Information Security Analyst
Information security analyst job in Lehi, UT
Who Is Elementum?
Elementum is the innovative startup that's using AI Driven Workflows so that businesses can operate faster, smarter, and cheaper. Elementum's unique IP allows its platform to run natively inside its customers' own data clouds, enabling instant automation without any integrations or APIs. It's also fully pre-integrated with all of the leading public and private AI/ML/LLMs, making it the only choice for secure, AI-driven automation. Industry leaders like Sanofi, Under Armour, and Snowflake are using AI Driven Workflows to transform their operations to increase productivity, delight customers, and capture market share.
Job Scope
Elementum is looking for an experienced Information Security Analyst to join our team. This role is a key driver of Governance, Risk, and Compliance (GRC) efforts, responsible for implementing and maintaining the organization's security program, with a special focus on securing our AI-Driven Workflow platform and its native execution environment.
The Information Security Analyst will interface directly with various teams and support security compliance efforts across the company and its products. This role reports to the company's Senior Audit Manager.
What You'll Do
Vendor Risk Management (VRM): Conduct thorough security assessments of third-party vendors, partners, and suppliers, particularly those providing AI/ML/LLM services or data cloud infrastructure, to identify potential risks and vulnerabilities.
Risk & Compliance: Operate and enhance Elementum's risk management processes by conducting comprehensive risk assessments of the Elementum platform's native data cloud deployment model and developing supporting documentation.
Collaborate closely with internal Engineering and Product teams to ensure the security and compliance of the AI-Driven Workflow features and the native execution environment.
Engage with internal and external stakeholders to assess the functionality of key information security controls related to vendor or in-house developed software/systems.
Analyze security reports, vulnerability scans, and other relevant data to make informed decisions and recommendations for improving the security posture of our platform.
Manage security issues and tasks assigned to vendors to closure, actively reducing associated security risks.
Complete detailed customer security and compliance questionnaires to offer assurance of Elementum's security posture regarding data cloud security, access control, and AI governance.
Identify improvement opportunities and provide strategic feedback to senior team members and management regarding the evolving security landscape in the AI and Data Cloud space.
Stay up-to-date with the latest security trends, vulnerabilities, and industry best practices related to LLM security, data cloud governance (e.g., Snowflake, Databricks, etc.), and data privacy regulations (GDPR, CCPA).
Assist in the creation and maintenance of documentation related to third-party security assessments and internal compliance processes.
You Should Have
2-3 years of experience in vendor risk, compliance, or security roles with hands-on experience in third-party security risk management.
Strong familiarity with ISO 27001 and SOC 2 (given the enterprise focus), and some familiarity with other relevant security frameworks such as NIST CSF & 800-53, SOX, SOC1, HITRUST/HIPAA, GDPR, CCPA, GxP, etc.
Demonstrable knowledge of or direct experience working with Cloud security and governance (AWS, Azure, GCP) and data cloud environments (Snowflake, Databricks).
Bachelor's degree in an IT-related field, cyber security, or equivalent experience.
2+ years of project management experience, preferably involving security compliance initiatives.
Experience in external or internal security audit/compliance activities.
Strong knowledge of risk management methods, standards, processes, governance models, and industry-standard risk analysis approaches.
Excellent written and verbal communication skills with the ability to present complex GRC and technical security information clearly to executives and customers.
Ability to think both strategically and tactically in a high-energy, fast-paced environment.
Proven ability to take ownership, self-motivate, and deliver results in ambiguous environments.
Nice to Have
Certifications: CRISC, CISA, or equivalent.
Prior experience in a startup or high-growth company operating in the AI/ML or Data Cloud space.
Understanding of working in regulated environments such as GDPR, CCPA, or HIPAA.
Competitive Benefits
Medical, dental, and vision coverage
401k matching
Flexible vacation policy
Engage with (and give high-fives to) senior management regularly
Get in on the ground floor of a huge opportunity
Cyber Security Engineer
Information security analyst job in Ogden, UT
Blu Omega is looking for an experienced Cyber Security Engineer to support a highly secure Department of Defense customer in Ogden, UT. This position supports a major initiative focused on modernizing legacy network systems and transitioning mission services into an AWS-based cloud environment while maintaining strict DoD security compliance.
Responsibilities:
Design, implement, and maintain Secure Cloud Computing Architecture (SCCA) security controls, including Virtual Data Center Security Stack (VDSS) and Boundary Cloud Access Point (BCAP).
Partner with DoD stakeholders to ensure cloud platforms comply with established security standards such as NIST 800-53, STIGs, and FedRAMP+.
Enforce Trusted Cloud Credential Management (TCCM) policies to protect identity, authentication, and cloud credentials.
Configure and manage cloud security monitoring, logging, and alerting solutions using tools such as SolarWinds, ELK, and cloud-native security services.
Support the onboarding and migration of applications and systems into the cloud, ensuring security controls are properly applied throughout the transition.
Collaborate with engineering and security teams to implement Zero Trust Architecture principles within cloud environments.
Contribute to Authorization to Operate (ATO) activities by documenting security controls, mapping inherited controls, and supporting eMASS submissions.
Provide technical leadership by advising on cloud security best practices and mentoring junior cybersecurity staff.
Qualifications:
Bachelor's degree in Computer Science, Cybersecurity, Information Systems, or a closely related discipline, or equivalent professional experience.
CompTIA Security+ certification (required).
Preferred DoD-recognized cloud security certifications such as AWS Certified Security - Specialty or Microsoft Azure Security Engineer.
7+ years of hands-on cloud security experience, with expertise in at least one major cloud service provider (AWS, Azure, or OCI).
Demonstrated experience implementing and managing cloud security controls, including IAM, logging, monitoring, and compliance enforcement.
Background in security incident response, vulnerability management, and cloud compliance assessments.
Strong analytical, troubleshooting, and problem-solving skills within complex cloud environments.
In-depth knowledge of DoD cloud security requirements, including NIST 800-53 controls, STIGs, and FedRAMP+ frameworks.
Experience using automation and infrastructure-as-code tools such as Terraform, Ansible, and PowerShell to manage secure cloud configurations.
Salary Range: $130,000 - $145,000
Our final salary offer will be based on several factors, including depth of technical skills, work experience, education, certifications, and clearance
What Blu Omega Can Offer You:
Competitive benefits including Health Insurance, 401K w/ match, Paid Time Off and more.
Results driven culture that embrace our core values
Rewarding work contributing to our Nation's mission critical programs
Blu Omega is a Woman Owned Small Business Federal Technology services firm headquartered in Washington DC and supporting clients nationally. We provide Technology solutions for enterprise and government customers. Our team has a past performance in a diverse range of programs including those for Data Management, Cloud/Infrastructure, Software Development and Enterprise Applications.
An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
Mission Relevant Terrain Cyber Analyst
Information security analyst job in Colorado Springs, CO
A leading federal contractor is seeking a highly skilled Mission Relevant Terrain - Cyber (MRT-C) Analyst to support cyberspace mission assurance activities for high-priority U.S. Space Force (USSF) operations. This role plays a critical part in identifying mission dependencies, assessing cyber vulnerabilities, and enabling defensive cyber actions that directly support national security missions.
The ideal candidate brings deep experience in mission analysis, cybersecurity, and space mission systems, with the ability to translate technical findings into actionable insights for mission owners, cyber operators, and program offices.
Responsibilities
Essential Duties
Conduct MRT-C analysis on mission systems and coordinate follow-on defensive cyber actions supporting top-priority USSF missions and assets.
