Post job

Cyber security analyst jobs in Loveland, CO

- 98 jobs
All
Cyber Security Analyst
Information Security Engineer
Information Security Analyst
Defense Analyst
Information Systems Security Officer
Data Security Analyst
Cyber Security Engineer
  • Cyber Analyst/ Cyber Security Analyst

    Cyber Defense Technologies 3.9company rating

    Cyber security analyst job in Denver, CO

    Cyber Analyst/Cyber Security Analyst Cyber Defense Technologies (CDT), a leading small business cybersecurity and engineering firm, is seeking a skilled and detail-oriented Cyber Analyst/Cyber Security Analyst onsite in Denver, CO with a TS/SCI clearance. In this role, you will monitor, analyze, for the purpose of mitigating threats. Responsibilities: Monitor network traffic, logs and alert to identify suspicious activity. Use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threat. Perform in-depth analysis of potential threats, vulnerabilities, and incidents to determine severity and impacts. Qualifications: Bachelor's degree in Systems Security, Network Engineering, Information Technology, or related Engineering discipline and typically 5+ years of relevant experience Relevant experience may be considered in lieu of required education. Relevant certifications (e.g. CEH, Security +, CYSA+) Why Join Cyber Defense Technologies? At CDT, we offer a collaborative and inclusive work environment where your expertise in finance and HR can help shape the future of cybersecurity and engineering solutions. This position offers the opportunity to lead financial strategies while supporting HR initiatives in a fast-paced, government contracting environment. Compensation and Benefits: Competitive salary based on experience. Comprehensive benefits package, including health, dental, and retirement plans. Opportunities for professional development and career advancement. CDT is committed to hiring and retaining a diverse workforce. We are an Equal Opportunity employer making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. Apply Now: If you are a proactive Cyber Analyst/Cyber Security Analyst and thrive in dynamic environments, we encourage you to apply and join the CDT team! Salary: $115,000 - $170,000
    $115k-170k yearly 60d+ ago
  • Classification Information Security Analyst

    National Renewable Energy Laboratory 4.1company rating

    Cyber security analyst job in Golden, CO

    **Posting Title** Classification Information Security Analyst . . Type** Regular . **Hours Per Week** 40 . **Working at NLR** NLR is located at the foothills of the Rocky Mountains in Golden, Colorado is the nation's primary laboratory for energy systems research and development. Join the National Laboratory of the Rockies (NLR), where world-class scientists, engineers, and experts are accelerating energy innovation through breakthrough research and systems integration. From our mission to our collaborative culture, NLR stands out in the research community for its commitment to an affordable and secure energy future. Spanning foundational science to applied systems engineering and analysis, we focus on solving complex challenges to deliver advanced, secure, reliable, and cost-effective energy solutions. Our work helps strengthen U.S. industries, support job creation, and promote national economic growth. At NLR, you'll find a mission-driven environment supported by state-of-the-art facilities, multidisciplinary research teams, and strong collaborations with industry, academia, and other national laboratories. We offer robust professional development opportunities, and a competitive benefits package designed to support your career and well-being. **Job Description** The Office of Laboratory Protection (LP) is an organization focused on providing a secure, safe, and resilient NLR community. LP supports more than 4,000 staff located at four sites and the associated infrastructure. LP is comprised of a team of highly skilled managers and technical subject matter experts dedicated to personnel security, physical security, access control, information security, foreign national access management, emergency management, and protective force operations. The Safeguards & Security Group Manager is seeking a skilled and motivated Classification Information Security Analyst to join our team. This pivotal role is primarily responsible for the continued implementation and management of the Controlled Unclassified Information (CUI) program, while also supporting Classified Matter Protection and Control (CMPC), and Operations Security (OPSEC) programs as necessary. The successful candidate will ensure that CUI requirements are integrated into organizational operations and information management processes. This role requires close collaboration with Legal, Export Control, Business Development, Information Governance, IT, and other stakeholders to ensure compliance with DOE and other federal agencies information protection policies. Responsibilities include: **Policy Expertise:** + Maintain up-to-date knowledge of federal OPSEC, CUI, and Classification policies, laws, and regulations. **Program Management:** + Lead the continued implementation and oversight of the CUI program, including policy, program, and procedure reviews and updates. + Collaborate with peer CUI specialists to develop and integrate CUI management solutions into NLR's broader information protection framework. + Support the OPSEC and CMPC programs in coordination with INFOSEC assurance analysts. + Provide strategic planning, risk management, and program oversight. + Mentor staff to ensure compliance with applicable requirements documents and procedures. + Coordinate CUI misuse determination, resolution, and reporting. + Conduct internal reviews and audits to ensure adherence to security requirements. **Training & Education:** + Review and revise existing CUI training materials; participate in working groups to enhance awareness programs. + Provide guidance on proper marking, handling, and safeguarding of CUI, classified, and sensitive information. + Support onboarding and refresher training for NLR personnel. **Analysis & Recommendations:** + Analyze information to determine appropriate CUI, OPSEC, and classification controls for NLR programs and initiatives. + Work to resolve security related issues that impact organizational goals. **Document Review & Incident Management:** + Assist in the review of information as requested to identify and protect sensitive and classified information. + Assist with the oversight of proper labeling of CUI documents. + Participate in the analysis and investigation of incidents of security concern. **Stakeholder Engagement and Relationship Building:** + Collaborate with internal stakeholders (Legal, IT, Program Management, project managers) to ensure consistent CUI compliance. + Build strong working relationships with DOE, lab leadership, and staff to balance security priorities with research and operations objectives in a customer focused manner. **Additional Responsibilities:** + Prepare and maintain lab level procedures, training, and internal SOPs + Promote a culture of safety, respect, accountability, and professionalism. + Other duties as assigned by management. . **Basic Qualifications** Relevant Bachelor's Degree and 5 or more years of experience or equivalent relevant education/experience. Or, relevant Master's Degree and 3 or more years of experience or equivalent relevant education/experience. Or, relevant PhD or equivalent relevant education/experience. Or, relevant JD or equivalent relevant education/experience. Complete understanding and wide application of technical principles, theories and concepts in the field. General knowledge of other related disciplines. Considerable knowledge of laws, regulations, principles, procedures and practices related to specific field. Strong leadership, project management and problem solving skills. Ability to use various computer software programs. DOE Q or TS Clearance: Must be able to obtain and maintain a DOE security clearance at the DOE (Q) and SCI access or DoD (TS) and SCI level. SCI access may require a polygraph examination. Eligibility requirements: To obtain a clearance, an individual must be at least 18 years of age; U.S. citizenship is required except in very limited circumstances. See DOE O 472.2A for additional information. *** Must meet educational requirements prior to employment start date.** **Additional Required Qualifications** + Bachelor's degree in a relevant field and at least 8 years of relevant experience in information security or reviewing research documents (or equivalent combination of education and experience). + Ability to respond to inquiries about document markings and accountability requirements. + Experience developing and delivering training on protecting CUI, proprietary, or classified information. + Motivated self-starter with the ability to work independently and as part of collaborative teams across the laboratory and DOE complex. + Strong problem-solving skills, with the ability to adapt to shifting priorities and meet deadlines. + Proficient in Microsoft Office. + Ability to use discretion and maintain strict confidentiality. + Ability to work both independently and collaboratively in a team-based environment. + Ability to obtain and maintain a TS clearance (see basic qualifications). **Preferred Qualifications** . **Job Application Submission Window** The anticipated closing window for application submission is up to 30 days and may be extended as needed. **Annual Salary Range (based on full-time 40 hours per week)** Job Profile: Professional III / Annual Salary Range: $81,500 - $146,700 NLR takes into consideration a candidate's education, training, and experience, expected quality and quantity of work, required travel (if any), external market and internal value, including seniority and merit systems, and internal pay alignment when determining the salary level for potential new employees. In compliance with the Colorado Equal Pay for Equal Work Act, a potential new employee's salary history will not be used in compensation decisions. **Benefits Summary** Benefits include medical, dental, and vision insurance; short*- and long-term disability insurance; pension benefits*; 403(b) Employee Savings Plan with employer match*; life and accidental death and dismemberment (AD&D) insurance; personal time off (PTO) and sick leave; paid holidays; and tuition reimbursement*. NLR employees may be eligible for, but are not guaranteed, performance-, merit-, and achievement- based awards that include a monetary component. Some positions may be eligible for relocation expense reimbursement. Limited-term positions are not eligible for long-term disability or tuition reimbursement. ***** Based on eligibility rules **Badging Requirement** NLR is subject to Department of Energy (DOE) access restrictions. All employees must also be able to obtain and maintain a federal Personal Identity Verification (PIV) card as required by Homeland Security Presidential Directive 12 (HSPD-12), which includes a favorable background investigation. **Drug Free Workplace** NLR is committed to maintaining a drug-free workplace in accordance with the federal Drug-Free Workplace Act and complies with federal laws prohibiting the possession and use of illegal drugs. Under federal law, marijuana remains an illegal drug. If you are offered employment at NLR, you must pass a pre-employment drug test prior to commencing employment. Unless prohibited by state or local law, the pre-employment drug test will include marijuana. If you test positive on the pre-employment drug test, your offer of employment may be withdrawn. **Submission Guidelines** Please note that in order to be considered an applicant for any position at NLR you must submit an application form for each position for which you believe you are qualified. Applications are not kept on file for future positions. Please include a cover letter and resume with each position application. . **Equal Opportunity Employer** All qualified applicants will receive consideration for employment without regard basis of age (40 and over), color, disability, gender identity, genetic information, marital status, domestic partner status, military or veteran status, national origin/ancestry, race, religion, creed, sex (including pregnancy, childbirth, breastfeeding), sexual orientation, and any other applicable status protected by federal, state, or local laws. **Reasonable Accommodations (******************************************************* **E** **-Verify** ************************ **For information about right to work, click here (************************************************************************************************** for English or** **here (************************************************ for Spanish.** E-Verify is a registered trademark of the U.S. Department of Homeland Security. This business uses E-Verify in its hiring practices to achieve a lawful workforce. The National Laboratory of the Rockies (NLR) is a leader in the U.S. Department of Energy's effort to secure an environmentally and economically sustainable energy future. With locations in Golden and Boulder, Colorado, and a satellite office in Washington, D.C., NLR is the primary laboratory for research, development, and deployment of renewable energy technologies in the United States. NLR is subject to Department of Energy (DOE) access restrictions. All candidates must be authorized to access the facility per DOE rules and guidance within a reasonable time frame for the specified position in order to be considered for an interview and for hiring. DOE rules for site access during the interview process depend on whether the candidate is interviewed on-site, off-site, or via telephone or videoconference. All employees must also be able to obtain and maintain a federal Personal Identity Verification (PIV) card as required by Homeland Security Presidential Directive 12 (HSPD-12), which includes a favorable background investigation. Additionally, DOE contractor employees are prohibited from participating in certain Foreign Government Talent Recruitment Programs (FGTRPs). If a candidate is currently participating in an FGTRP, they will be required to disclose their participation after receiving an offer of employment and may be required to disengage from participation in the FGTRP prior to commencing employment. Any offer of employment is conditional on the ability to obtain work authorization and to be granted access to NLR by the Department of Energy (DOE). **Drug Free Workplace** NLR is committed to maintaining a drug-free workplace in accordance with federal Drug-Free Workplace Act and complies with federal laws prohibiting the possession and use of illegal drugs. Under federal law, marijuana remains an illegal drug. If you are offered employment at NLR, you must pass a pre-employment drug test prior to commencing employment. Unless prohibited by state or local law, the pre-employment drug test will include marijuana. If you test positive on the pre-employment drug test, your offer of employment may be withdrawn. Please review the information on our Hiring Process (************************************************* website before you create an account and apply for a job. We also hope you will learn more about NLR (**************************** , visit our Careers site (****************************** , and continue to search for job opportunities (**************************************** at the lab.
    $81.5k-146.7k yearly 9d ago
  • Malware Defense Malware Analyst

