Post job

Security architect jobs in Castle Rock, CO

- 244 jobs
All
Security Architect
Information Systems Security Officer
Network Security Architect
Security System Engineer
Information Security Consultant
Senior Security Architect
Security Engineer
Senior Information Security Engineer
Senior Security Analyst
Information Security Engineer
Senior Information Security Analyst
  • Bank Information Security Governance Senior

    USAA 4.7company rating

    Security architect job in Colorado Springs, CO

    Why USAA? At USAA, our mission is to empower our members to achieve financial security through highly competitive products, exceptional service and trusted advice. We seek to be the #1 choice for the military community and their families. Embrace a fulfilling career at USAA, where our core values - honesty, integrity, loyalty and service - define how we treat each other and our members. Be part of what truly makes us special and impactful. The Opportunity We are seeking a dedicated Bank Information Security Governance Senior. We offer a flexible work environment that requires an individual to be in the office 4 days per week. This position can be based in our Phoenix, AZ; San Antonio, TX; Plano, TX; Colorado Springs, CO; Chesapeake, VA; Charlotte, NC or Tampa, FL offices. Relocation assistance is not available for this position. What you'll do: Supports the first line of defense in ensuring the effectiveness of Information Security (IS) governance, IS risk management, and compliance programs within the Bank Technology Office. Collaborates with Information Technology (IT) and IS teams, business stakeholders, Compliance, Risk Management, Audit Services, and external parties to support IS governance and IS risk and compliance-based initiatives. Acts as a key liaison between the Association's IS function and various Bank business units, ensuring alignment with enterprise security policies and standards. Continuously monitors IS environments to identify emerging risks related to cybersecurity, infrastructure, applications, and third-party services. Provides consultative services across Bank. Provides expert insights on the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the Bank organization's specific needs and strategic objectives. Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures. Conducts forward-looking risk assessments for new technology initiatives, system changes, and digital transformation projects. Analyzes incident trends and control gaps to anticipate potential risk scenarios and recommend preventive measures. Partners with and leads IT/IS teams to embed IS risk considerations early in the project lifecycle and ensure timely mitigation strategies. Leads the development, implementation, and continuous improvement of IT governance frameworks (e.g., COBIT, ITIL) tailored to the organization's specific needs and strategic objectives. Defines, maintains, and enforces IS policies, standards, and procedures to ensure compliance with relevant laws, regulations, and industry best practices. Ensures IS risk compliance with legal, regulatory, and contractual requirements, coordinating audits and assessments. Provides governance oversight for IS related initiatives, ensuring they adhere to established standards, policies, and risk management practices. Mentors junior members of the IS governance team, providing guidance and support in their professional development. Enhances, and maintains awareness of the risk governance framework and its elements (RCSA). Performs root cause analysis to determine likelihood, impact, and mitigation approaches of identified risks. Prepares metrics reporting and participates in the metrics refresh process. Maintains awareness of cloud computing principles and AI and understands potential IS risks inherent within this discipline. Ensures risks associated with business activities are effectively identified, measured, monitored, and controlled in accordance with risk and compliance policies and procedures. What you have: Bachelor's degree in Information Technology, Computer Science, Business Administration, or a related field; OR 4 years of related experience (in addition to the minimum years of experience required) may be substituted in lieu of degree. 6 years experience supporting IS governance, IS risk management, compliance, or IT audit activities In-depth knowledge and application of IT governance frameworks such as COBIT, ITIL, ISO 27001, and NIST, CIS Controls and CMMC Experience working on and implementing IT and/or IS policies, standards, and procedures. Experience leading and coordinating IS audits and assessments and ensuring compliance with regulatory requirements. A strong understanding of regulatory and compliance requirements applicable to the organization. Ability to interpret complex IT/IS environments and detect early warning signals. Experience in identifying potential failure points and simulating risk scenarios. Proficiency in using data to identify trends, anomalies, and emerging risks. Understanding of cloud, cybersecurity, and digital transformation risks. Ability to articulate risk insights and influence stakeholders to take preventive actions. Familiarity with GRC platforms, vulnerability management tools, and risk dashboards. What sets you apart: Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.). Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS) Work experience in highly regulated work environments including other large financial institutions Experience with data-driven analysis using AI tools and collaborating to drive process innovation Highly self-motivated individual capable of working independently and proactively handling their workload with minimal direct supervision. Strong analytical skills and demonstrated experience collaborating effectively with leadership at all levels within an organization. Compensation range: The salary range for this position is: $114,080-$218,030. USAA does not provide visa sponsorship for this role. Please do not apply for this role if at any time (now or in the future) you will need immigration support (i.e., H-1B, TN, STEM OPT Training Plans, etc.). Compensation: USAA has an effective process for assessing market data and establishing ranges to ensure we remain competitive. You are paid within the salary range based on your experience and market data of the position. The actual salary for this role may vary by location. Employees may be eligible for pay incentives based on overall corporate and individual performance and at the discretion of the USAA Board of Directors. The above description reflects the details considered necessary to describe the principal functions of the job and should not be construed as a detailed description of all the work requirements that may be performed in the job. Benefits: At USAA our employees enjoy best-in-class benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), pension, life insurance, parental benefits, adoption assistance, paid time off program with paid holidays plus 16 paid volunteer hours, and various wellness programs. Additionally, our career path planning and continuing education assists employees with their professional goals. For more details on our outstanding benefits, visit our benefits page on USAAjobs.com. Applications for this position are accepted on an ongoing basis, this posting will remain open until the position is filled. Thus, interested candidates are encouraged to apply the same day they view this posting. USAA is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
    $114.1k-218k yearly Auto-Apply 1d ago
  • C# Application Security Architect

    Quantix

    Security architect job in Englewood, CO

    Since 2002, Quantix ProTech has successfully delivered IT resources and solutions to companies while building a solid reputation for integrity and consistent quality. Quantix ProTech continues to partner with the commercial sector for specialized IT placement and staffing services. Quantix ProTech was recently featured in US News and World Report and Forbes. Job Title: C# Application Security Architect Location: Englewood, CO Type: Contract Length: 3 month increments but it's a big project, extension(s) Job Description: Company located in Englewood, CO has an immediate need for a C# Application Security Architect for a contract position. This position will be onsite. Candidate will assist the company move from one platform to another. Seeking a candidate that also understands Network Infrastructure. Position will help lead the production and improvement of compliance, quality, and timing of enterprise security architecture for client / delivery teams. Previous knowledge and expertise in designing and architecting information technology and security controls across complex and diverse networks, applications and infrastructures will be key. Required Skills: 1) 7-10 years of Application development experience in large scale environments including experience working with geographically separated and remote development teams. 2) 5-7 years of Application security and secure coding experience including but not limited to the OWASP Top 10 and SANS / CWE Top 25 coding standards. 3) Experience with.NET 4) 5-7 years of progressive information security experience across various information security / information technology risk management domains such as but not limited to: application security, infrastructure security, identity and access management, third party risk, vulnerability and cyber threat management, security architecture, etc. Desired Skills: 1) Microsoft Azure Qualifications Required Skills: 1) 7-10 years of Application development experience in large scale environments including experience working with geographically separated and remote development teams. 2) 5-7 years of Application security and secure coding experience including but not limited to the OWASP Top 10 and SANS / CWE Top 25 coding standards. 3) Experience with.NET 4) 5-7 years of progressive information security experience across various information security / information technology risk management domains such as but not limited to: application security, infrastructure security, identity and access management, third party risk, vulnerability and cyber threat management, security architecture, etc. Desired Skills: 1) Microsoft Azure Additional Information All your information will be kept confidential according to EEO guidelines. If your interested, send a copy of your resume at henriquez@quantixinc. com or reach me at ************.
    $101k-146k yearly est. 60d+ ago
  • Enterprise Security Architect

