Post job

Security engineer jobs in Pueblo, CO

- 167 jobs
All
Security Engineer
Information Systems Security Officer
Senior Security Engineer
Cyber Security Engineer
Cyber Security Analyst
Network Security Architect
Security Architect
Information Security Analyst
Senior Information Security Analyst
Information Assurance Engineer
Information Systems Engineer
  • Senior Cloud Security Engineer

    True Anomaly

    Security engineer job in Colorado Springs, CO

    A new space race has begun. True Anomaly seeks those with the talent and ambition to build innovative technology that solves the next generation of engineering, manufacturing, and operational challenges for space security and sustainability. OUR MISSION The peaceful use of space is essential for continued prosperity on Earth-from communications and finance to navigation and logistics. True Anomaly builds innovative technology at the intersection of spacecraft, software, and AI to enhance the capabilities of the U.S., its allies, and commercial partners. We safeguard global security by ensuring space access and sustainability for all. OUR VALUES Be the offset. We create asymmetric advantages with creativity and ingenuity What would it take? We challenge assumptions to deliver ambitious results It's the people. Our team is our competitive advantage and we are better together YOUR MISSION As a Senior Cloud Security Engineer, you will be at the forefront of securing the heart of our satellite mission control software. You will play a pivotal role in fortifying our cloud infrastructure, ensuring the safety of our critical space operations. If you enjoy pioneering solutions to novel security challenges, this mission is for you. RESPONSIBILITIES Design and implement secure cloud infrastructure solutions that meet regulatory and compliance requirements. Implement security strategies via automation to maximize control efficacy and user experience. Conduct security assessments and audits to ensure compliance with industry standards and best practices. Collaborate with cross-functional teams to provide security guidance and support. Stay current with emerging security threats, technologies, and regulations affecting cloud platforms and services. Provide expert guidance and lead response efforts for cloud security incidents. Operate vulnerability discovery tools for operating systems, containers, and software libraries. Build, deploy, and manage production security tools and services to monitor networks, endpoints, and cloud workloads. Design and operate scalable processes to provision cloud access and maintain least-privilege. Maintain a secure, reliable and low-touch infrastructure using technologies such as Terraform, Kubernetes, and immutable images. QUALIFICATIONS 5+ years of experience in a cloud or infrastructure security role. Security experience with Docker/Kubernetes and how to secure those environments. Experience with any of the three major cloud providers (AWS, Azure, GCP). Experience with Terraform, Python, Bash or similar scripting language. Experience building secure CI/CD pipelines with either GitHub Actions, Jenkins, GitLab. Experience managing vulnerability management and scanning tools. Experience with public key infrastructure and management of secrets. Understanding of real-time threat detection, secrets management, security considerations within build, release, CI/CD and other similar tooling. U.S. Citizen and eligible for DoD Secret or TS/SCI clearance. PREFERRED SKILLS AND EXPERIENCE Experience working in startups with hybrid cloud and on-prem environments. Experience implementing and managing security controls in accordance with Department of War Impact Levels, NIST 800-53 and Security Technical Implementation Guides. Certifications including CEH, Security+, OSCP. Ability to maintain or obtain TS/SCI clearance. COMPENSATION California Base Salary: $160,000-$225,000 Colorado Base Salary: $155,000-$215,000 Washington D.C. Base Salary: $160,000-$225,000 Remote: Compensation for remote employees will vary based on location and local market data. Equity + Benefits including Health, Dental, Vision, HRA/HSA options, PTO and paid holidays, 401K, Parental Leave Your actual level and base salary will be determined on a case-by-case basis and may vary based on the following considerations: job-related knowledge and skills, education and experience. ADDITIONAL REQUIREMENTS Work Location: Ideally, candidates will be based near Denver, Colorado Springs, Long Beach, or Washington, D.C., as some work requires on-site collaboration. Remote candidates will also be considered but should anticipate occasional travel for in-person work. Work environment is in a standard office, working at a desk or in a production factory. Physical demands may include frequent standing, sitting, walking, bending, and lifting or carrying items up to 20lbs. This position will be open until it is successfully filled. To submit your application, please follow the directions below. #LI-Hybrid To conform to U.S. Government space technology export regulations, including the International Traffic in Arms Regulations (ITAR) you must be a U.S. citizen, lawful permanent resident of the U.S., protected individual as defined by 8 U.S.C. 1324b(a)(3), or eligible to obtain the required authorizations from the U.S. Department of State. True Anomaly is committed to equal employment opportunity on any basis protected by applicable state and federal laws. If you have a disability or additional need that requires accommodation, please do not hesitate to let us.
    $160k-225k yearly Auto-Apply 20d ago
  • Cyber Systems Security Engineer Sr

    Lockheed Martin 4.8company rating

    Security engineer job in Colorado Springs, CO

    WHAT WE'RE DOING Do you want to be part of a culture that inspires employees to innovate, perform with excellence, and build incredible products? If you have the passion, drive, and courage to dream big, then we want to build a better tomorrow with you. Come and join our team! Lockheed Martin's Rotary and Mission Systems' C4ISR team is looking for a proven and experienced cyber systems engineer to support the Peace Krypton (PK) program. THE WORK As a System Engineer - Cyber in this position, you will: • Design and implement secure systems, including network architecture, system configuration, and security protocols. • Conduct risk assessments and vulnerability analyses to identify potential security threats and develop mitigation strategies. • Develop and implement security plans, including incident response plans, disaster recovery plans, and business continuity plans. • Integrate multiple systems and subsystems, including hardware, software, and firmware, to meet customer requirements. • Configure and maintain systems to meet DISA STIG requirements, including Windows, Linux, and network devices. • Implement and maintain security controls, including firewalls, intrusion detection systems, and antivirus software. • Develop and maintain system Plan of Action and Milestones (POAM). • Conduct vulnerability assessments and remediation activities to ensure systems are secure and compliant with DISA STIG guidelines. • Develop and maintain system documentation, including system configuration guides, security plans, and incident response plans. • Collaborate with cross-functional teams, including systems engineering, software engineering, and test engineering, to ensure that systems meet customer requirements and industry standards. • Develop and maintain system documentation, including system design documents, interface control documents, and test plans. • Ensure compliance with industry standards and regulations, including NIST, ISO 27001, and DoD 8570. • Collaborate with customers and stakeholders to understand security requirements and ensure that systems meet their needs. Please note: This position is based out of Colorado Springs, CO. WHO WE ARE Do you want to be part of a company culture that empowers employees to think big, lead with a growth mindset, and make the impossible a reality? We provide the resources and give you the flexibility to enable inspiration and focus. If you have the passion and courage to dream big, work hard, and have fun doing what you love then we want to build a better tomorrow with you. On this team, you will collaborate with a geographically separated team of technical professionals including software developers, system engineers, and integration and test engineers. You will work with cross-functional team in a highly dynamic mission-focused environment. WHO YOU ARE • An experienced System Engineer with a focus on cyber security and integration. • A candidate with a strong background in systems engineering, cyber security, and integration, with expertise in designing and implementing secure systems and integrating multiple systems and subsystems. • You will be responsible for ensuring the security and integrity of the PK systems, as well as integrating multiple systems and subsystems to meet customer requirements. WHY JOIN US Joining our team offers you the opportunity to support a join a company and a team where your contributions are valued and you can develop your skills and expertise. Our team also puts a high value on work-life balance. Striking a healthy balance between your personal and professional life is crucial to your happiness and success here, which is why we aren't focused on how many hours you spend at work or online. Instead, we're happy to offer a flexible schedule so you can have a more productive and well-balanced life both in and outside of work, along with competitive pay, and comprehensive benefits. Basic Qualifications • Current CompTIA Security+ certification • Bachelor's degree in Engineering, Computer Science, Information Assurance, or another STEM related field with 5+years related experience or related Master's degree with 3 years relevant experience. • Strong background in cyber security principles, including network security, and threat analysis • Strong understanding of STIGs and other security controls, including DISA STIGs and NIST guidelines • Experience with security tools and technologies, including vulnerability scanners, intrusion detection systems, and firewalls • Understanding of system integration and systems engineering principles. • This position requires the ability to travel up to 20% including internationally. Must hold a valid U.S. Passport. • This position requires the ability to obtain and maintain a DoD government clearance at the Secret level. Desired skills • Current CISSP Certification • Experience with agile development methodologies and DevOps practices • Experience with security information and event management (SIEM) systems and incident response tools • Strong programming and scripting skills, including languages such as C# and PowerShell • Knowledge of DO-178C - Software Considerations in Airborne Systems and Equipment Certification • Familiarity with industry standards and regulations, including NIST, ISO 27001, and DoD 8570 • Strong communication and collaboration skills, with ability to work with cross-functional teams and customers Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. * At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Other Important Information By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to work remotely Part-time Remote Telework: The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility. The specific weekly schedule will be discussed during the hiring process. Work Schedule Information Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Security Clearance Information This position requires a government security clearance, you must be a US Citizen for consideration. Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $101,000 - $178,135. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $116,200 - $201,365. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. This position is incentive plan eligible.
    $68k-89k yearly est. 60d+ ago
  • Cyber Security Analyst (RMF)