Perform mission analysis to identify cyber dependencies, vulnerabilities, and develop mission-focused defense strategies.
Analyze cyberspace activities affecting command, control, operational processes, and dependent space mission systems to ensure mission success.
Identify, evaluate, and implement mitigation strategies for risks within cyberspace terrain critical to mission accomplishment.
Develop mission thread data supporting mission owners, cybersecurity personnel, defensive cyber operators, and program teams in assessing acceptable mission risk caused by cybersecurity deficiencies.
Produce and deliver Operational Risk Assessments (ORA) and Asset Defense Plans (ADP).
Evaluate MRT-C results against system vulnerabilities and threat activity to identify Key Terrain - Cyber (KT-C) for each USSF mission.
Support MRT-C teams in analyzing mission systems to determine cyber dependencies, security risks, mission vulnerabilities, and protective measures.
Accurately enter and maintain mission data within the Mission Assurance Decision Support System (MADSS).
Qualifications
Required Skills & Knowledge
Strong understanding of critical vs. non-critical systems and networks, including how organizations defend, respond, and prioritize security actions.
Experience conducting assessments to identify deviations from acceptable configurations, enclave policies, or security baselines.
Ability to measure defense-in-depth effectiveness against known vulnerabilities.
Solid understanding of mission analysis techniques, FMA-C methodologies, and mission dependency mapping.
Extensive knowledge of Mission Assurance disciplines, including risk management, mission mapping, vulnerability assessments, and defensive cyber capabilities.
Ability to solve complex problems involving diverse information systems.
Familiarity with MADSS or similar mission assurance data repositories.
Strong verbal and written communication skills, with excellent time management and interpersonal abilities.
Minimum Requirements
4+ years of experience in mission analysis, information security technologies, or supporting USSF mission capabilities.
TS/SCI clearance required.
CISSP or Security+, and at least one of the following:
GICSP
GCED
PenTest+
GSEC
OR a B.S. in IT, Cybersecurity, Data Science, Information Systems, or Computer Science from an accredited or CAE-designated institution.
Ability to travel up to 25%.
Preferred Qualifications
Bachelor's degree from an accredited institution.
Experience with Functional Mission Analysis - Cyber (FMA-C).
Familiarity with U.S. Space Force capabilities, systems, and mission assets.
IT Solutions Analyst
Information security analyst job in Denver, CO
IDR is seeking a IT Solutions Analyst to join one of our top clients for an opportunity in Denver, Colorado. This role is within a dynamic industry focused on implementing innovative SAP solutions and cloud data architectures to modernize legacy systems and improve reporting and analytics capabilities. The position offers the chance to influence large-scale transformation initiatives and work closely with stakeholders in a hybrid work environment.
Position Overview for the IT Solutions Analyst:
Lead blueprinting activities during the first quarter to translate business needs into technical solutions
Conduct daily stakeholder meetings to gather and validate requirements
Produce clear documentation for review and stakeholder sign-off
Support the modernization of legacy SAP environments with cloud and data platform integrations
Play a key role in shaping a large-scale SAP RISE transformation project
Requirements for the IT Solutions Analyst:
Strong experience with SAP IS-U industry solution
Working knowledge of SAP BTP, with exposure to SAP Business Data Cloud (BDC) preferred
Proven ability to lead requirements gathering and blueprinting processes
Experience mapping integrations across complex SAP landscapes, including IS-U, BTP, and data platforms
Knowledge of SAP RISE best practices, especially for reporting and analytics
What's in it for you?
Competitive compensation package
Full Benefits; Medical, Vision, Dental, and more!
Opportunity to get in with an industry leading organization.
Why IDR?
25+ Years of Proven Industry Experience in 4 major markets
Employee Stock Ownership Program
Dedicated Engagement Manager who is committed to you and your success.
Medical, Dental, Vision, and Life Insurance
ClearlyRated's Best of Staffing Client and Talent Award winner 12 years in a row.
Compensation Details: $86-92/hr W2
Secret Mid-Level Cyber Threat Emulation Analyst
Information security analyst job in Colorado Springs, CO
A client of Insight Global's is looking for a Secret Mid-Level Cyber Threat Emulation Analyst, to join their team! This position will play a key role in supporting the Missile Defense Agency (MDA). Job Responsibilities: - Perform proactive and reactive cybersecurity duties on customer networks to strengthen enterprise-wide security posture.
- Analyze assets, threats, and vulnerabilities to identify weaknesses and enhance network defenses; measure effectiveness of defense-in-depth architecture.
- Develop, review, and update Defensive Cyber Operations (DCO) procedures, processes, manuals, and related documentation.
- Generate vulnerability assessment reports, escalate findings, and support enterprise-wide incident response in compliance with DoD regulations; lead cyber events and investigations from start to finish.
- Execute Cyber Threat Emulation (CTE) actions using automated validation tools; create dashboards and reports detailing vulnerabilities, remediation steps, and security posture assessments.
- Draft and submit Cyber Tasking Orders (CTOs) to address issues identified during CTE engagements; implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders as directed.
- Mentor and train analysts at all levels; collaborate with Cyberspace Domain Awareness (CDA) to develop evaluation criteria and methodologies aligned with HHQ and industry best practices.
This position is onsite full-time in Colorado Springs, CO or Huntsville, Alabama. This is a six month contract to hire opportunity and the salary range for this role is between $120,000 - $132,000/yr depending on years and level of experience, education, and certifications. This role requires an Active Secret Clearance or higher. Typical benefits offered include flexible work schedules, educational reimbursement, retirement benefits (401K match), employee stock purchase plan, health benefits, tax saving options, disability benefits, life and accident insurance, voluntary benefits, paid time off and paid holidays, and parental leave.
We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: ****************************************************
Skills and Requirements
- DoD Secret Security Clearance (Top Secret Preferred)
- DoD 8570.01-M IAT Level II certification with Continuing Education (CE) - (CySA+, GICSP, GSEC, Security+ CE, SSCP)
- 6+ years of general work experience
- 4 years of experience directly related to:
Performing manual or automated penetration test in an enterprise environment
Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments
Experience performing the full life cycle of incident response and enterprise-level monitoring
- 1+ years of management or leadership experience in a team environment
- Currently hold, or obtain within 6 months of start date, a PenTest+ certification - Bachelor's degree, or higher, in Cybersecurity, Computer Science or related field
- Experience working with Cyber Threat Emulation tools, policies, and procedures
- Experience operating custom software on top of a Linux platform
- Experience with security analysis and solutions in a WAN/LAN environment to include Routers, Switches, Network Devices, and Operating Systems (e.g., Windows, and Linux)
- Experience with other Security Operations Centers (SOC)/DCO tools/applications, such as Firewalls, Intrusion Detection Systems / Intrusion Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc.
- Experience performing security compliance scans across a WAN (ACAS/Nessus preferred)
- Background in configuration, troubleshooting, and deployment of host-based security (ESS preferred)
- Experience mentoring and training personnel in an evolving, high-paced environment
- Familiarity with DoD Security Operations Centers (SOC) (aka CSSP) and DCO/Cybersecurity Service Provider (CSSP)-guiding security policies and procedures
Information Lead Security Analyst
Information security analyst job in Englewood, CO
EchoStar is reimagining the future of connectivity. Our business reach spans satellite television service, live-streaming and on-demand programming, smart home installation services, mobile plans and products. Today, our brands include Boost Mobile, DISH TV, Gen Mobile, Hughes and Sling TV.