    Direct Staffing

    Security architect job in Denver, CO

    We continuously invest in our team members and our infrastructure so we can safeguard our employees, customers and company. We are seeking an Enterprise Security Architect to join our team in Denver, CO. If you like managing projects, owning budgets and being responsible for the security architecture then this may be the right move for you. The Enterprise Security Architect will lead security engineering and mentor team members. This will include planning (review technical solutions for adherence to best practices and best fit), building (act as a project leader to design and configure elements of large security projects) and run activities (responds to escalated tickets or problem reports). In the event that there is a security incident, the security architect may perform a post-event analysis to determine root cause and lead discussions to make sure the necessary changes are put in place to avoid this issue in the future. Responsibilities: Security Technology Strategy and Architecture: Design and implement enterprise security solutions that protect the company's market share, revenue and brand. Solutions should follow industry standard best practices, regulatory guidelines, and corporate policies. Research, evaluate, and recommend security technologies that can be applied to technology solutions being developed or maintained internally or externally. Security Project Management: Leads large highly complex global security projects often delegating work to other team members. Understands both business and technology objectives when deploying projects. Requires ability to configure and test solutions. Operational Security Management: Support of operational Security Management including; Firewall management Content filtering management Client and security agent management Vulnerability scanning remediation Technical Mentoring: Trains and mentors security engineering personnel on security architecture, new technology, and incident troubleshooting. Incident Handling and forensic analysis: Escalation point for incidents. Provides technical leadership for complex security incidents. Prepares final remediation plans for complex issues requiring senior executive engagement. Work environment is generally typical of an office setting, however, must be able to travel to manufacturing facilities globally for projects. Relocation assistance is available for those who qualify under our relocation policy. External Description Search We continuously invest in our team members and our infrastructure so we can safeguard our employees, customers and company. We are seeking an Enterprise Security Architect to join our team in Denver, CO. If you like managing projects, owning budgets and being responsible for the security architecture then this may be the right move for you. The Enterprise Security Architect will lead security engineering and mentor team members. This will include planning (review technical solutions for adherence to best practices and best fit.), building (act as a project leader to design and configure elements of large security projects) and run activities (responds to escalated tickets or problem reports). In the event that there is a security incident, the security architect may perform a post-event analysis to determine root cause and lead discussions to make sure the necessary changes are put in place to avoid this issue in the future. Responsibilities: Security Technology Strategy and Architecture: Design and implement enterprise security solutions that protect the company's market share, revenue and brand. Solutions should follow industry standard best practices, regulatory guidelines, and corporate policies. Research, evaluate, and recommend security technologies that can be applied to technology solutions being developed or maintained internally or externally. Security Project Management: Leads large highly complex global security projects often delegating work to other team members. Understands both business and technology objectives when deploying projects. Requires ability to configure and test solutions. Operational Security Management: Support of operational Security Management including; Firewall management Content filtering management Client and security agent management Vulnerability scanning remediation Technical Mentoring: Trains and mentors security engineering personnel on security architecture, new technology, and incident troubleshooting. Incident Handling and forensic analysis: Escalation point for incidents. Provides technical leadership for complex security incidents. Prepares final remediation plans for complex issues requiring senior executive engagement. Work environment is generally typical of an office setting, however, must be able to travel to manufacturing facilities globally for projects. Relocation assistance is available for those who qualify under our relocation policy. Requirements Search MINIMUM QUALIFICATIONS • Bachelor's degree. • 8 years of advanced security experience or 8 years of Network and Security experience with 5 years of strong security focused experience. • At least one certification such as CISSP, ENCE, SANS GIAC, Cisco CCSP, or CISM. • Experience with enterprise security architecture, design and implementation of complex WAN, LAN, and enterprise security environments. • Project management skills managing complex network and security technologies. • Experience with Windows server and desktop operating systems. • Experience in managing web content filtering and web proxy products. • Experience with network troubleshooting tools such as Splunk and Wireshark. • Experience supporting complex data network environments. • Strong understanding of SSL certificates and Public Key Infrastructure. • Expert working knowledge of network security and layered defense strategies (such as router access lists and route maps, Cisco ASA Firewalls, Cisco IDS Sensors, NAT, VPN, IPSEC, 3DES, SSL, 802.1x, WPA, TKIP, PEAP, Cisco ACS, TACACS and Radius). • Experience with web application design, function and secure software development lifecycles. • Proficient in Microsoft Word, Excel, Outlook • Ability to travel up to 20%. PREFERRED QUALIFICATIONS • Experience managing security for Manufacturing systems, SCADA, and Process control Networks preferred. • Knowledge of computer security incident response and computer forensics 7+ to 10 years experience SKILLS AND CERTIFICATIONS CISSP CISCO WAN/LAN Splunk Wireshark Firewalls SCADA Additional Information All your information will be kept confidential according to EEO guidelines.
    $101k-146k yearly est. 1d ago
  • Enterprise Security Architect

    Ent Credit Union 4.5company rating

    Security architect job in Colorado Springs, CO

    Ent Credit Union exists to improve the financial quality of life of the people we serve. This mission drives us every day, but we are more than our mission. We're also individuals using our unique abilities to make our organization, and the communities we serve, better than they were yesterday. We're a not-for-profit that puts people above profits and actively invests in our community. Our rapidly growing team is expanding our reach to serve more people throughout Colorado. To spread our mission far and wide, we need people like you. If you're interested in a paycheck with a purpose, apply with us today. Our people make the difference, and we truly believe you are our greatest asset. Job Description The Enterprise Security Architect is responsible for designing and implementing comprehensive security frameworks that protect the organization's information assets and ensure compliance with regulatory standards. This role involves assessing current security measures, identifying vulnerabilities, developing security strategy and roadmaps to mitigate risks, as well as developing security standards and best practices in collaboration with engineering teams and information security department for application development, cloud solutions and IT infrastructure. By collaborating with cross-functional teams and stakeholders, the Enterprise Security Architect plays a critical role in fostering a culture of security awareness and resilience within the organization. Essential Functions Security Strategy and Architecture: Develop Security Vision and Strategy: Design an overarching security architecture that aligns with the organization's business goals, ensuring it is adaptable to both current and emerging threats. Security Policy Assessment and Compliance: Participate in evaluating security policies, procedures, and controls to ensure compliance with industry regulations and organizational requirements. System and Application Security Design: Work with engineering, development, and IT teams to integrate security protocols into system design, application development, and IT infrastructure. Ensure adherence to principles like least privilege, secure coding, and secure system design. Innovation and Emerging Technologies: Evaluate Emerging Technologies: Investigate new technologies, such as AI, ML, and blockchain, for potential applications to enhance security posture and processes. Drive Security Innovation: Encourage innovation within security practices and solutions, staying ahead of potential threats and adopting advanced security tools and technologies. Risk Management and Third-Party Security: Risk Identification and Prioritization: Identify, analyze, and prioritize risks to the organization's IT environment, including data, systems, and networks. Develop Risk Mitigation Strategies: Create both preventive and reactive strategies to manage and mitigate security risks across systems. Third-Party Risk Management: Engage with the third-party risk management team to establish security protocols for data sharing, access control, and secure interactions with external partners. Governance, Policy, and Compliance: Policy and Governance Frameworks: Develop and advise on policies, standards, and guidelines for data protection, compliance, privacy, and security governance. Policy Enforcement: Collaborate on the creation of a governance framework to enforce security policies and ensure adherence across departments. Stakeholder Engagement and Education: Educate and advise cross-functional teams, including IT, HR, legal, and executive leadership, on security practices and the business impact of cybersecurity. Security Monitoring, Threat Intelligence, and Continuous Improvement: Security Monitoring Systems: Design and implement systems to detect, monitor, and respond to potential security threats in real-time, ensuring continuous protection. Threat Intelligence and Awareness: Stay informed about the latest cybersecurity threats, vulnerabilities, and trends, applying this knowledge to update and improve security measures. Continuous Improvement: Regularly assess and improve security protocols, systems, and policies to keep pace with evolving threats. Foster a culture of security awareness and adaptability within the organization. Bank Secrecy Act: Remains cognizant of and adheres to Ent policies and procedures, and regulations pertaining to the Bank Secrecy Act. Qualifications Minimum Formal Qualifications for this Position Bachelor's Degree in Information Technology, Computer Science, or related field. preferred 5+ years' working with security architectures, frameworks, and leading large-scale security initiatives Required 10+ years' experience in Cybersecurity preferred 7+ years' Security Engineering, Risk Management, Security Design preferred 3+ years' experience in cloud security, security governance, regulatory compliance preferred Technical or Specialized Knowledge/Skills: Understanding of security architecture frameworks (e.g., SABSA, NIST, ISO 27001). In-depth knowledge of security technologies, including firewalls, intrusion detection systems, and encryption methods. Familiarity with cloud security best practices and architectures across various cloud platforms (e.g., AWS, Azure, Google Cloud). Awareness of compliance regulations (e.g., GDPR, HIPAA, PCI-DSS) and risk management principles. Proficient in security assessment tools and methodologies (e.g., vulnerability scanning, penetration testing). Analytical and problem-solving skills for identifying and addressing security vulnerabilities. Knowledge of threat modeling and compliance to align security strategies with business objectives. Communication skills, with the ability to convey technical concepts to non-technical stakeholders. Ability to develop and maintain security documentation, including policies, standards, and incident response plans. Project management skills, including the ability to coordinate security initiatives and meet deadlines. Ability to evaluate and recommend new security technologies and tools that enhance overall security posture. Ability to collaborate effectively with cross-functional teams and build strong relationships with stakeholders. Capacity to mentor and guide junior security team members in security best practices and methodologies. Ability to adapt to evolving threats and a willingness to stay current with industry trends. Ability to think strategically and align security solutions with overall business objectives. Competence in risk assessment and management related to security decisions and implementations. Certifications Required: Cert Info Sys Sec Pro preferred Cert Info Sec Mgr preferred Environmental, Physical and Psychological Requirements Standing - Occasionally Walking - Occasionally Sitting - Frequently Lifting - Rarely (40 Lbs) Carrying - Rarely Pushing - Rarely Pulling - Rarely Balancing - Rarely Stooping - Rarely Kneeling - Rarely Crouching - Rarely Crawling - Rarely Reaching - Occasionally Handling - Occasionally Grasping - Occasionally Feeling - Occasionally Talking - Frequently Hearing - Frequently Repetitive Motions - Frequently Eye/Hand/Foot Coordination - Occasionally Noises louder than normal speaking volume - Occasionally Temperature Changes - Rarely Atmospheric Conditions - Rarely Additional Information The pay range for this position is: $151,590 to $167,564 per Year (CSF) Final compensation for this position will be determined by various factors such as relevant work experience, specific skills and competencies, education, certifications, and internal pay equity. This position is eligible for our corporate bonus program based on company performance. Benefits Summary Sheet At Ent Credit Union, we offer a comprehensive benefits package, including: Health Benefits: Affordable insurance, 24/7 doctor access, and a nationwide provider network. 401(k): 3% automatic contribution after three months, plus up to 6% matching. Paid Time Off: During your first year, enjoy 16 days of paid time off (PTO) plus 9 paid holidays. And it grows from there. Volunteer Time Off: Paid time off to give back to the community. Education Support: Up to $10,000 annually for higher education and assistance for certifications. Exclusive Discounts: Significant savings on home, car, and personal loans. For more information about our outstanding benefits please visit our careers page at ******************** We anticipate this position to close on 10/31/2025. Please submit your application at your earliest convenience to be considered. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities. The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
    $151.6k-167.6k yearly 17d ago
  • Cloud Network Security Architect