    Summit Technical Solutions LLC 4.5company rating

    Security engineer job in Colorado Springs, CO

    Are you a problem solver? Do you strive to make a positive difference? Do you enjoy being a contributor to a world class team? Summit Technical Solutions (STS) is seeking a Cyber Security Analyst Mid. This position will conduct risk assessment and provide recommendations for RMF system reviews. Involved in a wide range of cybersecurity services, including network defense, data integrity and application of security software. on the Command Information Management Systems (CIMS III) contract in Colorado Springs, CO. Essential Job Functions: * Participate in response to verified cyber-attacks. * Classified material incident handling and directing cleanup activities. * Complete regular situational awareness reports and daily reports. * Perform regular management and maintenance of network vulnerability scanning tools and other cybersecurity tools and perform vulnerability assessment scans as necessary. * Provide input/artifacts as part of the Risk Management Framework (RMF) process including accreditation. * Utilize Enterprise Mission Assurance Support Service (eMASS) for cyber security management. * Analyze and assist with the DISA STIGS and STIG-Tools, HBSS, ACAS or Nessus network scanning software. * Analyze and assess RMF controls Position Starting at $95,000 Required Experience Qualified candidates must have the following experience and qualifications: * Bachelor's degree in related technical field and 5+ years of related experience; OR Associate's degree in related field and 8+ years of experience * Security+ CE or equivalent IAT Level II certification * Current Secret clearance What makes STS great? STS is a services-based organization that relies on the exceptional results our workforce delivers to customers every day. We realize that our customers' high regard for our consistently high performance is only possible because of the talents, exceptional work ethic, and commitment of our people. We promote and live by a strong and inclusive company culture that places the focus on customer and employee satisfaction, communication, and respect. What to expect from STS: * Competitive total compensation plan, with immediate eligibility for most benefits and a 401(k) plan with matching contributions! * A work environment that emphasizes the safety of our workforce * An organization that is committed to upholding the highest level of business ethics and workplace conduct * A company that supports "paying it forward" with involvement in several deserving organizations and encourages volunteerism in the employee's community * Generous paid time-off program that starts on the first day of employment! * Tuition and certification cost reimbursement programs for qualifying employees STS is actively committed to employment of Veterans, whom we regard as one of our Nation's greatest resources. Today, you will find Veterans at every level of our organization, continuing their service to our country by supporting our government contracts and customers. STS is proud of their dedication, work ethic, loyalty, and commitment to duty, and we will continue to promote career opportunities for Veterans who are sincerely deserving of our appreciation. We are an affirmative action/equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, gender identity, sexual orientation or any other characteristic protected by law.
    $95k yearly 17d ago
  • Senior IT Security Analyst

    First Busey Corporation 4.5company rating

    Security engineer job in Colorado Springs, CO

    The Senior IT Security Analyst is responsible for managing activities relating to monitoring and responding to security events. The analyst is responsible for monitoring application, host, and network threats, including external threat actors and rogue insiders. As a trusted member of the Information Security team and industry community, the analyst works closely with internal technical teams, business units, and external entities aligned with the business, including private intelligence-sharing groups, law enforcement, and government agencies. The analyst is responsible for conducting in-depth research, documenting threats, understanding the risk to the business, and sharing information with those who need to know. Analysts are expected to continually adapt to stay a step ahead of cyber attackers and stay up to date on the latest methods attackers use to infiltrate computer systems. Analysts in this role are expected to consistently learn and grow. This is not a passive career opportunity, but rather one that requires a passion for security and rigor to protect the business. Duties & Responsibilities * Responsible for developing, managing, and maintaining threat intelligence and threat hunting program and processes * Regularly research and identify emerging threats, TTPs in public and closed forums, and work with colleagues to access risk and implement/validate controls as necessary. * Assist with Security Operations activities, including but not limited to, triage of alarms/alerts, and performing technical security assessments. * Participate in a call tree for outsourced Security Operations Center to assist with triage and remediation of critical and high rated alerts that are escalated both during and after business hours. * Research and recommend solutions to fulfill regulatory compliance with all standards set forth by FFIEC guidelines, Sarbanes Oxley, Gramm-Leach-Bliley and other regulations applicable to the financial services industry and publicly traded companies. * Perform periodic review of IT procedures and security of all systems in order to maintain integrity of company and customer data. * Document and perform verification of IT related changes in accordance with Company security policies and procedures. * Research and recommend hardware and software solutions to augment or enhance existing security measures. * Stay current in events and trends in IT security. * Investigate and report any security violations and incidents and ensure proper protection and corrective measures have been taken when an incident or vulnerability has been discovered. * Conduct scheduled reviews of key application security settings. * Develop metrics and scorecards to measure risk to the organization, as well as effectiveness and efficiency of SOC associates. * Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs * Supports audit and incident processes, as required * Monitor and support internal SEIM systems, reports, and searches * Monitor and support internal phishing email report systems and reports * Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business * Develops strong liaison relationships with key internal business and technology teams * Coach level I & IIs on security domains and program processes * Depending on need, VP Security may determine a Team Lead designation for Level III role * Participate in security work streams for a variety of enterprise projects and initiatives * Determine and communicate security risk postures to partners and leaders as appropriate Education & Experience Knowledge of: * Strong experience with threat information sharing and threat hunting processes to proactively identify potential or existing threats in medium to large environments. * Proficient with SIEM tools, threat intelligence platforms, and security orchestration, automation, and response (SOAR) solutions to centralize and manage the incident and remediation workflow. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Proficiency in operating systems such as Windows, Linux, and MacOS to effectively research and analyze threats in a sandbox environment, and respond to incidents. * Experience in incident handling and investigation including using formal chain-of-custody methods, forensic tools, and best practices. * Applicable knowledge of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and CVSS. * Capable of scripting in Python, Bash, Perl, RegEx, or PowerShell. * Knowledge and understanding of networking concepts and securing traffic across LAN, WAN, and Internet infrastructure. * Familiarity with cloud architectures, security standards, and best practices * Strong oral and written communication skills * Strong organizational skills and attention to detail * Excellent interpersonal skills Ability to: * Ability to analyze incident logs, attack vectors, and understand vulnerabilities and exploits. * Take independent action within established options and develops new procedures and approaches to problems when necessary * Analyze assignments based on a wide knowledge of many factors where application of advanced or technical concepts are required * Self-starter requiring minimal supervision * Highly organized and efficient. * Demonstrated strategic and tactical thinking. * Stays current with the evolving threat landscape. * Perform duties and make decisions under frequent time pressures Education and Training: * (Preferred) Bachelor's degree in Computer Science, Management Information Systems (MIS) or related field or equivalent work experience. * On-the-job training in relevant roles relating to security operations, threat intel and hunting, system administration, incident response, or equivalent * Security+, CySA+, GCIH, CSA, CCSP or similar certification; or willingness and ability to pursue certification/re-certification within the first six months of hire. * At least 5 years' experience in security operations center environments, threat intelligence/hunting, or security systems administration * Requires knowledge of Microsoft Office and other productivity tools Benefits and Compensation Salary offered is based on factors, including but not limited to, the job duties, required qualifications and relevant experience, and local market trends. The role may be eligible for bonus or incentives based on company and individual performance. (Base Pay Range: $86,000 - $123,000/year) Busey provides a competitive Total Rewards package in return for your time, talents, efforts and ultimately, results. Your personal and professional well-being-now and in the years to come-are important to us. Busey's Total Rewards include a competitive benefits package offering 401(k) match, profit sharing, employee stock purchase plan, paid time off, medical, dental, vision, company-paid life insurance and long-term disability, supplemental voluntary life insurance, short-term and long-term disability, wellness incentives and an employee assistance program. In addition, eligible associates may take advantage of pre-tax health savings accounts and flexible spending accounts. Visit Busey Total Rewards for more information. Equal Opportunity Busey values a diverse and inclusive workplace and strives to recruit, develop and retain individuals with exceptional talent. A team with diverse talent, working together, is essential to Busey's commitment of delivering service excellence. Busey is an Equal Opportunity Employer including Disability/Vets. Visit Busey.com/Careers to learn more about Busey's Equal Opportunity Employment. Unsolicited Resumes Busey Bank, and its subsidiaries, does not accept any liability for fees for resumes from recruiters or employment agencies ("Agency"), without a binding, written recruitment agreement between Busey and Agency describing the services and specific job openings ("Agreement"). Busey may consider any candidate for whom an Agency has submitted an unsolicited resume and explicitly reserves the right to hire those candidate(s) without any financial obligation to the Agency, unless an Agreement is in place. Any email or verbal contact with any Busey associate is inadequate to create a binding agreement. Agencies without an Agreement are requested not to contact any associates of Busey with recruiting inquiries or resumes. Busey respectfully requests no phone calls or emails. Application Deadline 11/15/25
    $86k-123k yearly Auto-Apply 55d ago
  • Cyber Threat Emulation Analyst