    Bank of America 4.7company rating

    Cyber security analyst job in Denver, CO

    Washington, District of Columbia;Chicago, Illinois; Denver, Colorado **To proceed with your application, you must be at least 18 years of age.** Acknowledge Refer a friend **To proceed with your application, you must be at least 18 years of age.** Acknowledge (****************************************************************************************************** **Job Description:** At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day. Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve. Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us! Bank of America is one of the world's leading financial institutions, serving over 66 million consumers and small businesses. Company success is only possible with a strong cyber defense, which enables Bank of America to safely conduct global operations across the United States and in approximately 35 countries. Our primary goal is to safeguard not only the company, but our clients and their trust. The Malware Defense Team is looking for top talent who would like to join one of the most advanced cybersecurity teams in the world. Responsibilities include, but are not limited to: - In-depth analysis of malware, including authoring analysis reports. - Tracking malware campaigns, malicious actors, and related infrastructure. - Creation of tools and scripts to assist in the analysis of malware analysis. - Field escalations of potentially malicious files and websites from teams within Malware Defense. Required Qualifications: - Strong direct experience of analyzing malware. - Intermediate to advanced malware analysis skills. - Experience creating innovative ways to track progression of malware families, infrastructure, and campaigns conducted by e-crime, and cyber espionage actors. - Experience creating tools and scripts to accelerate malware and threat analysis. - Background in network traffic analysis - WireShark, Fiddler, proxy logs, etc. - Experience analyzing malicious web content such as ClickFix, ClearFake, SocGholish, etc. - Experience authoring YARA, Suricata, and EKFiddle detection rules. - Experience with penetration testing and/or adversary emulation is a plus. - Able to work independently on tasks, but also work well within a team environment Desired Qualifications: - Experience analyzing malware targeting Linux, Android, and IOT platforms. Skills: + Cyber Security + Data Privacy and Protection + Problem Solving + Process Management + Threat Analysis + Business Acumen + Data and Trend Analysis + Interpret Relevant Laws, Rules, and Regulations + Risk Analytics + Stakeholder Management + Access and Identity Management + Data Governance + Encryption + Information Systems Management + Technology System Assessment **Shift:** 1st shift (United States of America) **Hours Per Week:** 40 Bank of America and its affiliates consider for employment and hire qualified candidates without regard to race, religious creed, religion, color, sex, sexual orientation, genetic information, gender, gender identity, gender expression, age, national origin, ancestry, citizenship, protected veteran or disability status or any factor prohibited by law, and as such affirms in policy and practice to support and promote the concept of equal employment opportunity, in accordance with all applicable federal, state, provincial and municipal laws. The company also prohibits discrimination on other bases such as medical condition, marital status or any other factor that is irrelevant to the performance of our teammates. View your **"Know your Rights (************************************************************************************** "** poster. **View the LA County Fair Chance Ordinance (************************************************************************************************** .** Bank of America aims to create a workplace free from the dangers and resulting consequences of illegal and illicit drug use and alcohol abuse. Our Drug-Free Workplace and Alcohol Policy ("Policy") establishes requirements to prevent the presence or use of illegal or illicit drugs or unauthorized alcohol on Bank of America premises and to provide a safe work environment. Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. Should you be offered a role with Bank of America, your hiring manager will provide you with information on the in-office expectations associated with your role. These expectations are subject to change at any time and at the sole discretion of the Company. To the extent you have a disability or sincerely held religious belief for which you believe you need a reasonable accommodation from this requirement, you must seek an accommodation through the Bank's required accommodation request process before your first day of work. This communication provides information about certain Bank of America benefits. Receipt of this document does not automatically entitle you to benefits offered by Bank of America. Every effort has been made to ensure the accuracy of this communication. However, if there are discrepancies between this communication and the official plan documents, the plan documents will always govern. Bank of America retains the discretion to interpret the terms or language used in any of its communications according to the provisions contained in the plan documents. Bank of America also reserves the right to amend or terminate any benefit plan in its sole discretion at any time for any reason.
    $63k-85k yearly est. 8d ago
  • Classification Information Security Analyst