    Fortinet 4.8company rating

    Security architect job in Denver, CO

    Fortinet is seeking a Cloud Network Security Architect specializing in cloud networking, SD-WAN on-ramp design, and SASE convergence. As part of Fortinet's Cloud Architecture team, this role drives the design and deployment of secure, high-performance connectivity across public cloud, data center, and edge environments. The ideal candidate combines strong DevOps engineering skills with deep understanding of secure cloud networking architectures, including dynamic routing constructs, transitive routing models, and cloud-native route services. This role will work closely with Product Management, R&D, Field Engineering, and global customers to develop reference architectures, integrations, and automation for secure, adaptive cloud connectivity. Responsibilities: Design and implement secure cloud network architectures that leverage Fortinet SD-WAN, SASE, and cloud-native routing to deliver optimized multi-cloud connectivity. Develop automation workflows and DevOps pipelines for network provisioning, telemetry, and policy enforcement, using services such as Terraform, Ansible, and cloud-native templates. Architect solutions using transitive routing, route services, dynamic path selection, and zero trust segmentation to enable secure, scalable network topologies. Partner with Product Management and Development teams to identify feature integrations that enhance secure cloud networking capabilities. Lead proof of concept deployments and customer solution validations across public and hybrid cloud environments. Develop and maintain reference architectures, scripts, and code repositories applying industry best practices. Provide architectural guidance on secure traffic steering, network segmentation, and cloud interconnects. Support Professional Services and Sales Engineering teams in customer design and migration projects. Create organizational workflow enhancements to deliver public cloud-sourced services, such hands-on labs, customer POCs, tool integration, data enrichment and other uses Provide technical guidance on Public Cloud matters to internal stakeholders Document and maintain script and application libraries or repositories Provide technical guidance on Public Cloud integration and development, ex. the use of CSP APIs and how they can be leveraged Translate business requirements to programmatic logic Develop customer-facing documentation Create reference designs and code that applies CSP best practices Advise Product and field Engineering on solution options, feature requirements, and reference designs. Requirements: 5+ years of experience in cloud networking, network security, or secure SD-WAN/SASE design. Strong development and scripting experience in one or more languages (Python, Node.js, C#, Go, or equivalent). Familiarity with CI/CD tools (Git, Jenkins) and IaC orchestration (Terraform, Ansible, or CloudFormation). Experience with IaaS and SaaS networking constructs such as VPCs/VNets, route tables, peering, VPNs, and load balancers. Knowledge of BGP, transitive routing, network segmentation, and traffic engineering in cloud environments. Hands-on experience with containerized environments (Docker, Kubernetes) and cloud-native network policies. Proficiency with data formats such as YAML, JSON, or XML. Familiarity with cloud security services (CNAPP, CASB, CWP, SCA, DAST). Strong communication skills and ability to collaborate across engineering, product, and customer-facing teams. Experience in network security highly desired, including VPN, Proxies, Authentication, etc. Technical writing and network documentation skills highly desired Kubernetes and Docker experience required Education: Bachelor's degree in Computer Science or similar and/or equivalent experience required Master's preferred Fortinet offers employees a variety of benefits, including medical, dental, vision, life and disability insurance, 401(k), 11 paid holidays, vacation time, and sick time as well as a comprehensive leave program. Wage ranges are based on various factors including the labor market, job type, and job level. On target earnings for this position is expected to be $170,000 - $280,000 per year. Exact salary offers will be determined by factors such as the candidate's subject knowledge, skill level, qualifications, experience, and geographic location. All roles are eligible to participate in the Fortinet equity program, and this position is also eligible for commissions based on the terms of the Sales Compensation Plan
    $170k-280k yearly Auto-Apply 21d ago
  • Senior IT Security Analyst

    First Busey Corporation 4.5company rating

    Security architect job in Denver, CO

    The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies. The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business. Duties & Responsibilities * Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes * Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary. * Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments. * Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours. * Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies. * Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data. * Document and perform verification of IT related changes in accordance with Company security policies and procedures. * Research and recommend hardware and software solutions to augment or enhance existing security measures. * Stay current in events and trends in IT security. * Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered. * Conduct scheduled reviews of key application security settings. * Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates. * Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs * Supports audit and incident processes, as required * Monitor and support internal SEIM systems, reports, and searches * Monitor and support internal phishing email report systems and reports * Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business * Develops strong liaison relationships with key internal business and technology teams * Coach level I & IIs on security domains and program processes * Depending on need, VP Security may determine a Team Lead designation for Level III role * Participate in security work streams for a variety of enterprise projects and initiatives * Determine and communicate security risk postures to partners and leaders as appropriate Education & Experience Knowledge of: * Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments. * Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents. * Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices. * Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS. * Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Familiarity with cloud architectures, security standards, and best practices * Strong oral and written communication skills * Strong organizational skills and attention to detail * Excellent interpersonal skills Ability to: * Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits. * Take independent action within established options and develops new procedures and approaches to problems when necessary * Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required * Self-starter requiring minimal supervision * Highly organized and efficient. * Demonstrated strategic and tactical thinking. * Stays current with the evolving threat landscape. * Perform duties and make decisions under frequent time pressures Education and Training: * (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience. * On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent * Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire. * At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration * Requires knowledge of Microsoft Office and other productivity tools Benefits and Compensation Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance. (Base Pay Range: $86,000 - $123,000/year) Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information. Equal Opportunity Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment. Unsolicited Resumes Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails. Application Deadline 11/15/25
    $86k-123k yearly Auto-Apply 47d ago
  • Senior Security Architect

