentoring and training personnel in an evolving, high-paced environment - Familiarity with DoD Security Operations Centers (SOC) (aka CSSP) and DCO/Cybersecurity Service Provider (CSSP)-guiding security policies and procedures
    $120k-132k yearly 60d+ ago
  • Industrial Security Analyst - Level 3 or 4

    Northrop Grumman 4.7company rating

    Cyber security analyst job in Colorado Springs, CO

    RELOCATION ASSISTANCE: No relocation assistance available CLEARANCE TYPE: Top SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. If forging a secure future excites you, look no further! Northrop Grumman's Space Sector provides an arena where your passion for innovation and quest for exploration are welcome. As an Industrial Security Analyst - Level 3 or Level 4 your role at Colorado Springs, CO will be pivotal in supporting missions critical to national and global security. This position is 100% onsite and cannot accommodate telecommute work. Ready to join forces with our visionary team? In this job, you will: Manage destruction, security education and awareness, compliance, create, maintain and leverage working relationships with internal and external customers Develop and administer security programs and procedures for classified or proprietary materials, documents, and equipment Utilize experience in program security, with knowledge of implementing a multi-disciplined security program (access control, personnel security, physical security, OPSEC etc.) Study and implement federal security regulations that apply to company operations Obtain rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies Prepare manuals outlining regulations, and establish procedures for handling, storing, and keeping records, and for granting personnel and visitors' access to restricted records and materials Conduct security education classes and related briefings Investigate security violations and prepare reports specifying preventive action to be taken Apply knowledge of ICD 705 and NISPOM Other duties as assigned This position can be filled at either a Level 3 or Level 4. Basic Qualifications for Level 3: Bachelor's degree with 5 years of professional experience - OR - Master's degree with 3 years of professional experience - OR - PhD with 1 year of professional experience Will consider an additional 4+ years of experience in lieu of degree Experience working with classified industrial security programs Experience with NISPOM and ICD 705 Requires an active Top-Secret/Sensitive Compartmented Information (SCI) clearance at time of application with ability to obtain poly Basic Qualifications for Level 4: Bachelor's degree with 8 years of professional experience - OR - Master's degree with 6 years of professional experience - OR - PhD with 4 years of professional experience Will consider an additional 4+ years of experience in lieu of degree Experience working with classified industrial security programs Experience with NISPOM and ICD 705 Requires an active Top-Secret/Sensitive Compartmented Information (SCI) clearance at time of application with ability to obtain poly Preferred Qualifications: Experience with DISS, SIMS, and Lenel FSO Certification, ISP Certification and/or other security certifications Curious about all the exciting developments with the Northrop Grumman Space Sector? Click the link below: ************************************* Primary Level Salary Range: $85,600.00 - $128,400.00Secondary Level Salary Range: $103,200.00 - $154,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
    $103.2k-154.8k yearly Auto-Apply 22d ago
  • Cyber Threat Analyst, Senior

    Booz Allen Hamilton Inc. 4.9company rating

    Cyber security analyst job in Colorado Springs, CO

    Key Role: Be responsible for analyzing and assessing foreign cyber operations, threat environments, and technical requirements. Characterize current foreign cyber capabilities and project future cyber systems and all-domain cyber systems to highlight the threat to the National Security Space Enterprise. Apply knowledge of cyber threats, networks, and technology when using Intelligence Community (IC) tools and databases to identify, extract, and analyze pertinent information, and provide technical analysis to support protection initiatives. Integrate cyber into the targeting, planning, and overall military strategy. Develop cyber order of battle, target information and products, intelligence, and target selection standards. Perform red tech scouting and track emerging threats, vulnerabilities, and trends by monitoring various internal and external sources, including Publicly Available Information or Commercially Available Information, formal intelligence reports, social media, proprietary threat feeds, network traffic logs, and alerts. Characterize blue modes and methods of battlefield communications vulnerable to adversary cyber-attacks. Identify cyber tactics used to mitigate C5ISR architectures. Engage IC partners to develop integrated analysis plans, solicit further insights, and collaborate on additional research. Identify information gaps and threat information needs to task IC entities via standard IC tasking processes and requests for information tools to influence and prioritize the IC Tasking, Collection, Processing, Exploitation, and Dissemination process. Author and coordinate threat assessment products on foreign cyber capabilities combining intelligence information and Department of Defense (DoD) technical and operations analysis in collaboration with IC and DoD partners. Analyze beyond incident response to hardening of the environment of future space architecture, involving performing periodic risk analysis and penetration tests to identify exploitable weaknesses of space assets. Search proactively for undetected and evolving threats through analysis, and be responsible for fixing vulnerabilities and reporting proper security measures as recommendations. Basic Qualifications: * 5+ years of experience with cyber warfare analysis and production in the DoD or IC * Experience researching and analyzing Malicious Cyber Actors (MCAs) * Knowledge of the components of cyber warfare, including penetration testing, supply chain analysis, defensive cyber operations, and information warfare * Knowledge of IC reporting, sources, dissemination mechanisms, and tradecrafts * Knowledge of both U.S. service and national security space systems and architectures * Ability to work in a dynamic environment, focused on networking with IC partners * Top Secret clearance * Bachelor's degree in Cybersecurity, CS, or IT * CompTIA Security+ Certification Additional Qualifications: * Experience providing intelligence support to research and development efforts * Experience working in special access programs and special access required environments * Knowledge of adversarial frameworks, including MITRE ATT&CK for mapping tactics, techniques, and procedures (TTPs), Cyber Kill Chain Methodology, and Diamond Model of Intrusion Analysis * Knowledge of current USSPACECOM, USCYBERCOM, and component intelligence operations * TS/SCI clearance * Certified Ethical Hacker (CEH), Certified Penetration Testing Professional (CPENT), Certified Threat Intelligence Analyst (CTIA), CompTIA CYSA+, EC-Council Certified Threat Intelligence Analyst (CTIA), or GIAC Cyber Threat Intelligence (GCTI) Certification Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required. Compensation At Booz Allen, we celebrate your contributions, provide you with opportunities and choices, and support your total well-being. Our offerings include health, life, disability, financial, and retirement benefits, as well as paid leave, professional development, tuition assistance, work-life programs, and dependent care. Our recognition awards program acknowledges employees for exceptional performance and superior demonstration of our values. Full-time and part-time employees working at least 20 hours a week on a regular basis are eligible to participate in Booz Allen's benefit programs. Individuals that do not meet the threshold are only eligible for select offerings, not inclusive of health benefits. We encourage you to learn more about our total benefits by visiting the Resource page on our Careers site and reviewing Our Employee Benefits page. Salary at Booz Allen is determined by various factors, including but not limited to location, the individual's particular combination of education, knowledge, skills, competencies, and experience, as well as contract-specific affordability and organizational requirements. The projected compensation range for this position is $77,600.00 to $176,000.00 (annualized USD). The estimate displayed represents the typical salary range for this position and is just one component of Booz Allen's total compensation package for employees. This posting will close within 90 days from the Posting Date. Identity Statement As part of the application process, you are expected to be on camera during interviews and assessments. We reserve the right to take your picture to verify your identity and prevent fraud. Work Model Our people-first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely. * If this position is listed as remote or hybrid, you'll periodically work from a Booz Allen or client site facility. * If this position is listed as onsite, you'll work with colleagues and clients in person, as needed for the specific role. Commitment to Non-Discrimination All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, local, or international law.
    $77.6k-176k yearly Auto-Apply 10d ago
  • Cyber Threat Emulation Analyst