    Launchtech

    Security engineer job in Colorado Springs, CO

    Job Description or Huntsville, AL - Redstone Arsenal (On-site) Clearance Required: Active Secret Clearance (or higher) Travel Required: Up to 10% LaunchTech is seeking a Mid-Level Cyber Threat Emulation Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly to improving the agency's defensive posture while mentoring analysts and executing cyber threat emulation engagements aligned with real-world adversary tactics. What You'll Do As a Mid-Level Cyber Threat Emulation Analyst, you will: Perform Defensive Cyber Operations (DCO) and Cyber Security Service Provider (CSSP) duties outlined in Evaluator Scoring Metrics (ESM) Perform cybersecurity duties on customer networks to improve enterprise-wide security posture Analyze correlated asset, threat, and vulnerability data against known adversary exploits and techniques to determine operational impacts and strengthen defensive posture Support the development, review, and updates of DCO procedures, processes, manuals, and other documentation Measure defense-in-depth effectiveness against known vulnerabilities Generate vulnerability assessment reports and escalate findings for review Support enterprise Incident Response in accordance with DoD regulations and instructions Lead cyber events and incident investigations from start to conclusion, including data gathering, analysis, and reporting Instruct, evaluate, and mentor analysts at junior, mid, and senior levels; support development of exploitation analyst training plans Receive, review, and implement Higher Headquarters Tasking Orders (HHQ) and Fragmentary Orders weekly Perform Cyber Threat Emulation (CTE) actions using Automated Security Validation toolsets per HHQ direction Execute CTE actions within approved network zones using specific adversary tactics, techniques, and procedures (TTPs) Create dashboards and reports communicating post-engagement analysis, vulnerabilities, recommended remediations, system security posture assessments, and incident response results Draft and submit Cyber Tasking Orders (CTOs) to address findings discovered during CTE engagements Collaborate with the Cyberspace Domain Awareness (CDA) team to develop evaluation criteria and methodologies aligned with HHQ inspection requirements and industry best practices What You Bring Basic Requirements: Must have 6, or more, years of general (full-time) work experience Must have 4 years of combined experience with: Performing manual or automated penetration tests in an enterprise environment Practical experience with vulnerability assessment, cybersecurity frameworks, or conducting risk assessments Experience performing the full life cycle of incident response and enterprise-level monitoring Must have 1 year of experience in management or leadership in a team environment Must have a current DoD 8570.01-M IAT Level II certification with Continuing Education (CE) (CySA+, GICSP, GSEC, Security+ CE, SSCP) Must have, or obtain within 6 months of start date, a PenTest+ certification Must have an active DoD Secret Security Clearance Desired Requirements: Have a Bachelor's degree, or higher, in Cybersecurity, Computer Science, or related field Have experience with Cyber Threat Emulation tools, policies, and procedures Have experience operating custom software on a Linux platform Have experience with security analysis and solutions in WAN/LAN environments (Routers, Switches, Network Devices, Windows, Linux) Have experience with SOC/DCO tools including Firewalls, Intrusion Detection/Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc. Have experience performing security compliance scans across a WAN (ACAS/Nessus preferred) Have a background in configuration, troubleshooting, and deployment of host-based security (ESS preferred) Be able to mentor and train personnel in a high-paced environment Be familiar with DoD Security Operations Centers (SOC/CSSP) Be familiar with DCO/CSSP-guiding security policies and procedures Have an active DoD Top Secret clearance Why LaunchTech? At LaunchTech, we don't just fill seats, we bring in people who want to make an impact. We deliver Excellence, Period. You will join a mission-driven team where your expertise directly strengthens national defense and advances cybersecurity excellence. We offer competitive benefits, including: Medical, Dental, and Vision coverage 401(k) with company match Paid Time Off (PTO) Opportunities to make a meaningful impact while advancing your career And more Ready to Join the LaunchTech Crew? If you're ready to apply your cyber expertise to mission-critical defense operations, we want to hear from you. LaunchTech is an Equal Opportunity Employer. We prohibit discrimination and harassment of any kind. All qualified applicants will receive consideration for employment without regard to race, protected veteran status, color, sex, religion, sexual orientation, national origin, disability, genetic information, age, pregnancy, or any other status protected under federal, state, or local law. Powered by JazzHR E0uCktenE0
    $68k-93k yearly est. 25d ago
  • Senior Security Engineer*

    Virtual Service Operations?Source=Indeed_Feed

    Security engineer job in Colorado Springs, CO

    Are you looking to take the next steps in your career as a Cleared EEC XSOAR Senior Security Engineer? Let's chat and see if we are a good match! Opportunity: Virtual Service Operations is searching for a Cleared EEC XSOAR Security Engineer to join our team in Colorado Springs, CO. As an EEC XSOAR, you are a critical part of our customers' adoption of Cloud security integrations. You may be engaged with multiple clients as the subject matter expert, establishing relationships with them to ensure best practices for their secure cloud environments throughout the lifecycle of their journey with our products. You'll guide them for quick and consistent adoption, accelerated integrations with new cloud security products, and real-time support and strategy. You'll act as their trusted advisor, providing strategic guidance around complex systems to secure a digital environment. Interacting directly with the client, you'll partner closely with client personnel to guide them on their cloud security journey. Your thorough understanding of our product integrations contributes to the development of new principles and concepts - providing detailed analysis around what's working, what's not, and what could be better. You enjoy implementation work, are proactive about resolving potential concerns, and operate well around strict best practices that enable our clients on their road to a more secure digital world. You're creative, innovative, and you love a challenge - learning how integrations might work better around new products and technologies. Responsibilities: Lead security automation technical implementations in a customer environment. Translate complex business requirements into best practice solutions. Identify and document operational business processes for automated playbook development. Prepare capacity planning, deployment, business continuity and configuration guides. Ability to communicate effectively in various situations with all levels of an organization from Engineering/Operations to CIO/CISO audiences. Present technical information to non-technical personnel. Train and enable customer teams to be successful with our products. Develop key performance indicators (KPIs), understand critical success factors, and continuously measure performance. Engage with the account team to allow them to clearly understand the customer's business & technical requirements as you learn through active engagement with the client. Qualifications: Experience with security automation platforms and orchestration tools (SOAR). Familiarity with IDS/IPS, SIEM, and endpoint solutions. Experience managing complex automated security solutions in large environments. Deep understanding of security threats, internet protocols and cybersecurity tools and applications. Project leadership experience; ability to drive organizations and resources to complete required tasks in service of end goals. Detailed experience in the installation, configuration, operation and documentation of security solutions to prevent cybersecurity threats. Experience working in a Security Operations Center (SOC) and documenting operational workflows. Excellent written and verbal communication skills, with confirmed ability to communicate to senior leaders and technical peers. Some understanding of Linux or Unix and network troubleshooting analysis. Preferred experience in Python and/or Javascript. Preferred experience in cybersecurity incident response. Previous experience with STIGs, RMF, NIST publications and/or SCAP. GCIA, CISSP , CEH, and/or Security+ certifications is a plus. Requirements Must possess an active Secret Clearance. Please note that pursuant to a government contract, this specific position requires U.S. citizenship status Minimum of 7 years of experience using Cortex EEC XSOAR Minimum of 5 years of experience with Palo Alto What is Important to Us: You are an excellent communicator in writing and speaking. You have the ability to work independently but also value teamwork. Your problem-solving skills are excellent. You are looking for a job where performance appraisals occur regularly, and you look forward to advancing your career. You seek a community of virtue-centered co-workers and clients. What we offer you: As part of the VSO company, you will be part of a virtue-centered team who value their work and teammates. This is a no-jerk zone . We provide ongoing learning and development opportunities to foster continuous growth. We offer competitive salaries, health benefits, and flexible work arrangements. More About VSO: VSO is a hybrid cloud and managed services consulting firm. Much of VSO's success can be attributed to our deep partnerships with IT services industry leaders such as AWS, IBM, Microsoft and others. VSO leverages numerous other partner relationships so as to provide our customers with optimal support. Additionally, we take pride in taking care of our employees. We offer a wide variety of benefits for eligible employees related to health, retirement, professional development, and more! For more information, please visit our website at *************************** Salary Description $150,000 - $175,000
    $150k-175k yearly 60d+ ago
  • Senior Security Engineer*