    Echostar 3.9company rating

    Security architect job in Littleton, CO

    EchoStar is reimagining the future of connectivity. Our business reach spans satellite television service, live-streaming and on-demand programming, smart home installation services, mobile plans and products. Today, our brands include Boost Mobile, DISH TV, Gen Mobile, Hughes and Sling TV. **Department Summary** Our Technology teams challenge the status quo and reimagine capabilities across industries. Whether through research and development, technology innovation or solution engineering, our people play vital roles in connecting consumers with the products and platforms of tomorrow. **Job Duties and Responsibilities** EchoStar is seeking a talented and innovative Security Architect to lead the design, development, and implementation of its Identity Management (IAM) and Zero Trust Architecture. The role will ensure robust security across EchoStar's digital ecosystem, focusing on secure authentication for employees and supply chain vendors, as well as implementing network- and user-based segmentation controls. The Security Architect will collaborate across internal teams and external partners to drive security innovation, ensure the effectiveness of security controls, and propel EchoStar's security program forward. **Key Responsibilities:** + Consumer Identity and Access Management (IAM) Architecture: Design, implement, and manage a secure IAM framework that delivers industry-leading authentication capabilities for EchoStar employees and supply chain vendors; ensure workflows are secure, scalable, and user-friendly, reducing authentication friction without compromising security + Zero Trust Architecture: Lead the design and deployment of EchoStar's Zero Trust architecture, focusing on network-based and user-based segmentation controls; ensure proper user, system, and data separation to protect against unauthorized access and lateral movement within the network + Security Control Effectiveness: Continuously measure and evaluate the effectiveness of security controls in production environments; use data-driven insights to ensure the architecture operates as designed, addressing any gaps or deficiencies proactively + Security Architecture Support: Provide Security Architecture support to align with and improve other security control frameworks within EchoStar; help reduce constraints and roadblocks in security projects and initiatives, ensuring smooth progress of the security program + Innovation in Security Control Stack: Drive innovation within EchoStar's security control stack to enhance overall security posture; leverage emerging technologies and advanced security practices to ensure EchoStar remains at the forefront of cybersecurity, building the most secure platform possible + Threat Landscape Research: Conduct ongoing research into emerging cybersecurity threats and trends, particularly those related to IAM and Zero Trust architectures; implement proactive solutions to protect EchoStar's systems, employees, and vendors from potential threats + Cross-Organizational Collaboration: Collaborate with various internal teams, including IT, compliance, and business units, to align security initiatives with business objectives; build strong relationships with external industry partners to adopt best practices and stay ahead of evolving security challenges + Security Initiatives Intake: Lead the intake and execution of new security initiatives; develop clear security requirements, participate in project reviews, and ensure security controls are seamlessly integrated into new technology deployments **Skills, Experience and Requirements** **Education and Experience:** + Bachelor's degree in Computer Science or Information Technology, related discipline, or commensurate industry experience + 10+ years of related experience **Skills and Qualifications:** + Strong understanding of cyber security principles, concepts, and technologies + Knowledge of network protocols, operating systems, and security frameworks + Experience with vulnerability assessment and penetration testing tools + Excellent analytical and problem-solving skills, with the ability to think critically and make informed decisions + Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams + Self-motivated and eager to learn, with a strong passion for cyber security + Relevant certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or Certified Information Systems Security Professional (CISSP) are a plus + Experience in designing and deploying security architectures for large-scale, global organizations + Familiarity with cloud security, especially around IAM and Zero Trust models in hybrid and multi-cloud environments + Prior experience in securing supply chain and vendor management processes Visa sponsorship not available for this role **Candidates must be willing to participate in at least one in-person interview, which may include a live whiteboarding or technical assessment session.** \#LI-JZ2 **Salary Ranges** Compensation: $127,050.00/Year - $181,500.00/Year **Benefits** We offer versatile health perks, including flexible spending accounts, HSA, a 401(k) Plan with company match, ESPP, career opportunities, and a flexible time away plan; all benefits can be viewed here: DISH Benefits . The base pay range shown is a guideline. Individual total compensation will vary based on factors such as qualifications, skill level, and competencies; compensation is based on the role's location and is subject to change based on work location. Candidates need to successfully complete a pre-employment screen, which may include a drug test and DMV check. Our company is committed to fostering an inclusive and equitable workplace where every individual has the opportunity to succeed. We are dedicated to providing individuals with criminal or arrest records a fair chance of employment in accordance with local, state, and federal laws. The posting will be active for a minimum of 3 days. The active posting will continue to extend by 3 days until the position is filled. We pride ourselves on developing and promoting talent as an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status. EchoStar will accommodate the sincerely held religious beliefs of employees if such accommodations are not undue hardships and are otherwise within the bounds of applicable law. All qualified applicants with arrest or conviction records will be considered for employment in accordance with local, state, and federal law. You may redact any information that identifies age, date of birth, or dates of school/graduation from your application documents before submission and throughout our application process. EchoStar will provide reasonable accommodation to otherwise qualified job applicants and employees with known physical or mental disabilities, unless doing so poses an undue hardship on the Company, poses a direct threat of substantial harm to others, or is otherwise not required by law. EchoStar has a more detailed Accommodation Policy that applies to employees. EchoStar endeavors to make echostar.com and jobs.echostar.com accessible to users. Please contact *************** if you would like to discuss the accessibility of our website or need assistance completing the application process. This contact information is for accommodation requests only; do not use this contact information to inquire about the status of applications. Click the links to access the following statements: EEO Policy Statement (********************************************************************************* , Pay Transparency (*********************************************************************************************************** , EEOC Know Your Rights (English (************************************************************************************ /Spanish (**************************************************************************************************** ) We are an Equal Opportunity/Affirmative Action employer and will consider all qualified applicants for employment without regard to race, color, religion, gender, pregnancy, sex, sexual orientation, gender identity, national origin, age, genetic information, protected veteran status, disability, or any other basis protected by local, state, or federal law. All qualified applicants with arrest or conviction records will be considered for employment in accordance with local, state, and federal law. U.S. Citizenship is required for certain positions. EEO is the law. At EchoStar, you have the right to request reasonable accommodations. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact ********************. This contact information is for accommodation requests only; you may not use this contact information to inquire about the status of an application.
    $127.1k-181.5k yearly Easy Apply 60d+ ago
  • Information Systems Security Officer Senior (ISSO)

    York Space Systems 4.3company rating

    Security architect job in Greenwood Village, CO

    Salary: $120,000-$135,000 York Space Systems was founded to radically improve spacecraft affordability and reliability, transforming, and enabling next generation space mission operations worldwide. Today, it is one of the most innovative aerospace companies, specializing in both end-to-end customer solutions and the rapid production of spacecraft platforms. York's complete Space Segment Solution including spacecraft production, payload integration, system integration & test, launch services, ground segment services, and mission operations enables customers to leverage York's existing technology solutions to get rapidly and responsively to orbit. We're looking to expand our team across the board. York Space Systems is seeking a Senior Information Systems Security officer (ISSO) to facilitate A&A (Authorization & Assessment) efforts throughout multiple systems' RMF lifecycle. The selected candidate will take the lead in supporting multiple RMF accreditation efforts and will perform tasks that include determining DoD requirements, hardware/software configuration management (to include baseline configuration), risk assessments/vulnerability assessments, testing and documenting security controls, and ensuring overall compliance with DoD Cybersecurity policies. The ideal candidate will have experience working as an ISSO or security relevant field and must be comfortable operating in a senior role and mentor for junior ISSOs. The selected candidate will be able to speak directly with customers with little to no Information System Security Managers (ISSM) involvement and be the face of security for their selected boundaries. Responsibilities below are inclusive ISSO duties. RESPONSIBILITIES Oversee day-today operations required to perform RMF Manage tasks and create deadlines to meet security requirements Be forward facing for customer interactions which will translate into system requirements Spearhead building RMF packages within eMASS and perform continuous monitoring for the full duration of the information system lifecycle Implement the Risk Management (RMF) process throughout the entire A&A lifecycle of the system(s) or multiple ATOs across different locations, supporting all efforts pre and post Authority to Operate (ATO) determination Assist the ISSM in meeting their duties to support A&A activities and coordinate with system's Security Controls Assessor (SCA) and Authorizing Official (AO) Perform and review technical security assessments of the system(s) to identify points of vulnerability, non-compliance with established cybersecurity standards and regulations, and recommend mitigation strategies to maintain operational security posture for the boundary systems Conduct risk analyses from vulnerability, compliance scans, penetration testing results, and/or other audit activities Create and maintain Plan of Action and Milestones (POA&Ms), System Security Plans (SSPs), Security Control Traceability Matrices (SCTMs), Standard Operating Procedures (SOPs), Configuration Management Plans, Contingency Plans and Test Result/Security Impact Analyses Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Conduct continuous monitoring (ConMon) activities for applicable authorization boundaries Apply and maintain up to date application of Security Technical Implementation Guides (STIGs) to required components of the information systems Maintain inventory and asset configuration to include change management documentation Lead System level change request through formalized Configuration Control boards (CCB) Ensure that the appropriate operational security posture is maintained for the information system, working in close collaboration with the information system owner and the ISSM Notify ISSM when changes occur that might affect the authorization determination of the information system(s) Experience in advising System Administrators and Network Administrator to Remediate system decencies Report all security-related concerns and incidents to the ISSM Able to also handle security concerns in lieu of ISSM advise on security concerns IAW system procedures REQUIRED QUALIFICATIONS Experience developing and documenting DoD Assessment and Authorization documentation Knowledge of CNSSI 1253, NIST 800 Series (primarily 800-53, 800-53A, 800-171), RMF 5 + years of IA/Cyber Security experience Bachelor's degree or higher in Computer Science or Security Security+/CISM certification or equivalent Experience with DCSA tools such as eMASS, STIGs and SCAP Possess an Active Secret clearance or higher REQUIREMENTS/PREFERRED QUALIFICATIONS Well versed with RMF package creation and maintenance artifacts to support A&A decision Experience using DISA Security Technical Implementation Guides (STIGs), Security Requirements Guide (SRGs) and Security Content Automation Protocol (SCAP) to audit and securely configure network-enabled devices Fundamental knowledge of DISA Enterprise Mission Assurance Support Service (eMASS) Proficient with vulnerability tools and audit review tools which include audit log analysis and report generation (Nessus and Splunk experience preferred) Experience conducting risk analysis on products and system components through review of CVEs, plugins, CWEs Experience in conducting software due diligence with COTS and GOTS solutions Strong communication and documentation skills Flexible and able to adapt to a rapidly changing environment Positive, self-motivated individual who can complete tasks independently Working knowledge of system functions, security policies, technical security safeguards, and operational security measures. BENEFITS In addition to compensation, York Space Systems is proud to offer a comprehensive benefits package including medical, dental, and vision insurance along with PTO and a 401K. HOW TO APPLY Interested candidates are encouraged to apply by clicking the “Apply for this position” link below. York Space Systems will be accepting applications on a rolling basis until the position is closed. York Space Systems provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, military or protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Must have permanent authorization to work in the United States. This policy applies to all terms and conditions or employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training. YORK SPACE SYSTEMS IS AN EEO EMPLOYER.
    $120k-135k yearly 60d+ ago
  • Senior Security Analyst