**Department Summary**
Our Technology teams challenge the status quo and reimagine capabilities across industries. Whether through research and development, technology innovation or solution engineering, our team members play a vital role in connecting consumers with the products and platforms of tomorrow.
**Job Duties and Responsibilities**
The Office of the CISO is responsible for defending our corporate and network assets, protecting customer data, and ensuring the resilience of our 5G network fabric. The Lead Analyst for Security Strategy and Administration is a pivotal role that serves as a force multiplier for the CISO and the entire security leadership team.
This position is responsible for driving the administrative and strategic rhythm of the security organization, translating strategic objectives into measurable outcomes, and ensuring cross-functional alignment across all security domains. The ideal candidate will possess a unique blend of technical acumen, business insight, and exceptional communication skills, enabling them to interface between deep technical teams and executive leadership. You will be instrumental in articulating the value of our security investments and demonstrating our defensive posture against the evolving threat landscape.
**Key Responsibilities:**
+ Serve as a primary strategic and administrative partner to the Chief Information Security Officer (CISO), facilitating the execution of key security initiatives and departmental objectives; track high-priority initiatives, identify and mitigate roadblocks, and ensure strategic goals are met
+ Synthesize and analyze telemetry from our security technology stack to develop comprehensive dashboards and executive-level reports; frame our security posture, threat landscape, and program performance against the **NIST Cybersecurity Framework (CSF) 2.0** functions
+ Orchestrate and facilitate the CISO's leadership rhythm, including staff meetings, quarterly business reviews, strategic planning sessions, and executive briefings; ensure clear documentation of decisions, rigorous tracking of action items, and proactive follow-up to drive accountability
+ Develop and refine executive-level presentations, internal communications, and board materials
+ Support the Office of the CISO with budget management, financial forecasting, headcount planning, and strategic vendor relationship management; provide analytical support to ensure we are maximizing the return on our security investments
**Skills, Experience and Requirements**
**Education & Experience:**
+ Bachelor's degree in Information Technology, Cybersecurity, Business Administration, or a related field
+ A minimum of 5 years of progressive experience in leadership, strategic planning, technology, or security administration roles in a large enterprise environment
+ Experience with, or a strong conceptual understanding of, enterprise security technology preferred
**Skills and Qualifications:**
+ Exceptional ability to synthesize complex quantitative and qualitative data from disparate sources and craft compelling narratives for executive audiences
+ Proven experience leading cross-functional initiatives and driving complex projects to completion in a fast-paced, matrixed organization
+ Strategic thinker with a proven ability to solve complex problems, navigate ambiguity, and drive results with a high degree of autonomy
+ Superior written and verbal communication skills, with an innate ability to modulate content for audiences ranging from deeply technical engineers to the Board of Directors
+ Demonstrated financial acumen, with experience in budget planning and management preferred
+ Proven ability to build trust and influence at all levels of an organization preferred
Visa sponsorship not available for this role
**Candidates must be willing to participate in at least one in-person interview, which may include a live whiteboarding or technical assessment session.**
\#LI-JZ2
**Salary Ranges**
Compensation: $96,250.00/Year - $137,500.00/Year
**Benefits**
We offer versatile health perks, including flexible spending accounts, HSA, a 401(k) Plan with company match, ESPP, career opportunities, and a flexible time away plan; all benefits can be viewed here: DISH Benefits .
The base pay range shown is a guideline. Individual total compensation will vary based on factors such as qualifications, skill level, and competencies; compensation is based on the role's location and is subject to change based on work location.
Candidates need to successfully complete a pre-employment screen, which may include a drug test and DMV check. Our company is committed to fostering an inclusive and equitable workplace where every individual has the opportunity to succeed. We are dedicated to providing individuals with criminal or arrest records a fair chance of employment in accordance with local, state, and federal laws.
The posting will be active for a minimum of 3 days. The active posting will continue to extend by 3 days until the position is filled.
We pride ourselves on developing and promoting talent as an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status. EchoStar will accommodate the sincerely held religious beliefs of employees if such accommodations are not undue hardships and are otherwise within the bounds of applicable law. All qualified applicants with arrest or conviction records will be considered for employment in accordance with local, state, and federal law. You may redact any information that identifies age, date of birth, or dates of school/graduation from your application documents before submission and throughout our application process.
EchoStar will provide reasonable accommodation to otherwise qualified job applicants and employees with known physical or mental disabilities, unless doing so poses an undue hardship on the Company, poses a direct threat of substantial harm to others, or is otherwise not required by law. EchoStar has a more detailed Accommodation Policy that applies to employees. EchoStar endeavors to make echostar.com and jobs.echostar.com accessible to users. Please contact *************** if you would like to discuss the accessibility of our website or need assistance completing the application process. This contact information is for accommodation requests only; do not use this contact information to inquire about the status of applications.
Click the links to access the following statements: EEO Policy Statement (********************************************************************************* , Pay Transparency (*********************************************************************************************************** , EEOC Know Your Rights (English (************************************************************************************ /Spanish (**************************************************************************************************** )
We are an Equal Opportunity/Affirmative Action employer and will consider all qualified applicants for employment without regard to race, color, religion, gender, pregnancy, sex, sexual orientation, gender identity, national origin, age, genetic information, protected veteran status, disability, or any other basis protected by local, state, or federal law. All qualified applicants with arrest or conviction records will be considered for employment in accordance with local, state, and federal law. U.S. Citizenship is required for certain positions. EEO is the law.
At EchoStar, you have the right to request reasonable accommodations. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact ********************. This contact information is for accommodation requests only; you may not use this contact information to inquire about the status of an application.
Easy ApplyClassification Information Security Analyst
Information security analyst job in Golden, CO
Posting TitleClassification Information Security Analyst
.
.
TypeRegular
.
Hours Per Week40
.
Working at NLRNLR is located at the foothills of the Rocky Mountains in Golden, Colorado is the nation's primary laboratory for energy systems research and development.
Join the National Laboratory of the Rockies (NLR), where world-class scientists, engineers, and experts are accelerating energy innovation through breakthrough research and systems integration. From our mission to our collaborative culture, NLR stands out in the research community for its commitment to an affordable and secure energy future. Spanning foundational science to applied systems engineering and analysis, we focus on solving complex challenges to deliver advanced, secure, reliable, and cost-effective energy solutions. Our work helps strengthen U.S. industries, support job creation, and promote national economic growth.
At NLR, you'll find a mission-driven environment supported by state-of-the-art facilities, multidisciplinary research teams, and strong collaborations with industry, academia, and other national laboratories. We offer robust professional development opportunities, and a competitive benefits package designed to support your career and well-being.
Job Description
The Office of Laboratory Protection (LP) is an organization focused on providing a secure, safe, and resilient NLR community. LP supports more than 4,000 staff located at four sites and the associated infrastructure. LP is comprised of a team of highly skilled managers and technical subject matter experts dedicated to personnel security, physical security, access control, information security, foreign national access management, emergency management, and protective force operations.
The Safeguards & Security Group Manager is seeking a skilled and motivated Classification Information Security Analyst to join our team. This pivotal role is primarily responsible for the continued implementation and management of the Controlled Unclassified Information (CUI) program, while also supporting Classified Matter Protection and Control (CMPC), and Operations Security (OPSEC) programs as necessary.
The successful candidate will ensure that CUI requirements are integrated into organizational operations and information management processes. This role requires close collaboration with Legal, Export Control, Business Development, Information Governance, IT, and other stakeholders to ensure compliance with DOE and other federal agencies information protection policies.