    Nrel

    Cyber security analyst job in Golden, CO

    Posting Title Classification Information Security Analyst . . Type Regular . Hours Per Week 40 . Working at NLR NLR is located at the foothills of the Rocky Mountains in Golden, Colorado is the nation's primary laboratory for energy systems research and development. Join the National Laboratory of the Rockies (NLR), where world-class scientists, engineers, and experts are accelerating energy innovation through breakthrough research and systems integration. From our mission to our collaborative culture, NLR stands out in the research community for its commitment to an affordable and secure energy future. Spanning foundational science to applied systems engineering and analysis, we focus on solving complex challenges to deliver advanced, secure, reliable, and cost-effective energy solutions. Our work helps strengthen U.S. industries, support job creation, and promote national economic growth. At NLR, you'll find a mission-driven environment supported by state-of-the-art facilities, multidisciplinary research teams, and strong collaborations with industry, academia, and other national laboratories. We offer robust professional development opportunities, and a competitive benefits package designed to support your career and well-being. Job Description The Office of Laboratory Protection (LP) is an organization focused on providing a secure, safe, and resilient NLR community. LP supports more than 4,000 staff located at four sites and the associated infrastructure. LP is comprised of a team of highly skilled managers and technical subject matter experts dedicated to personnel security, physical security, access control, information security, foreign national access management, emergency management, and protective force operations. The Safeguards & Security Group Manager is seeking a skilled and motivated Classification Information Security Analyst to join our team. This pivotal role is primarily responsible for the continued implementation and management of the Controlled Unclassified Information (CUI) program, while also supporting Classified Matter Protection and Control (CMPC), and Operations Security (OPSEC) programs as necessary. The successful candidate will ensure that CUI requirements are integrated into organizational operations and information management processes. This role requires close collaboration with Legal, Export Control, Business Development, Information Governance, IT, and other stakeholders to ensure compliance with DOE and other federal agencies information protection policies. Responsibilities include: Policy Expertise: * Maintain up-to-date knowledge of federal OPSEC, CUI, and Classification policies, laws, and regulations. Program Management: * Lead the continued implementation and oversight of the CUI program, including policy, program, and procedure reviews and updates. * Collaborate with peer CUI specialists to develop and integrate CUI management solutions into NLR's broader information protection framework. * Support the OPSEC and CMPC programs in coordination with INFOSEC assurance analysts. * Provide strategic planning, risk management, and program oversight. * Mentor staff to ensure compliance with applicable requirements documents and procedures. * Coordinate CUI misuse determination, resolution, and reporting. * Conduct internal reviews and audits to ensure adherence to security requirements. Training & Education: * Review and revise existing CUI training materials; participate in working groups to enhance awareness programs. * Provide guidance on proper marking, handling, and safeguarding of CUI, classified, and sensitive information. * Support onboarding and refresher training for NLR personnel. Analysis & Recommendations: * Analyze information to determine appropriate CUI, OPSEC, and classification controls for NLR programs and initiatives. * Work to resolve security related issues that impact organizational goals. Document Review & Incident Management: * Assist in the review of information as requested to identify and protect sensitive and classified information. * Assist with the oversight of proper labeling of CUI documents. * Participate in the analysis and investigation of incidents of security concern. Stakeholder Engagement and Relationship Building: * Collaborate with internal stakeholders (Legal, IT, Program Management, project managers) to ensure consistent CUI compliance. * Build strong working relationships with DOE, lab leadership, and staff to balance security priorities with research and operations objectives in a customer focused manner. Additional Responsibilities: * Prepare and maintain lab level procedures, training, and internal SOPs * Promote a culture of safety, respect, accountability, and professionalism. * Other duties as assigned by management. . Basic Qualifications Relevant Bachelor's Degree and 5 or more years of experience or equivalent relevant education/experience. Or, relevant Master's Degree and 3 or more years of experience or equivalent relevant education/experience. Or, relevant PhD or equivalent relevant education/experience. Or, relevant JD or equivalent relevant education/experience. Complete understanding and wide application of technical principles, theories and concepts in the field. General knowledge of other related disciplines. Considerable knowledge of laws, regulations, principles, procedures and practices related to specific field. Strong leadership, project management and problem solving skills. Ability to use various computer software programs. DOE Q or TS Clearance: Must be able to obtain and maintain a DOE security clearance at the DOE (Q) and SCI access or DoD (TS) and SCI level. SCI access may require a polygraph examination. Eligibility requirements: To obtain a clearance, an individual must be at least 18 years of age; U.S. citizenship is required except in very limited circumstances. See DOE O 472.2A for additional information. * Must meet educational requirements prior to employment start date. Additional Required Qualifications * Bachelor's degree in a relevant field and at least 8 years of relevant experience in information security or reviewing research documents (or equivalent combination of education and experience). * Ability to respond to inquiries about document markings and accountability requirements. * Experience developing and delivering training on protecting CUI, proprietary, or classified information. * Motivated self-starter with the ability to work independently and as part of collaborative teams across the laboratory and DOE complex. * Strong problem-solving skills, with the ability to adapt to shifting priorities and meet deadlines. * Proficient in Microsoft Office. * Ability to use discretion and maintain strict confidentiality. * Ability to work both independently and collaboratively in a team-based environment. * Ability to obtain and maintain a TS clearance (see basic qualifications). Preferred Qualifications . Job Application Submission Window The anticipated closing window for application submission is up to 30 days and may be extended as needed. Annual Salary Range (based on full-time 40 hours per week) Job Profile: Professional III / Annual Salary Range: $81,500 - $146,700 NLR takes into consideration a candidate's education, training, and experience, expected quality and quantity of work, required travel (if any), external market and internal value, including seniority and merit systems, and internal pay alignment when determining the salary level for potential new employees. In compliance with the Colorado Equal Pay for Equal Work Act, a potential new employee's salary history will not be used in compensation decisions. Benefits Summary Benefits include medical, dental, and vision insurance; short*- and long-term disability insurance; pension benefits*; 403(b) Employee Savings Plan with employer match*; life and accidental death and dismemberment (AD&D) insurance; personal time off (PTO) and sick leave; paid holidays; and tuition reimbursement*. NLR employees may be eligible for, but are not guaranteed, performance-, merit-, and achievement- based awards that include a monetary component. Some positions may be eligible for relocation expense reimbursement. Limited-term positions are not eligible for long-term disability or tuition reimbursement. * Based on eligibility rules Badging Requirement NLR is subject to Department of Energy (DOE) access restrictions. All employees must also be able to obtain and maintain a federal Personal Identity Verification (PIV) card as required by Homeland Security Presidential Directive 12 (HSPD-12), which includes a favorable background investigation. Drug Free Workplace NLR is committed to maintaining a drug-free workplace in accordance with the federal Drug-Free Workplace Act and complies with federal laws prohibiting the possession and use of illegal drugs. Under federal law, marijuana remains an illegal drug. If you are offered employment at NLR, you must pass a pre-employment drug test prior to commencing employment. Unless prohibited by state or local law, the pre-employment drug test will include marijuana. If you test positive on the pre-employment drug test, your offer of employment may be withdrawn. Submission Guidelines Please note that in order to be considered an applicant for any position at NLR you must submit an application form for each position for which you believe you are qualified. Applications are not kept on file for future positions. Please include a cover letter and resume with each position application. . Equal Opportunity Employer All qualified applicants will receive consideration for employment without regard basis of age (40 and over), color, disability, gender identity, genetic information, marital status, domestic partner status, military or veteran status, national origin/ancestry, race, religion, creed, sex (including pregnancy, childbirth, breastfeeding), sexual orientation, and any other applicable status protected by federal, state, or local laws. Reasonable Accommodations E-Verify ******************** For information about right to work, click here for English or here for Spanish. E-Verify is a registered trademark of the U.S. Department of Homeland Security. This business uses E-Verify in its hiring practices to achieve a lawful workforce.
    $81.5k-146.7k yearly Auto-Apply 9d ago
  • Information Systems Security Officer