    Cleared It Positions

    Security engineer job in Colorado Springs, CO

    Full-time Description Are you looking to take the next steps in your career as a Cleared EEC XSOAR Senior Security Engineer? Let's chat and see if we are a good match! Opportunity: Virtual Service Operations is searching for a Cleared EEC XSOAR Security Engineer to join our team in Colorado Springs, CO. As an EEC XSOAR, you are a critical part of our customers' adoption of Cloud security integrations. You may be engaged with multiple clients as the subject matter expert, establishing relationships with them to ensure best practices for their secure cloud environments throughout the lifecycle of their journey with our products. You'll guide them for quick and consistent adoption, accelerated integrations with new cloud security products, and real-time support and strategy. You'll act as their trusted advisor, providing strategic guidance around complex systems to secure a digital environment. Interacting directly with the client, you'll partner closely with client personnel to guide them on their cloud security journey. Your thorough understanding of our product integrations contributes to the development of new principles and concepts - providing detailed analysis around what's working, what's not, and what could be better. You enjoy implementation work, are proactive about resolving potential concerns, and operate well around strict best practices that enable our clients on their road to a more secure digital world. You're creative, innovative, and you love a challenge - learning how integrations might work better around new products and technologies. Responsibilities: Lead security automation technical implementations in a customer environment. Translate complex business requirements into best practice solutions. Identify and document operational business processes for automated playbook development. Prepare capacity planning, deployment, business continuity and configuration guides. Ability to communicate effectively in various situations with all levels of an organization from Engineering/Operations to CIO/CISO audiences. Present technical information to non-technical personnel. Train and enable customer teams to be successful with our products. Develop key performance indicators (KPIs), understand critical success factors, and continuously measure performance. Engage with the account team to allow them to clearly understand the customer's business & technical requirements as you learn through active engagement with the client. Qualifications: Experience with security automation platforms and orchestration tools (SOAR). Familiarity with IDS/IPS, SIEM, and endpoint solutions. Experience managing complex automated security solutions in large environments. Deep understanding of security threats, internet protocols and cybersecurity tools and applications. Project leadership experience; ability to drive organizations and resources to complete required tasks in service of end goals. Detailed experience in the installation, configuration, operation and documentation of security solutions to prevent cybersecurity threats. Experience working in a Security Operations Center (SOC) and documenting operational workflows. Excellent written and verbal communication skills, with confirmed ability to communicate to senior leaders and technical peers. Some understanding of Linux or Unix and network troubleshooting analysis. Preferred experience in Python and/or Javascript. Preferred experience in cybersecurity incident response. Previous experience with STIGs, RMF, NIST publications and/or SCAP. GCIA, CISSP , CEH, and/or Security+ certifications is a plus. Requirements Must possess an active Secret Clearance. Please note that pursuant to a government contract, this specific position requires U.S. citizenship status Minimum of 7 years of experience using Cortex EEC XSOAR Minimum of 5 years of experience with Palo Alto What is Important to Us: You are an excellent communicator in writing and speaking. You have the ability to work independently but also value teamwork. Your problem-solving skills are excellent. You are looking for a job where performance appraisals occur regularly, and you look forward to advancing your career. You seek a community of virtue-centered co-workers and clients. What we offer you: As part of the VSO company, you will be part of a virtue-centered team who value their work and teammates. This is a no-jerk zone . We provide ongoing learning and development opportunities to foster continuous growth. We offer competitive salaries, health benefits, and flexible work arrangements. More About VSO: VSO is a hybrid cloud and managed services consulting firm. Much of VSO's success can be attributed to our deep partnerships with IT services industry leaders such as AWS, IBM, Microsoft and others. VSO leverages numerous other partner relationships so as to provide our customers with optimal support. Additionally, we take pride in taking care of our employees. We offer a wide variety of benefits for eligible employees related to health, retirement, professional development, and more! For more information, please visit our website at *************************** Salary Description $150,000 - $175,000
    $150k-175k yearly 60d+ ago
  • Enterprise Security Architect