    Launchtech

    Cyber security analyst job in Colorado Springs, CO

    Job Description or Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10% LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics. What You'll Do As a Mid-Level Cyber Threat Emulation Analyst, you will: Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM) Perform cybersecurity duties on customer networks to improve enterprise-wide security posture Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation Measure defense-in-depth effectiveness against known vulnerabilities Generate vulnerability assessment reports and escalate findings for review Support enterprise Incident Response in accordance with DoD regulations and instructions Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs) Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices What You Bring Basic Requirements: Must have 6, or more, years of general (full-time) work experience Must have 4 years of combined experience with: Performing manual or automated penetration tests in an enterprise environment Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments Experience performing the full life cycle of incident response and enterprise-level monitoring Must have 1 year of experience in management or leadership in a team environment Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP) Must have, or obtain within 6 months of start date, a PenTest+ certification Must have an active DoD Secret Security Clearance Desired Requirements: Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field Have experience with Cyber Threat Emulation tools, policies, and procedures Have experience operating custom software on a Linux platform Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux) Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc. Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred) Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred) Be able to mentor and train personnel in a high-paced environment Be familiar with DoD Security Operations Centers (SOC/CSSP) Be familiar with DCO/CSSP-guiding security policies and procedures Have an active DoD Top Secret clearance Why LaunchTech? At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence. We offer competitive benefits, including: Medical, Dental, and Vision coverage 401(k) with company match Paid Time Off (PTO) Opportunities to make a meaningful impact while advancing your career And more Ready to Join the LaunchTech Crew? If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you. LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law. Powered by JazzHR E0uCktenE0
    $68k-93k yearly est. 19d ago
  • Specialist, Information System Security (ISSO)

    L3Harris 4.4company rating

    Cyber security analyst job in Colorado Springs, CO

    L3Harris is dedicated to recruiting and developing high-performing talent who are passionate about what they do. Our employees are unified in a shared dedication to our customers' mission and quest for professional growth. L3Harris provides an inclusive, engaging environment designed to empower employees and promote work-life success. Fundamental to our culture is an unwavering focus on values, dedication to our communities, and commitment to excellence in everything we do. L3Harris Technologies is the Trusted Disruptor in the defense industry. With customers' mission-critical needs always in mind, our employees deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security. Job Title: Specialist, Cyber Intelligence (ISSO) Job Code: 32184 Job Location: Colorado Springs, CO Job Schedule: 9/80 - Off Every Other Friday Job Description: L3Harris is seeking an Information System Security Officer (ISSO) to support the Space Superiority & Imaging division's customers and programs. The ISSO will perform information system security activities under the guidance and oversight of the Information System Security Manager (ISSM) on assigned information systems. The ISSO will be knowledgeable in information technology and information assurance standards and regulations. Responsibilities include, but are not limited to, performing security control assessments and continuous monitoring, conducting configuration and vulnerability scanning and remediation, authoring and maintaining documentation and artifacts (body of evidence) in support of the Assessment and Authorization (A&A) of information systems following the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF), remediating security control deficiencies, assessing and approving change requests for assigned information systems, performing user training and user account management oversight, and investigating and responding to security incidents and violations. Essential Functions: + Perform Continuous Monitoring of assigned information systems to include user activity monitoring (auditing) using SIEM tools or the native audit reduction capability of the operating system + Conduct security control assessments + Initiate, review, and remediate vulnerability and compliance scans using industry approved scanning tools (Nessus, ACAS) + Review and assess the configuration settings of assigned information systems against the DISA STIG configuration standards + Developing and updating documentation in support of obtaining or maintaining an Authority to Operate (ATO) for assigned information systems + Attend Change Control Boards (CCB) to review and approved information system change requests + Conduct and monitor security awareness training for information system users + Respond to, and investigate, security incidents and violations Qualifications: + Active Secret security clearance + Bachelor's Degree and minimum 4 years of prior relevant experience, or Graduate Degree and a minimum of 2 years of prior related experience. In lieu of a degree, minimum of 8 years of prior related experience Preferred Additional Skills: + DoD 8570 IAM III certification + Experience as an ISSO/ISSM supporting classified systems under the JSIG, ICD 503, and/or 32 CFR Part 117 Section 18 + Experience as an ISSO/ISSM supporting NIPRNet and/or SIPRNet systems + Experience hardening information systems and/or performing configuration/vulnerability assessments against the DISA STIG standards + Experience auditing information system and user activity using SIEM tools like Splunk, and/or Log Insight + Experience utilizing command line interfaces (CLI) and Linux/Unix commands to operate/support systems + Experience scanning information systems using Nessus and/or ACAS + Experience with A&A databases like eMASS and/or Xacta + Experience performing RMF A&A activities and system accreditation + Experience developing policies and procedures to implement security controls and customer requirements. + Experience developing Plans of Action & Milestones (POA&M) to document and mitigate security control deficiencies In compliance with pay transparency requirements, the salary range for this role in Colorado is $79,000 - $146,500 and for the greater Denver area is $90,500 - $168,500. This is not a guarantee of compensation or salary, as final offer amount may vary based on factors including but not limited to experience and geographic location. L3Harris also offers a variety of benefits, including health and disability insurance, 401(k) match, flexible spending accounts, EAP, education assistance, parental leave, paid time off, and company-paid holidays. The specific programs and options available to an employee may vary depending on date of hire, schedule type, and the applicability of collective bargaining agreements. The closing date for this job posting is March 16th, 2026. #LI-FS1 L3Harris Technologies is proud to be an Equal Opportunity Employer. L3Harris is committed to treating all employees and applicants for employment with respect and dignity and maintaining a workplace that is free from unlawful discrimination. All applicants will be considered for employment without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender (including pregnancy, childbirth, breastfeeding or other related medical conditions), gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, characteristic or membership in any other group protected by federal, state or local laws. L3Harris maintains a drug-free workplace and performs pre-employment substance abuse testing and background checks, where permitted by law. Please be aware many of our positions require the ability to obtain a security clearance. Security clearances may only be granted to U.S. citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet eligibility requirements for access to classified information. By submitting your resume for this position, you understand and agree that L3Harris Technologies may share your resume, as well as any other related personal information or documentation you provide, with its subsidiaries and affiliated companies for the purpose of considering you for other available positions. L3Harris Technologies is an E-Verify Employer. Please click here for the E-Verify Poster in English (******************************************************************************************** or Spanish (******************************************************************************************** . For information regarding your Right To Work, please click here for English (****************************************************************************************** or Spanish (******************************************************************************************** .
    $90.5k-168.5k yearly 14d ago
  • Cyber Security Specialist

