SSD Hardware Security Architect
Security architect job in Longmont, CO
Join a multibillion-dollar global company that brings together amazing technology, people, and operational scale to become a powerhouse in the memory industry. Headquartered in Rancho Cordova, California, Solidigm combines elements of an established, successful technology company with the spirit, agility, and entrepreneurial mindset of a start-up. In addition to the U.S. headquarters and other facilities in the U.S., the company has international presence in Asia, Europe, and the Americas. Solidigm will continue to lead the world in innovating new Memory technologies with aspirations to be the #1 NAND memory company in the world. At Solidigm, we view problems as opportunities to define innovative solutions that hold the power to change the world and unleash the potential technological needs that the future holds. At Solidigm, we are One Team that fosters a diverse, equitable, and inclusive culture that embraces individual uniqueness and empowers us to bring our best selves to deliver excellence in support of Solidigm's vision and mission to be the go-to partner for optimized data storage solutions. You can be part of the takeoff of an innovative business that develops cutting-edge products, delivers strong business value for customers, provides an engaging workplace for its employees, and serves a greater impact on the world. This is a golden opportunity for the right applicant to join us and help design, build, and lead Solidigm. We want a diverse team of dedicated professionals who will not just be Solidigm team members but contribute to how we shape the future of the organization. We are seeking applicants who will grow and thrive in our culture; be customer inspired, trusting, innovative, team-oriented, inclusive, results driven, collaborative, passionate, and flexible.
Job Description
As an SSD Hardware Security Architect, you will be an integral part of defining and driving new security technologies for future Data Center SSD products.
Responsible for secure design, development and operation of Solidigm's hardware and software products and services. Responsibilities may include threat assessments, design of security components, and vulnerability assessment. Ensures products conform to standards and specifications. Develops plans and cost estimates and assesses projects to analyze risks. Responds to customer/client requests or events as they occur. Develops solutions to problems utilizing formal education, judgment and formal processes. Maintains substantial knowledge of state-of-the-art security principles, theories, attacks and contributes to literature and conferences. May participate in development of intellectual property. Requires thorough knowledge of security practices, procedures and capabilities in order to perform non-repetitive, analytical work.
Key Responsibilities
Architect and define hardware security features and cryptographic primitives for upcoming SSD products. This will be performed through defining technical specifications, training and technical mentoring.
Perform threat modeling and devise mitigation strategies. Participate in security reviews and risk assessments throughout the product lifecycle.
Collaborate with cross-functional teams (SoC, firmware, validation, etc.) to integrate security into product designs.
Provide architectural support for security features in development.
Research emerging hardware security technologies and assess their applicability to future products. Collaborate with other architects and product planners on Solidigm's security feature roadmap.
Monitor industry trends and participate in standards bodies to influence specifications and ensure Solidigm's leadership in secure storage.
Represent Solidigm in external forums and working groups to shape the future of hardware security.
Mentor junior engineers and contribute to a culture of security excellence and continuous learning.
Qualifications
Bachelor's or master's degree in electrical engineering, Computer Engineering, or related field.
10+ years of experience in hardware architecture and security design.
Prior experience in hardware design is required-preferably in security, but not mandatory.
Proven background in researching, recommending, and specifying security features
Proven background in cryptography and/or applied cryptography. Familiarity with latest developments in postquantum cryptographic algorithms
Deep understanding of hardware threat modeling, secure silicon design, and cryptographic implementations.
Familiarity with relevant industry standards (e.g. NIST Special Publications, FIPS 203 - 205, etc.)
Excellent verbal and written communication, leadership, and collaboration skills.
Preferred Qualifications
Experience with formal verification of security hardware components.
Prior involvement in industry standards organizations or technical working groups.
Additional Information
The compensation range for this role is $132,940 - $209,760 USD. Actual compensation is influenced by a variety of factors including but not limited to skills, experience, qualifications, and geographic location.
This is a Hybrid role that can report out of any of the following Solidigm offices: Rancho Cordova California; Longmont Colorado; or Vancouver BC CAN.
Powered by SmartRecruiters - Candidate Privacy Policy
C# Application Security Architect
Security architect job in Englewood, CO
Since 2002, Quantix ProTech has successfully delivered IT resources and solutions to companies while building a solid reputation for integrity and consistent quality. Quantix ProTech continues to partner with the commercial sector for specialized IT placement and staffing services. Quantix ProTech was recently featured in US News and World Report and Forbes.
Job Title: C# Application Security Architect
Location: Englewood, CO
Type: Contract
Length: 3 month increments but it's a big project, extension(s)
Job Description: Company located in Englewood, CO has an immediate need for a C# Application Security Architect for a contract position. This position will be onsite. Candidate will assist the company move from one platform to another. Seeking a candidate that also understands Network Infrastructure. Position will help lead the production and improvement of compliance, quality, and timing of enterprise security architecture for client / delivery teams. Previous knowledge and expertise in designing and architecting information technology and security controls across complex and diverse networks, applications and infrastructures will be key.
Required Skills:
1) 7-10 years of Application development experience in large scale environments including experience working with geographically separated and remote development teams.
2) 5-7 years of Application security and secure coding experience including but not limited to the OWASP Top 10 and SANS / CWE Top 25 coding standards.
3) Experience with.NET
4) 5-7 years of progressive information security experience across various information security / information technology risk management domains such as but not limited to: application security, infrastructure security, identity and access management, third party risk, vulnerability and cyber threat management, security architecture, etc.
Desired Skills:
1) Microsoft Azure
Qualifications
Required Skills:
1) 7-10 years of Application development experience in large scale environments including experience working with geographically separated and remote development teams.
2) 5-7 years of Application security and secure coding experience including but not limited to the OWASP Top 10 and SANS / CWE Top 25 coding standards.
3) Experience with.NET
4) 5-7 years of progressive information security experience across various information security / information technology risk management domains such as but not limited to: application security, infrastructure security, identity and access management, third party risk, vulnerability and cyber threat management, security architecture, etc.
Desired Skills:
1) Microsoft Azure
Additional Information
All your information will be kept confidential according to EEO guidelines. If your interested, send a copy of your resume at henriquez@quantixinc. com or reach me at ************.
Enterprise Security Architect
Security architect job in Denver, CO
We continuously invest in our team members and our infrastructure so we can safeguard our employees, customers and company. We are seeking an Enterprise Security Architect to join our team in Denver, CO. If you like managing projects, owning budgets and being responsible for the security architecture then this may be the right move for you. The Enterprise Security Architect will lead security engineering and mentor team members. This will include planning (review technical solutions for adherence to best practices and best fit), building (act as a project leader to design and configure elements of large security projects) and run activities (responds to escalated tickets or problem reports). In the event that there is a security incident, the security architect may perform a post-event analysis to determine root cause and lead discussions to make sure the necessary changes are put in place to avoid this issue in the future.
Responsibilities:
Security Technology Strategy and Architecture: Design and implement enterprise security solutions that protect the company's market share, revenue and brand. Solutions should follow industry standard best practices, regulatory guidelines, and corporate policies. Research, evaluate, and recommend security technologies that can be applied to technology solutions being developed or maintained internally or externally.
Security Project Management: Leads large highly complex global security projects often delegating work to other team members. Understands both business and technology objectives when deploying projects. Requires ability to configure and test solutions.
Operational Security Management: Support of operational Security Management including;
Firewall management
Content filtering management
Client and security agent management
Vulnerability scanning remediation
Technical Mentoring: Trains and mentors security engineering personnel on security architecture, new technology, and incident troubleshooting.
Incident Handling and forensic analysis: Escalation point for incidents. Provides technical leadership for complex security incidents. Prepares final remediation plans for complex issues requiring senior executive engagement.
Work environment is generally typical of an office setting, however, must be able to travel to manufacturing facilities globally for projects.
Relocation assistance is available for those who qualify under our relocation policy.
External Description Search We continuously invest in our team members and our infrastructure so we can safeguard our employees, customers and company. We are seeking an Enterprise Security Architect to join our team in Denver, CO. If you like managing projects, owning budgets and being responsible for the security architecture then this may be the right move for you. The Enterprise Security Architect will lead security engineering and mentor team members. This will include planning (review technical solutions for adherence to best practices and best fit.), building (act as a project leader to design and configure elements of large security projects) and run activities (responds to escalated tickets or problem reports). In the event that there is a security incident, the security architect may perform a post-event analysis to determine root cause and lead discussions to make sure the necessary changes are put in place to avoid this issue in the future.
Responsibilities:
Security Technology Strategy and Architecture: Design and implement enterprise security solutions that protect the company's market share, revenue and brand. Solutions should follow industry standard best practices, regulatory guidelines, and corporate policies. Research, evaluate, and recommend security technologies that can be applied to technology solutions being developed or maintained internally or externally.
Security Project Management: Leads large highly complex global security projects often delegating work to other team members. Understands both business and technology objectives when deploying projects. Requires ability to configure and test solutions.
Operational Security Management: Support of operational Security Management including;
Firewall management
Content filtering management
Client and security agent management
Vulnerability scanning remediation
Technical Mentoring: Trains and mentors security engineering personnel on security architecture, new technology, and incident troubleshooting.
Incident Handling and forensic analysis: Escalation point for incidents. Provides technical leadership for complex security incidents. Prepares final remediation plans for complex issues requiring senior executive engagement.
Work environment is generally typical of an office setting, however, must be able to travel to manufacturing facilities globally for projects.