Responsibilities include:
Policy Expertise:
Maintain up-to-date knowledge of federal OPSEC, CUI, and Classification policies, laws, and regulations.
Program Management:
Lead the continued implementation and oversight of the CUI program, including policy, program, and procedure reviews and updates.
Collaborate with peer CUI specialists to develop and integrate CUI management solutions into NLR's broader information protection framework.
Support the OPSEC and CMPC programs in coordination with INFOSEC assurance analysts.
Provide strategic planning, risk management, and program oversight.
Mentor staff to ensure compliance with applicable requirements documents and procedures.
Coordinate CUI misuse determination, resolution, and reporting.
Conduct internal reviews and audits to ensure adherence to security requirements.
Training & Education:
Review and revise existing CUI training materials; participate in working groups to enhance awareness programs.
Provide guidance on proper marking, handling, and safeguarding of CUI, classified, and sensitive information.
Support onboarding and refresher training for NLR personnel.
Analysis & Recommendations:
Analyze information to determine appropriate CUI, OPSEC, and classification controls for NLR programs and initiatives.
Work to resolve security related issues that impact organizational goals.
Document Review & Incident Management:
Assist in the review of information as requested to identify and protect sensitive and classified information.
Assist with the oversight of proper labeling of CUI documents.
Participate in the analysis and investigation of incidents of security concern.
Stakeholder Engagement and Relationship Building:
Collaborate with internal stakeholders (Legal, IT, Program Management, project managers) to ensure consistent CUI compliance.
Build strong working relationships with DOE, lab leadership, and staff to balance security priorities with research and operations objectives in a customer focused manner.
Additional Responsibilities:
Prepare and maintain lab level procedures, training, and internal SOPs
Promote a culture of safety, respect, accountability, and professionalism.
Other duties as assigned by management.
.
Basic QualificationsRelevant Bachelor's Degree and 5 or more years of experience or equivalent relevant education/experience. Or, relevant Master's Degree and 3 or more years of experience or equivalent relevant education/experience. Or, relevant PhD or equivalent relevant education/experience. Or, relevant JD or equivalent relevant education/experience. Complete understanding and wide application of technical principles, theories and concepts in the field. General knowledge of other related disciplines. Considerable knowledge of laws, regulations, principles, procedures and practices related to specific field. Strong leadership, project management and problem solving skills. Ability to use various computer software programs.
DOE Q or TS
Clearance: Must be able to obtain and maintain a DOE security clearance at the DOE (Q) and SCI access or DoD (TS) and SCI level. SCI access may require a polygraph examination.
Eligibility requirements: To obtain a clearance, an individual must be at least 18 years of age; U.S. citizenship is required except in very limited circumstances. See DOE O 472.2A for additional information.
* Must meet educational requirements prior to employment start date.
Additional Required Qualifications
Bachelor's degree in a relevant field and at least 8 years of relevant experience in information security or reviewing research documents (or equivalent combination of education and experience).
Ability to respond to inquiries about document markings and accountability requirements.
Experience developing and delivering training on protecting CUI, proprietary, or classified information.
Motivated self-starter with the ability to work independently and as part of collaborative teams across the laboratory and DOE complex.
Strong problem-solving skills, with the ability to adapt to shifting priorities and meet deadlines.
Proficient in Microsoft Office.
Ability to use discretion and maintain strict confidentiality.
Ability to work both independently and collaboratively in a team-based environment.
Ability to obtain and maintain a TS clearance (see basic qualifications).
Preferred Qualifications
.
Job Application Submission Window
The anticipated closing window for application submission is up to 30 days and may be extended as needed.
Annual Salary Range (based on full-time 40 hours per week) Job Profile: Professional III / Annual Salary Range: $81,500 - $146,700
NLR takes into consideration a candidate's education, training, and experience, expected quality and quantity of work, required travel (if any), external market and internal value, including seniority and merit systems, and internal pay alignment when determining the salary level for potential new employees. In compliance with the Colorado Equal Pay for Equal Work Act, a potential new employee's salary history will not be used in compensation decisions.
Benefits SummaryBenefits include medical, dental, and vision insurance; short*- and long-term disability insurance; pension benefits*; 403(b) Employee Savings Plan with employer match*; life and accidental death and dismemberment (AD&D) insurance; personal time off (PTO) and sick leave; paid holidays; and tuition reimbursement*. NLR employees may be eligible for, but are not guaranteed, performance-, merit-, and achievement- based awards that include a monetary component. Some positions may be eligible for relocation expense reimbursement. Limited-term positions are not eligible for long-term disability or tuition reimbursement.
* Based on eligibility rules
Badging RequirementNLR is subject to Department of Energy (DOE) access restrictions. All employees must also be able to obtain and maintain a federal Personal Identity Verification (PIV) card as required by Homeland Security Presidential Directive 12 (HSPD-12), which includes a favorable background investigation.Drug Free Workplace
NLR is committed to maintaining a drug-free workplace in accordance with the federal Drug-Free Workplace Act and complies with federal laws prohibiting the possession and use of illegal drugs. Under federal law, marijuana remains an illegal drug.
If you are offered employment at NLR, you must pass a pre-employment drug test prior to commencing employment. Unless prohibited by state or local law, the pre-employment drug test will include marijuana. If you test positive on the pre-employment drug test, your offer of employment may be withdrawn.
Submission Guidelines
Please note that in order to be considered an applicant for any position at NLR you must submit an application form for each position for which you believe you are qualified. Applications are not kept on file for future positions. Please include a cover letter and resume with each position application.
.
Equal Opportunity Employer
All qualified applicants will receive consideration for employment without regard basis of age (40 and over), color, disability, gender identity, genetic information, marital status, domestic partner status, military or veteran status, national origin/ancestry, race, religion, creed, sex (including pregnancy, childbirth, breastfeeding), sexual orientation, and any other applicable status protected by federal, state, or local laws.
Reasonable Accommodations
E-Verify ******************** For information about right to work, click here for English or here for Spanish.
E-Verify is a registered trademark of the U.S. Department of Homeland Security. This business uses E-Verify in its hiring practices to achieve a lawful workforce.
Auto-ApplyInformation Security Specialist Engineer
Information security analyst job in Aurora, CO
Must Be A US Citizen Active TS/SCI w/Poly required Duties and Responsibilities: • Implement Information Assurance (IA) processes, provide guidance, and develop documentation throughout the system development life-cycle via the RMF tool in ServiceNOW. • Develop, implement, and document formal security policies and System Security Plans (SSP) throughout the program and monitor compliance to these policies during all phases of the Risk Management Framework (RMF) process.
• Utilize Enterprise Security Services to provide analysis of vulnerabilities and compliance risks in ACAS, Enterprise IT audit logs in ArcSight and Splunk, McAfee Host-Based Security Services (HBSS), User Activity Monitoring (UAM), and Cyber Terrain Mapping (CTM) on 100+ nodes.
• Monitor Heat Map Score matrix and evaluate cyber risk data, keeping the score at acceptable risk levels for the security categorization of the asset(s) and their Risk Evaluation Lanes (REL).
• Manage and deliver system authorization and accreditation packages, for 4 assets that span 3 different classification levels.
• Review and make recommendations on program-level documentation (e.g., requirements specification, system architecture, design documents, test plans, security plans, etc.).
• Assess/calculate risk based on threats, vulnerabilities, and shortfalls uncovered in routine analyzation of Continuous Monitoring (ConMon) controls and provide those results as Body of Evidence (BoE) to be evaluated in 7, 30, 90 and 365 day increments as the control metrics require.