    Input Technology Solutions

    Cyber security analyst job in Colorado Springs, CO

    Input Technology Solutions has an immediate opening for those ready for an exciting and dynamic career as an Cyber Security Specialist to to work with agile development teams to review application risks, identify weaknesses, and implement remediation actions. The ideal candidate is someone experienced with conducting security and vulnerability scans, and application security testing. Must have excellent attention to detail, strong analytic, and communication skills. Clearance: Active Secret Requirements: Essential Functions: Configure and manage Tenable Security Center and Nessus Manager in an on-premises environment as part of DISA Assured Compliance and Assessment Solution (ACAS) Administer and maintain McAfee ePolicy Orchestrator (ePO) and Enterprise Security System (ESS) point products Monitor security logs and alerts from Elastic and Kibana (ELK Stack) and other system level audits Support incident detection and conduct preliminary response actions to security incidents. Configure and launch STIG compliance scans using SCAP Compliance Checker (SCC) Administer Microsoft Windows Server and Red Hat Linux (RHEL) operating systems Administer virtualization platforms using VMware and Microsoft Hyper-V Monitor, assess, and report system security vulnerabilities, document corrective actions on the POA&M, and implement preventative actions to minimize the security vulnerabilities. Identify and analyze emergent cybersecurity technologies and systems engineering methods to improve the system's cybersecurity posture. Perform testing of all patches and fixes to ensure cybersecurity compliance prior to installation of new equipment. Perform other duties as assigned. Required Skills: Experience in implementing and enforcing application cybersecurity and vulnerability management. Required Experience: Bachelor's degree in Cybersecurity, Information Technology, Computer Science or related field; or equivalent combination of education and experience. Three (3) years or more of Cybersecurity related experience (hands on security engineering). Assured Compliance Assessment Solution (ACAS) experience is mandatory. Experience conducting Information Systems vulnerability assessment, risk mitigation, and application of mitigation strategies. Understanding of RMF, eMASS, POA&Ms, ACAS, and Vulnerability Management. Additional Eligibility Qualifications: DoD 8570 IAT II or IAM II Certified (Security+ CE or equivalent) required at higher.
    $77k-109k yearly est. 60d+ ago
  • NL-25-086 Sustainment Cyber Security Test Engineer

    Nlogic

    Cyber security analyst job in Colorado Springs, CO

    nLogic is seeking a Sustainment Cyber Security Test Engineer to support the MSEIT contract at Space Systems Command (SSC). The MILSATCOM Systems Engineering, Integration, and Test (MSEIT) effort provides leading edge Systems Engineering & Integration (SE&I) for the US Space Force's Space Systems Center (SSC). We support the Space Force's acquisition of state of the art satellite communications systems, providing global secure, survivable, and protected communications for our nation's warfighters. We seek technical individuals who will thrive in a highly collaborative work environment of small teams, using the most modern tools and methodologies to tackle the challenges of integrating complex space and ground communications systems. Required Skills and Qualifications: An active Secret Clearance is required for this role Bachelor's degree in engineering, mathematics, physics, computer science, or equivalent technical discipline Understand fundamentals of various Operating Systems Ability to troubleshoot problems involving complex systems Within 6 months of hire, must meet position and certification requirements outlined in DoDD 8140 and DoDD 8570.01-M for Information Assurance Excellent oral and written communication skills Motivated, self-starter capable of autonomous on-the-job learning/improvement with minimal supervision Familiarity with Information Assurance Vulnerability Management (IAVM) processes Familiarity in military, aerospace, DoD government, academia, or industry Familiarity using Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) and benchmarks Preferred Skills and Qualifications: International Council on Systems Engineering (INCOSE) Certification (i.e. ASEP, CSEP, ESEP) Understanding of fundamental concepts of software design and implementation Ability to undertake new challenges with limited guidance Knowledge of DoD mission system sustainment Experience with Secure Content Automation Protocol (SCAP) Compliance Checker (SCC) and STIG Viewer Experience with Assured Compliance Assessment Solution (ACAS) Experience using the Command-Line-Interface (CLI) Experience with administrating Linux and Windows systems Experience with Database Management (e.g. Microsoft SQL Server) Experience with Cisco network devices Experience with developing and maintaining scripts (primarily PowerShell) Experience with working in a highly competitive multi-contractor environment Familiarity with software vulnerability assessment and code analysis Familiarity with DoD RMF Assessment and Authorization (A&A) process Familiarity with AF/DoD/CNSSI/NIST security policy/manuals and other guiding policy documents Familiarity with penetration testing methodology and tools Work Conditions: Work Model: On-Site Travel: Minimal Working Hours: Standard Candidate must be a U.S. Citizen and hold an active Secret Clearance. This is a full-time position in Colorado Springs, CO. The pay range for this position in Colorado is $75,000 to $95,000. We offer a comprehensive benefits package including health insurance, Employee Stock Ownership Plan (ESOP), 401(k) retirement plan, paid time off, and additional supplemental benefits, such as professional development support. Qualified candidates should complete their application to be considered for the opportunity.
    $75k-95k yearly 60d+ ago
  • Information System Security Officer II