    True Anomaly

    Cyber security analyst job in Denver, CO

    A new space race has begun. True Anomaly seeks those with the talent and ambition to build innovative technology that solves the next generation of engineering, manufacturing, and operational challenges for space security and sustainability. OUR MISSION The peaceful use of space is essential for continued prosperity on Earth-from communications and finance to navigation and logistics. True Anomaly builds innovative technology at the intersection of spacecraft, software, and AI to enhance the capabilities of the U.S., its allies, and commercial partners. We safeguard global security by ensuring space access and sustainability for all. OUR VALUES Be the offset. We create asymmetric advantages with creativity and ingenuity What would it take? We challenge assumptions to deliver ambitious results It's the people. Our team is our competitive advantage and we are better together YOUR MISSION The Information Systems Security Officer (ISSO) will oversee the security posture of all classified information systems and develop/revise necessary Risk Management Framework (RMF) documentation to support system authorization. The role reports to the Vice President of Facilities and Government Security and will be onsite in our Denver, CO office. RESPONSIBILITIES Build and update standard RMF packages, including the Systems Security Plam (SSP), Plan of Actions and Milestones (POAMs), Security Control Traceability Matrix (SCTM), hardware and software inventories, and network topology diagrams. Lead the development and implementation of security policies and procedures required by assessment and authorization activities in accordance with ICD-503, DAAPM, NISPOM, JSIG, and NIST 800-53. Program guidance and direction to program personnel, ensuring effective communication within the roles. Collaborate with System Administrators and Network Engineers to ensure timely application of security patches and secure configurations in line with Security Technical Implementation Guidelines (STIGs). QUALIFICATIONS 5-11 years of relevant work experience. Assist with information system security management and day-to-day security operations. Serve as a member of the Change Control Board (CCB) to ensure configuration management for Cybersecurity-relevant software, hardware, and firmware is maintained and documented. Ensure all personnel receive the necessary technical and security training to perform their duties effectively. Conduct security reviews of proposed changes or additions to the information system (including hardware or software) and advise the Information System Security Manager (ISSM) on security relevance. Perform vulnerability/risk assessment analysis to support continuous monitoring and the certification and accreditation process. U.S. Citizen and eligible for DoD Secret or TS/SCI clearance. PREFERRED SKILLS AND EXPERIENCE Current active DoD TS/SCI clearance. COMPENSATION Base Salary: $80,000-$150,000 Equity + Benefits including Health, Dental, Vision, HRA/HSA options, PTO and paid holidays, 401K, Parental Leave Your actual level and base salary will be determined on a case-by-case basis and may vary based on the following considerations: job-related knowledge and skills, education, location, and experience. ADDITIONAL REQUIREMENTS Work Location-this position will be fully onsite in our Gravity Works office in Centennial, CO. Work environment-the work environment; temperature, noise level, inside or outside, or other factors that will affect the person's working conditions while performing the job. Physical demands-the physical demands of the job, including bending, sitting, lifting and driving. This position will be open until it is successfully filled. To submit your application, please follow the directions below. #LI-Onsite To conform to U.S. Government space technology export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a U.S. citizen, lawful permanent resident of the U.S., protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the U.S. Department of State. True Anomaly is committed to equal employment opportunity on any basis protected by applicable state and federal laws. If you have a disability or additional need that requires accommodation, please do not hesitate to let us.
    $80k-150k yearly Auto-Apply 33d ago
  • Cyber Security Engineer

    Eide Bailly 4.4company rating

    Cyber security analyst job in Denver, CO

    Work Options: Remote (with some travel expectations to client sites) Typical Day in the Life As a Security Engineer, you will help our clients' costs effectively improve, manage and protect infrastructure to meet business demands by developing premise and cloud strategies, processes, and tools for secure implementations, operations, support and secure management. You will also work directly with clients to prepare, protect, detect, respond and recover along all points of the security lifecycle. You understand the technical and non-technical issues and challenges they are facing and use this knowledge and your experience to design tailored technical solutions that align to the organization's objectives and needs. A typical day as a Security Engineer may include: * Design, implement and manage various technologies for clients with security, high availability, disaster recovery, performance and reliability for network and server systems. * Consult with clients to provide recommendations on how to improve their technical environments and ensure a high level of uptime. * Identify new and leverage existing technology solutions to solve security problems. * Evaluate and implement new security technologies for our clients to improve their security posture. * Lead systems analysis and ensure satisfactory performance by providing recommendations, assessments, planning, deployment, configuring, systems integration, troubleshooting, problem resolution, and maintenance of operating systems, software applications, web deployed applications, and security systems. * Develop technical summary information and reports for presentation to management and clients * Perform research and lead proof of concept efforts to determine where additional technologies may be necessary. * Engage with incident response teams and client IT teams for rapid containment and log collection * Lead solution architecture, implementation and support to protect customer environments from breach and other threats. * Assist with comprehensive investigations and triage on wide variety of client environments and implement respond and remediation efforts. * Cultivate new and existing client relationships to identify technology and security opportunities with clients and prospects based on business and technology conversations. * Develop Statements of Work with defining scope, approach and estimated work effort to support our clients' needs. * Provide technical mentorship and leadership to grow technical staff knowledge and experience. * Maintain awareness of technology trends and issues to apply that knowledge to client issues and solutions. * Apply advanced subject matter knowledge to complex security and technology issues. * This role requires being well-versed and adept in Cyber tools and technologies (including security products/platforms) and having experience developing relationships with technical and business contacts/partners. It also requires a passion for delivering proven results and driving revenue. * Excellent client facing skills, the ability to effectively influence clients and prospects, and excellent communication and presentation skills are critical. Who You Are * You have a bachelor's degree in computer science, management information systems, and infrastructure security. * Ideal candidate will have more than 8 years working in a similar role focused on advising clients on security posture and security best practices. * You have extensive history designing, implementing and managing security solutions. * You have prior experience presenting to C Level executives, business owners and stakeholders and are effective engaging in technical discussions with non-technical leaders and briefing senior executives on threats in their current environment and industry * Confident in leading project meetings and working as part of a technical team to design, implement and manage security solutions. * Work effectively independently and as part of a team. * Flexible and able to accommodate changing schedules of client and project needs and willingness to work extended hours when needed. * Rigorous attention to detail and strong analytical skills. * You can prioritize work and handle multiple tasks in a fast-paced environment. * Experience with a wide range of security-related topics such as authentication, identity management, data protection, data loss prevention, encryption, principle of least privilege, software attack methodologies, secure data transfer, secure data storage, etc. * Excellent understanding of IT protocols, technologies such as TCP/IP, OSI model and various other protocols, tools and methods * Excellent communication and collaboration with team members, practice areas and clients * Excellent windows and network troubleshooting abilities You have prior experience with Virtualization platforms. * You have experience with next generation endpoint protection and email security filtering solutions. * Able to configure and deploy Entra ID conditional access policies to secure data, apps, devices, and identities. * Able to configure and deploy device policies using Intune to push security configurations. * Able to configure and deploy Sentinel for security logging and monitoring. * Able to monitor and respond to alerts and incidents in the Defender portal. * AZ-500 Microsoft Azure Security Technologies * AZ-900 Microsoft Azure Fundamentals certification * Travel is up to 40% possible. Must be authorized to work in the United States now or in the future without visa sponsorship. Culture at Eide Bailly Integrity. Meaningful Relationships. People. Authenticity. Trust. That's how we work. Eide Bailly is one of the top 25 CPA and business advisory firms in the nation. Our people are the foundation for our success. People join Eide Bailly for the opportunities and stay because of the culture. We're focused on building a collaborative workplace based on integrity, authenticity, and support for one another. You'll find opportunities for education and career growth, a team dedicated to your growth and success, and benefits that put you and your family's needs first. Hear what our employees have to say about working at Eide Bailly. Compensation Base salary range: $95,000 - $130,000 Our compensation philosophy emphasizes competitive and equitable pay. Eide Bailly complies with all local/state regulations regarding displaying ranges. Final compensation decisions are dependent upon factors such as geography, experience, education, skills, and internal equity. Benefits Beyond base compensation, Eide Bailly provides benefits such as: generous paid time off, comprehensive medical, dental, and vision insurance, 401(k) profit sharing, life and disability insurance, lifestyle spending account, certification incentives, education assistance, and a referral program. Next Steps We'll be in touch! If you look like the right fit for our position, one of our recruiters will be reaching out to schedule a phone interview with you to learn more about your career interests and goals. In the meantime, we encourage you to learn more about us on Facebook, Twitter, Instagram, LinkedIn or our About Us page. For extra assistance in your job search journey, explore EB Career Resources-a complimentary external tool that offers career exploration, resume workshops, interview prep and other professional development options. #LI-BC1 #LI-REMOTE
    $95k-130k yearly Auto-Apply 15d ago
  • Information System Security Officer II (TS/SCI Clearance Required)