• Direct activities required to remediate system-level information security weaknesses tracked via the FISMA (POA&M) process. Document the elements of the plans, milestones for correcting the weaknesses, and scheduled completion dates for the milestones, periodically reporting remediation progress as necessary.
• Brief leadership, as needed, on the status of action items and/or results of activities affecting the security posture of the program.
• Able to collaborate and communicate effectively with other system engineers, system administrators, software developers, and information assurance professionals.
Education & Qualifications:
• Bachelor's Degree in Information Technology, Information Systems Security, Cybersecurity, or related field. • DoD 8570.01 IAT level 2 or greater cybersecurity certification per DoD 8570.01
• Minimum of 10 years' related experience in Cybersecurity, Systems or Software Engineering, for the government or government contractor, if other than IC position.
Classification Information Security Analyst
Information security analyst job in Golden, CO
**Posting Title** Classification Information Security Analyst . . Type** Regular . **Hours Per Week** 40 . **Working at NLR** NLR is located at the foothills of the Rocky Mountains in Golden, Colorado is the nation's primary laboratory for energy systems research and development.
Join the National Laboratory of the Rockies (NLR), where world-class scientists, engineers, and experts are accelerating energy innovation through breakthrough research and systems integration. From our mission to our collaborative culture, NLR stands out in the research community for its commitment to an affordable and secure energy future. Spanning foundational science to applied systems engineering and analysis, we focus on solving complex challenges to deliver advanced, secure, reliable, and cost-effective energy solutions. Our work helps strengthen U.S. industries, support job creation, and promote national economic growth.
At NLR, you'll find a mission-driven environment supported by state-of-the-art facilities, multidisciplinary research teams, and strong collaborations with industry, academia, and other national laboratories. We offer robust professional development opportunities, and a competitive benefits package designed to support your career and well-being.
**Job Description**
The Office of Laboratory Protection (LP) is an organization focused on providing a secure, safe, and resilient NLR community. LP supports more than 4,000 staff located at four sites and the associated infrastructure. LP is comprised of a team of highly skilled managers and technical subject matter experts dedicated to personnel security, physical security, access control, information security, foreign national access management, emergency management, and protective force operations.
The Safeguards & Security Group Manager is seeking a skilled and motivated Classification Information Security Analyst to join our team. This pivotal role is primarily responsible for the continued implementation and management of the Controlled Unclassified Information (CUI) program, while also supporting Classified Matter Protection and Control (CMPC), and Operations Security (OPSEC) programs as necessary.
The successful candidate will ensure that CUI requirements are integrated into organizational operations and information management processes. This role requires close collaboration with Legal, Export Control, Business Development, Information Governance, IT, and other stakeholders to ensure compliance with DOE and other federal agencies information protection policies.
Responsibilities include:
**Policy Expertise:**
+ Maintain up-to-date knowledge of federal OPSEC, CUI, and Classification policies, laws, and regulations.
**Program Management:**
+ Lead the continued implementation and oversight of the CUI program, including policy, program, and procedure reviews and updates.
+ Collaborate with peer CUI specialists to develop and integrate CUI management solutions into NLR's broader information protection framework.
+ Support the OPSEC and CMPC programs in coordination with INFOSEC assurance analysts.
+ Provide strategic planning, risk management, and program oversight.
+ Mentor staff to ensure compliance with applicable requirements documents and procedures.
+ Coordinate CUI misuse determination, resolution, and reporting.
+ Conduct internal reviews and audits to ensure adherence to security requirements.
**Training & Education:**
+ Review and revise existing CUI training materials; participate in working groups to enhance awareness programs.
+ Provide guidance on proper marking, handling, and safeguarding of CUI, classified, and sensitive information.
+ Support onboarding and refresher training for NLR personnel.
**Analysis & Recommendations:**
+ Analyze information to determine appropriate CUI, OPSEC, and classification controls for NLR programs and initiatives.
+ Work to resolve security related issues that impact organizational goals.
**Document Review & Incident Management:**
+ Assist in the review of information as requested to identify and protect sensitive and classified information.
+ Assist with the oversight of proper labeling of CUI documents.
+ Participate in the analysis and investigation of incidents of security concern.
**Stakeholder Engagement and Relationship Building:**
+ Collaborate with internal stakeholders (Legal, IT, Program Management, project managers) to ensure consistent CUI compliance.
+ Build strong working relationships with DOE, lab leadership, and staff to balance security priorities with research and operations objectives in a customer focused manner.
**Additional Responsibilities:**
+ Prepare and maintain lab level procedures, training, and internal SOPs
+ Promote a culture of safety, respect, accountability, and professionalism.
+ Other duties as assigned by management.
.
**Basic Qualifications**
Relevant Bachelor's Degree and 5 or more years of experience or equivalent relevant education/experience. Or, relevant Master's Degree and 3 or more years of experience or equivalent relevant education/experience. Or, relevant PhD or equivalent relevant education/experience. Or, relevant JD or equivalent relevant education/experience. Complete understanding and wide application of technical principles, theories and concepts in the field. General knowledge of other related disciplines. Considerable knowledge of laws, regulations, principles, procedures and practices related to specific field. Strong leadership, project management and problem solving skills. Ability to use various computer software programs.
DOE Q or TS
Clearance: Must be able to obtain and maintain a DOE security clearance at the DOE (Q) and SCI access or DoD (TS) and SCI level. SCI access may require a polygraph examination.
Eligibility requirements: To obtain a clearance, an individual must be at least 18 years of age; U.S. citizenship is required except in very limited circumstances. See DOE O 472.2A for additional information.
*** Must meet educational requirements prior to employment start date.**
**Additional Required Qualifications**
+ Bachelor's degree in a relevant field and at least 8 years of relevant experience in information security or reviewing research documents (or equivalent combination of education and experience).
+ Ability to respond to inquiries about document markings and accountability requirements.
+ Experience developing and delivering training on protecting CUI, proprietary, or classified information.
+ Motivated self-starter with the ability to work independently and as part of collaborative teams across the laboratory and DOE complex.
+ Strong problem-solving skills, with the ability to adapt to shifting priorities and meet deadlines.
+ Proficient in Microsoft Office.
+ Ability to use discretion and maintain strict confidentiality.
+ Ability to work both independently and collaboratively in a team-based environment.
+ Ability to obtain and maintain a TS clearance (see basic qualifications).
**Preferred Qualifications**
.
**Job Application Submission Window**
The anticipated closing window for application submission is up to 30 days and may be extended as needed.
**Annual Salary Range (based on full-time 40 hours per week)**
Job Profile: Professional III / Annual Salary Range: $81,500 - $146,700
NLR takes into consideration a candidate's education, training, and experience, expected quality and quantity of work, required travel (if any), external market and internal value, including seniority and merit systems, and internal pay alignment when determining the salary level for potential new employees. In compliance with the Colorado Equal Pay for Equal Work Act, a potential new employee's salary history will not be used in compensation decisions.
**Benefits Summary**
Benefits include medical, dental, and vision insurance; short*- and long-term disability insurance; pension benefits*; 403(b) Employee Savings Plan with employer match*; life and accidental death and dismemberment (AD&D) insurance; personal time off (PTO) and sick leave; paid holidays; and tuition reimbursement*. NLR employees may be eligible for, but are not guaranteed, performance-, merit-, and achievement- based awards that include a monetary component. Some positions may be eligible for relocation expense reimbursement. Limited-term positions are not eligible for long-term disability or tuition reimbursement.