    Grs, Inc. 4.4company rating

    Cyber security analyst job in Colorado Springs, CO

    Global Resource Solutions, Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Information System Security Officer II. Job Descriptio n: Summary: The ISSO II's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Essential Duties & Responsibilities: Review, prepare, and update AIS authorization packages Notify customer when changes occur that might affect AIS authorization Perform AIS self-inspections, provide security coordination and review of all system test plans Identify AIS vulnerabilities and implement countermeasures Represent the customer on various technical review and inspection teams Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system authorization packages Coordinate, prepare, and track AIS inspections, reports, and responses Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities Prepare reports on the status of security safeguards applied to computer systems Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices Perform ISSO duties in support of in-house and external customers Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts Review, track, and conduct AIS training Requirement: Four (4) years related experience Bachelor's Degree in a related area or equivalent experience (Four (4) years) Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire. Security Requirements: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Programs Willingness to submit to a Counterintelligence Polygraph Skills: Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners Working knowledge of Microsoft Office (Word, PowerPoint, and Excel) Possess a high degree of originality, creativity, initiative requiring minimal supervision Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation) Must be able to lift up to 50lbs Physical Requirements : This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk. Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English. GRS is an Equal Opportunity Employer. GRS will continue to abide by obligations under VEVRRA and Section 503 physical or mental disability, protected veteran status, or any other characteristics that are protected by law.
    $77k-100k yearly est. Auto-Apply 36d ago
  • SME Engineer/Cyber Security Architect/Engineer - C

    Telos Corporation 4.6company rating

    Cyber security analyst job in Colorado Springs, CO

    The most security-conscious organizations trust Telos Corporation to protect their vital IT assets. The reputation of our company rests on the quality of our solutions and the integrity of our people. Explore what you can bring to our solutions in the areas of cyber, cloud and enterprise security. Be a part of the Telos culture and see what sets us apart! Telos offers an excellent compensation package with benefits that include generous paid time off, medical, dental, vision, tuition reimbursement, and 401k. Our employees enjoy more than just a great work environment! This position will be based at Peterson SFB, CO. We are seeking a Subject Matter Expert (SME) to support the Air Force Information Network (AFIN), a multibillion-dollar global initiative ensuring secure, high-speed communications infrastructure for the Department of the Air Force (DAF). The SME will serve as the technical lead for the integration and deployment of Illumio solutions within the Air Force Network (AFNET) to support the Department of Defense (DoD) Zero Trust Architecture (ZTA). This role will focus on micro-segmentation, network mapping, and maintaining a secure environment through the Illumio Policy Compute Engine (PCE) and Virtual Enforcement Node (VEN) on NIPR and SIPR networks. The SME will provide subject matter expertise, assist with installation, provide tiered support, and ensure the system's cybersecurity posture is maintained and updated with the latest patches, upgrades, and security rules. Key Tasks & Responsibilities: * Install, reinstall, upgrade, or advise on configuring the Illumio Policy Compute Engine (PCE) and Virtual Enforcement Node (VEN) across NIPR and SIPR networks. * Provide guidance on traffic analysis, micro-segmentation, and write security rules to prevent adversary lateral movement and optimize application/workload security. * Oversee project management, providing advice to the Air Force management team on best practices for Illumio deployments. * Build and deploy Open Virtualization Appliances (OVA) and assist in maintaining the ITF (Integration Test Facility) environment to ensure system stability. * Maintain and sustain the cyber security posture of Illumio deployments. * Test and validate patches, upgrades, and security controls in lab environments prior to fielding. * Ensure the Authority to Operate (ATO) is continuously updated in accordance with STIG (Security Technical Implementation Guides) requirements and remediate vulnerabilities. * Provide in-person Type 1, over-the-shoulder training and hands-on experience for Air Force personnel using Illumio. * Offer local Tier 3 and Tier 4 support for ongoing operations, troubleshooting, monitoring, and management of Illumio installations. * Develop best practice operational procedures and runbooks for ongoing Illumio maintenance, including backup/restore, cold standby PCE, and system rebuilds. * Work on system integrations, including Syslog/SIEM and Single Sign-On (SSO). * Develop a labeling schema and deployment methodology using Air Force automation frameworks and Illumio best practices. * Provide Tier 3 support for the Illumio suite, ensuring rapid response and resolution of system issues. * Prepare and maintain detailed project documentation, reports, and metrics. * Author Illumio policy frameworks for core data center services, administrative access, and traffic management (egress, IP lists, multi-tenant workloads). * Develop Illumio-specific API scripts to optimize operational services. * Assist with technical reviews, change preparations, and customer framework integration. Job Requirements Desired Education & Experience: * Bachelor's degree in Systems Engineering, Computer Science, or a related field * 4+ years of hands-on experience in network engineering and firewall management * 4+ years of experience with cloud networking and virtualization technologies (e.g., VMware) * Expert skills to install/reinstall/upgrade or advise on the tasks required to place the Illumio Policy Compute Engine and Virtual Enforcement Nodes * Subject matter expertise on Illumio micro segmentation to provide consulting to customer throughout integration into its service set. * Expert skills in required to develop Illumio labeling and policy design Minimum Certification Requirements: * Information Assurance (IA) Technician (IAT) Level II (DODM 8140) Potentially Required Certification(s): * Illumio Core Expert, Certification * CompTIA Network+ Certification Security Clearance: * Valid DoD Secret clearance is required. Additionally, NATO Secret and/or DoD Top Secret/SSBI clearances, favorably adjudicated for SCI eligibility, are required at certain locations The successful candidate must meet eligibility requirements to access sensitive information, which requires US citizenship. Telos maintains a drug-free workplace and will conduct drug testing on all applicants who have accepted an offer of employment. Telos Corporation participates in the E-Verify program. Therefore, any employment with Telos will also be contingent upon confirmation from the Social Security Administration ("SSA") and/or the Department of Homeland Security ("DHS") of your authorization to work in the United States. Telos offers excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future. Telos Corporation and its subsidiaries are committed to equal opportunity for all, without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, age, veteran status, disability, genetic information, or any other protected characteristic. Telos Corporation will make reasonable accommodations for known physical or mental limitations of otherwise qualified employees and applicants with disabilities unless the accommodation would impose an undue hardship on the operation of our business. If you are interested in applying for an employment opportunity and feel you need a reasonable accommodation pursuant to the ADA, please contact us at **************. If you require relay service assistance, please click on the following link to review information on your state's relay service: ********************************** Telos Corporation is an EEO/AA employer. Job Type Full-Time Location Peterson AFB, CO 80914 US (Primary) Telos offers an excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future. Telos and its subsidiaries are an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status.
    $76k-100k yearly est. 4d ago
  • DSS Information System Security Officer (ISSO) - (IDISSO092325.1)