    Switchboard Hiring

    Security architect job in Englewood, CO

    Job Description Sponsorship not available. Position only available to those with legal authorization to work in the United States. Switchboard is seeking a Senior Security Analyst on behalf of our client, Open Technology Solutions. In this role, you'll lead critical vulnerability and threat management programs while serving as a senior analyst in the SOC to protect a financial services consortium. You'll manage security operations, work directly with contracted MDR and SIEM providers, and translate complex security concepts into actionable insights for stakeholders. If you have 5+ years of SOC experience, strong knowledge of network security technologies, and the ability to mentor others while managing escalations, we want to hear from you. About Open Technology Solutions Open Technology Solutions (OTS) is a technology consortium empowering credit unions and community financial institutions to compete and thrive. They provide shared technology infrastructure and innovative solutions that help member institutions deliver exceptional service to their communities. With a people-first culture built on collaboration and technical excellence, OTS combines the stability of serving the financial sector with the innovation of a forward-thinking technology organization. As a Senior Security Analyst, you will: Lead the organization's vulnerability and threat management program, identifying and mitigating security risks before they become incidents Manage relationships with third-party security vendors and oversee the 24/7 Security Operations Center Monitor cyber threat intelligence and determine which threats are relevant to the financial services environment Translate technical security issues into clear language for business stakeholders and partner organizations Coach and mentor junior security analysts and serve as backup to the Security Operations Manager Develop and maintain security procedures, standards, and documentation Requirements 5+ years of experience in a security operations center or similar security role Strong knowledge of network security technologies and how to communicate security concepts to non-technical audiences Hands-on experience with Microsoft security tools (Office 365, Microsoft Sentinel) Familiarity with vulnerability management, incident response, and security frameworks Understanding of network protocols, authentication methods, and access control systems Ability to work independently with minimal training and onboarding support Security certifications preferred (CISSP, CCNA, CISM, or similar) Bachelor's degree preferred but not required Benefits Location: Hybrid (3 days per week in our Englewood, CO office) Compensation: $135K - $150K salary + 10% bonus Benefits: Comprehensive medical, dental, and vision insurance (starting first full month) 401(k) with company matching 11 paid holidays + PTO Student loan paydown program (up to $10,000 lifetime benefit) Tuition reimbursement (up to $5,250 annually) Service anniversary bonuses Company-paid life insurance, short-term and long-term disability Wellness reimbursement and additional unique perks
    $135k-150k yearly 2d ago
  • Information Security Engineer

    C4 Technical Services 3.4company rating

    Security architect job in Broomfield, CO

    Responsible for providing network security expertise related to any of the following: activation and turn up of customer security equipment, failover testing, monitoring network security devices, troubleshooting, investigation of events, debug, investigation of incidents, escalation or mitigation of incidents and events, network security analysis, or deployment of devices. 2-4 years of experience in IT, networking or cybersecurity required. Targeted and Recommended Certifications and Skills: Fortinet / Fortigate Security Experience Needed - Top skill One of the following - NSE4, NSE 5-Analyzer, NSE 5 - Manager, NSE 7 CCNA CCNP Cisco Router/Routing Background IRF- integrated router firewall background Next-Generation Firewall background Routing background Project Date and Time needs: Monday to Friday ** Standard Business Hours **
    $67k-92k yearly est. 60d+ ago
  • Information Network Security Architect

    Ra 3.1company rating

    Security architect job in Colorado Springs, CO

    About us: We (our client) inspire and support discoveries that advance the quality of life. We provide life science, diagnostic and applied market laboratories worldwide with instruments, services, consumables, applications and expertise. Most of all we are an equal opportunity employer and value diversity at our company. We are looking for expert level networks and security engineer with extensive expertise in Cisco (firewall, switching, routing), Juniper, Palo Alto Networks and other technologies. Job Description Your responsibilities when you are on board: You will define and manage security infrastructure roadmap in collaboration with the Networks and Security organization. You will lead and contribute in projects to implement next generation access and security infrastructure components. Provide technical design, implementation planning, testing and troubleshooting expertise. Design, develop and lead implementation of new technical security infrastructures. Responsible for technical planning, design, development and modification of new solution specifications and implementation. Manage large information technology vendors in the technical aspects of designing, developing and implementing solutions. Qualifications We'd love to speak to you, if: You hold a Bachelors or Masters Degree or University Degree. You've more than 8 years with some technology certifications. You've in-depth expertise in Network and Security technologies. What can we offer: A base salary of $95,000 - $123,000 + Full benefits Relocation Assistance Additional Information I love talking to passionate people. Please do not hesitate to reach out to me at shruthi.n at roljobs dot com
    $95k-123k yearly 60d+ ago
  • Systems Engineer II - Security & Compliance

    Charter Spectrum

    Security architect job in Greenwood Village, CO

    This role requires the ability to work lawfully in the U.S. without employment-based immigration sponsorship, now or in the future. This posting has been extended beyond the initial anticipated closing date. Do you thrive on solving complex technical challenges and building scalable systems? Spectrum seeks a Systems Engineer II to help shape and support the design, implementation and maintenance of databases and systems related to cybersecurity compliance according to industry standards. This is a cross functional role monitoring and driving compliance activities across Network Technology Services and Security. The ideal candidate will have a strong technical expertise in system architecture and security controls, as well as interpreting and implementing compliance frameworks. How You'll Make an Impact * Collaborate closely with vertical leads to interpret internal compliance requirements and embed them into daily operations. * Track compliance metrics to measure vertical adherence, report on progress and identify areas of support to leadership. * Provide guidance to ensure verticals remediate compliance gaps to meet the defined target for each metric. * Develop and maintain documentation such as System Security Plans (SSPs), Compliance Timelines and Continuous Monitoring reports. * Contribute to design sessions with Architects, Requirements Analysts, Security Operations and Systems Engineers; supports in creation of detailed design documents and functional specifications for new applications/services and enhancements to existing systems/services * Review existing security integration capabilities, data sources, and proposed solution designs for feasibility, cost and functionality * Create work effort estimates for assigned tasks, supporting prioritization and release management * Develop and enforce security policies, procedures, and compliance requirements (e.g., NIST, PCI) * Use established change management processes, performing operational procedures with minimal customer impact during established maintenance window * Work with database administrators to configure, tune and maintain database security * Collaborate with Security teams to ensure security is integrated into system designs and deployments. Working Conditions * Office environment What You'll Bring to Spectrum Required Qualifications Education * Bachelor's degree in Computer Science or related field, or equivalent experience; may require Industry Standard Certifications Experience * 3+ years of Application Development experience in relevant areas * 2+ years of Network OSS application experience * 2+ years of System administration experience * 2+ years of Database support and development experience * 2+ years in Enterprise Application Integration (EAI) experience Skills * Demonstrated in-depth ability to conduct security design sessions to specify solution designs for feasibility, cost, and functionality; create detailed documentation to functionally understand new and existing applications; follow and implement established change and control policies and procedures; troubleshoot application problems * Demonstrated in-depth knowledge of development tools, application frameworks, testing tools, and * OSS applications and software; choosing the appropriate lifecycle and the planning, monitoring and control of the systems engineering process Preferred Qualifications Experience * 5+ years of Application Development experience in relevant areas * 3+ years of Network OSS application experience * 3+ years of System Administration experience * 3+ years of Database support and development experience * 3+ years of experience in Enterprise Application Integration (EAI) ISY340 2025-63095 2025 Here, our employees don't just have jobs, they're building careers. That's why we offer a comprehensive pay and benefits package that rewards employees for their contributions to our success, supporting all aspects of their well-being at every stage of life. A qualified applicant's criminal history, if any, will be considered in a manner consistent with applicable laws, including local ordinances. This job posting will remain open until 2025-12-05 06:40 PM (UTC) and will be extended if necessary. The base pay for this position generally is between $75,130.00 and $120,010.00. The actual compensation offered will carefully consider a wide range of factors, including your skills, qualifications, experience, and location. We comply with local wage minimums and also, certain positions are eligible for additional forms of other incentive-based compensation such as bonuses. Get to Know Us Charter Communications provides superior communication and entertainment products for residential and business customers through the Spectrum brand. Our offerings include Spectrum Internet, TV, Mobile and Voice. Beyond our connectivity solutions, we also provide local news, programming and regional sports via Spectrum Networks and multiscreen advertising solutions via Spectrum Reach. When you join our team, you'll be keeping our customers connected to what matters most in 41 states across the U.S. Watch this video to learn more. Grow Your Career Here We're committed to growing a workforce that reflects the customers and communities we serve - providing opportunities for employment and advancement to all team members. Spectrum is an Equal Opportunity Employer, including job seekers with disabilities and veterans. Learn about Life at Spectrum.
    $75.1k-120k yearly 3d ago
  • Colorado_Information Security_GRC Exp_w2_Govt. exp preferred

    360 It Professionals 3.6company rating

    Security architect job in Denver, CO

    360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement. Job Description We are looking to fill a position for Information Security Engineer with GRC experience in Denver CO. This is a Risk and Compliance: Governance, Risk & Compliance (GRC) position Qualifications Audit Governance Risk and Compliance It Security Risk Management Additional Information Webcam interview is acceptable.
    $97k-128k yearly est. 60d+ ago
  • Information System Security Officer (ISSO) II

    Parsons Commercial Technology Group Inc.