    Ent Federal Credit Union 4.5company rating

    Security engineer job in Colorado Springs, CO

    The Enterprise Security Architect is responsible for designing and implementing comprehensive security frameworks that protect the organization's information assets and ensure compliance with regulatory standards. This role involves assessing current security measures, identifying vulnerabilities, developing security strategy and roadmaps to mitigate risks, as well as developing security standards and best practices in collaboration with engineering teams and information security department for application development, cloud solutions and IT infrastructure. By collaborating with cross-functional teams and stakeholders, the Enterprise Security Architect plays a critical role in fostering a culture of security awareness and resilience within the organization. Essential Functions * Security Strategy and Architecture: Develop Security Vision and Strategy: Design an overarching security architecture that aligns with the organization's business goals, ensuring it is adaptable to both current and emerging threats. Security Policy Assessment and Compliance: Participate in evaluating security policies, procedures, and controls to ensure compliance with industry regulations and organizational requirements. System and Application Security Design: Work with engineering, development, and IT teams to integrate security protocols into system design, application development, and IT infrastructure. Ensure adherence to principles like least privilege, secure coding, and secure system design. * Innovation and Emerging Technologies: Evaluate Emerging Technologies: Investigate new technologies, such as AI, ML, and blockchain, for potential applications to enhance security posture and processes. Drive Security Innovation: Encourage innovation within security practices and solutions, staying ahead of potential threats and adopting advanced security tools and technologies. * Risk Management and Third-Party Security: Risk Identification and Prioritization: Identify, analyze, and prioritize risks to the organization's IT environment, including data, systems, and networks. Develop Risk Mitigation Strategies: Create both preventive and reactive strategies to manage and mitigate security risks across systems. Third-Party Risk Management: Engage with the third-party risk management team to establish security protocols for data sharing, access control, and secure interactions with external partners. * Governance, Policy, and Compliance: Policy and Governance Frameworks: Develop and advise on policies, standards, and guidelines for data protection, compliance, privacy, and security governance. Policy Enforcement: Collaborate on the creation of a governance framework to enforce security policies and ensure adherence across departments. Stakeholder Engagement and Education: Educate and advise cross-functional teams, including IT, HR, legal, and executive leadership, on security practices and the business impact of cybersecurity. * Security Monitoring, Threat Intelligence, and Continuous Improvement: Security Monitoring Systems: Design and implement systems to detect, monitor, and respond to potential security threats in real-time, ensuring continuous protection. Threat Intelligence and Awareness: Stay informed about the latest cybersecurity threats, vulnerabilities, and trends, applying this knowledge to update and improve security measures. Continuous Improvement: Regularly assess and improve security protocols, systems, and policies to keep pace with evolving threats. Foster a culture of security awareness and adaptability within the organization. * Bank Secrecy Act: Remains cognizant of and adheres to Ent policies and procedures, and regulations pertaining to the Bank Secrecy Act. Minimum Formal Qualifications for this Position * Bachelor's Degree in Information Technology, Computer Science, or related field. preferred * 5+ years' working with security architectures, frameworks, and leading large-scale security initiatives Required * 10+ years' experience in Cybersecurity preferred * 7+ years' Security Engineering, Risk Management, Security Design preferred * 3+ years' experience in cloud security, security governance, regulatory compliance preferred Technical or Specialized Knowledge/Skills: * Understanding of security architecture frameworks (e.g., SABSA, NIST, ISO 27001). * In-depth knowledge of security technologies, including firewalls, intrusion detection systems, and encryption methods. * Familiarity with cloud security best practices and architectures across various cloud platforms (e.g., AWS, Azure, Google Cloud). * Awareness of compliance regulations (e.g., GDPR, HIPAA, PCI-DSS) and risk management principles. * Proficient in security assessment tools and methodologies (e.g., vulnerability scanning, penetration testing). * Analytical and problem-solving skills for identifying and addressing security vulnerabilities. * Knowledge of threat modeling and compliance to align security strategies with business objectives. * Communication skills, with the ability to convey technical concepts to non-technical stakeholders. * Ability to develop and maintain security documentation, including policies, standards, and incident response plans. * Project management skills, including the ability to coordinate security initiatives and meet deadlines. * Ability to evaluate and recommend new security technologies and tools that enhance overall security posture. * Ability to collaborate effectively with cross-functional teams and build strong relationships with stakeholders. * Capacity to mentor and guide junior security team members in security best practices and methodologies. * Ability to adapt to evolving threats and a willingness to stay current with industry trends. * Ability to think strategically and align security solutions with overall business objectives. * Competence in risk assessment and management related to security decisions and implementations. Certifications Required: * Cert Info Sys Sec Pro preferred * Cert Info Sec Mgr preferred Environmental, Physical and Psychological Requirements * Standing - Occasionally * Walking - Occasionally * Sitting - Frequently * Lifting - Rarely (40 Lbs) * Carrying - Rarely * Pushing - Rarely * Pulling - Rarely * Balancing - Rarely * Stooping - Rarely * Kneeling - Rarely * Crouching - Rarely * Crawling - Rarely * Reaching - Occasionally * Handling - Occasionally * Grasping - Occasionally * Feeling - Occasionally * Talking - Frequently * Hearing - Frequently * Repetitive Motions - Frequently * Eye/Hand/Foot Coordination - Occasionally * Noises louder than normal speaking volume - Occasionally * Temperature Changes - Rarely * Atmospheric Conditions - Rarely
    $102k-131k yearly est. 2d ago
  • F5 Security Engineer - Active TS/SCI with CI Poly

    ENS Solutions, LLC

    Security engineer job in Colorado Springs, CO

    Job Description Participate in the development and support of customer technical requirements Champion a collaborative, team-based environment, sharing standard methodologies and success and building positive relationships Plan, Design, Develop, Implement and Operate F5 products such as LTM, ASM, BIG-IQ and APM Manage the configuration on multiple physical and virtual F5 across multiple data centers Develop scripts and tools to automate configuration of a large number of network security devices distributed across multiple data centers Propose and implement system enhancements that will improve the performance and reliability of the network security infrastructure Applies capacity planning configuration changes as demanded by the business Address performance, scalability, and service architecture administration issues Design, install, configure, maintain network security services, equipment and devices Plan and support network security infrastructure Provide clear technical documentation and written procedures for issues identified and addressed Monitoring and troubleshooting of platform and OS based problems, network security infrastructure and connectivity issues Perform launch testing for new software releases and the introduction of new features Coordinate equipment orders including physical or virtual appliances, as well as upgrading, monitoring, testing and servicing the systems as needed Demonstrates knowledge of a broad range of technology towers i.e.: Storage, Virtualization, Intel, Networking, Data Center Migration and Disaster Recovery Knowledge of risk and controls landscape, ensuring company-wide standards are met Participate in change and incident management Anticipating potential problems and acting to minimize the impact they may have on the project or unit Ability to collaborate with different technology towers to achieve common goals Requirements Bachelor's degree in computer science, information systems, telecommunications, or an engineering focused field Must have an Active TS/SCI and willing to obtain a CI Poly 5+ years of relevant F5 experience with F5 LTM, ASM, BIG-IQ, and/or APM administration and life cycle management including experience with advanced iRule creation and troubleshooting Ability to handle multiple complex F5 configurations and deployments at once Understanding of networking at all layers of the OSI model; and Previous experience with web application technologies Experience deploying, managing, and troubleshooting network systems, switching, and routing protocol standards such as: TCP/IP, MPLS, OSPF, BGP, SDN, and 802.1x. Experience managing and troubleshooting DNS, DHCP, IPAM, and NTP in a large multi-site environment Ability to manage multiple stands of work simultaneously. Executes within a customer-centric environment. Excellent verbal and written communication skill Hands on experience with Python and APIs Self-driven with the ability to manage workload without direct supervision Must have the F5 201 certification 8570 IAT Level II Certification required Preferred Skills/Qualifications Experience with Infoblox DDI, Microsoft DNS, Dyn, VMWare Automation products (vRO, vRA) Benefits Essential Network Security (ENS) Solutions, LLC is a service-disabled veteran owned, highly regarded IT consulting and management firm. ENS consults for the Department of Defense (DoD) and Intelligence Community (IC) providing innovative solutions in the core competency area of Identity, Credential and Access Management (ICAM), Software Development, Cyber and Network Security, System Engineering, Program/Project Management, IT support, Solutions, and Services that yield enduring results. Our strong technical and management experts have been able to maintain a standard of excellence in their relationships while delivering innovative, scalable and collaborative infrastructure to our clients. Why ENS? Free Platinum-Level Medical/Dental/Vision coverage, 100% paid for by ENS 401k Contribution from Day 1 PTO + 11 Paid Federal Holidays Long & Short Term Disability Insurance Group Term Life Insurance Tuition, Certification & Professional Development Assistance Workers' Compensation Relocation Assistance
    $74k-101k yearly est. 18d ago
  • Secret - Lead Cyber Security Engineer

    Insight Global

    Security engineer job in Colorado Springs, CO

    -Plan, perform, analyze, and report on compliance with designated security controls using a test environment as well as Assured Compliance Assessment Solution (ACAS) scans. -Implement vulnerability compliance actions to ensure the safety of data. -Ensure all Information Security Continuous Monitoring (ISCM) tasks are completed on time. -Monitor, assess, and report system security vulnerabilities, document corrective actions, and implement preventative actions to minimize the security vulnerabilities. -Identify and analyze emergent cybersecurity technologies and systems engineering methods to improve the system's cybersecurity posture. -Perform testing to ensure security controls are implemented correctly and ensure the security of data. -Perform testing of all upgrades to ensure cybersecurity compliance prior to installation of new equipment. -Assess, remediate, mitigate, and document/track risks associated with cybersecurity vulnerabilities. -Perform Security Impact Assessments on all system changes and events to identify and document and impacts to cybersecurity. -Validate systems are configured securely as part of testing initiatives. -Document corrective actions or proposed changes to cybersecurity functionality. -Create, manage, and delete user accounts, profiles, and policies on systems. -Support incident detection and preliminary response actions to security incidents. -Work with a team of engineers to ensure all equipment is properly STIG'd and ensure patching is completed in a timely manner. -Perform ATO package and control compliance reviews in eMASS and maintain the POA&M. We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: **************************************************** Skills and Requirements -Master's or Bachelor's degree in an IT- or cyber-related field. -Minimum of 10 years of cyber-related experience -Must have an active Secret clearance. -Security+ certification at a minimum, CISSP preferred. -Experience with ACAS, ESS, and other compliance tools/techniques. -Experience with Elastic, Splunk, or other log collection tools -Experience with eMASS -Robust understanding of Risk Management Framework (RMF) security controls. -Experience investigating security incidents.
    $74k-102k yearly est. 9d ago
  • Cyber Security Test Engineer