    Cimarron 4.5company rating

    Cyber security analyst job in Colorado Springs, CO

    Cimarron is seeking a DSS Information System Security Officer (ISSO) to support the Missile Defense Agency (MDA) on the Integrated Research and Development for Enterprise Solutions (IRES) contract at Schriever Space Force Base in the Colorado Springs, CO area. Key Duties: Develop and maintain required security authorization package artifacts on MDA-designated systems for SAP program authorizations. Create and implement policies, procedures, and control evidence for selected security controls. Collaborate with hardware engineers, software engineers, and test teams to develop, test, and deploy cyber tools that support compliance initiatives on new platforms. Assess and coordinate mitigation of system security threats and risks using DoD-approved tools (e.g., ACAS, Prisma, Trelix). Lead efforts in security planning, assessment, risk analysis, risk management, certification, and awareness activities for MDSEA systems. Prepare documentation and data in support of U.S. Government Assessment and Authorization (A&A) efforts to obtain new Cyber Security Authorizations to Operate (ATO). Manage records for assigned enclaves and ensure baseline systems meet mission requirements for operation, function, and cyber posture. Review and analyze system logs to identify performance or behavior anomalies, determine trends, and recommend proactive corrective actions. Coordinate tasks and problem-solving efforts with team members, customers, stakeholders, and leadership to ensure solutions are developed with minimal mission impact. Evaluate security vulnerabilities in various software and hardware platforms and recommend appropriate mitigations. Maintain proficiency in cyber applications to effectively accomplish assigned tasks. Requirements Required Skills, Experience, and Education: Due to facility security requirements, only U.S. citizens are eligible for consideration at the time. This position requires access to federal facilities. Candidates must possess a valid, unexpired Real ID-compliant driver's license or state-issued identification card at the time of hire. If you are unsure whether your ID is Real ID-compliant, please check for the star symbol in the upper portion of your driver's license or state ID. Active Top Secret clearance (or higher). Ability to obtain a SCI clearance. 8 or more years of general, full-time work experience. 4 or more years of directly related work experience. 1 or more years of experience working in a management or leadership position. Current DoD 8570 IAT Level II Certification (ex., Security+). Experience with the Joint Special Access Program Implementation Guide (JSIG). Experience in Risk Management Framework (RMF) accreditation and authorization (A&A) processes, including development of standard Body of Evidence (BoE) packages. Experience delivering technical briefings to executive-level personnel. Excellent verbal, written, interpersonal, and teamwork skills. Ability to prioritize and perform work in a highly complex environment. Desired Skills, Experience, and Education: Active TS/SCI clearance. Experience in defining cyber architecture, and then engineering and implementing that architecture. Familiarity with the System Development Life Cycle (SDLC). Familiarity with project management principles. Experience with agile system development and DevSecOps tools and processes. Ability to conduct research and develop white papers on security and other applicable topics. Knowledge of container scanning vulnerability tools (e.g., JFrog Xray, Prisma). Experience with cyber compliance tools such as ACAS, Trelix, Prisma, and Elastic. Active DoD 8570 IAT Level III or IAM Level II certification (e.g., CISSP, CISM, CCISO). Business Profile: Cimarron is a global solutions company with a strategic partnering approach to satisfying customer-driven requirements. We ensure customer success with a modern approach and experienced leadership. Driven by an entrepreneurial spirit, Cimarron is fueled by highly skilled employees, developing new innovative technologies, and delivering superior products and services. We believe in recognizing employees' worth by offering competitive salaries and benefits, including health, dental, and vision insurance, 401(k) contributions, educational reimbursement, and much more. From company communication through Company-wide information meetings led by our President and CEO, to an Awards program designed to recognize our amazing employees and their accomplishments, you will not only feel like you are a part of a team, you will be a valued member of the Cimarron family. Cimarron is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, age, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or any other characteristic protected by federal, state, or local law.
    $73k-95k yearly est. 60d+ ago
  • Information Security Analyst