Relocation assistance is available for those who qualify under our relocation policy.
Requirements Search MINIMUM QUALIFICATIONS
• Bachelor's degree.
• 8 years of advanced security experience or 8 years of Network and Security experience with 5 years of strong security focused experience.
• At least one certification such as CISSP, ENCE, SANS GIAC, Cisco CCSP, or CISM.
• Experience with enterprise security architecture, design and implementation of complex WAN, LAN, and enterprise security environments.
• Project management skills managing complex network and security technologies.
• Experience with Windows server and desktop operating systems.
• Experience in managing web content filtering and web proxy products.
• Experience with network troubleshooting tools such as Splunk and Wireshark.
• Experience supporting complex data network environments.
• Strong understanding of SSL certificates and Public Key Infrastructure.
• Expert working knowledge of network security and layered defense strategies (such as router access lists and route maps, Cisco ASA Firewalls, Cisco IDS Sensors, NAT, VPN, IPSEC, 3DES, SSL, 802.1x, WPA, TKIP, PEAP, Cisco ACS, TACACS and Radius).
• Experience with web application design, function and secure software development lifecycles.
• Proficient in Microsoft Word, Excel, Outlook
• Ability to travel up to 20%.
PREFERRED QUALIFICATIONS
• Experience managing security for Manufacturing systems, SCADA, and Process control Networks preferred.
• Knowledge of computer security incident response and computer forensics
7+ to 10 years experience
SKILLS AND CERTIFICATIONS
CISSP
CISCO
WAN/LAN
Splunk
Wireshark
Firewalls
SCADA
Additional Information
All your information will be kept confidential according to EEO guidelines.
Cloud Network Security Architect
Security architect job in Denver, CO
Fortinet is seeking a Cloud Network Security Architect specializing in cloud networking, SD-WAN on-ramp design, and SASE convergence. As part of Fortinet's Cloud Architecture team, this role drives the design and deployment of secure, high-performance connectivity across public cloud, data center, and edge environments. The ideal candidate combines strong DevOps engineering skills with deep understanding of secure cloud networking architectures, including dynamic routing constructs, transitive routing models, and cloud-native route services. This role will work closely with Product Management, R&D, Field Engineering, and global customers to develop reference architectures, integrations, and automation for secure, adaptive cloud connectivity.
Responsibilities:
Design and implement secure cloud network architectures that leverage Fortinet SD-WAN, SASE, and cloud-native routing to deliver optimized multi-cloud connectivity.
Develop automation workflows and DevOps pipelines for network provisioning, telemetry, and policy enforcement, using services such as Terraform, Ansible, and cloud-native templates.
Architect solutions using transitive routing, route services, dynamic path selection, and zero trust segmentation to enable secure, scalable network topologies.
Partner with Product Management and Development teams to identify feature integrations that enhance secure cloud networking capabilities.
Lead proof of concept deployments and customer solution validations across public and hybrid cloud environments.
Develop and maintain reference architectures, scripts, and code repositories applying industry best practices.
Provide architectural guidance on secure traffic steering, network segmentation, and cloud interconnects.
Support Professional Services and Sales Engineering teams in customer design and migration projects.
Create organizational workflow enhancements to deliver public cloud-sourced services, such hands-on labs, customer POCs, tool integration, data enrichment and other uses
Provide technical guidance on Public Cloud matters to internal stakeholders
Document and maintain script and application libraries or repositories
Provide technical guidance on Public Cloud integration and development, ex. the use of CSP APIs and how they can be leveraged
Translate business requirements to programmatic logic
Develop customer-facing documentation
Create reference designs and code that applies CSP best practices
Advise Product and field Engineering on solution options, feature requirements, and reference designs.
Requirements:
5+ years of experience in cloud networking, network security, or secure SD-WAN/SASE design.
Strong development and scripting experience in one or more languages (Python, Node.js, C#, Go, or equivalent).
Familiarity with CI/CD tools (Git, Jenkins) and IaC orchestration (Terraform, Ansible, or CloudFormation).
Experience with IaaS and SaaS networking constructs such as VPCs/VNets, route tables, peering, VPNs, and load balancers.
Knowledge of BGP, transitive routing, network segmentation, and traffic engineering in cloud environments.
Hands-on experience with containerized environments (Docker, Kubernetes) and cloud-native network policies.
Proficiency with data formats such as YAML, JSON, or XML.
Familiarity with cloud security services (CNAPP, CASB, CWP, SCA, DAST).
Strong communication skills and ability to collaborate across engineering, product, and customer-facing teams.
Experience in network security highly desired, including VPN, Proxies, Authentication, etc.
Technical writing and network documentation skills highly desired
Kubernetes and Docker experience required
Education:
Bachelor's degree in Computer Science or similar and/or equivalent experience required
Master's preferred
Fortinet offers employees a variety of benefits, including medical, dental, vision, life and disability insurance, 401(k), 11 paid holidays, vacation time, and sick time as well as a comprehensive leave program.
Wage ranges are based on various factors including the labor market, job type, and job level. On target earnings for this position is expected to be $170,000 - $280,000 per year. Exact salary offers will be determined by factors such as the candidate's subject knowledge, skill level, qualifications, experience, and geographic location.
All roles are eligible to participate in the Fortinet equity program, and this position is also eligible for commissions based on the terms of the Sales Compensation Plan
Auto-ApplySenior IT Security Analyst
Security architect job in Denver, CO
The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies.
The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business.
Duties & Responsibilities
* Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes
* Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary.
* Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments.
* Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours.
* Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies.
* Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data.
* Document and perform verification of IT related changes in accordance with Company security policies and procedures.
* Research and recommend hardware and software solutions to augment or enhance existing security measures.
* Stay current in events and trends in IT security.
* Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered.
* Conduct scheduled reviews of key application security settings.
* Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates.
* Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
* Supports audit and incident processes, as required
* Monitor and support internal SEIM systems, reports, and searches
* Monitor and support internal phishing email report systems and reports
* Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
* Develops strong liaison relationships with key internal business and technology teams
* Coach level I & IIs on security domains and program processes
* Depending on need, VP Security may determine a Team Lead designation for Level III role
* Participate in security work streams for a variety of enterprise projects and initiatives
* Determine and communicate security risk postures to partners and leaders as appropriate
Education & Experience
Knowledge of:
* Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments.
* Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents.
* Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices.
* Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS.
* Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell.
* Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure.
* Familiarity with cloud architectures, security standards, and best practices
* Strong oral and written communication skills
* Strong organizational skills and attention to detail
* Excellent interpersonal skills
Ability to:
* Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits.
* Take independent action within established options and develops new procedures and approaches to problems when necessary
* Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required
* Self-starter requiring minimal supervision
* Highly organized and efficient.
* Demonstrated strategic and tactical thinking.
* Stays current with the evolving threat landscape.
* Perform duties and make decisions under frequent time pressures
Education and Training:
* (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience.
* On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent
* Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire.
* At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration
* Requires knowledge of Microsoft Office and other productivity tools
Benefits and Compensation
Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance.
(Base Pay Range: $86,000 - $123,000/year)
Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information.
Equal Opportunity
Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment.
Unsolicited Resumes
Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails.
Application Deadline 11/15/25
Auto-ApplySenior Security Architect
Security architect job in Littleton, CO
EchoStar is reimagining the future of connectivity. Our business reach spans satellite television service, live-streaming and on-demand programming, smart home installation services, mobile plans and products. Today, our brands include Boost Mobile, DISH TV, Gen Mobile, Hughes and Sling TV.
**Department Summary**
Our Technology teams challenge the status quo and reimagine capabilities across industries. Whether through research and development, technology innovation or solution engineering, our people play vital roles in connecting consumers with the products and platforms of tomorrow.
**Job Duties and Responsibilities**
EchoStar is seeking a talented and innovative Security Architect to lead the design, development, and implementation of its Identity Management (IAM) and Zero Trust Architecture. The role will ensure robust security across EchoStar's digital ecosystem, focusing on secure authentication for employees and supply chain vendors, as well as implementing network- and user-based segmentation controls. The Security Architect will collaborate across internal teams and external partners to drive security innovation, ensure the effectiveness of security controls, and propel EchoStar's security program forward.