***** Based on eligibility rules
**Badging Requirement**
NLR is subject to Department of Energy (DOE) access restrictions. All employees must also be able to obtain and maintain a federal Personal Identity Verification (PIV) card as required by Homeland Security Presidential Directive 12 (HSPD-12), which includes a favorable background investigation.
**Drug Free Workplace**
NLR is committed to maintaining a drug-free workplace in accordance with the federal Drug-Free Workplace Act and complies with federal laws prohibiting the possession and use of illegal drugs. Under federal law, marijuana remains an illegal drug.
If you are offered employment at NLR, you must pass a pre-employment drug test prior to commencing employment. Unless prohibited by state or local law, the pre-employment drug test will include marijuana. If you test positive on the pre-employment drug test, your offer of employment may be withdrawn.
**Submission Guidelines**
Please note that in order to be considered an applicant for any position at NLR you must submit an application form for each position for which you believe you are qualified. Applications are not kept on file for future positions. Please include a cover letter and resume with each position application.
.
**Equal Opportunity Employer**
All qualified applicants will receive consideration for employment without regard basis of age (40 and over), color, disability, gender identity, genetic information, marital status, domestic partner status, military or veteran status, national origin/ancestry, race, religion, creed, sex (including pregnancy, childbirth, breastfeeding), sexual orientation, and any other applicable status protected by federal, state, or local laws.
**Reasonable Accommodations (*******************************************************
**E** **-Verify** ************************ **For information about right to work, click here (************************************************************************************************** for English or** **here (************************************************ for Spanish.**
E-Verify is a registered trademark of the U.S. Department of Homeland Security. This business uses E-Verify in its hiring practices to achieve a lawful workforce.
The National Laboratory of the Rockies (NLR) is a leader in the U.S. Department of Energy's effort to secure an environmentally and economically sustainable energy future. With locations in Golden and Boulder, Colorado, and a satellite office in Washington, D.C., NLR is the primary laboratory for research, development, and deployment of renewable energy technologies in the United States.
NLR is subject to Department of Energy (DOE) access restrictions. All candidates must be authorized to access the facility per DOE rules and guidance within a reasonable time frame for the specified position in order to be considered for an interview and for hiring. DOE rules for site access during the interview process depend on whether the candidate is interviewed on-site, off-site, or via telephone or videoconference. All employees must also be able to obtain and maintain a federal Personal Identity Verification (PIV) card as required by Homeland Security Presidential Directive 12 (HSPD-12), which includes a favorable background investigation. Additionally, DOE contractor employees are prohibited from participating in certain Foreign Government Talent Recruitment Programs (FGTRPs). If a candidate is currently participating in an FGTRP, they will be required to disclose their participation after receiving an offer of employment and may be required to disengage from participation in the FGTRP prior to commencing employment. Any offer of employment is conditional on the ability to obtain work authorization and to be granted access to NLR by the Department of Energy (DOE).
**Drug Free Workplace**
NLR is committed to maintaining a drug-free workplace in accordance with federal Drug-Free Workplace Act and complies with federal laws prohibiting the possession and use of illegal drugs. Under federal law, marijuana remains an illegal drug.
If you are offered employment at NLR, you must pass a pre-employment drug test prior to commencing employment. Unless prohibited by state or local law, the pre-employment drug test will include marijuana. If you test positive on the pre-employment drug test, your offer of employment may be withdrawn.
Please review the information on our Hiring Process (************************************************* website before you create an account and apply for a job. We also hope you will learn more about NLR (**************************** , visit our Careers site (****************************** , and continue to search for job opportunities (**************************************** at the lab.
Information Security Analyst, Journeyman
Information security analyst job in Colorado Springs, CO
Journeyman Information Security Analyst Colorado Springs, CO (Onsite)
An organization is seeking a Journeyman Information Security Analyst to support the Data Transport Product Support Sustainment Logistics Maintenance (DSLM) contract. The DSLM effort provides sustaining, maintaining, and logistics support for the operational capability to transfer data for highly reliable and secure telemetry, tracking, command, control, and communications. DSLM primarily supports the Satellite Control Network (SCN). This position is on-site at a contractor facility in Colorado Springs, CO.
WHAT YOU CAN EXPECT TO DO:
Ensure cybersecurity controls for state-of-the-art secure operating systems, networks, and database products are applied IAW DoD cyber directives (including DoDI 8510.01 RMF, DoDI 8500.01, and NIST SP 800-37).
Conduct risk assessments and provide recommendations for application design.
Address a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.
Utilize encryption technology, penetration and vulnerability analysis, and IT security research.
Prepare security reports to regulatory agencies as needed.
Duties & Responsibilities (include but are not limited to):
Develop and maintain cybersecurity artifacts for SCN mission systems.
Develop and implement an Anti-virus/Malware identification process for equipment transfers to/from SCN sites.
Coordinate with Software Maintenance Action (SWMA) IA patching team and program office IA architecture team on an IA/Cybersecurity Roadmap to identify non-compliant IA controls and propose corrective actions.
Employ system security engineering to design, develop, and implement secure applications and configurations in coordination with the Government.
Evaluate hardware, firmware, and software information security components for mission hardware acquisition.
Perform cybersecurity controls verification assessments IAW DoDI 8510.01 and DoDI 8500.01 annually.
Attend Cyber Technical Interchange Meetings during key project phases (Requirements, Design, etc.) to obtain Cyber community buy-in.
Develop and implement policies, procedures, and standards related to information security, privacy, and incident response; monitor compliance.
Provide technical engineering services for integrated security systems and solutions.
Use tools and processes to monitor information systems for security-related events.
Plan configuration changes for major security infrastructure platforms.
Maintain a library of security audit tools and processes for testing, audits, incident response, and diagnosing security issues.
Travel may be required.
WHAT THE TEAM REQUIRES:
BS Degree and 3 years of related experience or equivalent combination of education and experience, including 2 years of relevant Cybersecurity experience.
Active DoD Secret Security Clearance or the ability to obtain and maintain one.
Demonstrated traits: technical competence, strong decision-making and critical thinking, customer focus, self-motivation, desire to learn, effective interpersonal skills, pride in work, teamwork, and dedication.
WHAT THE TEAM PREFERS:
DoD 8140 Cyber Defense Analyst or Vulnerability Analyst Basic Qualification or certification (e.g., CEH, Security+), or a technical BS from an ABET-accredited or CAE-designated institution (as defined in DoD 8140).
SCN and/or DoD experience is preferred.
Working Place: Colorado Springs, Colorado, United States Company : 2025 August 28th - Auria Space
Cyber Threat Emulation Analyst
Information security analyst job in Colorado Springs, CO
or
Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10%
LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics.
What You'll Do
As a Mid-Level Cyber Threat Emulation Analyst, you will:
Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM)
Perform cybersecurity duties on customer networks to improve enterprise-wide security posture
Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture
Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation
Measure defense-in-depth effectiveness against known vulnerabilities
Generate vulnerability assessment reports and escalate findings for review
Support enterprise Incident Response in accordance with DoD regulations and instructions
Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting
Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans
Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly
Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction
Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs)
Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results
Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements
Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices
What You Bring
Basic Requirements:
Must have 6, or more, years of general (full-time) work experience
Must have 4 years of combined experience with:
Performing manual or automated penetration tests in an enterprise environment
Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments
Experience performing the full life cycle of incident response and enterprise-level monitoring
Must have 1 year of experience in management or leadership in a team environment
Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP)
Must have, or obtain within 6 months of start date, a PenTest+ certification
Must have an active DoD Secret Security Clearance
Desired Requirements:
Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field
Have experience with Cyber Threat Emulation tools, policies, and procedures
Have experience operating custom software on a Linux platform
Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux)
Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc.
Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred)
Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred)
Be able to mentor and train personnel in a high-paced environment
Be familiar with DoD Security Operations Centers (SOC/CSSP)
Be familiar with DCO/CSSP-guiding security policies and procedures
Have an active DoD Top Secret clearance
Why LaunchTech?
At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence.
We offer competitive benefits, including:
Medical, Dental, and Vision coverage
401(k) with company match
Paid Time Off (PTO)
Opportunities to make a meaningful impact while advancing your career
And more
Ready to Join the LaunchTech Crew?
If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you.
LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law.
Auto-ApplyData Security Analyst - C78843 7.5 Salt Lake City, Utah
Information security analyst job in Salt Lake City, UT
We are looking for a Data Security Analyst for our long-term multiyear project out of Salt Lake City, Utah. Build software libraries and services to provide secure-by-default services to software engineering teams, including authentication systems, secure service architectures, endpoint control solutions, and cloud controls
· Partner with colleagues from across engineering and risk to ensure an outstanding developer experience that satisfies the firm's security needs
· Collaborate on feature design and problem solving
· Help to provide frictionless integration with the firm's runtime, deployment and SDLC technologies
· Manage the full lifecycle of software components, from requirements through design, testing, development, release and demise
· Help to communicate and promote best practices for security engineering across the firm
· Engage in production troubleshooting
Basic Qualifications
· A strong grounding in security concepts, including secure coding practices, trusted computing and principles of authentication and authorization
· A good understanding of public key and symmetric key cryptography
· The ability to reason about performance, security, and process interactions in complex distributed systems
· Proficiency in designing, developing and testing cross-platform software in one or more of Java, Golang or C#; open to using multiple languages
· Experience developing, deploying and supporting software across the full Continuous Delivery life-cycle
· The ability to understand and effectively debug both new and existing software
· Experience meeting demands for high availability, low latency and scale
· The ability to communicate technical concepts effectively, both in writing and orally, as well as the interpersonal skills required to collaborate effectively with colleagues across diverse engineering teams
Preferred Qualifications
· An understanding of regulated environments, e.g. financial services
· Experience building services using public cloud providers such as AWS, Azure or GCP
· Experience with threat modeling and risk assessment
· Experience of practical security engineering in a Linux and/or Windows environment
· Familiarity with service mesh concepts and service-oriented architectures
· Familiarity with data protection principles and solutions
· Experience with deploying software to containerized environments - Kubernetes/Docker
· Experience monitoring, measuring, auditing and supporting software
· Scripting skills using Python, PowerShell or bash
· Experience with Terraform or similar infrastructure-as-code platforms, as a user and/or as a service provider
Information Security and Compliance Analyst
Information security analyst job in Pleasant Grove, UT
At Veracity, we aim to be a different kind of insurance partner - one that is free from outside investors, venture capital, or the pressures of a corporate parent. Ours is a culture of empowerment - one that believes in effort, results, and accountability. We believe that transparency fosters trust, trust fosters growth, and that growth drives innovation. Our commitment to rigorous evaluation and relentless execution lead to rapid evolution.
We answer only to the small business owners we serve, and this independence allows us to stay focused on what matters most: helping their businesses thrive by providing expert guidance and best-in-class insurance policies.
We're growing fast and want you to be a part of it!
We're seeking a talented, detail-oriented Information Security and Compliance Analyst to join our team. Reporting to the Technical Operations and Information Security Manager, this role is responsible for supporting the organization's cybersecurity posture by maintaining and enhancing security policies, controls, and monitoring systems, and ensuring compliance with frameworks such as SOC 2 and PCI DSS to protect company and client data.
Key Responsibilities
Strengthen the organization's cybersecurity posture by implementing, maintaining, and improving security policies, standards, and technical controls
Monitor security tools and system activity to identify, investigate, and escalate potential threats or vulnerabilities
Support vulnerability management, including performing scans, tracking remediation, and validating fixes
Maintain accurate, audit-ready documentation and coordinate evidence collection for SOC 2, PCI DSS, and other compliance frameworks
Support incident response processes, including triage, documentation, and post-incident follow-up
Assist with user access reviews, control testing, risk assessments, and security awareness efforts
Collaborate with IT, Engineering, and Compliance teams on secure configurations, remediation plans, and cross-functional security initiatives
Participate in routine policy, procedure, and control reviews to ensure alignment with regulatory requirements and security best practices
Maintain detailed logs and reports of security activities, metrics, and compliance obligations
Identify opportunities to strengthen controls, streamline processes, and enhance overall security program maturity
Required to perform other duties as requested, directed, or assigned
Requirements and Qualifications
Bachelor's degree in information systems, IT, Cybersecurity, or a related field
2-3 years of experience in security compliance, auditing, or governance (SOC 2 experience preferred)
Strong integrity, attention to detail, and accountability in handling sensitive or regulated information
Proactive problem-solving skills with the ability to anticipate and address risks effectively
Strong collaboration and communication skills with experience working across technical and compliance teams
Ability to remain composed and effective under pressure, including during audits and security incident
Perks
Health, dental, and vision plans
Amazing work-life balance with 4 weeks of Paid Time Off
10 Paid Company Holidays with 2 floating holidays
401K Programs with employer match
Personal assistance programs for support in a healthy personal and work life
Why Veracity?
Here at Veracity, you'll be part of a team of trailblazers and visionaries. We're not just revolutionizing the way people “do” insurance; we are creating a whole new paradigm. Here, you will experience a vibrant and inclusive workplace where your ideas matter! With us, you have a chance to:
Engage in groundbreaking projects that are reshaping the insurance landscape
Collaborate with a group of dedicated, like-minded professionals
Experience a culture that prioritizes growth and development
Compensation Range: $75k/yr - $85k/yr
We are proud to be an equal-opportunity employer. We are committed to providing equal opportunities to all qualified applicants, regardless of race, color, religion, sex, national origin, disability, or any other legally protected characteristics.
If you need accommodation, please let us know during the interview process.
Auto-ApplyPrivacy, Cybersecurity, and Data Innovation (DE)
Information security analyst job in Denver, CO
We are seeking entrepreneurial associates in law school class years 2013 through 2019 to join our privacy, cybersecurity, and data innovation practice group. Chambers USA 2020 recognized Gibson Dunn for Privacy & Data Security nationwide, highlighting the firms highly regarded privacy and cybersecurity offering. Our team is sought after and growing, and represents leading global platforms and disruptive technology companies on their most critical regulatory, litigation, product and business strategies and disputes. Candidates should have strong privacy, cybersecurity and/or technology company experience, and ideally have worked in a broad range of regulatory, technology and compliance counseling, government investigations, and related litigation matters. Experience with Federal Trade Commission consumer protection-related regulatory matters is also desirable. The team is collaborative and dynamic, and this opportunity offers great professional growth for the right candidate. Candidates to have three to seven years of substantive experience at a leading law firm and strong academic credentials.
The annual compensation range for this position is between $295,000 and $450,000. The salary offered within this range will depend upon qualifications and other operational considerations. Benefits offered for this position include health care; retirement benefits; paid days off, including sick time, and vacation time; parental leave; basic life insurance; Flexible Spending Accounts; as well as discretionary, performance-based bonuses.