    Acuity Innovations

    Security engineer job in Colorado Springs, CO

    Salary: $70k-$85k depends on experience Acuity Innovations LLC is a small, defense contracting company that provides enterprise architecture, solution design, digital engineering, defensive cyberspace operations, system integration, and test and evaluation products and services that improve performance and decrease decision timelines. Our fundamental, repeatable service offering is bound in architecting, designing, securing, integrating, and verifying the operational readiness of data ecosystems. Do you want to be part of a unique, small business that differentiates itself by: Delivering the best products, integrated systems, and mission capabilities for the warfighter Building long-term relationships and treating its employees as family Deploying small but powerful High-Performance Teams, like elite Special Forces teams to each task Collaborating within and across the Acuity Innovations teams as well as with the customer Providing a growth path to partnership/ownership opportunities If you have this type of passion and desire to be part of a collaborative team environment with the innovation, initiative, and confidence to make things better, then Acuity Innovations may be the right place to realize your personal and professional goals. Package includes: Competitive salary 3 weeks paid time off 11 Federal Holidays Flexible Hours Benefits Career Development/Mentorship Opportunities Company Sponsored Social Events We seek technical individuals who will succeed in a highly collaborative work environment. Acuity Innovations LLC: Overview | LinkedIn **************************** Brief Job Description: Acuity Innovations is seeking a Cyber Security Test Engineer to join our team.Applicant must be a US Citizen and be able to obtain a DoD SECRET Security Clearance. The candidate will provide support to the cyber security operations staff in resolving cyber security issues as requested. Also, the candidate will assist in the identification of non-compliant system settings, exploitable threats, and other system vulnerabilities. We seek technical individuals who will thrive in a highly collaborative work environment of small teams, using the most modern tools and methodologies to tackle the challenges of integrating complex space and ground communications systems. Responsibilities: Assist in authoring technical documentation including test plans, test procedures, technical white papers, and test reports Use industry accepted and in-house developed tools to collect and aggregate cyber security data for use in identifying non-compliant system settings, exploitable threats, and other system vulnerabilities Assist in the communication with system developers to further understanding of cyber security concepts and implemented controls Provide the collected data to Information Systems Security Engineers (ISSE) in support of their assessment of system cyber security posture and support the cyber security operations staff in resolving complex cyber security issues as requested Assist in the authoring and peer-reviews cyber security test plans and detailed test procedures that include step-by-step instructions for using advanced cyber security tools Enhance cyber security testing processes and procedures through feedback and implementation Assist in the reporting on cyber security program activities to upper management as requested Travel: approximately 10% Required Skills & Experiences: Bachelors degree in engineering, mathematics, physics, computer science, or Cyber discipline Understand fundamentals of Security Technical Implementation Guides (STIG) and benchmarks Understand fundamentals of various Operating Systems Ability to troubleshoot problems involving complex systems Within 6 months of hire, must meet position and certification requirements outlined in DoDD 8140 and DoDD 8570.01-M for Information Assurance Excellent oral and written communication skills Must be a US Citizen and be able to obtain a DoD SECRET Security Clearance Preferred Skills & Experiences: Understand fundamental concepts of software design and implementation Ability to undertake new challenges with limited guidance Basic knowledge with Secure Content Automation Protocol (SCAP) Compliance Checker (SCC) and STIG Viewer Knowledge of Assured Compliance Assessment Solution (ACAS),Command-Line-Interface (CLI), and Linux and Windows systems Knowledge of developing and maintaining scripts (primarily PowerShell) Clearance: All applicants selected will be subject to a background check and a security investigation and will need to meet eligibility requirements for access to classified information.
    $70k-85k yearly 28d ago
  • Information System Security Officer II

    Grs, Inc. 4.4company rating

    Security engineer job in Colorado Springs, CO

    Global Resource Solutions, Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Information System Security Officer II. Job Descriptio n: Summary: The ISSO II's primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Essential Duties & Responsibilities: Review, prepare, and update AIS authorization packages Notify customer when changes occur that might affect AIS authorization Perform AIS self-inspections, provide security coordination and review of all system test plans Identify AIS vulnerabilities and implement countermeasures Represent the customer on various technical review and inspection teams Conduct security surveys at subordinate facilities and gather pertinent security documentation for inclusion into system authorization packages Coordinate, prepare, and track AIS inspections, reports, and responses Maintain AIS security records and prepare Co-Utilization Agreements for network nodes operating in government facilities Prepare reports on the status of security safeguards applied to computer systems Ensure AIS and network nodes are operated, maintained, and disposed of in accordance with security policies and practices Perform ISSO duties in support of in-house and external customers Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts Review, track, and conduct AIS training Requirement: Four (4) years related experience Bachelor's Degree in a related area or equivalent experience (Four (4) years) Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 within 6 months of the date of hire. Security Requirements: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Programs Willingness to submit to a Counterintelligence Polygraph Skills: Ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners Working knowledge of Microsoft Office (Word, PowerPoint, and Excel) Possess a high degree of originality, creativity, initiative requiring minimal supervision Must be familiar with security policy/manuals and the appropriate DCIDs/JAFANs and other guiding policy documents Requires travel within the organizational geographic Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation) Must be able to lift up to 50lbs Physical Requirements : This position requires employees to be willing and able to: sit, bend, reach, stoop, squat, stand, and walk. Communication: Excellent customer service via phone and face to face conversation, excellent written and oral command of English. GRS is an Equal Opportunity Employer. GRS will continue to abide by obligations under VEVRRA and Section 503 physical or mental disability, protected veteran status, or any other characteristics that are protected by law.
    $77k-100k yearly est. Auto-Apply 12d ago
  • Information Assurance Engineer - C