    Security architect job in Aurora, CO

    In a world of possibilities, pursue one with endless opportunities. Imagine Next! At Parsons, you can imagine a career where you thrive, work with exceptional people, and be yourself. Guided by our leadership vision of valuing people, embracing agility, and fostering growth, we cultivate an innovative culture that empowers you to achieve your full potential. Unleash your talent and redefine what's possible. Job Description: Parsons is looking for a talented Level 2 ISSO to join our growing team! In this role you will develop, maintain, and implement information security standards, procedures, and guidelines for applications and databases. In addition, you will ensure that systems and organizational databases are protected from unauthorized access and use, and monitor systems, identify threats, and handle disaster recovery operations. The max salary for this role is between $90k-$95k, pending skillset and qualifications. What You'll Be Doing: * Performs assessments of systems and networks within the networking environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations (compliance audits) and active evaluations (vulnerability assessments). * Establishes strict program control processes to ensure mitigation of risks and supports for obtaining certification and accreditation of systems. This includes process support, analysis support, coordination support, security certification test support, security documentation support, investigations, software research, hardware introduction and release, emerging technology research inspections, and periodic audits. * Assists in the implementation of required government policy (e.g.,, NISPOM, DCID 6/3), and makes recommendations on process tailoring. * Performs analyses to validate established security requirements and recommends additional security requirements and safeguards where required. * Supports the formal Security Test & Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports. * Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed. * Demonstrates advanced subject matter expertise in job family. * Contributes to and may lead the planning and implementation of large programs in the function, and regularly interfaces with senior management and executive leadership. * Plays a role in overall functional strategic planning. What Required Skills You'll Bring: * Active Top Secret/SCI with CI Polygraph. * Bachelors degree with typically 2+ years of relevant experience. Candidates with a Masters degree require 1+ year(s) of relevant experience, and additional years of experience can qualify in lieu of a degree for non-degreed candidates. * An active CASP+, CECCNP, Security+, CISA, CISSP, GCED, GCIH, CCSP or CISSP or must be willing to obtain / maintain within 6 months of hire. What Desired Skills You'll Bring: * Strong leadership skills * Management experience * Ability to coach and develop junior ISSO's Security Clearance Requirement: An active Top Secret SCI w/Polygraph security clearance is required for this position. This position is part of our Federal Solutions team. The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now. Salary Range: $86,700.00 - $151,700.00 We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle! This position will be posted for a minimum of 3 days and will continue to be posted for an average of 30 days until a qualified applicant is selected or the position has been cancelled. Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status. We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY! Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to ************************************************
    $90k-95k yearly Auto-Apply 2d ago
  • Lead Security Engineer, Cloud Infrastructure

    Klaviyo 4.2company rating

    Security architect job in Denver, CO

    At Klaviyo, we value the unique backgrounds, experiences and perspectives each Klaviyo (we call ourselves Klaviyos) brings to our workplace each and every day. We believe everyone deserves a fair shot at success and appreciate the experiences each person brings beyond the traditional job requirements. If you're a close but not exact match with the description, we hope you'll still consider applying. Want to learn more about life at Klaviyo? Visit careers.klaviyo.com to see how we empower creators to own their own destiny. As a Lead Security Engineer, you'll be a vital part of the Infrastructure Security Team, focusing on strengthening the security posture across Klaviyo's entire technology environment, developing security architectures and repeatable patterns and mentoring colleagues and junior security engineers. Unlike roles with a narrowly defined specialty, this position offers the opportunity to demonstrate your unique expertise-whether that's in cloud security, identity and access management, data protection, secure systems design, or other security domains. Your work will involve evaluating and hardening our infrastructure, collaborating with cross-functional teams, and leveraging AI to build scalable solutions to address emerging threats. We are looking for someone who is excited to bring their specialized skills to the team, shaping Klaviyo's security practices and helping us continue to raise the bar. How You Will Make a Difference Secure Klaviyo's infrastructure by designing, implementing, and maintaining scalable security controls across cloud, on-prem, and hybrid environments Evaluate and improve security configurations and policies across a range of technologies, using your domain expertise to reduce risk and enable secure-by-default architectures Collaborate with engineering and IT teams to embed security practices and develop repeatable security patterns across the development and deployment lifecycle Lead threat modeling, risk assessments, and architecture reviews in areas aligned with your specialty Develop automated solutions and infrastructure-as-code to drive consistent and reproducible security outcomes Stay ahead of the latest threats and advocate for innovative security solutions aligned with business needs Help define security standards and best practices at Klaviyo, championing their adoption across teams Who You Are Have 5+ years of experience in infrastructure or security engineering roles, with deep knowledge in one or more security focus areas (e.g., cloud security, IAM, endpoint security, data protection, detection engineering, compliance) Comfortable navigating ambiguity and defining priorities in a broad-scoped role Experienced working in modern cloud environments such as AWS, GCP, or Azure Familiar with infrastructure-as-code tools such as Terraform, CloudFormation, or Pulumi Proficient in secure systems design, threat modeling, and vulnerability management AI Agentic development and prompt engineering, MCP (AWS Bedrock, OpenAI, Anthropic) Able to clearly articulate complex security topics to technical and non-technical stakeholders Passionate about security, eager to learn from others and share your expertise Nice to have - certifications (e.g., CISSP, CKS, GCP/AWS Security certs) or equivalent practical experience We use Covey as part of our hiring and / or promotional process. For jobs or candidates in NYC, certain features may qualify it as an AEDT. As part of the evaluation process we provide Covey with job requirements and candidate submitted applications. We began using Covey Scout for Inbound on April 3, 2025. Please see the independent bias audit report covering our use of Covey here Massachusetts Applicants: It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability. Our salary range reflects the cost of labor across various U.S. geographic markets. The range displayed below reflects the minimum and maximum target salaries for the position across all our US locations. The base salary offered for this position is determined by several factors, including the applicant's job-related skills, relevant experience, education or training, and work location. In addition to base salary, our total compensation package may include participation in the company's annual cash bonus plan, variable compensation (OTE) for sales and customer success roles, equity, sign-on payments, and a comprehensive range of health, welfare, and wellbeing benefits based on eligibility. Your recruiter can provide more details about the specific salary/OTE range for your preferred location during the hiring process. Base Pay Range For US Locations:$188,000-$282,000 USD Get to Know Klaviyo We're Klaviyo (pronounced clay-vee-oh). We empower creators to own their destiny by making first-party data accessible and actionable like never before. We see limitless potential for the technology we're developing to nurture personalized experiences in ecommerce and beyond. To reach our goals, we need our own crew of remarkable creators-ambitious and collaborative teammates who stay focused on our north star: delighting our customers. If you're ready to do the best work of your career, where you'll be welcomed as your whole self from day one and supported with generous benefits, we hope you'll join us. AI fluency at Klaviyo includes responsible use of AI (including privacy, security, bias awareness, and human-in-the-loop). We provide accommodations as needed. By participating in Klaviyo's interview process, you acknowledge that you have read, understood, and will adhere to our Guidelines for using AI in the Klaviyo interview Process. For more information about how we process your personal data, see our Job Applicant Privacy Notice. Klaviyo is committed to a policy of equal opportunity and non-discrimination. We do not discriminate on the basis of race, ethnicity, citizenship, national origin, color, religion or religious creed, age, sex (including pregnancy), gender identity, sexual orientation, physical or mental disability, veteran or active military status, marital status, criminal record, genetics, retaliation, sexual harassment or any other characteristic protected by applicable law. IMPORTANT NOTICE: Our company takes the security and privacy of job applicants very seriously. We will never ask for payment, bank details, or personal financial information as part of the application process. All our legitimate job postings can be found on our official career site. Please be cautious of job offers that come from non-company email addresses (@klaviyo.com), instant messaging platforms, or unsolicited calls. By clicking "Submit Application" you consent to Klaviyo processing your Personal Data in accordance with our Job Applicant Privacy Notice. If you do not wish for Klaviyo to process your Personal Data, please do not submit an application. You can find our Job Applicant Privacy Notice here and here (FR).
    $79k-110k yearly est. Auto-Apply 16d ago
  • Senior Information Systems Security Officer (ISSO) - Aurora, CO