**Key Responsibilities:**
+ Consumer Identity and Access Management (IAM) Architecture: Design, implement, and manage a secure IAM framework that delivers industry-leading authentication capabilities for EchoStar employees and supply chain vendors; ensure workflows are secure, scalable, and user-friendly, reducing authentication friction without compromising security
+ Zero Trust Architecture: Lead the design and deployment of EchoStar's Zero Trust architecture, focusing on network-based and user-based segmentation controls; ensure proper user, system, and data separation to protect against unauthorized access and lateral movement within the network
+ Security Control Effectiveness: Continuously measure and evaluate the effectiveness of security controls in production environments; use data-driven insights to ensure the architecture operates as designed, addressing any gaps or deficiencies proactively
+ Security Architecture Support: Provide Security Architecture support to align with and improve other security control frameworks within EchoStar; help reduce constraints and roadblocks in security projects and initiatives, ensuring smooth progress of the security program
+ Innovation in Security Control Stack: Drive innovation within EchoStar's security control stack to enhance overall security posture; leverage emerging technologies and advanced security practices to ensure EchoStar remains at the forefront of cybersecurity, building the most secure platform possible
+ Threat Landscape Research: Conduct ongoing research into emerging cybersecurity threats and trends, particularly those related to IAM and Zero Trust architectures; implement proactive solutions to protect EchoStar's systems, employees, and vendors from potential threats
+ Cross-Organizational Collaboration: Collaborate with various internal teams, including IT, compliance, and business units, to align security initiatives with business objectives; build strong relationships with external industry partners to adopt best practices and stay ahead of evolving security challenges
+ Security Initiatives Intake: Lead the intake and execution of new security initiatives; develop clear security requirements, participate in project reviews, and ensure security controls are seamlessly integrated into new technology deployments
**Skills, Experience and Requirements**
**Education and Experience:**
+ Bachelor's degree in Computer Science or Information Technology, related discipline, or commensurate industry experience
+ 10+ years of related experience
**Skills and Qualifications:**
+ Strong understanding of cyber security principles, concepts, and technologies
+ Knowledge of network protocols, operating systems, and security frameworks
+ Experience with vulnerability assessment and penetration testing tools
+ Excellent analytical and problem-solving skills, with the ability to think critically and make informed decisions
+ Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams
+ Self-motivated and eager to learn, with a strong passion for cyber security
+ Relevant certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or Certified Information Systems Security Professional (CISSP) are a plus
+ Experience in designing and deploying security architectures for large-scale, global organizations
+ Familiarity with cloud security, especially around IAM and Zero Trust models in hybrid and multi-cloud environments
+ Prior experience in securing supply chain and vendor management processes
Visa sponsorship not available for this role
**Candidates must be willing to participate in at least one in-person interview, which may include a live whiteboarding or technical assessment session.**
\#LI-JZ2
**Salary Ranges**
Compensation: $127,050.00/Year - $181,500.00/Year
**Benefits**
We offer versatile health perks, including flexible spending accounts, HSA, a 401(k) Plan with company match, ESPP, career opportunities, and a flexible time away plan; all benefits can be viewed here: DISH Benefits .
The base pay range shown is a guideline. Individual total compensation will vary based on factors such as qualifications, skill level, and competencies; compensation is based on the role's location and is subject to change based on work location.
Candidates need to successfully complete a pre-employment screen, which may include a drug test and DMV check. Our company is committed to fostering an inclusive and equitable workplace where every individual has the opportunity to succeed. We are dedicated to providing individuals with criminal or arrest records a fair chance of employment in accordance with local, state, and federal laws.
The posting will be active for a minimum of 3 days. The active posting will continue to extend by 3 days until the position is filled.
We pride ourselves on developing and promoting talent as an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status. EchoStar will accommodate the sincerely held religious beliefs of employees if such accommodations are not undue hardships and are otherwise within the bounds of applicable law. All qualified applicants with arrest or conviction records will be considered for employment in accordance with local, state, and federal law. You may redact any information that identifies age, date of birth, or dates of school/graduation from your application documents before submission and throughout our application process.
EchoStar will provide reasonable accommodation to otherwise qualified job applicants and employees with known physical or mental disabilities, unless doing so poses an undue hardship on the Company, poses a direct threat of substantial harm to others, or is otherwise not required by law. EchoStar has a more detailed Accommodation Policy that applies to employees. EchoStar endeavors to make echostar.com and jobs.echostar.com accessible to users. Please contact *************** if you would like to discuss the accessibility of our website or need assistance completing the application process. This contact information is for accommodation requests only; do not use this contact information to inquire about the status of applications.
Click the links to access the following statements: EEO Policy Statement (********************************************************************************* , Pay Transparency (*********************************************************************************************************** , EEOC Know Your Rights (English (************************************************************************************ /Spanish (**************************************************************************************************** )
We are an Equal Opportunity/Affirmative Action employer and will consider all qualified applicants for employment without regard to race, color, religion, gender, pregnancy, sex, sexual orientation, gender identity, national origin, age, genetic information, protected veteran status, disability, or any other basis protected by local, state, or federal law. All qualified applicants with arrest or conviction records will be considered for employment in accordance with local, state, and federal law. U.S. Citizenship is required for certain positions. EEO is the law.
At EchoStar, you have the right to request reasonable accommodations. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact ********************. This contact information is for accommodation requests only; you may not use this contact information to inquire about the status of an application.
Easy ApplyVP & Chief Information Security Officer
Security architect job in Denver, CO
Reporting to the Chief Information Officer, the Vice President & Chief Information Security Officer (CISO) is a key executive leader who acts as a strategic business partner and enabler of scalable growth, not just a technical guardian. This leader will design and execute an adaptive, automated, and business-integrated cybersecurity strategy that protects the company's information assets while proactively positioning security as a competitive advantage.
The CISO will evolve the company's security posture by embedding automation and a "secure by design" culture into all operational and product development processes. Reporting to the highest level of leadership, this role is responsible for translating technical risks into quantifiable business impacts, ensuring continuous compliance, and driving a company-wide security mindset. The CISO will build a resilient and innovative security organization that accelerates, rather than hinders, a high-growth business, all while building and maintaining trust with customers, partners, and the market.
Key Responsibilities and Essential Job Functions
Enterprise Security Strategy & Governance:
* Design and implement a scalable security strategy and governance model that aligns with business objectives, is adaptable, and anticipates the unique risks and requirements of hypergrowth.
* Design and execute a forward-looking cybersecurity strategy that supports innovation while maintaining customer trust and competitive differentiation, proactively positioning security as a competitive advantage that builds and sustains stakeholders' trust at scale.
* In partnership with Compliance Team, maintain and enhance compliance posture across multiple frameworks including SOC 2, ISO 27001, HIPAA, PCI DSS, GDPR, and CCPA 2.0.
* Establish automated, risk-based security governance frameworks and controls that scale effortlessly with the business, enabling decentralized and informed decision-making.
Operational Security & Resilience
* Lead enterprise-wide threat detection, vulnerability management (TVM), and incident response programs with measurable effectiveness metrics.
* Instantiate security-as-code and automated frameworks for architecture, engineering, and operations to eliminate manual toil and support hypergrowth.
* Improve an operationalized proactive cyber resilience program focused on minimizing business impact during and after a security event.
* Lead the evolution of the SOC, leveraging automation and threat intelligence to achieve 24/7 coverage with maximum efficiency, and transition it towards a data-driven security-as-a-service model.
* Define and track business-oriented security metrics and key risk indicators (KRIs) that directly inform business leaders on risk exposure and the effectiveness of security investments.
* Drive continuous improvement in mean time to detect (MTTD) and mean time to respond (MTTR).
Compliance & Risk Management
* Build a continuous compliance framework, using automation to maintain real-time audit readiness and demonstrate control effectiveness with minimal friction for product and engineering teams.
* Embed security and privacy by design into the product development lifecycle, enabling rapid innovation while meeting and exceeding customer expectations.
* Lead enterprise risk assessment programs and maintain a comprehensive risk register with clear mitigation strategies.
* Develop a risk quantification program to translate technical risks into business impacts and inform data-driven investment decisions for the executive team and board.
Leadership & Strategic Engagement
* Act as a strategic business partner to the CEO, C-suite, and board, using deep business acumen to align security with Flexential's growth objectives.
* Equip the sales and customer success teams to confidently communicate our security story, turning our security posture into a key enabler for winning and retaining enterprise customers.
* Scale security culture throughout the organization by empowering all teams to own their security, moving from a centralized security gatekeeper model to a decentralized security enablement model.
* Represent Flexential externally with customers, prospects, regulators, auditors, and industry organizations as a cybersecurity thought leader.
* Build strategic relationships with peer CISOs, industry groups, and security vendor partners.
People Leadership & Organizational Development
* Build and mentor a high-performing security organization that is structured for scale, leveraging automation and delegation to maximize impact and embed security ownership across engineering and product teams.
* Cultivate an innovative and collaborative security culture that empowers the business to move fast securely, positioning the security team as an accelerator, not a roadblock.
* Create psychological safety that allows teams to learn from setbacks and continuously improve.
* Establish clear goals, performance metrics, and accountability frameworks aligned with organizational objectives.
* Implement structured career development paths and succession planning within the security organization.
Required Qualifications
* Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or related field.
* 10+ years of progressive experience in information security, risk management, or IT leadership roles.
* 5+ years in a senior leadership position, preferably as a CISO, VP of Security, or equivalent executive role.
* Demonstrated success building and scaling enterprise security programs in high-growth or complex environments.
* Deep knowledge of compliance and regulatory frameworks including SOC 2, ISO 27001, HIPAA, PCI DSS, GDPR, and CCPA.
* Proven experience managing multi-million-dollar budgets and demonstrating ROI on security investments.
* Exceptional executive presence with demonstrated ability to communicate effectively with boards, C-suite executives, customers, and technical teams.
* Experience leading incident response and crisis management in enterprise environments.
Preferred Qualifications
* Master's degree in Cybersecurity, Business Administration, Risk Management, or related discipline
* Industry-recognized certifications such as CISSP, CISM, CISA, CCISO, CGEIT, or equivalent
* Experience in hybrid cloud, SaaS, colocation, or data center environments
* Track record of supporting revenue growth through security as a sales enabler and customer differentiator
* Background in regulated industries or managing security for service provider environments
* Experience with security transformation initiatives and modern security architecture patterns (Zero Trust, SASE, etc.)