    Goldbelt Incorporated 4.5company rating

    Cyber security analyst job in Colorado Springs, CO

    Please note that this position is contingent upon the successful award of a contract currently under bid. Nisga'a CIOPS provides hands-on experienced services to civilian and DoD programs worldwide. Delivering highly skilled, cleared personnel who provide services on five continents for a portfolio of customers. Summary: The Information Security Analyst will support the protection of our organization's information systems and data. This role is responsible for monitoring security systems, identifying vulnerabilities, responding to incidents, and ensuring compliance with security policies and standards. The ideal candidate will have a strong technical foundation in cybersecurity and a passion for safeguarding digital assets. Responsibilities Essential Job Functions: * Under general direction, supports all activities relating to RMF control remediation and artifact gathering for specified systems. * Works with an engineering team to ensure that information security is reflected properly in deployed systems (to include handling Technical Order and Time Compliant Technical Order). * Develop information systems assurance programs to include vulnerability and threat management, and control guidelines. * Advises other sections regarding internal controls and security procedures. Prepares activity and progress reports relating to the information systems audit function. * Access to eMASS (system used to log RMF activities) may be required. Qualifications Necessary Skills and Knowledge: * Shall have knowledge and experience in cybersecurity tools, network topologies, intrusion detection, PKI, and secured networks. * Knowledge of security practices and roles necessary to support networks, software, and hardware deployments and implementation. * Strong problem-solving skills and attention to detail. Minimum Qualifications: * At least 3 years of experience in the field or in a related area. * IAT Level II Certification. * Experience with cybersecurity policies and threat mitigation. * Must have active TS/SCI Preferred Qualifications: * Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field. * Experience working in federal or defense environments. * Industry standard information security certifications. #CJ Pay and Benefits The salary range for this position is $96,000.00 to $108,000.00 annually. At Goldbelt, we value and reward our team's dedication and hard work. We provide a competitive base salary commensurate with your qualifications and experience. As an employee, you'll enjoy a comprehensive benefits package, including medical, dental, and vision insurance, a 401(k) plan with company matching, tax-deferred savings options, supplementary benefits, paid time off, and professional development opportunities.
    $96k-108k yearly Auto-Apply 60d+ ago
  • Security Analyst

    Rocket City HR

    Cyber security analyst job in Colorado Springs, CO

    In this role you will provide matrixed security management to the Program Directorate in the Missile Defense Agency, ensuring compliance with regulatory requirements and agency security protocols. Responsibilities: Deliver acquisition and industrial security. Provide dedicated Classification Management and Security Classification Guide (SCG) support to the SS work force. Technical subject matter expert (SME) on relevant Information Security, Acquisition Security, and Program Protection policies, regulations, and procedures. Provide authoritative Information Security, Acquisition Security, and Program Protection advice and guidance in all aspects of the development and deployment of acquisition programs. Develop, evaluate, and implement Information Security, Acquisition Security, and Program Protection procedures in compliance with applicable laws, orders, directives, regulations, and instructions. Develop and implement security and program protection procedures including Program Protection Planning, Information Security (INFOSEC), Operations Security (OPSEC), access control, classified container control, and incident reporting. Clearly communicate and coordinate security and program protection activities. All other duties as assigned. Required Skills/Experience: 8+ years working on missile defense-related or other complex, large DoD program/project. Ability to think critically (i.e. research, understand, analyze, synthesize, and critique), creating solutions to new and one-of-a-kind threat challenges and issues as they arise. Ability to propose technical project plans and solutions that align with customer strategic goals. Skilled in using Microsoft Office products to communicate technical and programmatic information. Active Secret Clearance with TS/SCI eligibility Preferred Education/Skills: BS/BA degree in Security/CI field preferred Understanding of MDA and its threat processes and organizational elements. Experience gathering and specifying system requirements through internal and external stakeholder coordination and collaboration. Ability to clearly communicate complex ideas and produce and present clear, concise, well-organized, and audience-relevant presentations and documents. Equal Employment Opportunity (EEO) employer Reasonable accommodation may be made to enable qualified individuals with disabilities to perform essential job functions.
    $59k-83k yearly est. 25d ago
  • Information System Security Officer II

    Global Resource Solutions, Inc. 4.4company rating

    Cyber security analyst job in Colorado Springs, CO

    Global Resource Solutions, Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Information System Security Officer II. Job Descriptio n: Summary: The ISSO II's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Essential Duties & Responsibilities: Review, prepare, and update AIS authorization packages Notify customer when changes occur that might affect AIS authorization Perform AIS self-inspections, provide security coordination and review of all system test plans Identify AIS vulnerabilities and implement countermeasures Represent the customer on various technical review and inspection teams Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system authorization packages Coordinate, prepare, and track AIS inspections, reports, and responses Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities Prepare reports on the status of security safeguards applied to computer systems Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices Perform ISSO duties in support of in-house and external customers Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts Review, track, and conduct AIS training Requirement: Four (4) years related experience Bachelor's Degree in a related area or equivalent experience (Four (4) years) Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire. Security Requirements: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Programs Willingness to submit to a Counterintelligence Polygraph Skills: Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners Working knowledge of Microsoft Office (Word, PowerPoint, and Excel) Possess a high degree of originality, creativity, initiative requiring minimal supervision Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation) Must be able to lift up to 50lbs Physical Requirements : This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk. Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English. GRS is an Equal Opportunity Employer. GRS will continue to abide by obligations under VEVRRA and Section 503 physical or mental disability, protected veteran status, or any other characteristics that are protected by law.
    $67k-90k yearly est. Auto-Apply 36d ago
  • Information Security Specialist