    RTX Corporation

    Security architect job in Aurora, CO

    Country: United States of America Onsite U.S. Citizen, U.S. Person, or Immigration Status Requirements: Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance Security Clearance: TS/SCI with Polygraph At Raytheon, the foundation of everything we do is rooted in our values and a higher calling to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world. Our cybersecurity team is seeking a Information Systems Security Officer (ISSO) to support our team 100% onsite at our facility in Aurora, Colorado. The ISSO is responsible for the implementation of the cybersecurity requirements as stipulated by various USG requirements documents including (but not limited to): ICD 503 RMF, NIST, and associated NIST documents. What You Will Do * Cybersecurity sustainment activities (hardware change administration, software change administration, account overseeing, media protection, user interface, file transfers, etc.) * Development of Assessment and Authorization (A&A) artifacts (SSPs, SCTM, System Profiles, POA&M, testing documentation, etc.) * Information System Self Inspections, Auditing, and Continuous Monitoring. * Interfacing with Internal/External Customers: Customer Representatives, Program Managers/Directors, IT, etc. * Cybersecurity Training and Awareness, Incident Response Investigations. * Development, Maintenance, and Implementation of internal and customer compliant cybersecurity policies and procedures. * The ideal candidate possesses meaningful written and oral communications skills, technical knowledge, exemplary customer service skills, thorough time administration skills, the ability to creatively find solutions to complex challenges, and the ability to multi-task and thrive in a fast paced environment. * This position will report directly to the Aurora Information Systems Security Manager (ISSM) for Raytheon. * Travel to other locations as required up to 10% of work schedule. Qualifications You Must Have * Typically requires a Bachelor's Degree or equivalent experience and minimum 5 years prior relevant experience, or an Advanced Degree in a related field and minimum 3 years' experience. * A minimum of 5+ years of experience supporting various computer hardware platforms and multiple operating systems, both stand alone and LAN/WAN configurations * Current IAM Level I certification * DoD 8140.03 Compliant Professional Certification (e.g. Security+, SSCP, CISSP, CISM, GSLC, etc.) * Relevant Experience Considered in any combination: * Cybersecurity, systems security or hardening * Information Technology * Experience with SCI Programs A&A documentation and processes * Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics) * Experience with operating systems security features and settings (e.g. Windows, UNIX, and Linux) Qualifications We Prefer * Experience with various information system security assessment/hardening resources - NESSUS, SCAP Compliance Checker, Retina, etc. * Working knowledge of Wide-Area and Local Area Networks (WAN/LAN), to include Cisco-based routers switches, and firewalls. * Prior ISSO/IAO experience. What We Offer Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation. Relocation Non-Eligible - Relocation assistance not available Please consider the following role type definition as you apply for this role: * Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products. We are RTX #LI-Onsite As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote. The salary range for this role is 82,000 USD - 164,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills. Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement. Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance. This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply. RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act. Privacy Policy and Terms: Click on this link to read the Policy and Terms
    $67k-92k yearly est. Auto-Apply 17d ago
  • System Security Engineer

    Cymertek

    Security architect job in Aurora, CO

    System Security EngineerLOCATIONAurora, CO 80014CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are seeking a highly motivated and detail-oriented System Security Engineer to design, implement, and maintain security measures that protect our critical systems and data. In this role, you will work closely with cross-functional teams to identify vulnerabilities, develop robust security solutions, and ensure compliance with industry standards and regulations. The ideal candidate has a strong understanding of system architecture, a proactive approach to mitigating risks, and a passion for staying ahead of evolving cyber threats. If you are a problem-solver who thrives in a dynamic environment, we encourage you to apply and help us safeguard our organization's infrastructure. *** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. *** SIMILAR CAREER TITLESCybersecurity Engineer, Information Security Engineer, Network Security Engineer, IT Security Engineer, Cloud Security Engineer, Infrastructure Security Engineer, Endpoint Security Engineer, Security Operations Engineer, Security Systems Analyst, Data Security Engineer, Application Security Engineer, Identity and Access Management Engineer, Threat Detection Engineer, Vulnerability Management Engineer, Risk Assessment Engineer, Compliance Security Engineer, Incident Response Engineer, Secure Systems Architect, Security Automation Engineer, etc.DEGREE (Level Desired) Bachelor's DegreeDEGREE (Focus) Cybersecurity, Computer Science, Information Technology, Information Systems, Computer Engineering, Network Engineering, Software Engineering, Systems Engineering, Electrical Engineering, Data Science, Telecommunications, Information Assurance, Security Management, Digital Forensics, Cryptography, Cyber Operations, Applied Mathematics, Artificial Intelligence, Risk Management, Secure Systems Design, etc.ALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES Design and implement secure system architectures Monitor and respond to system security incidents Develop and enforce system security policies Conduct risk assessments and mitigate vulnerabilities Ensure compliance with security standards and frameworks Collaborate with teams to integrate security into system development REQUIRED SKILLS Proficiency in configuring firewalls and intrusion detection systems Strong knowledge of operating system security (e.g., Linux, Windows) Experience with endpoint protection tools Familiarity with network protocols and security Ability to perform vulnerability assessments and penetration tests Expertise in implementing encryption and secure authentication methods DESIRED SKILLS Knowledge of cloud security practices (e.g., AWS, Azure) Familiarity with automation tools for security (e.g., Ansible, Terraform) Experience with security incident response and forensics Understanding of DevSecOps principles Strong communication and technical documentation skills Ability to train and mentor team members on security best practices PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development. At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day. We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave. Ready to make your next move the best one? Join us and experience the difference. BENEFITS Excellent Salaries Flexible Work Schedule Cafeteria Style Benefits 10% - 401k Matching (Vested Immediately) Additional 401k Profit Sharing 30 days Paid Leave/Holiday (No Use or Lose!) The day off for your birthday Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus) HSA/FSA AFLAC Long Term/Short Term Disability - 100% employee coverage. No cost to you. Life Insurance - 100% employee coverage. No cost to you. Additional Discretionary Life Insurance Paid Training No long, wordy reviews with tons of paperwork!!! Referral bonus program with recurring annual payments HOW TO APPLY Email us at ***************** or apply today: **************** Want to see what our employees think? Click here . EQUAL OPPORTUNITY EMPLOYER STATEMENT Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
    $75k-105k yearly est. Easy Apply 60d+ ago
  • Enterprise Security Architect

    Direct Staffing

    Security architect job in Denver, CO

    We continuously invest in our team members and our infrastructure so we can safeguard our employees, customers and company. We are seeking an Enterprise Security Architect to join our team in Denver, CO. If you like managing projects, owning budgets and being responsible for the security architecture then this may be the right move for you. The Enterprise Security Architect will lead security engineering and mentor team members. This will include planning (review technical solutions for adherence to best practices and best fit), building (act as a project leader to design and configure elements of large security projects) and run activities (responds to escalated tickets or problem reports). In the event that there is a security incident, the security architect may perform a post-event analysis to determine root cause and lead discussions to make sure the necessary changes are put in place to avoid this issue in the future. Responsibilities: Security Technology Strategy and Architecture: Design and implement enterprise security solutions that protect the company's market share, revenue and brand. Solutions should follow industry standard best practices, regulatory guidelines, and corporate policies. Research, evaluate, and recommend security technologies that can be applied to technology solutions being developed or maintained internally or externally. Security Project Management: Leads large highly complex global security projects often delegating work to other team members. Understands both business and technology objectives when deploying projects. Requires ability to configure and test solutions. Operational Security Management: Support of operational Security Management including; Firewall management Content filtering management Client and security agent management Vulnerability scanning remediation Technical Mentoring: Trains and mentors security engineering personnel on security architecture, new technology, and incident troubleshooting. Incident Handling and forensic analysis: Escalation point for incidents. Provides technical leadership for complex security incidents. Prepares final remediation plans for complex issues requiring senior executive engagement. Work environment is generally typical of an office setting, however, must be able to travel to manufacturing facilities globally for projects. Relocation assistance is available for those who qualify under our relocation policy. External Description Search We continuously invest in our team members and our infrastructure so we can safeguard our employees, customers and company. We are seeking an Enterprise Security Architect to join our team in Denver, CO. If you like managing projects, owning budgets and being responsible for the security architecture then this may be the right move for you. The Enterprise Security Architect will lead security engineering and mentor team members. This will include planning (review technical solutions for adherence to best practices and best fit.), building (act as a project leader to design and configure elements of large security projects) and run activities (responds to escalated tickets or problem reports). In the event that there is a security incident, the security architect may perform a post-event analysis to determine root cause and lead discussions to make sure the necessary changes are put in place to avoid this issue in the future. Responsibilities: Security Technology Strategy and Architecture: Design and implement enterprise security solutions that protect the company's market share, revenue and brand. Solutions should follow industry standard best practices, regulatory guidelines, and corporate policies. Research, evaluate, and recommend security technologies that can be applied to technology solutions being developed or maintained internally or externally. Security Project Management: Leads large highly complex global security projects often delegating work to other team members. Understands both business and technology objectives when deploying projects. Requires ability to configure and test solutions. Operational Security Management: Support of operational Security Management including; Firewall management Content filtering management Client and security agent management Vulnerability scanning remediation Technical Mentoring: Trains and mentors security engineering personnel on security architecture, new technology, and incident troubleshooting. Incident Handling and forensic analysis: Escalation point for incidents. Provides technical leadership for complex security incidents. Prepares final remediation plans for complex issues requiring senior executive engagement. Work environment is generally typical of an office setting, however, must be able to travel to manufacturing facilities globally for projects. Relocation assistance is available for those who qualify under our relocation policy. Requirements Search MINIMUM QUALIFICATIONS • Bachelor's degree. • 8 years of advanced security experience or 8 years of Network and Security experience with 5 years of strong security focused experience. • At least one certification such as CISSP, ENCE, SANS GIAC, Cisco CCSP, or CISM. • Experience with enterprise security architecture, design and implementation of complex WAN, LAN, and enterprise security environments. • Project management skills managing complex network and security technologies. • Experience with Windows server and desktop operating systems. • Experience in managing web content filtering and web proxy products. • Experience with network troubleshooting tools such as Splunk and Wireshark. • Experience supporting complex data network environments. • Strong understanding of SSL certificates and Public Key Infrastructure. • Expert working knowledge of network security and layered defense strategies (such as router access lists and route maps, Cisco ASA Firewalls, Cisco IDS Sensors, NAT, VPN, IPSEC, 3DES, SSL, 802.1x, WPA, TKIP, PEAP, Cisco ACS, TACACS and Radius). • Experience with web application design, function and secure software development lifecycles. • Proficient in Microsoft Word, Excel, Outlook • Ability to travel up to 20%. PREFERRED QUALIFICATIONS • Experience managing security for Manufacturing systems, SCADA, and Process control Networks preferred. • Knowledge of computer security incident response and computer forensics 7+ to 10 years experience SKILLS AND CERTIFICATIONS CISSP CISCO WAN/LAN Splunk Wireshark Firewalls SCADA Additional Information All your information will be kept confidential according to EEO guidelines.
    $101k-146k yearly est. 60d+ ago
  • Enterprise Security Architect