Physical Requirements
* Prolonged periods of sitting at a desk and working on a computer in an office environment
* Ability to travel up to 20% for customer meetings, audits, conferences, or industry events
* Flexibility for after-hours availability to respond to security incidents, crises, or critical business needs
* Ability to work effectively in a fast-paced, dynamic environment with competing priorities
Base Pay Range: Annualized salary range offered for this position is estimated to be $235,000 - $275,000. However, the actual pay range depends on each candidate's experience, location, and qualifications.
Variable Pay: Discretionary annual bonus, based on personal and company performance.
Flexential participates in the E-Verify program. Please click here for more information.
#LI-Hybrid
This position has the following safety hazards:
☒ Ergonomics
☒ Trip/Fall
☒ Driving (must possess valid driver's license and insurance)
Not meeting every single requirement? No problem! We are looking for candidates who possess unique skills that set them apart from the rest. If you're enthusiastic about this role and believe you have the skills and abilities that would make you successful, don't hesitate to apply today!
Benefits of working at Flexential:
* Medical, Telehealth, Dental and Vision
* 401(k)
* Health Savings Accounts (HSA) and Flexible Spending Accounts (FSA)
* Life and AD&D
* Short Term and Long-Term disability
* Flex Paid Time Off (PTO)
* Leave of Absence
* Employee Assistance Program
* Wellness Program
* Rewards and Recognition Program
Benefits are subject to change at the Company's discretion.
EEO Statement: Flexential is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity or expression, pregnancy, age, national origin, disability status, genetic information, protected veteran status, or any other characteristic protected by law.
Auto-ApplyCyber Analyst II - Information Systems Security Officer - Boulder, CO
Security architect job in Boulder, CO
ATTENTION MILITARY AFFILIATED JOB SEEKERS
- Our organization works with partner companies to source qualified talent for their open roles. The following position is available to
Veterans, Transitioning Military, National Guard and Reserve Members, Military Spouses, Wounded Warriors, and their Caregivers
. If you have the required skill set, education requirements, and experience, please click the submit button and follow the next steps.
Unless specifically stated otherwise, this role is "On-Site" at the location detailed in the job post.
Clearance Level - Must Be Able to Obtain
Top Secret/SCI Polygraph
U.S. Person Required
Yes
Travel Percentage
Clearance Level - Must Currently Possess
Top Secret/SCI
U.S. Citizenship Required
Yes
Is Relocation Available
Yes
Job Description
Technical advisor for the Information Systems (IS) security requirements necessary for the protection of all sensitive information processed, stored, and/or transmitted through the use of the IS. Interprets government requirements, prepare, validate, and maintain documentation in support of the Risk Management Framework (RMF). Also implements and oversees the program security plans, policies, and procedures necessary to ensure compliance with all company and government requirements.
The Enterprise Assurance Strategic Capabilities Unit delivers critical assurance disciplines that protect and enable people, data and missions. We provide a comprehensive approach to managing risk across the enterprise for current and future information environments where the business and missions execute. We apply the use of innovative tools and robust processes to ensure mission and business success.
What You'll Do:
Schedule, conduct, and administer security tests and evaluations programs to ensure that all the applicable IS are operating in accordance with security requirements.
Maintain a configuration management system to track and control all components of IS used in support of programs.
Identify, evaluate, and document all IS and provide guidance on what controls and countermeasures may be appropriate to mitigate vulnerabilities and threats
Perform audits of all IS, investigation anomalies, and record and report findings, as required. Coordinate and/or conduct detailed inquiries; assess potential damage; and develop, document, implement, and monitor corrective action plans. Perform data spill containment and clean up per customer direction.
Ability to identify and respond to potential cyber threats to company equities utilizing advanced software applications and information provided by government partners and open-source intelligence gathering.
May coordinate the response and recovery activities from information security incidents. This includes collaboration with appropriate response partners, assist with determining the root cause of cyber incidents and work with stakeholders and responsible parties to remediate any identified control gaps or failures.
May perform data breach response, cyber risk/security assessments, and remain involved in phases such as penetration testing, vulnerability scanning, and log configuration.
May participate in engagements related to preemptive data breach response; analytic and reporting for litigation, data breaches, and regulatory response; workplace and employment issues, including theft of trade secrets; and investigations related to network breaches/unauthorized access of data through computer forensics and incident response.
May perform duties as a cyber security threat hunter; track threat actors; responsible for reviewing system log events and data packets to proactively detect advanced threats that evade traditional security solutions; participate in developing processes, procedures, and training for new technologies.
Identify and manage Plan of Action & Milestones (POA&Ms) through remediation as well as develop corrective action plans for each POA&M; monthly progress reporting to management.
Promote information security awareness.
Maintain a regular and predictable work schedule.
Establish and maintain effective working relationships within the department, the Strategic Business Units, Strategic Capabilities Units and the Company. Interact appropriately with others in order to maintain a positive and productive work environment.
Perform other duties as necessary.
On-Site Work Environment: This position requires regular in-person engagement by working on-site five days each normally scheduled week in the primary work location. Travel and local commute between company campuses and other possible non-company locations may be required.
Working Conditions:
Work is performed in an office environment, laboratory, cleanroom, or production floor.
Additional Qualifications/Responsibilities
Required Education, Experience, & Skills
Related Bachelor's and 2 or more years of related experience
Each higher-level degree, i.e., Associate's, Bachelor's Degree, Master's Degree or Ph.D., may substitute for additional years of experience.
Related certifications may count towards years of related experience.
Related technical experience may be considered in lieu of education. Degree must be from a university, college, or school which is accredited by an agency recognized by the US Secretary of Education, US Department of Education.
A current, active TS/SCI security clearance is required with the ability to obtain and maintain a TS/SCI Polygraph.
8140 compliant certification.
Preferred Education, Experience, & Skills
A current, active TS/SCI with Polygraph security clearance.
Pay Information
Full-Time Salary Range: $77809 - $132275
Information Systems Security Officer
Security architect job in Denver, CO
A new space race has begun. True Anomaly seeks those with the talent and ambition to build innovative technology that solves the next generation of engineering, manufacturing, and operational challenges for space security and sustainability.
OUR MISSION
The peaceful use of space is essential for continued prosperity on Earth-from communications and finance to navigation and logistics. True Anomaly builds innovative technology at the intersection of spacecraft, software, and AI to enhance the capabilities of the U.S., its allies, and commercial partners. We safeguard global security by ensuring space access and sustainability for all.
OUR VALUES
Be the offset.
We create asymmetric advantages with creativity and ingenuity
What would it take?
We challenge assumptions to deliver ambitious results
It's the people.
Our team is our competitive advantage and we are better together
YOUR MISSION
The Information Systems Security Officer (ISSO) will oversee the security posture of all classified information systems and develop/revise necessary Risk Management Framework (RMF) documentation to support system authorization. The role reports to the Vice President of Facilities and Government Security and will be onsite in our Denver, CO office.
RESPONSIBILITIES
Build and update standard RMF packages, including the Systems Security Plam (SSP), Plan of Actions and Milestones (POAMs), Security Control Traceability Matrix (SCTM), hardware and software inventories, and network topology diagrams.
Lead the development and implementation of security policies and procedures required by assessment and authorization activities in accordance with ICD-503, DAAPM, NISPOM, JSIG, and NIST 800-53.
Program guidance and direction to program personnel, ensuring effective communication within the roles.
Collaborate with System Administrators and Network Engineers to ensure timely application of security patches and secure configurations in line with Security Technical Implementation Guidelines (STIGs).
QUALIFICATIONS
5-11 years of relevant work experience.
Assist with information system security management and day-to-day security operations.
Serve as a member of the Change Control Board (CCB) to ensure configuration management for Cybersecurity-relevant software, hardware, and firmware is maintained and documented.
Ensure all personnel receive the necessary technical and security training to perform their duties effectively.
Conduct security reviews of proposed changes or additions to the information system (including hardware or software) and advise the Information System Security Manager (ISSM) on security relevance.
Perform vulnerability/risk assessment analysis to support continuous monitoring and the certification and accreditation process.
U.S. Citizen and eligible for DoD Secret or TS/SCI clearance.
PREFERRED SKILLS AND EXPERIENCE
Current active DoD TS/SCI clearance.
COMPENSATION
Base Salary: $80,000-$150,000
Equity + Benefits including Health, Dental, Vision, HRA/HSA options, PTO and paid holidays, 401K, Parental Leave
Your actual level and base salary will be determined on a case-by-case basis and may vary based on the following considerations: job-related knowledge and skills, education, location, and experience.
ADDITIONAL REQUIREMENTS
Work Location-this position will be fully onsite in our Gravity Works office in Centennial, CO.
Work environment-the work environment; temperature, noise level, inside or outside, or other factors that will affect the person's working conditions while performing the job.
Physical demands-the physical demands of the job, including bending, sitting, lifting and driving.
This position will be open until it is successfully filled. To submit your application, please follow the directions below. #LI-Onsite
To conform to U.S. Government space technology export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a U.S. citizen, lawful permanent resident of the U.S., protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the U.S. Department of State.
True Anomaly is committed to equal employment opportunity on any basis protected by applicable state and federal laws. If you have a disability or additional need that requires accommodation, please do not hesitate to let us.
Auto-ApplySenior Security Analyst
Security architect job in Englewood, CO
Job Description
Sponsorship not available. Position only available to those with legal authorization to work in the United States.