    Sierra Space 4.2company rating

    Cyber security analyst job in Louisville, CO

    Sierra Space Careers: At Sierra Space, we build the missions and systems that keep our world secure in the domain above Earth. Sierra Space team members share a spirit of innovation and collaboration and a belief that we can deliver on the boldest missions in space today. Together with our customers, we aim to safeguard our nation, sustain human presence in space, and secure the freedom of operations in low Earth orbit and beyond. Our success is measured by the trust of those who rely on what we build and deliver, and our technologies keep the United States and its allies mission-ready throughout space. We are mission-driven, and together, we are an extraordinary team. About the RoleWe are seeking a highly skilled and experienced Information Systems Security Officer (ISSO) with a strong emphasis on the Risk Management Framework (RMF). The ISSO will be responsible for ensuring the security and integrity of our information systems by implementing and managing security measures in accordance with RMF guidelines. The ideal candidate will have a deep understanding of RMF processes, cybersecurity principles, and compliance requirements.About You Our mission is driven by an unyielding commitment to advancing space-based technology in service of our customers and safeguarding national security. We seek individuals who are passionate about innovating beyond boundaries and relentlessly pursuing solutions that protect, preserve and empower - to join us in this critical mission. We're looking for team members who align with our values, mission and goals - while also meeting the minimum qualifications below. The preferred qualifications are a bonus, not a requirement. Key Responsibilities: Develop, implement, and maintain security policies, procedures, and controls in accordance with RMF guidelines. Conduct risk assessments to identify potential security threats and vulnerabilities. Develop and maintain System Security Plans (SSPs) and other required documentation. Ensure compliance with federal, state, and organizational security regulations and standards. Perform continuous monitoring of information systems to detect and respond to security incidents. Collaborate with system owners, administrators, and other stakeholders to ensure security controls are effectively implemented. Conduct security control assessments and audits to evaluate the effectiveness of security measures. Provide guidance and support for the development and implementation of security controls. Prepare and present security status reports to management and other stakeholders. Stay current with emerging security trends, threats, and technologies. Minimum Qualifications: Requires Bachelor's degree in a related field (or equivalent work experience in lieu of degree). Typically 2+ years of related experience. Certifications: (1 or more required) GIAC (Global Information Assurance Certification), network technology certifications such as a CCNP (Cisco Certified Network Professional), or SANS level 200 courses. Knowledge of secure software development. Knowledge of cyber supply chain threat monitoring. An active Top Secret with SCI eligibility and the ability to obtain a CI polygraph U.S. Security Clearance. Preferred Qualifications: In-depth knowledge of RMF processes, NIST SP 800-37, NIST SP 800-53, and other relevant standards. Experience with security assessment and authorization (A&A) processes. Strong understanding of cybersecurity principles, including risk management, incident response, and vulnerability management. Relevant certifications such as CISSP, CISM, CAP, or similar are highly desirable. Excellent analytical, problem-solving, and communication skills. Ability to work independently and as part of a team in a fast-paced environment. Compensation: Pay Range: $94,050.00 - $129,318.75 Your actual base compensation will be determined on a case-by-case basis and may vary based on job-related knowledge and skills, education, experience, internal equity and market competitiveness. Elevate Your Career At Sierra Space, we are committed to your personal and professional development. We empower you to make profound and meaningful contributions and foster a vibrant culture of collaboration, where teamwork ignites breakthrough innovations. We also offer a generous benefit package, including medical, dental, and vision plans, 401(k) with 150% match up to 6%, life insurance, 3 weeks paid time off, and more. Sierra Space is an industry-leading space and defense technology company providing satellites, spacecraft, and enabling mission systems and components. We deliver mission-proven technologies to our customers that safeguard our nation, protect space-based assets and enable space exploration. Application Deadline: This role will remain posted until a qualified pool of candidates is identified. Please note: Sierra Space does not accept unsolicited resumes from contract agencies or search firms. Any unsolicited resumes submitted to our website or to Sierra Space team members not through our approved vendor list or Talent Acquisition will be considered property of Sierra Space, and we will not be obligated to pay any referral fees. Sierra Space Corporation is an equal opportunity employer and is committed to working with and providing reasonable accommodations to applicants with disabilities. If you need special assistance or a reasonable accommodation related to applying for employment with Sierra Space or at any stage of the recruitment process, please contact us.
    $94.1k-129.3k yearly Auto-Apply 24d ago
  • Information Security Engineer

    C4 Technical Services 3.4company rating

    Cyber security analyst job in Broomfield, CO

    Responsible for providing network security expertise related to any of the following: activation and turn up of customer security equipment, failover testing, monitoring network security devices, troubleshooting, investigation of events, debug, investigation of incidents, escalation or mitigation of incidents and events, network security analysis, or deployment of devices. 2-4 years of experience in IT, networking or cybersecurity required. Targeted and Recommended Certifications and Skills: Fortinet / Fortigate Security Experience Needed - Top skill One of the following - NSE4, NSE 5-Analyzer, NSE 5 - Manager, NSE 7 CCNA CCNP Cisco Router/Routing Background IRF- integrated router firewall background Next-Generation Firewall background Routing background Project Date and Time needs: Monday to Friday ** Standard Business Hours **
    $67k-92k yearly est. 60d+ ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Denver, CO

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. **Responsibilities:** + **M&A Integration Execution:** Collaborate and engage with IAM Lead and other business partners on planning, design, and execution of IAM integration strategies for M&A activities, ensuring alignment with overall business and security objectives. This includes assessing the IAM landscapes of merging entities to identify challenges and solutions. + **Design and Implement Sailpoint IIQ Solutions:** Configure and customize Sailpoint IIQ components (Lifecycel Manager, Compliance Manager etc). Also develop workflows, rules, and connectors for identity governance. + **Application integration with Sailpoint IIQ:** Integrate Sailpoint IIQ with enterprise applications, directories and cloud platforms in addition to developing and maintaining connectros for provisioning and de-provisioning. + **Sailpoint IIQ Development and Scripting:** Write and maintain BeanShell scripts, Java code and XML configurations, develop customer Sailpoint tasks and workflows. + **Identity System Merging & Consolidation:** Manage the complex process of merging disparate identity providers, user directories (e.g., Active Directory, Azure AD, LDAP), and access management systems from acquired companies into the existing infrastructure. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Security & Compliance:** Ensure IAM systems and processes comply with regulatory requirements (e.g., GDPR, HIPAA, SOX) and internal security policies, providing auditable records of access activities. Protect against data breaches by ensuring only authorized personnel can access sensitive information. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Collaboration & Communication:** Coordinate cross-functional teams, including Information Security, IT Operations, HR, and Application Development, to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical stakeholders. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications** + Experience with SailPoint IdentityIQ (IIQ) is a must + Experience with SailPoint IIQ Integrations (Workday, Active Directory/LDAP, Webservices, SCIM, JDBC, SAP) + Experience implementing Life Cycle Manager (LCM) Configuration workflow tasks that model business functions, including Lifecycle Requests (Role or Entitlement), Lifecycle Events (Joiner, Mover, or Leaver), and LCM Workflow Details (Workflows and Subprocesses) + Solid understanding of the SailPoint object model, rules, and policies + Experience with both lifecycle manager (LCM) and compliance manager (CM) modules + Knowledge of Active Directory, LDAP, Workday, and cloud platforms (GCP, MS Entra ID) is required + Proven track record of successful IAM implementations including large scale enterprise deployments. + Experience working within regulatory standards and requirements such as, SOX, HIPAA, GDPR etc. is desired. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 29d ago
  • Denver CO_Data Security Analyst_Cisco Certified_Linux exp

    360 It Professionals 3.6company rating

    Cyber security analyst job in Denver, CO

    360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement. Job Description We are looking to fill a position for Data Security in Denver CO. Qualifications Short Description: Selected person will be responsible to maintain systems to protect data from unauthorized users. Identifies, reports, and resolves security violations. May require a bachelor's degree in area of specialty and at least 1 year or equivalent experience in the field or in a related area. CCNA CCNP+ (security) CCSA (security) Linux Additional Information Webcam interview is acceptable.
    $68k-93k yearly est. 60d+ ago
  • Information Security Analyst 3rd shift