    Nooks

    Cyber security analyst job in Colorado Springs, CO

    Are you seeking an exciting and unique opportunity to grow and support our national security? As a startup, we are offering a limited-time opportunity to be an equity owner in a pioneering new industry. Nooks is pioneering Classified Infrastructure-as-a-Service (CIaaS) to provide government and industry partners with the fastest, most efficient access to classified infrastructure. We are building a nationwide network of accredited classified spaces and systems, ensuring that the best technologies equip our nation's warfighters. At Nooks, we value innovation, collaboration, and a service-first mindset. ABOUT THE ROLE We are seeking a highly analytical and experienced Information Security Specialist to serve as an internal consultant and driver of operational excellence across the US Space Force's classified security enterprise. This is a strategic role focused on analyzing, standardizing, and streamlining security workflows within the Information Security discipline. The role involves providing support on system security planning, compliance with ICD 503 and CNSSI 1253, incident response, and continuous monitoring of classified IT infrastructure. KEY RESPONSIBILITIES: 1. Security Process Analysis and Design Efficiency Improvement: Identify operational inefficiencies, compliance gaps, and bottlenecks in existing security workflows. Standardization: Design, implement, and standardize new, optimized security processes and procedures to enhance efficiency, reduce cycle time, and ensure consistent compliance across all USSF sites. Methodology: Utilize process improvement methodologies (e.g., Lean, Six Sigma principles) to enhance the security team's overall effectiveness while maintaining strict regulatory adherence. 2. Incidence Response and Operations Incident Response: Lead and participate in all security incident response activities, including the identification, containment, eradication, and recovery from security incidents impacting SCI systems. SOP Guidance: Maintain detailed Standard Operating Procedures (SOPs) for security incident instigation, mitigation, and reporting activities. Coordination: Coordinate incident response and forensic activities with the ISSM, SSO, command leadership, law enforcement, and other government agencies as required. Monitoring and Reporting: Stay up-to-date on the latest security threats, vulnerabilities, and technologies to inform defensive strategies. 3. Technology Integration and Metrics Technology Evaluation: Evaluate and recommend technology solutions (e.g., workflow software, compliance tracking tools, security management systems) to automate manual security processes and enhance auditability. System Optimization: Serve as a functional lead for the integration and optimization of security management systems (DISS/NBIS, NISS) and physical security systems (ACS/IDS) to improve data integrity and compliance reporting. KPI Development: Develop and track Key Performance Indicators (KPIs) and metrics for security process efficiency, compliance status, and security team performance to measure the impact of improvement initiatives. THE SKILLSET: Experience: 3-7 years of broad, hands-on experience in Information Security, with a significant focus on SCI security and networks within the U.S. Defense Industrial Base or Intelligence Community. Process Expertise: Proven experience in process improvement, standardization, or quality assurance roles within a highly regulated compliance environment. Regulatory Expertise: Deep, practical knowledge of NISPOM/32 CFR Part 117 and applicable Intelligence Community Directives (ICDs). Clearance: Must possess and maintain an Active Top Secret (TS) / Sensitive Compartmented Information (SCI) eligibility security clearance. U.S. Citizenship is required. Skills: Exceptional analytical and problem-solving skills, with a proven ability to translate complex regulatory requirements into simplified, efficient, and user-friendly processes. PREFERRED QUALIFICATIONS: Certification: SPeD Certification, or experience with process improvement methodologies (e.g., Lean, Six Sigma). System Proficiency: Highly proficient with security management systems (DISS, NISS) and familiarity with enterprise software tools used for document control or workflow management. Education: Bachelor's degree in a relevant field (e.g., Security Management, Business Process, Quality Assurance). This position is a strategic, enterprise-wide role that may require occasional travel to USSF facilities. This employment offer is contingent upon continued funding of the underlying government contract. Should the contract be modified, or terminated, or if funding is reduced or eliminated, the employer reserves the right to adjust or rescind the offer accordingly. Salary Range for all departments Salary Range$90,000-$110,000 USD
    $90k-110k yearly Auto-Apply 1d ago
  • Information System Security Officer

    Kratos Defense and Security 4.8company rating

    Cyber security analyst job in Colorado Springs, CO

    KFED Direct Approvers start [Twila Johnson, Michelle Maestas, Tim Bankich, John Cummins, Frank Cannizzaro, Jessica Giddens, David Gambla, Greg Caicedo] end Org Code: 7.130.102.10.20 Justification: This position is to support the initial standup and continuous monitoring and compliance of the AFCGI project. This position will also help to fulfill Least Privilege, Separation of Duties, and future 24/7 Security Operations Center and Cyber Incident Response requirements for SDA requirements of the global network being stood up and maintained. Failure to fill this position could jeopardize delivering contracted products and services to an important government client.
    $66k-85k yearly est. 14d ago
  • Information Security Analyst, Journeyman

    Vets Hired

    Cyber security analyst job in Colorado Springs, CO

    Journeyman Information Security Analyst Colorado Springs, CO (Onsite) An organization is seeking a Journeyman Information Security Analyst to support the Data Transport Product Support Sustainment Logistics Maintenance (DSLM) contract. The DSLM effort provides sustaining, maintaining, and logistics support for the operational capability to transfer data for highly reliable and secure telemetry, tracking, command, control, and communications. DSLM primarily supports the Satellite Control Network (SCN). This position is on-site at a contractor facility in Colorado Springs, CO. WHAT YOU CAN EXPECT TO DO: Ensure cybersecurity controls for state-of-the-art secure operating systems, networks, and database products are applied IAW DoD cyber directives (including DoDI 8510.01 RMF, DoDI 8500.01, and NIST SP 800-37). Conduct risk assessments and provide recommendations for application design. Address a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Utilize encryption technology, penetration and vulnerability analysis, and IT security research. Prepare security reports to regulatory agencies as needed. Duties & Responsibilities (include but are not limited to): Develop and maintain cybersecurity artifacts for SCN mission systems. Develop and implement an Anti-virus/Malware identification process for equipment transfers to/from SCN sites. Coordinate with Software Maintenance Action (SWMA) IA patching team and program office IA architecture team on an IA/Cybersecurity Roadmap to identify non-compliant IA controls and propose corrective actions. Employ system security engineering to design, develop, and implement secure applications and configurations in coordination with the Government. Evaluate hardware, firmware, and software information security components for mission hardware acquisition. Perform cybersecurity controls verification assessments IAW DoDI 8510.01 and DoDI 8500.01 annually. Attend Cyber Technical Interchange Meetings during key project phases (Requirements, Design, etc.) to obtain Cyber community buy-in. Develop and implement policies, procedures, and standards related to information security, privacy, and incident response; monitor compliance. Provide technical engineering services for integrated security systems and solutions. Use tools and processes to monitor information systems for security-related events. Plan configuration changes for major security infrastructure platforms. Maintain a library of security audit tools and processes for testing, audits, incident response, and diagnosing security issues. Travel may be required. WHAT THE TEAM REQUIRES: BS Degree and 3 years of related experience or equivalent combination of education and experience, including 2 years of relevant Cybersecurity experience. Active DoD Secret Security Clearance or the ability to obtain and maintain one. Demonstrated traits: technical competence, strong decision-making and critical thinking, customer focus, self-motivation, desire to learn, effective interpersonal skills, pride in work, teamwork, and dedication. WHAT THE TEAM PREFERS: DoD 8140 Cyber Defense Analyst or Vulnerability Analyst Basic Qualification or certification (e.g., CEH, Security+), or a technical BS from an ABET-accredited or CAE-designated institution (as defined in DoD 8140). SCN and/or DoD experience is preferred. Working Place: Colorado Springs, Colorado, United States Company : 2025 August 28th - Auria Space
    $70k-100k yearly est. 60d+ ago
  • F5 Security Engineer - Active TS/SCI with CI Poly