Switchboard is seeking a Senior Security Analyst on behalf of our client, Open Technology Solutions. In this role, you'll lead critical vulnerability and threat management programs while serving as a senior analyst in the SOC to protect a financial services consortium. You'll manage security operations, work directly with contracted MDR and SIEM providers, and translate complex security concepts into actionable insights for stakeholders. If you have 5+ years of SOC experience, strong knowledge of network security technologies, and the ability to mentor others while managing escalations, we want to hear from you.
About Open Technology Solutions
Open Technology Solutions (OTS) is a technology consortium empowering credit unions and community financial institutions to compete and thrive. They provide shared technology infrastructure and innovative solutions that help member institutions deliver exceptional service to their communities. With a people-first culture built on collaboration and technical excellence, OTS combines the stability of serving the financial sector with the innovation of a forward-thinking technology organization.
As a Senior Security Analyst, you will:
Lead the organization's vulnerability and threat management program, identifying and mitigating security risks before they become incidents
Manage relationships with third-party security vendors and oversee the 24/7 Security Operations Center
Monitor cyber threat intelligence and determine which threats are relevant to the financial services environment
Translate technical security issues into clear language for business stakeholders and partner organizations
Coach and mentor junior security analysts and serve as backup to the Security Operations Manager
Develop and maintain security procedures, standards, and documentation
Requirements
5+ years of experience in a security operations center or similar security role
Strong knowledge of network security technologies and how to communicate security concepts to non-technical audiences
Hands-on experience with Microsoft security tools (Office 365, Microsoft Sentinel)
Familiarity with vulnerability management, incident response, and security frameworks
Understanding of network protocols, authentication methods, and access control systems
Ability to work independently with minimal training and onboarding support
Security certifications preferred (CISSP, CCNA, CISM, or similar)
Bachelor's degree preferred but not required
Benefits
Location: Hybrid (3 days per week in our Englewood, CO office)
Compensation: $135K - $150K salary + 10% bonus
Benefits:
Comprehensive medical, dental, and vision insurance (starting first full month)
401(k) with company matching
11 paid holidays + PTO
Student loan paydown program (up to $10,000 lifetime benefit)
Tuition reimbursement (up to $5,250 annually)
Service anniversary bonuses
Company-paid life insurance, short-term and long-term disability
Wellness reimbursement and additional unique perks
Information Security Engineer
Security architect job in Broomfield, CO
Responsible for providing network security expertise related to any of the following: activation and turn up of customer security equipment, failover testing, monitoring network security devices, troubleshooting, investigation of events, debug, investigation of incidents, escalation or mitigation of incidents and events, network security analysis, or deployment of devices. 2-4 years of experience in IT, networking or cybersecurity required.
Targeted and Recommended Certifications and Skills:
Fortinet / Fortigate Security Experience Needed - Top skill
One of the following - NSE4, NSE 5-Analyzer, NSE 5 - Manager, NSE 7
CCNA
CCNP
Cisco Router/Routing Background
IRF- integrated router firewall background
Next-Generation Firewall background
Routing background
Project Date and Time needs:
Monday to Friday
** Standard Business Hours **
Systems Engineer II - Security & Compliance
Security architect job in Greenwood Village, CO
This role requires the ability to work lawfully in the U.S. without employment-based immigration sponsorship, now or in the future. This posting has been extended beyond the initial anticipated closing date. Do you thrive on solving complex technical challenges and building scalable systems? Spectrum seeks a Systems Engineer II to help shape and support the design, implementation and maintenance of databases and systems related to cybersecurity compliance according to industry standards. This is a cross functional role monitoring and driving compliance activities across Network Technology Services and Security. The ideal candidate will have a strong technical expertise in system architecture and security controls, as well as interpreting and implementing compliance frameworks.
How You'll Make an Impact
* Collaborate closely with vertical leads to interpret internal compliance requirements and embed them into daily operations.
* Track compliance metrics to measure vertical adherence, report on progress and identify areas of support to leadership.
* Provide guidance to ensure verticals remediate compliance gaps to meet the defined target for each metric.
* Develop and maintain documentation such as System Security Plans (SSPs), Compliance Timelines and Continuous Monitoring reports.
* Contribute to design sessions with Architects, Requirements Analysts, Security Operations and Systems Engineers; supports in creation of detailed design documents and functional specifications for new applications/services and enhancements to existing systems/services
* Review existing security integration capabilities, data sources, and proposed solution designs for feasibility, cost and functionality
* Create work effort estimates for assigned tasks, supporting prioritization and release management
* Develop and enforce security policies, procedures, and compliance requirements (e.g., NIST, PCI)
* Use established change management processes, performing operational procedures with minimal customer impact during established maintenance window
* Work with database administrators to configure, tune and maintain database security
* Collaborate with Security teams to ensure security is integrated into system designs and deployments.
Working Conditions
* Office environment
What You'll Bring to Spectrum
Required Qualifications
Education
* Bachelor's degree in Computer Science or related field, or equivalent experience; may require Industry Standard Certifications
Experience
* 3+ years of Application Development experience in relevant areas
* 2+ years of Network OSS application experience
* 2+ years of System administration experience
* 2+ years of Database support and development experience
* 2+ years in Enterprise Application Integration (EAI) experience
Skills
* Demonstrated in-depth ability to conduct security design sessions to specify solution designs for feasibility, cost, and functionality; create detailed documentation to functionally understand new and existing applications; follow and implement established change and control policies and procedures; troubleshoot application problems
* Demonstrated in-depth knowledge of development tools, application frameworks, testing tools, and
* OSS applications and software; choosing the appropriate lifecycle and the planning, monitoring and control of the systems engineering process
Preferred Qualifications
Experience
* 5+ years of Application Development experience in relevant areas
* 3+ years of Network OSS application experience
* 3+ years of System Administration experience
* 3+ years of Database support and development experience
* 3+ years of experience in Enterprise Application Integration (EAI)
ISY340 2025-63095 2025
Here, our employees don't just have jobs, they're building careers. That's why we offer a comprehensive pay and benefits package that rewards employees for their contributions to our success, supporting all aspects of their well-being at every stage of life.
A qualified applicant's criminal history, if any, will be considered in a manner consistent with applicable laws, including local ordinances.
This job posting will remain open until 2025-12-05 06:40 PM (UTC) and will be extended if necessary.
The base pay for this position generally is between $75,130.00 and $120,010.00. The actual compensation offered will carefully consider a wide range of factors, including your skills, qualifications, experience, and location. We comply with local wage minimums and also, certain positions are eligible for additional forms of other incentive-based compensation such as bonuses.
Get to Know Us Charter Communications provides superior communication and entertainment products for residential and business customers through the Spectrum brand. Our offerings include Spectrum Internet, TV, Mobile and Voice. Beyond our connectivity solutions, we also provide local news, programming and regional sports via Spectrum Networks and multiscreen advertising solutions via Spectrum Reach. When you join our team, you'll be keeping our customers connected to what matters most in 41 states across the U.S. Watch this video to learn more.
Grow Your Career Here We're committed to growing a workforce that reflects the customers and communities we serve - providing opportunities for employment and advancement to all team members. Spectrum is an Equal Opportunity Employer, including job seekers with disabilities and veterans. Learn about Life at Spectrum.
Colorado_Information Security_GRC Exp_w2_Govt. exp preferred
Security architect job in Denver, CO
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Job Description
We are looking to fill a position for Information Security Engineer with GRC experience in Denver CO.
This is a Risk and Compliance: Governance, Risk & Compliance (GRC) position
Qualifications
Audit
Governance Risk and Compliance
It Security
Risk Management
Additional Information
Webcam interview is acceptable.
Lead Security Engineer, Cloud Infrastructure
Security architect job in Denver, CO
At Klaviyo, we value the unique backgrounds, experiences and perspectives each Klaviyo (we call ourselves Klaviyos) brings to our workplace each and every day. We believe everyone deserves a fair shot at success and appreciate the experiences each person brings beyond the traditional job requirements. If you're a close but not exact match with the description, we hope you'll still consider applying. Want to learn more about life at Klaviyo? Visit careers.klaviyo.com to see how we empower creators to own their own destiny.
As a Lead Security Engineer, you'll be a vital part of the Infrastructure Security Team, focusing on strengthening the security posture across Klaviyo's entire technology environment, developing security architectures and repeatable patterns and mentoring colleagues and junior security engineers. Unlike roles with a narrowly defined specialty, this position offers the opportunity to demonstrate your unique expertise-whether that's in cloud security, identity and access management, data protection, secure systems design, or other security domains. Your work will involve evaluating and hardening our infrastructure, collaborating with cross-functional teams, and leveraging AI to build scalable solutions to address emerging threats.
We are looking for someone who is excited to bring their specialized skills to the team, shaping Klaviyo's security practices and helping us continue to raise the bar.