    Global Channel Management

    Cyber security analyst job in Broomfield, CO

    Global Channel Management is a technology company that specializes in various types of recruiting and staff augmentation. Our account managers and recruiters have over a decade of experience in various verticals. GCM understands the challenges companies face when it comes to the skills and experience needed to fill the void of the day to day function. Organizations need to reduce training and labor costs but at same requiring the best "talent " for the job. Qualifications 3rd shift (mon, tues, thurs, fri) 7pm - 6am MST Required Skills (Minimum knowledge, skills and abilities to enter the job): • Minimum of 1-3 years of experience within the IT field • Exceptional written and oral communication skills • Strong critical thinking and analytical skills • Attention to detail • Experience handling security incidents, to include reviewing raw log files, data correlation, and analysis • Experience with and thorough understanding of attack vectors, threat tactics, and attacker techniques • Able to proactively perform duties and responsibilities with little-to-no direction • Able to effectively and efficiently collaborate with a diverse and geographically distributed team • Must be willing and able to work a shift routine • Ensure successful handoff of procedures between shifts Desired Skills (Preferred not required): • Bachelor's degree in computer science, information technology, or related field is required • Experience with enterprise information security data management tools such as ArcSight or Splunk is preferred • Solid experience in scripting languages such as (or similar to) Python, PERL, and Ruby is a plus • Proficiency with RSA Archer • Experience with industry standard frameworks • Experience with YARA, regex, or other host/network-based signature development Additional Information $38/hr 6 MONTHS
    $38 hourly 23h ago
  • Information security (IS) engineers

    Stem Xpert

    Cyber security analyst job in Denver, CO

    TekWissen provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each clients requirements and span the services spectrum from Application Development/Maintenance, testing, IT Consulting & staffing for IT Infrastructure Management through strategic consulting and industry oriented Business Process. Our end-to-end Business Process as a Service (BPaaS) solutions support complex, high-value, knowledge based work. Combining applications, platforms, infrastructure, knowledge processes, and domain expertise allows us to deliver greater efficiencies and innovative business capabilities. Why TekWissen • Proven experience in delivering high performance data driven results since 2009. • We give our clients access to the same collaboration tools used internally by our development team, providing full visibility into project progress and team communication. .Client also has access to source code, so you can provide feedback early on. • Same team throughout the whole development phase and support. We consider loyalty to be our strategic priority. • Competitive cost structure utilizing offshore resources. • Ability to provide cost efficient post launch support. • Time zone allows daily morning Scrum meeting with entire team. For clients in the US, the overlap is 10-12 hours a day. • Low up-front investment we are open to start with a small trial project. • No lock-in - You can adjust the team size up and down as needed upon two weeks' notice • Our projects managers are based in both the US and India. You can opt for a US-based project manager. • We work on fixed price projects, essentially taking on the risk for cost overruns and miscalculations. This also helps clients budget with more certainty. • Keep you in the know of where the industry is going so you get the advantage of new technology. Job Description This position is to engineer, deploy, and manage current and future systems and tools, including Axway SecureTransport and JIRA environments for the Department of Labor and Employment. Assists with the deployment of an enterprise managed file transfer system and Agile implementation system. Works to integrate the enterprise managed file transfer system with other software platforms throughout the organization. Works with both internal and external file transfers. Works hand in hand with project managers, other engineers, administrators, and customers to deliver projects on time and on budget. Assists with the development of documentation for requirements, architectural designs, engineering drawings and diagrams, as well as operational policies and procedures. Assists with the development of documents and best practices for system installation, deployment, and operation. Encourages an environment of sharing and teamwork among the project teams. Experience with managed FTP required, and experience with Axway Secure Transport and JIRA preferred. Experience with managed file transfer and FTP/SFTP protocols required. Experience with network architecture required. Basic understanding of DNS required. Experience with Cygwin, Tomcat, Apache, Perl, PHP, and Java preferred. Experience with server administration, especially Windows Server 2012 preferred. Qualifications Experience with managed file transfer and FTP/SFTP protocols required. Experience with network architecture required. Basic understanding of DNS required. Experience with Cygwin, Tomcat, Apache, Perl, PHP, and Java preferred. Additional Information AGILE - Agile Development Methodology Communication skills both verbal and written Microsoft SQL Server Tomcat
    $67k-91k yearly est. 60d+ ago
  • Information security (IS) engineers

    Practice Xpert Inc. 3.7company rating

    Cyber security analyst job in Denver, CO

    TekWissen provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each clients requirements and span the services spectrum from Application Development/Maintenance, testing, IT Consulting & staffing for IT Infrastructure Management through strategic consulting and industry oriented Business Process. Our end-to-end Business Process as a Service (BPaaS) solutions support complex, high-value, knowledge based work. Combining applications, platforms, infrastructure, knowledge processes, and domain expertise allows us to deliver greater efficiencies and innovative business capabilities. Why TekWissen • Proven experience in delivering high performance data driven results since 2009. • We give our clients access to the same collaboration tools used internally by our development team, providing full visibility into project progress and team communication. .Client also has access to source code, so you can provide feedback early on. • Same team throughout the whole development phase and support. We consider loyalty to be our strategic priority. • Competitive cost structure utilizing offshore resources. • Ability to provide cost efficient post launch support. • Time zone allows daily morning Scrum meeting with entire team. For clients in the US, the overlap is 10-12 hours a day. • Low up-front investment we are open to start with a small trial project. • No lock-in - You can adjust the team size up and down as needed upon two weeks' notice • Our projects managers are based in both the US and India. You can opt for a US-based project manager. • We work on fixed price projects, essentially taking on the risk for cost overruns and miscalculations. This also helps clients budget with more certainty. • Keep you in the know of where the industry is going so you get the advantage of new technology. Job Description This position is to engineer, deploy, and manage current and future systems and tools, including Axway SecureTransport and JIRA environments for the Department of Labor and Employment. Assists with the deployment of an enterprise managed file transfer system and Agile implementation system. Works to integrate the enterprise managed file transfer system with other software platforms throughout the organization. Works with both internal and external file transfers. Works hand in hand with project managers, other engineers, administrators, and customers to deliver projects on time and on budget. Assists with the development of documentation for requirements, architectural designs, engineering drawings and diagrams, as well as operational policies and procedures. Assists with the development of documents and best practices for system installation, deployment, and operation. Encourages an environment of sharing and teamwork among the project teams. Experience with managed FTP required, and experience with Axway Secure Transport and JIRA preferred. Experience with managed file transfer and FTP/SFTP protocols required. Experience with network architecture required. Basic understanding of DNS required. Experience with Cygwin, Tomcat, Apache, Perl, PHP, and Java preferred. Experience with server administration, especially Windows Server 2012 preferred. Qualifications Experience with managed file transfer and FTP/SFTP protocols required. Experience with network architecture required. Basic understanding of DNS required. Experience with Cygwin, Tomcat, Apache, Perl, PHP, and Java preferred. Additional Information AGILE - Agile Development Methodology Communication skills both verbal and written Microsoft SQL Server Tomcat
    $66k-90k yearly est. 1m ago
  • Malware Defense Malware Analyst