    Telos 4.6company rating

    Security engineer job in Colorado Springs, CO

    The most security-conscious organizations trust Telos Corporation to protect their vital IT assets. The reputation of our company rests on the quality of our solutions and the integrity of our people. Explore what you can bring to our solutions in the areas of cyber, cloud and enterprise security. Be a part of the Telos culture and see what sets us apart! Telos offers an excellent compensation package with benefits that include generous paid time off, medical, dental, vision, tuition reimbursement, and 401k. Our employees enjoy more than just a great work environment! This position will be based at Colorado Springs, CO Responsibilities: Learn and become familiar with the Xacta IA Manager Software Suite and Enterprise Mission Assurance Support Service (eMASS) tools. Responsible for entering security aspects of systems, software, applications, DevSecOps and associated RMF A&A data consistent with RMF ISSM responsibilities. The position will provide "day-to-day" support for Unclassified, Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. The candidate will be required to conduct “walkthroughs” of enterprise systems, applications, and DevSecOps projects to collect required artifacts in support of the initial NIST RMF A&A and subsequent continuous monitoring activities. The candidate will be responsible for the performance of security control assessment planning and execution in compliance with client policies and procedures with minimal supervision. The candidate will have had prior experience working with a wide variety of technologies, be well versed in the current state of information security and be able to interpret requirements of relevant governing bodies (e.g., NIST, CNSSI, JSIG, OMB, GAO, etc.). The candidate will utilize Xacta and eMASS to produce Body of Evidence (e.g., System Security Plan (SSP), Risk Assessment Report (RAR), specific POA&M portions, vulnerability reports, etc.) that meets local requirements while maintaining compliance with higher-level governance (e.g., NIST, FISMA, etc.). Develop and manage multiple RMF projects in the DAF and AF IC RMF tools such as eMASS or Xacta IA Manager Suite. Work with the customer to gather FedRAMP artifacts that will be used to support DAF and AF IC AO risk decisions. Perform system auditing, vulnerability risk assessments, hardware/software configuration management, and investigations on cybersecurity related security violations/incidents. Develop system documentation for information system authorization, security management, and continuous monitoring for assigned systems. Assist with providing cybersecurity education and training for all system users on appropriate risk mitigation strategies. Interface with internal/external customers to identify requirements and provide problem resolution. Perform other administrative and support functions as needed. Requirements Qualifications: Active Top Secret/SCI Security Clearance is required IT/Computer Science/Cyber Security Bachelor's (or equivalent) with 10 - 12 yrs of experience or a Master's with 8 - 10 yrs of experience. IAM Level III - IAW DoD 8570 Baseline Certifications 3 years of experience at the Senior or SME level for Information System Security Engineer, Information Systems Security Manager, Information Systems Security Officer; or 5 years' experience with RMF, NIST, FISMA, and POA&Ms from a theoretical, practical, and best practice perspective. Experience with Cloud environments and cybersecurity requirements. Experience using a combination of IA and IT related skills. For this position knowledge and practical experience for the IT/RMF side versus IT/Systems Integration is weighed equally. Experience in a role or implementer within the RMF Assessment and Authorize (A&A) process is a must. Experience developing, executing, reviewing, and documenting security control test plans and implementation statements. Experience investigating and documenting system topology in OV-1 or similar diagrams, to include: Internal/External Ports, Protocols, Internal/External interfaces, Hardware, Software, Cryptography Experience with security hardening requirements in accordance with DoD and vendor guidance. Experience in vulnerability analysis and patch remediation. Knowledge and experience applying security requirements related to applicable control overlays (e.g., Privacy, Classified, Cross Domain Solutions, etc.) Strong written and verbal communications skills and the ability to interact with people at all levels are required. Professional attitude regarding attention to detail and customer service and excellent organizational skills are required. Ability to pay strict attention to detail with an emphasis on high quality of deliverables. Demonstrated ability to work tasks autonomously. Prefer understanding of policies related to RMF (NIST SP 800-53, CNSSI 1253). Prefer experience using the Air Force RMF mandated eMASS and Xacta tools. Prefer experience supporting systems in SCI and SAP environments. Prefer experience with DISA Security Technical Implementation Guidance (STIG) and Security Requirements Guides (SRG). Prefer experience with vulnerability management tools (i.e. ACAS) to validate compliance with security and patch management requirements. Prefer experience with operating systems such as Red Hat Linux (primary) Windows (secondary). Prefer experience with Amazon Web Services Solutions experience and/or certification. The successful candidate must meet eligibility requirements to access sensitive information, which requires US citizenship. Telos maintains a drug-free workplace and will conduct drug testing on all applicants who have accepted an offer of employment. Telos Corporation participates in the E-Verify program. Therefore, any employment with Telos will also be contingent upon confirmation from the Social Security Administration ("SSA") and/or the Department of Homeland Security ("DHS") of your authorization to work in the United States. Telos offers excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future. Telos Corporation and its subsidiaries are committed to equal opportunity for all, without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, age, veteran status, disability, genetic information, or any other protected characteristic. Telos Corporation will make reasonable accommodations for known physical or mental limitations of otherwise qualified employees and applicants with disabilities unless the accommodation would impose an undue hardship on the operation of our business. If you are interested in applying for an employment opportunity and feel you need a reasonable accommodation pursuant to the ADA, please contact us at **************. If you require relay service assistance, please click on the following link to review information on your state's relay service: ********************************** Telos Corporation is an EEO/AA employer.
    $72k-95k yearly est. 60d+ ago
  • Information Security Analyst, Journeyman

    Vets Hired

    Security engineer job in Colorado Springs, CO

    Journeyman Information Security Analyst Colorado Springs, CO (Onsite) An organization is seeking a Journeyman Information Security Analyst to support the Data Transport Product Support Sustainment Logistics Maintenance (DSLM) contract. The DSLM effort provides sustaining, maintaining, and logistics support for the operational capability to transfer data for highly reliable and secure telemetry, tracking, command, control, and communications. DSLM primarily supports the Satellite Control Network (SCN). This position is on-site at a contractor facility in Colorado Springs, CO. WHAT YOU CAN EXPECT TO DO: Ensure cybersecurity controls for state-of-the-art secure operating systems, networks, and database products are applied IAW DoD cyber directives (including DoDI 8510.01 RMF, DoDI 8500.01, and NIST SP 800-37). Conduct risk assessments and provide recommendations for application design. Address a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Utilize encryption technology, penetration and vulnerability analysis, and IT security research. Prepare security reports to regulatory agencies as needed. Duties & Responsibilities (include but are not limited to): Develop and maintain cybersecurity artifacts for SCN mission systems. Develop and implement an Anti-virus/Malware identification process for equipment transfers to/from SCN sites. Coordinate with Software Maintenance Action (SWMA) IA patching team and program office IA architecture team on an IA/Cybersecurity Roadmap to identify non-compliant IA controls and propose corrective actions. Employ system security engineering to design, develop, and implement secure applications and configurations in coordination with the Government. Evaluate hardware, firmware, and software information security components for mission hardware acquisition. Perform cybersecurity controls verification assessments IAW DoDI 8510.01 and DoDI 8500.01 annually. Attend Cyber Technical Interchange Meetings during key project phases (Requirements, Design, etc.) to obtain Cyber community buy-in. Develop and implement policies, procedures, and standards related to information security, privacy, and incident response; monitor compliance. Provide technical engineering services for integrated security systems and solutions. Use tools and processes to monitor information systems for security-related events. Plan configuration changes for major security infrastructure platforms. Maintain a library of security audit tools and processes for testing, audits, incident response, and diagnosing security issues. Travel may be required. WHAT THE TEAM REQUIRES: BS Degree and 3 years of related experience or equivalent combination of education and experience, including 2 years of relevant Cybersecurity experience. Active DoD Secret Security Clearance or the ability to obtain and maintain one. Demonstrated traits: technical competence, strong decision-making and critical thinking, customer focus, self-motivation, desire to learn, effective interpersonal skills, pride in work, teamwork, and dedication. WHAT THE TEAM PREFERS: DoD 8140 Cyber Defense Analyst or Vulnerability Analyst Basic Qualification or certification (e.g., CEH, Security+), or a technical BS from an ABET-accredited or CAE-designated institution (as defined in DoD 8140). SCN and/or DoD experience is preferred. Working Place: Colorado Springs, Colorado, United States Company : 2025 August 28th - Auria Space
    $70k-100k yearly est. 60d+ ago
  • IT Network Security Architect

    Ra 3.1company rating

    Security engineer job in Colorado Springs, CO

    About us: We (our client) inspire and support discoveries that advance the quality of life. We provide life science, diagnostic and applied market laboratories worldwide with instruments, services, consumables, applications and expertise. Most of all we are an equal opportunity employer and value diversity at our company. We are looking for expert level networks and security engineer with extensive expertise in Cisco (firewall, switching, routing), Juniper, Palo Alto Networks and other technologies. Job Description Your responsibilities when you are on board: You will define and manage security infrastructure roadmap in collaboration with the Networks and Security organization. You will lead and contribute in projects to implement next generation access and security infrastructure components. Provide technical design, implementation planning, testing and troubleshooting expertise. Design, develop and lead implementation of new technical security infrastructures. Responsible for technical planning, design, development and modification of new solution specifications and implementation. Manage large information technology vendors in the technical aspects of designing, developing and implementing solutions. Qualifications We'd love to speak to you, if: You hold a Bachelors or Masters Degree or University Degree. You've more than 8 years with some technology certifications. You've in-depth expertise in Network and Security technologies. What can we offer: A base salary of $95,000 - $123,000 + Full benefits Relocation Assistance Additional Information I love talking to passionate people. Please do not hesitate to reach out to me at shruthi.n at roljobs dot com
    $95k-123k yearly 60d+ ago
  • ISSO II - Information Systems Security Officer II