How You Will Make a Difference
Secure Klaviyo's infrastructure by designing, implementing, and maintaining scalable security controls across cloud, on-prem, and hybrid environments
Evaluate and improve security configurations and policies across a range of technologies, using your domain expertise to reduce risk and enable secure-by-default architectures
Collaborate with engineering and IT teams to embed security practices and develop repeatable security patterns across the development and deployment lifecycle
Lead threat modeling, risk assessments, and architecture reviews in areas aligned with your specialty
Develop automated solutions and infrastructure-as-code to drive consistent and reproducible security outcomes
Stay ahead of the latest threats and advocate for innovative security solutions aligned with business needs
Help define security standards and best practices at Klaviyo, championing their adoption across teams
Who You Are
Have 5+ years of experience in infrastructure or security engineering roles, with deep knowledge in one or more security focus areas (e.g., cloud security, IAM, endpoint security, data protection, detection engineering, compliance)
Comfortable navigating ambiguity and defining priorities in a broad-scoped role
Experienced working in modern cloud environments such as AWS, GCP, or Azure
Familiar with infrastructure-as-code tools such as Terraform, CloudFormation, or Pulumi
Proficient in secure systems design, threat modeling, and vulnerability management
AI Agentic development and prompt engineering, MCP (AWS Bedrock, OpenAI, Anthropic)
Able to clearly articulate complex security topics to technical and non-technical stakeholders
Passionate about security, eager to learn from others and share your expertise
Nice to have - certifications (e.g., CISSP, CKS, GCP/AWS Security certs) or equivalent practical experience
We use Covey as part of our hiring and / or promotional process. For jobs or candidates in NYC, certain features may qualify it as an AEDT. As part of the evaluation process we provide Covey with job requirements and candidate submitted applications. We began using Covey Scout for Inbound on April 3, 2025.
Please see the independent bias audit report covering our use of Covey here
Massachusetts Applicants:
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Our salary range reflects the cost of labor across various U.S. geographic markets. The range displayed below reflects the minimum and maximum target salaries for the position across all our US locations. The base salary offered for this position is determined by several factors, including the applicant's job-related skills, relevant experience, education or training, and work location.
In addition to base salary, our total compensation package may include participation in the company's annual cash bonus plan, variable compensation (OTE) for sales and customer success roles, equity, sign-on payments, and a comprehensive range of health, welfare, and wellbeing benefits based on eligibility.
Your recruiter can provide more details about the specific salary/OTE range for your preferred location during the hiring process.
Base Pay Range For US Locations:$188,000-$282,000 USD
Get to Know Klaviyo
We're Klaviyo (pronounced clay-vee-oh). We empower creators to own their destiny by making first-party data accessible and actionable like never before. We see limitless potential for the technology we're developing to nurture personalized experiences in ecommerce and beyond. To reach our goals, we need our own crew of remarkable creators-ambitious and collaborative teammates who stay focused on our north star: delighting our customers. If you're ready to do the best work of your career, where you'll be welcomed as your whole self from day one and supported with generous benefits, we hope you'll join us.
AI fluency at Klaviyo includes responsible use of AI (including privacy, security, bias awareness, and human-in-the-loop). We provide accommodations as needed.
By participating in Klaviyo's interview process, you acknowledge that you have read, understood, and will adhere to our Guidelines for using AI in the Klaviyo interview Process. For more information about how we process your personal data, see our Job Applicant Privacy Notice.
Klaviyo is committed to a policy of equal opportunity and non-discrimination. We do not discriminate on the basis of race, ethnicity, citizenship, national origin, color, religion or religious creed, age, sex (including pregnancy), gender identity, sexual orientation, physical or mental disability, veteran or active military status, marital status, criminal record, genetics, retaliation, sexual harassment or any other characteristic protected by applicable law.
IMPORTANT NOTICE: Our company takes the security and privacy of job applicants very seriously. We will never ask for payment, bank details, or personal financial information as part of the application process. All our legitimate job postings can be found on our official career site. Please be cautious of job offers that come from non-company email addresses (@klaviyo.com), instant messaging platforms, or unsolicited calls.
By clicking "Submit Application" you consent to Klaviyo processing your Personal Data in accordance with our Job Applicant Privacy Notice. If you do not wish for Klaviyo to process your Personal Data, please do not submit an application.
You can find our Job Applicant Privacy Notice
here
and here (FR).
Auto-ApplyInformation System Security Officer (ISSO) II
Security architect job in Aurora, CO
In a world of possibilities, pursue one with endless opportunities. Imagine Next! At Parsons, you can imagine a career where you thrive, work with exceptional people, and be yourself. Guided by our leadership vision of valuing people, embracing agility, and fostering growth, we cultivate an innovative culture that empowers you to achieve your full potential. Unleash your talent and redefine what's possible.
Job Description:
Parsons is looking for a talented Level 2 ISSO to join our growing team!
In this role you will develop, maintain, and implement information security standards, procedures, and guidelines for applications and databases. In addition, you will ensure that systems and organizational databases are protected from unauthorized access and use, and monitor systems, identify threats, and handle disaster recovery operations.
The max salary for this role is between $90k-$95k, pending skillset and qualifications.
What You'll Be Doing:
* Performs assessments of systems and networks within the networking environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations (compliance audits) and active evaluations (vulnerability assessments).
* Establishes strict program control processes to ensure mitigation of risks and supports for obtaining certification and accreditation of systems. This includes process support, analysis support, coordination support, security certification test support, security documentation support, investigations, software research, hardware introduction and release, emerging technology research inspections, and periodic audits.
* Assists in the implementation of required government policy (e.g.,, NISPOM, DCID 6/3), and makes recommendations on process tailoring.
* Performs analyses to validate established security requirements and recommends additional security requirements and safeguards where required.
* Supports the formal Security Test & Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports.
* Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed.
* Demonstrates advanced subject matter expertise in job family.
* Contributes to and may lead the planning and implementation of large programs in the function, and regularly interfaces with senior management and executive leadership.
* Plays a role in overall functional strategic planning.
What Required Skills You'll Bring:
* Active Top Secret/SCI with CI Polygraph.
* Bachelors degree with typically 2+ years of relevant experience. Candidates with a Masters degree require 1+ year(s) of relevant experience, and additional years of experience can qualify in lieu of a degree for non-degreed candidates.
* An active CASP+, CECCNP, Security+, CISA, CISSP, GCED, GCIH, CCSP or CISSP or must be willing to obtain / maintain within 6 months of hire.
What Desired Skills You'll Bring:
* Strong leadership skills
* Management experience
* Ability to coach and develop junior ISSO's
Security Clearance Requirement:
An active Top Secret SCI w/Polygraph security clearance is required for this position.
This position is part of our Federal Solutions team.
The Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what's next to deliver the solutions our customers need now.
Salary Range: $86,700.00 - $151,700.00
We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!
This position will be posted for a minimum of 3 days and will continue to be posted for an average of 30 days until a qualified applicant is selected or the position has been cancelled.
Parsons is an equal opportunity employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, veteran status or any other protected status.
We truly invest and care about our employee's wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest-APPLY TODAY!
Parsons is aware of fraudulent recruitment practices. To learn more about recruitment fraud and how to report it, please refer to ************************************************
Auto-ApplySenior Information Systems Security Officer (ISSO) - Aurora, CO
Security architect job in Aurora, CO
Country: United States of America Onsite U.S. Citizen, U.S. Person, or Immigration Status Requirements: Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
Security Clearance:
TS/SCI with Polygraph
At Raytheon, the foundation of everything we do is rooted in our values and a higher calling to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Our cybersecurity team is seeking a Information Systems Security Officer (ISSO) to support our team 100% onsite at our facility in Aurora, Colorado. The ISSO is responsible for the implementation of the cybersecurity requirements as stipulated by various USG requirements documents including (but not limited to): ICD 503 RMF, NIST, and associated NIST documents.
What You Will Do
* Cybersecurity sustainment activities (hardware change administration, software change administration, account overseeing, media protection, user interface, file transfers, etc.)
* Development of Assessment and Authorization (A&A) artifacts (SSPs, SCTM, System Profiles, POA&M, testing documentation, etc.)
* Information System Self Inspections, Auditing, and Continuous Monitoring.
* Interfacing with Internal/External Customers: Customer Representatives, Program Managers/Directors, IT, etc.
* Cybersecurity Training and Awareness, Incident Response Investigations.
* Development, Maintenance, and Implementation of internal and customer compliant cybersecurity policies and procedures.
* The ideal candidate possesses meaningful written and oral communications skills, technical knowledge, exemplary customer service skills, thorough time administration skills, the ability to creatively find solutions to complex challenges, and the ability to multi-task and thrive in a fast paced environment.
* This position will report directly to the Aurora Information Systems Security Manager (ISSM) for Raytheon.
* Travel to other locations as required up to 10% of work schedule.
Qualifications You Must Have
* Typically requires a Bachelor's Degree or equivalent experience and minimum 5 years prior relevant experience, or an Advanced Degree in a related field and minimum 3 years' experience.
* A minimum of 5+ years of experience supporting various computer hardware platforms and multiple operating systems, both stand alone and LAN/WAN configurations
* Current IAM Level I certification
* DoD 8140.03 Compliant Professional Certification (e.g. Security+, SSCP, CISSP, CISM, GSLC, etc.)
* Relevant Experience Considered in any combination:
* Cybersecurity, systems security or hardening
* Information Technology
* Experience with SCI Programs A&A documentation and processes
* Experience working with and/or supporting computer technologies (such as: databases, operating systems, computer network hardware, software programs, hardware troubleshooting or electronics)
* Experience with operating systems security features and settings (e.g. Windows, UNIX, and Linux)
Qualifications We Prefer
* Experience with various information system security assessment/hardening resources - NESSUS, SCAP Compliance Checker, Retina, etc.
* Working knowledge of Wide-Area and Local Area Networks (WAN/LAN), to include Cisco-based routers switches, and firewalls.
* Prior ISSO/IAO experience.
What We Offer
Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation.