    Bank of America Corporation 4.7company rating

    Cyber security analyst job in Denver, CO

    At Bank of America, we are guided by a common purpose to help make financial lives better through the power of every connection. We do this by driving Responsible Growth and delivering for our clients, teammates, communities and shareholders every day. Being a Great Place to Work is core to how we drive Responsible Growth. This includes our commitment to being an inclusive workplace, attracting and developing exceptional talent, supporting our teammates' physical, emotional, and financial wellness, recognizing and rewarding performance, and how we make an impact in the communities we serve. Bank of America is committed to an in-office culture with specific requirements for office-based attendance and which allows for an appropriate level of flexibility for our teammates and businesses based on role-specific considerations. At Bank of America, you can build a successful career with opportunities to learn, grow, and make an impact. Join us! Bank of America is one of the world's leading financial institutions, serving over 66 million consumers and small businesses. Company success is only possible with a strong cyber defense, which enables Bank of America to safely conduct global operations across the United States and in approximately 35 countries. Our primary goal is to safeguard not only the company, but our clients and their trust. The Malware Defense Team is looking for top talent who would like to join one of the most advanced cybersecurity teams in the world. Responsibilities include, but are not limited to: * In-depth analysis of malware, including authoring analysis reports. * Tracking malware campaigns, malicious actors, and related infrastructure. * Creation of tools and scripts to assist in the analysis of malware analysis. * Field escalations of potentially malicious files and websites from teams within Malware Defense. Required Qualifications: * Strong direct experience of analyzing malware. * Intermediate to advanced malware analysis skills. * Experience creating innovative ways to track progression of malware families, infrastructure, and campaigns conducted by e-crime, and cyber espionage actors. * Experience creating tools and scripts to accelerate malware and threat analysis. * Background in network traffic analysis - WireShark, Fiddler, proxy logs, etc. * Experience analyzing malicious web content such as ClickFix, ClearFake, SocGholish, etc. * Experience authoring YARA, Suricata, and EKFiddle detection rules. * Experience with penetration testing and/or adversary emulation is a plus. * Able to work independently on tasks, but also work well within a team environment Desired Qualifications: * Experience analyzing malware targeting Linux, Android, and IOT platforms. Skills: * Cyber Security * Data Privacy and Protection * Problem Solving * Process Management * Threat Analysis * Business Acumen * Data and Trend Analysis * Interpret Relevant Laws, Rules, and Regulations * Risk Analytics * Stakeholder Management * Access and Identity Management * Data Governance * Encryption * Information Systems Management * Technology System Assessment Shift: 1st shift (United States of America) Hours Per Week: 40
    $63k-85k yearly est. 5d ago
  • Engineer, Information Security and Risk

    Cardinal Health 4.4company rating

    Cyber security analyst job in Denver, CO

    Cardinal Health, Inc. (NYSE: CAH) is a global healthcare services and products company. We provide customized solutions for hospitals, healthcare systems, pharmacies, ambulatory surgery centers, clinical laboratories, physician offices and patients in the home. We are a distributor of pharmaceuticals and specialty products; a global manufacturer and distributor of medical and laboratory products; an operator of nuclear pharmacies and manufacturing facilities; and a provider of performance and data solutions. Working to be healthcare's most trusted partner, our customer-centric focus drives continuous improvement and leads to innovative solutions that improve the lives of people every day. With approximately 50,000 employees worldwide, Cardinal Health ranks among the top fifteen in the Fortune 500. **_Department Overview:_** **Information Technology** oversees the effective development, delivery, and operation of computing and information services. This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. **Information Security and Risk** develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure, or destruction. This job family develops system back-up and disaster recovery plans, conducts incident responses, threat management, vulnerability scanning, virus management and intrusion detection as well as completes risk assessments. Lead IAM work for new customer onboardings and migrations. Collaborate with CAH Account Management, Application Teams, and Customers to design, implement, and test federated SSO solution based on customer login requirements. Provide technical guidance and act as primary point of contact for business partners and customer related to IAM work for onboarding. Additional responsibilities include supporting application integrations and enhancing SSO self service application onboarding. **Responsibilities:** + **Customer Onboarding IAM Efforts - Strategy & Execution :** Lead the planning, design, and execution for Customer Onboarding via federated SSO, ensuring alignment with overall business and security objectives. This includes assessing multiple Cardinal Health e-commerce applications, understanding login requirements for new/existing customers, designing, testing and implementing solutions etc to ensure top notch user login experience and enhancing Cardinal Health's security posture. + **Collaboration & Communication:** Coordinate cross-functional teams, including Customer Business and IT teams, Cardinal Health's Account Management/Sales and Application teams, Information Security and others to ensure effective IAM implementation and seamless integration with business processes. Communicate complex security concepts to technical and non-technical internal and external stakeholders. + **Application Integration Leadership:** Lead the integration of various enterprise applications (SaaS, on-premise, custom-built) with our core IAM infrastructure, ensuring secure authentication, authorization, and user provisioning/de-provisioning. + **User Lifecycle Management:** Streamline and automate user provisioning, de-provisioning, and periodic access reviews for employees, contractors, and partners across all integrated systems, ensuring smooth onboarding and offboarding during M&A transitions. + **Solution Design & Implementation:** Design, implement, and maintain IAM solutions including Single Sign-On (SSO), Multi-Factor Authentication (MFA), and Role-Based Access Control (RBAC) frameworks. + **Technical Troubleshooting & Support:** Troubleshoot, identify, and resolve technical identity and access management-related issues, providing expert support to internal teams and end-users during and after integration. + **Documentation & Best Practices:** Develop, review, and maintain comprehensive technical documentation, including architecture diagrams, configuration guides, and operational procedures. Stay up-to-date with IAM best practices, regulatory requirements, and security trends. **Qualifications:** + **Education:** Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field, or equivalent practical experience. + **Experience:** 5+ years of progressive experience as an IAM Engineer, designing and implementing enterprise scale solutions with significant experience in supporting M&A integration projects preferred. + **Technical Expertise:** + Extensive knowledge and experience with authentication standards and technologies such as SSO (SAML, OAuth, OpenID Connect), MFA + Proficiency in directory services (e.g., Active Directory, Azure AD, LDAP). + Hands-on experience with leading IAM platforms (e.g., Okta, Microsoft Azure AD, CyberArk, ForgeRock, Ping Identity, SailPoint). + Strong understanding of security principles, risk management, and access control models (e.g., RBAC). + Familiarity with Zero Trust architecture principles. + Familiarity with AI/ML concepts and their practical application in security and risk management, especially in IAM context. + Strong communication and interpersonal skills to collaborate effectively with various teams and stakeholders. + Detail-oriented mindset to ensure precise access control configurations and compliance. + Excellent problem-solving and analytical abilities to troubleshoot access issues and design solutions for unique business requirements + Must be a self-starter who takes full ownership of projects from inception to completion , holding oneself accountable for the security and operation integrity of IAM platform. + Ability to manage multiple priorities and meet tight deadlines in a fast-paced M&A environment. **Anticipated salary range:** $94,900 - $135,600 **Bonus eligible:** No **Benefits:** Cardinal Health offers a wide variety of benefits and programs to support health and well-being. + Medical, dental and vision coverage + Paid time off plan + Health savings account (HSA) + 401k savings plan + Access to wages before pay day with my FlexPay + Flexible spending accounts (FSAs) + Short- and long-term disability coverage + Work-Life resources + Paid parental leave + Healthy lifestyle programs **Application window anticipated to close:** 12/20/2025 *if interested in opportunity, please submit application as soon as possible. The salary range listed is an estimate. Pay at Cardinal Health is determined by multiple factors including, but not limited to, a candidate's geographical location, relevant education, experience and skills and an evaluation of internal pay equity. _Candidates who are back-to-work, people with disabilities, without a college degree, and Veterans are encouraged to apply._ _Cardinal Health supports an inclusive workplace that values diversity of thought, experience and background. We celebrate the power of our differences to create better solutions for our customers by ensuring employees can be their authentic selves each day. Cardinal Health is an Equal_ _Opportunity/Affirmative_ _Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, ancestry, age, physical or mental disability, sex, sexual orientation, gender identity/expression, pregnancy, veteran status, marital status, creed, status with regard to public assistance, genetic status or any other status protected by federal, state or local law._ _To read and review this privacy notice click_ here (***************************************************************************************************************************
    $94.9k-135.6k yearly 29d ago
  • Information security (IS) engineers