    Ent Federal Credit Union 4.5company rating

    Security architect job in Colorado Springs, CO

    The Enterprise Security Architect is responsible for designing and implementing comprehensive security frameworks that protect the organization's information assets and ensure compliance with regulatory standards. This role involves assessing current security measures, identifying vulnerabilities, developing security strategy and roadmaps to mitigate risks, as well as developing security standards and best practices in collaboration with engineering teams and information security department for application development, cloud solutions and IT infrastructure. By collaborating with cross-functional teams and stakeholders, the Enterprise Security Architect plays a critical role in fostering a culture of security awareness and resilience within the organization. Essential Functions * Security Strategy and Architecture: Develop Security Vision and Strategy: Design an overarching security architecture that aligns with the organization's business goals, ensuring it is adaptable to both current and emerging threats. Security Policy Assessment and Compliance: Participate in evaluating security policies, procedures, and controls to ensure compliance with industry regulations and organizational requirements. System and Application Security Design: Work with engineering, development, and IT teams to integrate security protocols into system design, application development, and IT infrastructure. Ensure adherence to principles like least privilege, secure coding, and secure system design. * Innovation and Emerging Technologies: Evaluate Emerging Technologies: Investigate new technologies, such as AI, ML, and blockchain, for potential applications to enhance security posture and processes. Drive Security Innovation: Encourage innovation within security practices and solutions, staying ahead of potential threats and adopting advanced security tools and technologies. * Risk Management and Third-Party Security: Risk Identification and Prioritization: Identify, analyze, and prioritize risks to the organization's IT environment, including data, systems, and networks. Develop Risk Mitigation Strategies: Create both preventive and reactive strategies to manage and mitigate security risks across systems. Third-Party Risk Management: Engage with the third-party risk management team to establish security protocols for data sharing, access control, and secure interactions with external partners. * Governance, Policy, and Compliance: Policy and Governance Frameworks: Develop and advise on policies, standards, and guidelines for data protection, compliance, privacy, and security governance. Policy Enforcement: Collaborate on the creation of a governance framework to enforce security policies and ensure adherence across departments. Stakeholder Engagement and Education: Educate and advise cross-functional teams, including IT, HR, legal, and executive leadership, on security practices and the business impact of cybersecurity. * Security Monitoring, Threat Intelligence, and Continuous Improvement: Security Monitoring Systems: Design and implement systems to detect, monitor, and respond to potential security threats in real-time, ensuring continuous protection. Threat Intelligence and Awareness: Stay informed about the latest cybersecurity threats, vulnerabilities, and trends, applying this knowledge to update and improve security measures. Continuous Improvement: Regularly assess and improve security protocols, systems, and policies to keep pace with evolving threats. Foster a culture of security awareness and adaptability within the organization. * Bank Secrecy Act: Remains cognizant of and adheres to Ent policies and procedures, and regulations pertaining to the Bank Secrecy Act. Minimum Formal Qualifications for this Position * Bachelor's Degree in Information Technology, Computer Science, or related field. preferred * 5+ years' working with security architectures, frameworks, and leading large-scale security initiatives Required * 10+ years' experience in Cybersecurity preferred * 7+ years' Security Engineering, Risk Management, Security Design preferred * 3+ years' experience in cloud security, security governance, regulatory compliance preferred Technical or Specialized Knowledge/Skills: * Understanding of security architecture frameworks (e.g., SABSA, NIST, ISO 27001). * In-depth knowledge of security technologies, including firewalls, intrusion detection systems, and encryption methods. * Familiarity with cloud security best practices and architectures across various cloud platforms (e.g., AWS, Azure, Google Cloud). * Awareness of compliance regulations (e.g., GDPR, HIPAA, PCI-DSS) and risk management principles. * Proficient in security assessment tools and methodologies (e.g., vulnerability scanning, penetration testing). * Analytical and problem-solving skills for identifying and addressing security vulnerabilities. * Knowledge of threat modeling and compliance to align security strategies with business objectives. * Communication skills, with the ability to convey technical concepts to non-technical stakeholders. * Ability to develop and maintain security documentation, including policies, standards, and incident response plans. * Project management skills, including the ability to coordinate security initiatives and meet deadlines. * Ability to evaluate and recommend new security technologies and tools that enhance overall security posture. * Ability to collaborate effectively with cross-functional teams and build strong relationships with stakeholders. * Capacity to mentor and guide junior security team members in security best practices and methodologies. * Ability to adapt to evolving threats and a willingness to stay current with industry trends. * Ability to think strategically and align security solutions with overall business objectives. * Competence in risk assessment and management related to security decisions and implementations. Certifications Required: * Cert Info Sys Sec Pro preferred * Cert Info Sec Mgr preferred Environmental, Physical and Psychological Requirements * Standing - Occasionally * Walking - Occasionally * Sitting - Frequently * Lifting - Rarely (40 Lbs) * Carrying - Rarely * Pushing - Rarely * Pulling - Rarely * Balancing - Rarely * Stooping - Rarely * Kneeling - Rarely * Crouching - Rarely * Crawling - Rarely * Reaching - Occasionally * Handling - Occasionally * Grasping - Occasionally * Feeling - Occasionally * Talking - Frequently * Hearing - Frequently * Repetitive Motions - Frequently * Eye/Hand/Foot Coordination - Occasionally * Noises louder than normal speaking volume - Occasionally * Temperature Changes - Rarely * Atmospheric Conditions - Rarely
    $102k-131k yearly est. 16d ago
  • Information Security Consultant (Vulnerability scan for application code)

    360 It Professionals 3.6company rating

    Security architect job in Denver, CO

    360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement. Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile. Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us. We make sure that we deliver performance driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change. Job Description Primary job duties include the following: ● Address security risk assessment findings and recommendations for two key systems, Benefits Management System (JAVA, Linux, Oracle) and PEAK (force.com platform) ● Wok with vendor development staff to develop application code scanning process and to develop remediation plans. ● Provide recommendations for software and hardware configurations to support security standards and setting up a HW/SW asset license management system. ● Participate in the definition and implementation of projects to upgrade the systems and infrastructure to comply with revised standards for security and privacy Qualifications ● Minimum of 3 years of experience in a system development environment, JAVA ● Minimum of 1 year of experience with application code vulnerability scanning ● Minimum of 3 years' experience developing and implementing technical projects ● Minimum of 1 year experience with secure coding with hands on use of an application code vulnerability scanning tool ● Clear Communicator (written and verbal) ● Experienced with using common business applications; such as, Google Docs, Microsoft Office (Word, Excel), Microsoft Project ● Strong analytical and research skills using the Internet and other tools ● Strong verbal communication skills and ability to facilitate a planning session or meeting ● Understanding of data governance, including the security requirements for PII, FTI, and PHI. ● Must be able to work independently and be proactive in reaching for information ● Must be comfortable in an environment with change and many concurrent projects Additional Information Thanks and Regards, Karan Sharma 510-254-3300 ext. 150
    $97k-128k yearly est. 60d+ ago

Learn more about security architect jobs

How much does a security architect earn in Castle Rock, CO?

The average security architect in Castle Rock, CO earns between $86,000 and $173,000 annually. This compares to the national average security architect range of $92,000 to $179,000.

Average security architect salary in Castle Rock, CO

$122,000
Job type you want
Full Time
Part Time
Internship
Temporary