Relocation Non-Eligible - Relocation assistance not available
Please consider the following role type definition as you apply for this role:
* Onsite: Employees who are working in Onsite roles will work primarily onsite. This includes all production and maintenance employees, as they are essential to the development of our products.
We are RTX
#LI-Onsite
As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote.
The salary range for this role is 82,000 USD - 164,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.
Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.
Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.
This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.
RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
Auto-ApplySystem Security Engineer
Security architect job in Aurora, CO
System Security EngineerLOCATIONAurora, CO 80014CLEARANCETS/SCI Full Poly (Please note this position requires full U.S. Citizenship) KEY SUMMARYWe are seeking a highly motivated and detail-oriented System Security Engineer to design, implement, and maintain security measures that protect our critical systems and data. In this role, you will work closely with cross-functional teams to identify vulnerabilities, develop robust security solutions, and ensure compliance with industry standards and regulations. The ideal candidate has a strong understanding of system architecture, a proactive approach to mitigating risks, and a passion for staying ahead of evolving cyber threats. If you are a problem-solver who thrives in a dynamic environment, we encourage you to apply and help us safeguard our organization's infrastructure.
*** Please note that our job openings are dynamic and can open or close quickly (much faster than we can publish). If you do not see an opening you are looking for, know that we see almost all types of positons. We strive to keep our listings up to date, but please consider submitting your current resume. Our team will work with you to identify the most recent opportunities that align with your skillset and career goals. We look forward to you joining our family. ***
SIMILAR CAREER TITLESCybersecurity Engineer, Information Security Engineer, Network Security Engineer, IT Security Engineer, Cloud Security Engineer, Infrastructure Security Engineer, Endpoint Security Engineer, Security Operations Engineer, Security Systems Analyst, Data Security Engineer, Application Security Engineer, Identity and Access Management Engineer, Threat Detection Engineer, Vulnerability Management Engineer, Risk Assessment Engineer, Compliance Security Engineer, Incident Response Engineer, Secure Systems Architect, Security Automation Engineer, etc.DEGREE (Level Desired) Bachelor's DegreeDEGREE (Focus) Cybersecurity, Computer Science, Information Technology, Information Systems, Computer Engineering, Network Engineering, Software Engineering, Systems Engineering, Electrical Engineering, Data Science, Telecommunications, Information Assurance, Security Management, Digital Forensics, Cryptography, Cyber Operations, Applied Mathematics, Artificial Intelligence, Risk Management, Secure Systems Design, etc.ALTERNATE EXPERIENCEGeneral comment on degrees: Most contracts allow additional experience (4-5 years) in lieu of a Bachelor's Degree. Some contracts give 4-5 years experience credit for a Bachelor's Degree. Some contracts give 2 years experience credit for a Master's Degree. We will work with you to find the right fit.POSITION RESPONSIBILITIES
Design and implement secure system architectures
Monitor and respond to system security incidents
Develop and enforce system security policies
Conduct risk assessments and mitigate vulnerabilities
Ensure compliance with security standards and frameworks
Collaborate with teams to integrate security into system development
REQUIRED SKILLS
Proficiency in configuring firewalls and intrusion detection systems
Strong knowledge of operating system security (e.g., Linux, Windows)
Experience with endpoint protection tools
Familiarity with network protocols and security
Ability to perform vulnerability assessments and penetration tests
Expertise in implementing encryption and secure authentication methods
DESIRED SKILLS
Knowledge of cloud security practices (e.g., AWS, Azure)
Familiarity with automation tools for security (e.g., Ansible, Terraform)
Experience with security incident response and forensics
Understanding of DevSecOps principles
Strong communication and technical documentation skills
Ability to train and mentor team members on security best practices
PLUG IN to CYMERTEK - And design your future... YOUR FOREVER CAREER STARTS HERE
Are you looking for more than just a job? Join a company where employees are treated like family, and your career is built to last. We are a growing small business and a trusted federal contractor offering full scope consulting services in information technology, cybersecurity, and analyst workforce development.
At our company, you come first. We're committed to creating an environment where you'll thrive professionally and personally. We provide meaningful, challenging work using cutting-edge technologies while investing in your growth and success. With direct access to company leadership, a laid-back and inclusive atmosphere, and exceptional work-life balance, you'll feel valued every day.
We also believe in taking care of our family - both yours and ours. Our benefits are phenomenal, family-friendly, and designed with your well-being in mind. From employee and family events to career-long support, we create a community you'll never want to leave.
Ready to make your next move the best one? Join us and experience the difference.
BENEFITS
Excellent Salaries
Flexible Work Schedule
Cafeteria Style Benefits
10% - 401k Matching (Vested Immediately)
Additional 401k Profit Sharing
30 days Paid Leave/Holiday (No Use or Lose!)
The day off for your birthday
Medical/Dental/Vision - 100% employee coverage. ($1200 allowance - or a bonus)
HSA/FSA
AFLAC
Long Term/Short Term Disability - 100% employee coverage. No cost to you.
Life Insurance - 100% employee coverage. No cost to you.
Additional Discretionary Life Insurance
Paid Training
No long, wordy reviews with tons of paperwork!!!
Referral bonus program with recurring annual payments
HOW TO APPLY
Email us at ***************** or apply today: ****************
Want to see what our employees think? Click here .
EQUAL OPPORTUNITY EMPLOYER STATEMENT
Cymertek is proud to be an Equal Opportunity Employer committed to fostering an inclusive and diverse workplace. We embrace and celebrate differences in our employees, recognizing that a diverse workforce enhances our creativity, innovation, and overall success. At Cymertek, employment decisions are made based on merit, qualifications, and business needs without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or any other characteristic protected by applicable laws. We believe in creating an environment where all individuals are treated with respect and dignity, and where opportunities for professional growth and advancement are accessible to everyone, regardless of background or identity.
Easy ApplyEnterprise Security Architect
Security architect job in Denver, CO
We continuously invest in our team members and our infrastructure so we can safeguard our employees, customers and company. We are seeking an Enterprise Security Architect to join our team in Denver, CO. If you like managing projects, owning budgets and being responsible for the security architecture then this may be the right move for you. The Enterprise Security Architect will lead security engineering and mentor team members. This will include planning (review technical solutions for adherence to best practices and best fit), building (act as a project leader to design and configure elements of large security projects) and run activities (responds to escalated tickets or problem reports). In the event that there is a security incident, the security architect may perform a post-event analysis to determine root cause and lead discussions to make sure the necessary changes are put in place to avoid this issue in the future.
Responsibilities:
Security Technology Strategy and Architecture: Design and implement enterprise security solutions that protect the company's market share, revenue and brand. Solutions should follow industry standard best practices, regulatory guidelines, and corporate policies. Research, evaluate, and recommend security technologies that can be applied to technology solutions being developed or maintained internally or externally.
Security Project Management: Leads large highly complex global security projects often delegating work to other team members. Understands both business and technology objectives when deploying projects. Requires ability to configure and test solutions.
Operational Security Management: Support of operational Security Management including;
Firewall management
Content filtering management
Client and security agent management
Vulnerability scanning remediation
Technical Mentoring: Trains and mentors security engineering personnel on security architecture, new technology, and incident troubleshooting.
Incident Handling and forensic analysis: Escalation point for incidents. Provides technical leadership for complex security incidents. Prepares final remediation plans for complex issues requiring senior executive engagement.
Work environment is generally typical of an office setting, however, must be able to travel to manufacturing facilities globally for projects.
Relocation assistance is available for those who qualify under our relocation policy.
External Description Search We continuously invest in our team members and our infrastructure so we can safeguard our employees, customers and company. We are seeking an Enterprise Security Architect to join our team in Denver, CO. If you like managing projects, owning budgets and being responsible for the security architecture then this may be the right move for you. The Enterprise Security Architect will lead security engineering and mentor team members. This will include planning (review technical solutions for adherence to best practices and best fit.), building (act as a project leader to design and configure elements of large security projects) and run activities (responds to escalated tickets or problem reports). In the event that there is a security incident, the security architect may perform a post-event analysis to determine root cause and lead discussions to make sure the necessary changes are put in place to avoid this issue in the future.
Responsibilities:
Security Technology Strategy and Architecture: Design and implement enterprise security solutions that protect the company's market share, revenue and brand. Solutions should follow industry standard best practices, regulatory guidelines, and corporate policies. Research, evaluate, and recommend security technologies that can be applied to technology solutions being developed or maintained internally or externally.
Security Project Management: Leads large highly complex global security projects often delegating work to other team members. Understands both business and technology objectives when deploying projects. Requires ability to configure and test solutions.
Operational Security Management: Support of operational Security Management including;
Firewall management
Content filtering management
Client and security agent management
Vulnerability scanning remediation
Technical Mentoring: Trains and mentors security engineering personnel on security architecture, new technology, and incident troubleshooting.
Incident Handling and forensic analysis: Escalation point for incidents. Provides technical leadership for complex security incidents. Prepares final remediation plans for complex issues requiring senior executive engagement.
Work environment is generally typical of an office setting, however, must be able to travel to manufacturing facilities globally for projects.
Relocation assistance is available for those who qualify under our relocation policy.
Requirements Search MINIMUM QUALIFICATIONS
• Bachelor's degree.
• 8 years of advanced security experience or 8 years of Network and Security experience with 5 years of strong security focused experience.
• At least one certification such as CISSP, ENCE, SANS GIAC, Cisco CCSP, or CISM.
• Experience with enterprise security architecture, design and implementation of complex WAN, LAN, and enterprise security environments.