Information Security Analyst
Information security analyst job in Broomfield, CO
Global Channel Management is a technology company that specializes in various types of recruiting and staff augmentation. Our account managers and recruiters have over a decade of experience in various verticals. GCM understands the challenges companies face when it comes to the skills and experience needed to fill the void of the day to day function. Organizations need to reduce training and labor costs but at same requiring the best "talent " for the job.
Qualifications
Information Security Analyst must work 3rd shift (Wed-Sat) 7pm - 6am MST
Information Security Analyst requires:
1-3 years of experience within the IT field
Bachelor's degree in computer science, information technology, or
related field is required Experience with enterprise information
security data management tools such as ArcSight or Splunk is preferred
Solid experience in scripting languages such as (or similar to) Python, PERL, and Ruby is a plus• Proficiency with RSA Archer
Experience with industry standard frameworks• Experience with YARA, regex, or other host/network-based signature development
Information Security Analyst duties:
Respond to network and host based security events
Minimize
the dwell time of threat actors by monitoring, triaging, and validating
security events, while maintaining thorough documentation in the case
management system
Operate with little-to-no direction and define relationships between seemingly unrelated events through deductive reasoning
Actively hunting for and dissecting previously unidentified threats in the environment
Participate in intelligence sharing and trust groups, then apply this knowledge to security controls
Additional Information
$38/hr
6 months
Network Security Analyst
Information security analyst job in Lehi, UT
Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at *************************
Job Description
Job Title: Network Security Analyst
Duration: 6 Months
Location: Lehi, UT
Required:
• Minimum 3+ years exp.
• Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred)
• Review requests for new firewall policy
• Understanding of IP stack
• Ability to prioritize work and meet defined SLAs
• Good communication skills - both verbal and written
Additional InformationThanks & Regards,
______________________________________________________________________________________________________
Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************
Denver CO_Data Security Analyst_Cisco Certified_Linux exp
Information security analyst job in Denver, CO
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Job Description
We are looking to fill a position for Data Security in Denver CO.
Qualifications
Short Description:
Selected person will be responsible to maintain systems to protect data from unauthorized users. Identifies, reports, and resolves security violations.
May require a bachelor's degree in area of specialty and at least 1 year or equivalent experience in the field or in a related area.
CCNA
CCNP+ (security)
CCSA (security)
Linux
Additional Information
Webcam interview is acceptable.
Network Security Analyst
Information security analyst job in Aurora, CO
Network Security AnalystLOCATIONAurora, CO 80014CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are looking for a detail-oriented and proactive Network Security Analyst to join our cybersecurity team. In this role, you will monitor, analyze, and protect the organization's network infrastructure against potential threats and vulnerabilities. You will be responsible for identifying security risks, responding to incidents, and implementing measures to safeguard sensitive information. Collaborating with cross-functional teams, you will play a key role in enhancing the organization's overall network security posture. The ideal candidate is passionate about cybersecurity, thrives in a dynamic environment, and is committed to staying ahead of emerging threats and technologies.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Analyst, Information Security Analyst, Security Operations Center (SOC) Analyst, Network Defense Analyst, Threat Intelligence Analyst, IT Security Specialist, Vulnerability Analyst, Incident Response Analyst, Security Monitoring Analyst, Cyber Defense Analyst, Infrastructure Security Analyst, etc.DEGREE (Level Desired) Bachelor's DegreeALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Monitor network traffic for anomalies
Investigate and resolve security incidents
Maintain and update security systems
Generate and analyze security reports
Assist in developing incident response plans
Ensure adherence to security policies
REQUIRED SKILLS
Proficiency in monitoring tools like IDS/IPS
Strong analytical and problem-solving skills
Understanding of network protocols (TCP/IP, DNS)
Knowledge of malware analysis tools
Ability to interpret security logs
Familiarity with vulnerability scanning tools
DESIRED SKILLS
Experience with advanced threat detection
Knowledge of forensics methodologies
Understanding of regulatory frameworks (e.g., GDPR, HIPAA)
Experience with SOC workflows
Familiarity with automation and scripting
Knowledge of threat intelligence platforms
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyCloud Security Engineer
Information security analyst job in Ogden, UT
We are seeking a qualified Cloud Security Engineer to support a secure DOD customer located in Ogden, UT. The overall program that this role supports aims to modernize legacy network infrastructure and migrate services into a new AWS Cloud Environment.
Clearance Requirements: Candidates must have an interim secret clearance (or above) as a precondition of employment
Location: Onsite 100% at Hill AFB, Ogden UT
Responsibilities:
Implement and manage Secure Cloud Computing Architecture (SCCA) controls, including Virtual Data Center Security Stack (VDSS) and Boundary Cloud Access Point (BCAP).
Work with DoD teams to ensure cloud environments are compliant with DoD security frameworks, including NIST, STIGs, and FedRAMP+.
Manage and enforce Trusted Cloud Credential Management (TCCM) practices for secure identity access and cloud credential management.
Configure and maintain cloud security services for monitoring, alerting, and logging using tools like SolarWinds, ELK, and native CSP security features.
Support cloud onboarding and migration, ensuring security best practices are adhered to during the transition.
Collaborate with cross-functional teams to ensure Zero Trust principles are implemented effectively in the cloud environment.
Assist in preparing and maintaining documentation for ATO processes, including mapping inherited controls and contributing to eMASS submissions.
Provide guidance on cloud security best practices and mentor junior team members in cloud security management.
Requirements:
Bachelor's degree in Computer Science, Cybersecurity, Information Systems, or a related field (or equivalent experience).
CompTIA Security+ (or higher IE CISM or CISSP etc)
DoD-approved cloud security certifications (e.g., AWS Certified Security Specialty, Microsoft Certified: Azure Security Engineer) preferred.
7+ years of experience in cloud security with hands-on experience in at least one CSP (OCI, Azure, or AWS).
Experience in implementing and managing security controls in cloud environments, including identity and access management (IAM), logging, and monitoring.
Experience with security incident management, vulnerability assessments, and cloud compliance processes.
Strong troubleshooting and problem-solving skills in cloud environments.
Solid understanding of DoD cloud security requirements, including NIST 800-53, STIGs, and FedRAMP+.
Proficiency with automation tools such as Terraform, Ansible, and PowerShell for managing cloud configuration.
Interim Secret clearance or above
What Blu Omega Can Offer You:
Competitive benefits including Health Insurance, 401K w/ match, Paid Time Off and more.
Results driven culture that embrace our core values
Rewarding work contributing to our Nation's mission critical programs
Blu Omega is a Woman Owned Small Business Federal Health Technology and Operations firm headquartered in Washington DC and supporting clients nationally. We provide Technology solutions for enterprise and government customers. Our team has a past performance in a diverse range of programs including those for Data Management, Cloud/Infrastructure, Software Development and Enterprise Applications.
An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
Network Security Analyst
Information security analyst job in Lehi, UT
Mindlance is a national recruiting company which partners with many of the leading employers in the Life Sciences, IT, and Financial Services sectors, feel free to check us out at ************************* Job Description Job Title: Network Security Analyst
Duration: 6 Months
Location: Lehi, UT
Required:
• Minimum 3+ years exp.
• Experience with implementing policy on firewalls (Juniper & Palo alto experience preferred)
• Review requests for new firewall policy
• Understanding of IP stack
• Ability to prioritize work and meet defined SLAs
• Good communication skills - both verbal and written
Additional Information
Thanks & Regards,
______________________________________________________________________________________________________
Vikram Bhalla | Team-Recruitment | Mindlance, Inc. | Office: **************