    360 It Professionals 3.6company rating

    Cyber security analyst job in Denver, CO

    360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement. Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile. Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us. We make sure that we deliver performance driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change. Job Description Information security (IS) engineers will collect, review, evaluate and interpret data; diagnose normal and abnormal patterns; develop and implement security rules and policies; diagnose and troubleshoot problems; solve problems; and design and implement solutions based on security principals, best practice and existing technologies. Engineers may also configure, maintain and install equipment; develop or modify source code; write scripts; harden or secure applications or databases; or respond to and resolve information security incidents depending on their area of specialty. All engineering specialties may also plan, implement, evaluate, review and status projects involving information security solutions in their specialty area. They document their work or the work of others on their projects. Engineers must be able to clearly communicate and escalate problems, issues and solutions to technical and non-technical audiences alike using verbal, written and graphical communication. They must be able to work on interdisciplinary teams to develop solutions that are integrated across organizational and functional lines. Duties: Primary job duties include the following: ● Address security risk assessment findings and recommendations for two key systems, Colorado Benefits Management System (JAVA, Linux, Oracle) and PEAK (force.com platform) ● Assist the state with updating processes and procedures in support of security plans for Federal Agencies (Social Security Administration, CMS and IRS) ● Provide recommendations for software and hardware configurations to support security standards and setting up a HW/SW asset license management system. ● Assist the state with planning the migration of one major system to new hardware and implementing the required controls. ● Participate in the definition and implementation of projects to upgrade the systems and infrastructure to comply with revised standards for security and privacy, including MARS E v 2.0 for CMS and publication 1075 for IRS and management of FTI data. ● Recommend changes to the process for planning and validating the application of patches. ● Assist with the implementation of a Governance, Risk Compliance (GRC) tool ● Review application code and operating system vulnerability scans and oversee remediation Qualifications Minimum Requirements: ● Minimum of 3 years of experience in a system development environment ● Minimum of 3 years' experience developing and implementing technical projects ● Minimum of 5 years' experience as a security engineer or security auditor ● Clear Communicator (written and verbal) ● Experienced with using common business applications; such as, Google Docs, Microsoft Office (Word, Excel), Microsoft Project ● Strong analytical and research skills using the Internet and other tools ● Strong verbal communication skills and ability to facilitate a planning session or meeting ● Understanding of data governance, including the security requirements for PII and PHI. ● Must be able to work independently and be proactive in reaching for information ● Must be comfortable in an environment with change and many concurrent projects Desired Experience: ● Understanding of a government environment and data governance ● Experience in the application of commonly accepted concepts and practices specific to the secure design and development of technical documents ● JAVA and Salesforce development Additional Information Thanks & Regards Vikas Kumar vikas.kumar(@)360itpro.com
    $76k-101k yearly est. 60d+ ago
  • Information Security Analyst 3rd shift

    Global Channel Management

    Cyber security analyst job in Broomfield, CO

    Global Channel Management is a technology company that specializes in various types of recruiting and staff augmentation. Our account managers and recruiters have over a decade of experience in various verticals. GCM understands the challenges companies face when it comes to the skills and experience needed to fill the void of the day to day function. Organizations need to reduce training and labor costs but at same requiring the best "talent " for the job. Qualifications 3rd shift (mon, tues, thurs, fri) 7pm - 6am MST Required Skills (Minimum knowledge, skills and abilities to enter the job): • Minimum of 1-3 years of experience within the IT field • Exceptional written and oral communication skills • Strong critical thinking and analytical skills • Attention to detail • Experience handling security incidents, to include reviewing raw log files, data correlation, and analysis • Experience with and thorough understanding of attack vectors, threat tactics, and attacker techniques • Able to proactively perform duties and responsibilities with little-to-no direction • Able to effectively and efficiently collaborate with a diverse and geographically distributed team • Must be willing and able to work a shift routine • Ensure successful handoff of procedures between shifts Desired Skills (Preferred not required): • Bachelor's degree in computer science, information technology, or related field is required • Experience with enterprise information security data management tools such as ArcSight or Splunk is preferred • Solid experience in scripting languages such as (or similar to) Python, PERL, and Ruby is a plus • Proficiency with RSA Archer • Experience with industry standard frameworks • Experience with YARA, regex, or other host/network-based signature development Additional Information $38/hr 6 MONTHS
    $38 hourly 60d+ ago
  • Information security (IS) engineers

    Stem Xpert

    Cyber security analyst job in Denver, CO

    TekWissen provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each clients requirements and span the services spectrum from Application Development/Maintenance, testing, IT Consulting & staffing for IT Infrastructure Management through strategic consulting and industry oriented Business Process. Our end-to-end Business Process as a Service (BPaaS) solutions support complex, high-value, knowledge based work. Combining applications, platforms, infrastructure, knowledge processes, and domain expertise allows us to deliver greater efficiencies and innovative business capabilities. Job Description Information security (IS) engineers will collect, review, evaluate and interpret data; diagnose normal and abnormal patterns; develop and implement security rules and policies; diagnose and troubleshoot problems; solve problems; and design and implement solutions based on security principals, best practice and existing technologies. Engineers may also configure, maintain and install equipment; develop or modify source code; write scripts; harden or secure applications or databases; or respond to and resolve information security incidents depending on their area of specialty. All engineering specialties may also plan, implement, evaluate, review and status projects involving information security solutions in their specialty area. They document their work or the work of others on their projects. Engineers must be able to clearly communicate and escalate problems, issues and solutions to technical and non-technical audiences alike using verbal, written and graphical communication. They must be able to work on interdisciplinary teams to develop solutions that are integrated across organizational and functional lines. Additional Information If you are available, interested, planning to make a change, or know of a friend who might have the required qualifications and interest, please call me ASAP at ************.
    $67k-91k yearly est. 60d+ ago
  • Information security (IS) engineers

    Practice Xpert Inc. 3.7company rating

    Cyber security analyst job in Denver, CO

    TekWissen provides a unique portfolio of innovative capabilities that seamlessly combines clients insights, strategy, design, software engineering and systems integration. Our tightly integrated offerings are tailored to each clients requirements and span the services spectrum from Application Development/Maintenance, testing, IT Consulting & staffing for IT Infrastructure Management through strategic consulting and industry oriented Business Process. Our end-to-end Business Process as a Service (BPaaS) solutions support complex, high-value, knowledge based work. Combining applications, platforms, infrastructure, knowledge processes, and domain expertise allows us to deliver greater efficiencies and innovative business capabilities. Job Description Information security (IS) engineers will collect, review, evaluate and interpret data; diagnose normal and abnormal patterns; develop and implement security rules and policies; diagnose and troubleshoot problems; solve problems; and design and implement solutions based on security principals, best practice and existing technologies. Engineers may also configure, maintain and install equipment; develop or modify source code; write scripts; harden or secure applications or databases; or respond to and resolve information security incidents depending on their area of specialty. All engineering specialties may also plan, implement, evaluate, review and status projects involving information security solutions in their specialty area. They document their work or the work of others on their projects. Engineers must be able to clearly communicate and escalate problems, issues and solutions to technical and non-technical audiences alike using verbal, written and graphical communication. They must be able to work on interdisciplinary teams to develop solutions that are integrated across organizational and functional lines. Additional Information If you are available, interested, planning to make a change, or know of a friend who might have the required qualifications and interest, please call me ASAP at ************.
    $66k-90k yearly est. 2m ago
  • Information Security Analyst

    Global Channel Management

    Cyber security analyst job in Broomfield, CO

    Global Channel Management is a technology company that specializes in various types of recruiting and staff augmentation. Our account managers and recruiters have over a decade of experience in various verticals. GCM understands the challenges companies face when it comes to the skills and experience needed to fill the void of the day to day function. Organizations need to reduce training and labor costs but at same requiring the best "talent " for the job. Qualifications Information Security Analyst must work 3rd shift (Wed-Sat) 7pm - 6am MST Information Security Analyst requires: 1-3 years of experience within the IT field Bachelor's degree in computer science, information technology, or related field is required Experience with enterprise information security data management tools such as ArcSight or Splunk is preferred Solid experience in scripting languages such as (or similar to) Python, PERL, and Ruby is a plus• Proficiency with RSA Archer Experience with industry standard frameworks• Experience with YARA, regex, or other host/network-based signature development Information Security Analyst duties: Respond to network and host based security events Minimize the dwell time of threat actors by monitoring, triaging, and validating security events, while maintaining thorough documentation in the case management system Operate with little-to-no direction and define relationships between seemingly unrelated events through deductive reasoning Actively hunting for and dissecting previously unidentified threats in the environment Participate in intelligence sharing and trust groups, then apply this knowledge to security controls Additional Information $38/hr 6 months
    $38 hourly 60d+ ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Loveland, CO?

The average cyber security analyst in Loveland, CO earns between $59,000 and $106,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Loveland, CO

$79,000
Job type you want
Full Time
Part Time
Internship
Temporary