• Project management skills managing complex network and security technologies.
• Experience with Windows server and desktop operating systems.
• Experience in managing web content filtering and web proxy products.
• Experience with network troubleshooting tools such as Splunk and Wireshark.
• Experience supporting complex data network environments.
• Strong understanding of SSL certificates and Public Key Infrastructure.
• Expert working knowledge of network security and layered defense strategies (such as router access lists and route maps, Cisco ASA Firewalls, Cisco IDS Sensors, NAT, VPN, IPSEC, 3DES, SSL, 802.1x, WPA, TKIP, PEAP, Cisco ACS, TACACS and Radius).
• Experience with web application design, function and secure software development lifecycles.
• Proficient in Microsoft Word, Excel, Outlook
• Ability to travel up to 20%.
PREFERRED QUALIFICATIONS
• Experience managing security for Manufacturing systems, SCADA, and Process control Networks preferred.
• Knowledge of computer security incident response and computer forensics
7+ to 10 years experience
SKILLS AND CERTIFICATIONS
CISSP
CISCO
WAN/LAN
Splunk
Wireshark
Firewalls
SCADA
Additional Information
All your information will be kept confidential according to EEO guidelines.
Senior Security Architect
Security architect job in Littleton, CO
EchoStar is reimagining the future of connectivity. Our business reach spans satellite television service, live-streaming and on-demand programming, smart home installation services, mobile plans and products. Today, our brands include Boost Mobile, DISH TV, Gen Mobile, Hughes and Sling TV.
Department Summary
Our Technology teams challenge the status quo and reimagine capabilities across industries. Whether through research and development, technology innovation or solution engineering, our people play vital roles in connecting consumers with the products and platforms of tomorrow.
Job Duties and Responsibilities
EchoStar is seeking a talented and innovative Security Architect to lead the design, development, and implementation of its Identity Management (IAM) and Zero Trust Architecture. The role will ensure robust security across EchoStar's digital ecosystem, focusing on secure authentication for employees and supply chain vendors, as well as implementing network- and user-based segmentation controls. The Security Architect will collaborate across internal teams and external partners to drive security innovation, ensure the effectiveness of security controls, and propel EchoStar's security program forward.
Key Responsibilities:
* Consumer Identity and Access Management (IAM) Architecture: Design, implement, and manage a secure IAM framework that delivers industry-leading authentication capabilities for EchoStar employees and supply chain vendors; ensure workflows are secure, scalable, and user-friendly, reducing authentication friction without compromising security
* Zero Trust Architecture: Lead the design and deployment of EchoStar's Zero Trust architecture, focusing on network-based and user-based segmentation controls; ensure proper user, system, and data separation to protect against unauthorized access and lateral movement within the network
* Security Control Effectiveness: Continuously measure and evaluate the effectiveness of security controls in production environments; use data-driven insights to ensure the architecture operates as designed, addressing any gaps or deficiencies proactively
* Security Architecture Support: Provide Security Architecture support to align with and improve other security control frameworks within EchoStar; help reduce constraints and roadblocks in security projects and initiatives, ensuring smooth progress of the security program
* Innovation in Security Control Stack: Drive innovation within EchoStar's security control stack to enhance overall security posture; leverage emerging technologies and advanced security practices to ensure EchoStar remains at the forefront of cybersecurity, building the most secure platform possible
* Threat Landscape Research: Conduct ongoing research into emerging cybersecurity threats and trends, particularly those related to IAM and Zero Trust architectures; implement proactive solutions to protect EchoStar's systems, employees, and vendors from potential threats
* Cross-Organizational Collaboration: Collaborate with various internal teams, including IT, compliance, and business units, to align security initiatives with business objectives; build strong relationships with external industry partners to adopt best practices and stay ahead of evolving security challenges
* Security Initiatives Intake: Lead the intake and execution of new security initiatives; develop clear security requirements, participate in project reviews, and ensure security controls are seamlessly integrated into new technology deployments
Skills, Experience and Requirements
Education and Experience:
* Bachelor's degree in Computer Science or Information Technology, related discipline, or commensurate industry experience
* 10+ years of related experience
Skills and Qualifications:
* Strong understanding of cyber security principles, concepts, and technologies
* Knowledge of network protocols, operating systems, and security frameworks
* Experience with vulnerability assessment and penetration testing tools
* Excellent analytical and problem-solving skills, with the ability to think critically and make informed decisions
* Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams
* Self-motivated and eager to learn, with a strong passion for cyber security
* Relevant certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or Certified Information Systems Security Professional (CISSP) are a plus
* Experience in designing and deploying security architectures for large-scale, global organizations
* Familiarity with cloud security, especially around IAM and Zero Trust models in hybrid and multi-cloud environments
* Prior experience in securing supply chain and vendor management processes
Visa sponsorship not available for this role
Candidates must be willing to participate in at least one in-person interview, which may include a live whiteboarding or technical assessment session.
#LI-JZ2
Salary Ranges
Compensation: $127,050.00/Year - $181,500.00/Year
Benefits
We offer versatile health perks, including flexible spending accounts, HSA, a 401(k) Plan with company match, ESPP, career opportunities, and a flexible time away plan; all benefits can be viewed here: DISH Benefits.
The base pay range shown is a guideline. Individual total compensation will vary based on factors such as qualifications, skill level, and competencies; compensation is based on the role's location and is subject to change based on work location.
Candidates need to successfully complete a pre-employment screen, which may include a drug test and DMV check. Our company is committed to fostering an inclusive and equitable workplace where every individual has the opportunity to succeed. We are dedicated to providing individuals with criminal or arrest records a fair chance of employment in accordance with local, state, and federal laws.
The posting will be active for a minimum of 3 days. The active posting will continue to extend by 3 days until the position is filled.
We pride ourselves on developing and promoting talent as an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or protected veteran status. EchoStar will accommodate the sincerely held religious beliefs of employees if such accommodations are not undue hardships and are otherwise within the bounds of applicable law. All qualified applicants with arrest or conviction records will be considered for employment in accordance with local, state, and federal law. You may redact any information that identifies age, date of birth, or dates of school/graduation from your application documents before submission and throughout our application process.
EchoStar will provide reasonable accommodation to otherwise qualified job applicants and employees with known physical or mental disabilities, unless doing so poses an undue hardship on the Company, poses a direct threat of substantial harm to others, or is otherwise not required by law. EchoStar has a more detailed Accommodation Policy that applies to employees. EchoStar endeavors to make echostar.com and jobs.echostar.com accessible to users. Please contact *************** if you would like to discuss the accessibility of our website or need assistance completing the application process. This contact information is for accommodation requests only; do not use this contact information to inquire about the status of applications.
Click the links to access the following statements: EEO Policy Statement, Pay Transparency, EEOC Know Your Rights (English/Spanish)
Easy ApplyInformation Security Consultant (Vulnerability scan for application code)
Security architect job in Denver, CO
360 IT Professionals is a Software Development Company based in Fremont, California that offers complete technology services in Mobile development, Web development, Cloud computing and IT staffing. Merging Information Technology skills in all its services and operations, the company caters to its globally positioned clients by providing dynamic feasible IT solutions. 360 IT Professionals work along with its clients to deliver high-performance results, based exclusively on the one of a kind requirement.
Our services are vast and we produce software and web products. We specialize in Mobile development, i.e. iPhone and Android apps. We use Objective C and Swift programming languages to create native applications for iPhone, whereas we use Android Code to develop native applications for Android devices. To create applications that work on cross-platforms, we use a number of frameworks such as Titanium, PhoneGap and JQuery mobile.
Furthermore, we build web products and offer services such as web designing, layouts, responsive designing, graphic designing, web application development using frameworks based on model view controller architecture and content management system. Our services also extend to the domain of Cloud Computing, where we provide Salesforce CRM to effectively manage one's business and ease out all the operations by giving an easy platform. Apart from this, we also provide IT Staffing services that can help your organization to a great extent as you can hire highly skilled personnel's through us.
We make sure that we deliver performance driven products that are optimally developed as per your organization's needs. Take a shot at us for your IT requirements and experience a radical change.
Job Description
Primary job duties include the following:
● Address security risk assessment findings and recommendations for two key systems, Benefits Management System (JAVA, Linux, Oracle) and PEAK (force.com platform)
● Wok with vendor development staff to develop application code scanning process and to develop remediation plans.
● Provide recommendations for software and hardware configurations to support security standards and setting up a HW/SW asset license management system.
● Participate in the definition and implementation of projects to upgrade the systems and infrastructure to comply with revised standards for security and privacy
Qualifications
● Minimum of 3 years of experience in a system development environment, JAVA
● Minimum of 1 year of experience with application code vulnerability scanning
● Minimum of 3 years' experience developing and implementing technical projects
● Minimum of 1 year experience with secure coding with hands on use of an application code vulnerability scanning tool
● Clear Communicator (written and verbal)
● Experienced with using common business applications; such as, Google Docs, Microsoft Office (Word, Excel), Microsoft Project
● Strong analytical and research skills using the Internet and other tools
● Strong verbal communication skills and ability to facilitate a planning session or meeting
● Understanding of data governance, including the security requirements for PII, FTI, and PHI.
● Must be able to work independently and be proactive in reaching for information
● Must be comfortable in an environment with change and many concurrent projects
Additional Information
Thanks and Regards,
Karan Sharma
510-254-3300 ext. 150