    ENS Solutions, LLC

    Cyber security analyst job in Colorado Springs, CO

    Job Description Participate in the development and support of customer technical requirements Champion a collaborative, team-based environment, sharing standard methodologies and success and building positive relationships Plan, Design, Develop, Implement and Operate F5 products such as LTM, ASM, BIG-IQ and APM Manage the configuration on multiple physical and virtual F5 across multiple data centers Develop scripts and tools to automate configuration of a large number of network security devices distributed across multiple data centers Propose and implement system enhancements that will improve the performance and reliability of the network security infrastructure Applies capacity planning configuration changes as demanded by the business Address performance, scalability, and service architecture administration issues Design, install, configure, maintain network security services, equipment and devices Plan and support network security infrastructure Provide clear technical documentation and written procedures for issues identified and addressed Monitoring and troubleshooting of platform and OS based problems, network security infrastructure and connectivity issues Perform launch testing for new software releases and the introduction of new features Coordinate equipment orders including physical or virtual appliances, as well as upgrading, monitoring, testing and servicing the systems as needed Demonstrates knowledge of a broad range of technology towers i.e.: Storage, Virtualization, Intel, Networking, Data Center Migration and Disaster Recovery Knowledge of risk and controls landscape, ensuring company-wide standards are met Participate in change and incident management Anticipating potential problems and acting to minimize the impact they may have on the project or unit Ability to collaborate with different technology towers to achieve common goals Requirements Bachelor's degree in computer science, information systems, telecommunications, or an engineering focused field Must have an Active TS/SCI and willing to obtain a CI Poly 5+ years of relevant F5 experience with F5 LTM, ASM, BIG-IQ, and/or APM administration and life cycle management including experience with advanced iRule creation and troubleshooting Ability to handle multiple complex F5 configurations and deployments at once Understanding of networking at all layers of the OSI model; and Previous experience with web application technologies Experience deploying, managing, and troubleshooting network systems, switching, and routing protocol standards such as: TCP/IP, MPLS, OSPF, BGP, SDN, and 802.1x. Experience managing and troubleshooting DNS, DHCP, IPAM, and NTP in a large multi-site environment Ability to manage multiple stands of work simultaneously. Executes within a customer-centric environment. Excellent verbal and written communication skill Hands on experience with Python and APIs Self-driven with the ability to manage workload without direct supervision Must have the F5 201 certification 8570 IAT Level II Certification required Preferred Skills/Qualifications Experience with Infoblox DDI, Microsoft DNS, Dyn, VMWare Automation products (vRO, vRA) Benefits Essential Network Security (ENS) Solutions, LLC is a service-disabled veteran owned, highly regarded IT consulting and management firm. ENS consults for the Department of Defense (DoD) and Intelligence Community (IC) providing innovative solutions in the core competency area of Identity, Credential and Access Management (ICAM), Software Development, Cyber and Network Security, System Engineering, Program/Project Management, IT support, Solutions, and Services that yield enduring results. Our strong technical and management experts have been able to maintain a standard of excellence in their relationships while delivering innovative, scalable and collaborative infrastructure to our clients. Why ENS? Free Platinum-Level Medical/Dental/Vision coverage, 100% paid for by ENS 401k Contribution from Day 1 PTO + 11 Paid Federal Holidays Long & Short Term Disability Insurance Group Term Life Insurance Tuition, Certification & Professional Development Assistance Workers' Compensation Relocation Assistance
    $74k-101k yearly est. 12d ago
  • Cyber Threat Emulation Analyst

    Launchtech

    Cyber security analyst job in Colorado Springs, CO

    or Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10% LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics. What You'll Do As a Mid-Level Cyber Threat Emulation Analyst, you will: Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM) Perform cybersecurity duties on customer networks to improve enterprise-wide security posture Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation Measure defense-in-depth effectiveness against known vulnerabilities Generate vulnerability assessment reports and escalate findings for review Support enterprise Incident Response in accordance with DoD regulations and instructions Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs) Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices What You Bring Basic Requirements: Must have 6, or more, years of general (full-time) work experience Must have 4 years of combined experience with: Performing manual or automated penetration tests in an enterprise environment Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments Experience performing the full life cycle of incident response and enterprise-level monitoring Must have 1 year of experience in management or leadership in a team environment Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP) Must have, or obtain within 6 months of start date, a PenTest+ certification Must have an active DoD Secret Security Clearance Desired Requirements: Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field Have experience with Cyber Threat Emulation tools, policies, and procedures Have experience operating custom software on a Linux platform Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux) Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc. Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred) Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred) Be able to mentor and train personnel in a high-paced environment Be familiar with DoD Security Operations Centers (SOC/CSSP) Be familiar with DCO/CSSP-guiding security policies and procedures Have an active DoD Top Secret clearance Why LaunchTech? At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence. We offer competitive benefits, including: Medical, Dental, and Vision coverage 401(k) with company match Paid Time Off (PTO) Opportunities to make a meaningful impact while advancing your career And more Ready to Join the LaunchTech Crew? If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you. LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law.
    $68k-93k yearly est. Auto-Apply 48d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Colorado Springs, CO?

The average cyber security analyst in Colorado Springs, CO earns between $60,000 and $106,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Colorado Springs, CO

$80,000

What are the biggest employers of Cyber Security Analysts in Colorado Springs, CO?

The biggest employers of Cyber Security Analysts in Colorado Springs, CO are:
  1. Launchtech
  2. KBR
  3. GD Information Technology
  4. Insight Global
Job type you want
Full Time
Part Time
Internship
Temporary