    Watermark Risk Management International

    Security engineer job in Colorado Springs, CO

    Job Description Come make your mark with Watermark! 🎖️ FOUNDED BY USAF VETERANS in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business. 🌎 SUBJECT MATTER EXPERTS specializing in security and risk management. We're intimately familiar with DOD security programs and mission requirements. ⭐ OUR CORE VALUES drive every action we take as a company. We strive to exhibit PERSPECTIVE, PASSION, COMMUNICATION, INTEGRITY AND ETHICS, and BALANCE in all we do. 💲 COMPETITIVE BENEFITS PACKAGE to address our employees' physical, mental, emotional, and financial well-being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first! Information Systems Security Officer II The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. In this role you will… Assist the ISSM in meeting their duties and responsibilities Prepare, review, and update authorization packages Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly Ensure all IS security-related documentation is current and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them Prepare reports on the status of security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct continuous monitoring activities for authorization boundaries under your preview Assist Department of Defense, National Agency and Contractor organizations with the development of assessment and authorization (A&A) efforts Experience Requirements: 2-5 years related experience Prior performance in roles such as System, Network Administrator or ISSO SAP experience Education Requirements: Bachelor's degree or equivalent experience (4 years) Certification Requirements: Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire. Security Clearance Requirements: Current Top Secret SCI Clearance with ability to obtain CI Poly Other Requirements: Must have expert knowledge of DoD, National and applicable service and agency security policy, manuals and standards. Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners Reports to a physical location which occasionally requires the ability to traverse between buildings May require sedentary work at least 50% of the time Must be able to regularly list up to 50 lbs Ability to manage stress with a high degree of maturity/professionalism Demonstrated critical thinking and leadership skills and the ability to work well with others Effective verbal and written communication skills All Level I & Level II positions - candidate should possess some Special Access Program (SAP) experience All Level III positions -candidate should possess 2+ years of Special Access Program (SAP) experience The anticipated compensation range for this position i s $ 86,615 - $110,185 . Multiple considerations are taken into account when determining the final salary/hour rate, including but not limited to, Contract Wage Determination, education and certifications, relevant work experience, related skills and competencies, as well as Federal Government Contract Labor categories. Central to Watermark's employment philosophy is the wellbeing of our employees which is why we offer a robust benefits package and wellness program alongside of annual base compensation.) Watermark is an equal opportunity employer. All terms and conditions of employment are established without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, veteran status, or any other protected category under applicable federal, state, and local laws. Powered by JazzHR 2b6sAWo78O
    $110.2k yearly 10d ago
  • Information Systems Security Officer (ISSO) II

    Gtangible Corporation

    Security engineer job in Colorado Springs, CO

    Job Description gTANGIBLE Corporation (gTC), ****************** is an S corporation and a registered Government contractor that provides services and solutions in: National Security Programs Professional, Administrative, and Management Support Mission and Warfighter Support We are a Service-Disabled Veteran Owned Small Business (SDVOSB) and the founder has years of successful experience in the Government contracting arena. Our leadership team is an exceptional group of Government contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position. Requisition Type: Contingent (Open) Position Status: Full Time Position Title: Information Systems Security Officer (ISSO) II Location: Colorado Springs, CO Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for Counterintelligence polygraph Duties and Responsibilities The Air Force (AF) Special Access Program (SAP) Security Support Services (SSS) assists the AF cognizant security authority in oversight of enhanced National Security Objectives supporting AF SAP interests through active and integrated security operations, processes, mechanisms, and management. This support provides multi- disciplinary security support, including specialized analytical/program protection support, while being responsive and flexible to dynamic SAP security situations. The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Duties include the following: Develop physical or logical topologies for a system. Assist the ISSM in meeting their duties and responsibilities. Prepare, review, and update authorization packages. Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media. Conduct periodic reviews of information systems to ensure compliance with the security authorization package. Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change. Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly. Ensure all IS security-related documentation is current and accessible to properly authorized individuals. Ensure audit records are collected, reviewed, and documented (to include any anomalies). Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties. Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans. Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them. Prepare reports on the status of security safeguards applied to computer systems. Perform ISSO duties in support of in-house and external customers. Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries. Knowledge and Qualifications Bachelor's degree and 2-5 years of related experience or Associates degree and 4-7 years of related experience or 6-9 years of related experience without a degree. Related experience especially in developing RMF packages or body of evidence. Prior performance in roles such as System, Network Administrator, or ISSO. Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire. Must be able to regularly lift up to 50 lbs. SAP experience required. Prior active duty in the U.S. Air Force a plus. Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other protected category under applicable federal, state, and local laws.
    $68k-93k yearly est. 10d ago
  • Information Systems Security Officer II

    P-11 Security

    Security engineer job in Colorado Springs, CO

    Full-time Description The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, personnel security, incident handling, and security training and awareness. It will be required to work in close coordination with the ISSM and ISO in monitoring the information system(s) and its environment of operation to include developing and updating the authorization documentation, implementing configuration management across authorization boundaries. This will include assessing the security impact of those changes and making recommendation to the ISSM. The primary function is working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide “day-to-day” support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include: Assist the ISSM in meeting their duties and responsibilities Prepare, review, and update authorization packages Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Notify ISSM when changes occur that might affect the authorization determination of the information system(s) Conduct periodic reviews of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and AO/DAO prior to the change Monitor system recovery processes to ensure security features and procedures are properly restored and functioning correctly Ensure all IS security-related documentation is current and accessible to properly authorized individuals Ensure audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cyber security vulnerabilities and assist with the implementation of the countermeasures for them Prepare reports on the status of security safeguards applied to computer systems Perform ISSO duties in support of in-house and external customers Conduct security impact analysis activities and provide to the ISSM on all configuration management changes to the authorization boundaries Requirements Experience: 2 - 5 years related experience Prior performance in roles such as System/Network Administrator or ISSO Education: Bachelor's degree or equivalent experience (4 years) Certifications: Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level II or Information Assurance Manager II within 6 months of the date of hire Security Clearance: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Program Information Willingness to submit to a Counterintelligence polygraph Other Requirements: Must be able to regularly lift up to 50 lbs
    $68k-93k yearly est. 4d ago
  • Information Systems Security Officer (L3)

    Keenbee Talent Soluitions

    Security engineer job in Colorado Springs, CO

    A leading federal contractor is seeking a qualified and motivated Cybersecurity Information System Security Officer (ISSO) Level 3 to support a mission-critical Department of Defense (DoD) program. This role offers the opportunity to join a team of professionals committed to cybersecurity excellence and national defense. As an ISSO, you will apply and manage IT security controls to protect the confidentiality, integrity, and availability of DoD systems and data. You will ensure alignment with current hardware and software configurations and coordinate with system and network configuration managers. This position supports the full Risk Management Framework (RMF) lifecycle-including assessment, authorization, sustainment, and system disposition. You'll collaborate with Certified Defense Contractors to uphold continuous monitoring standards and meet change management requirements. Close coordination with the Security Control Assessor (SCA) and Authorizing Official Designated Representative (AODR) is essential to obtain and maintain security approvals. Additional duties include account management, auditing, vulnerability scanning, and advising both civilian and military personnel on cybersecurity matters. The role also supports compliance efforts and audit readiness. This is an excellent opportunity for an experienced cybersecurity professional to contribute technical knowledge and strategic insight in a mission-focused environment. Responsibilities / Required Skills Active Top Secret clearance with SCI eligibility (TS/SCI) Willing and able to submit to a Counterintelligence (CI) polygraph 10+ years of relevant DoD experience 4+ years of experience in SAP and/or SCI environments within the past 5 years Willingness to travel as needed Subject Matter Expert in RMF, cyber engineering, and project management Strong communication skills, both verbal and written Ability to convey complex technical concepts clearly and concisely Proven ability to anticipate and mitigate potential issues Highly organized with strong problem-solving and critical-thinking skills Strategic mindset with the ability to support senior leadership Education / Certifications MA/MS/ME in Computer Science, Cybersecurity, MIS, or related field Relevant certifications or equivalent experience may be considered in lieu of a degree 1+ year of experience implementing RMF IT security controls and policies DoD 8140 / DoD 8570 IASAE Level II certification Security Professional Education Development (SPēD) certification Benefits Employer-paid medical insurance Dental and vision insurance 401(k) Paid time off (PTO) Tuition reimbursement Security Clearance Applicants must be U.S. Citizens with an active Top Secret clearance and SCI eligibility. Final hiring is contingent upon successful completion of a security investigation and the ability to meet eligibility requirements for access to classified government information.
    $68k-93k yearly est. 60d+ ago
  • Information Network Security Architect

    Ra 3.1company rating

    Security engineer job in Colorado Springs, CO

    About us: We (our client) inspire and support discoveries that advance the quality of life. We provide life science, diagnostic and applied market laboratories worldwide with instruments, services, consumables, applications and expertise. Most of all we are an equal opportunity employer and value diversity at our company. We are looking for expert level networks and security engineer with extensive expertise in Cisco (firewall, switching, routing), Juniper, Palo Alto Networks and other technologies. Job Description Your responsibilities when you are on board: You will define and manage security infrastructure roadmap in collaboration with the Networks and Security organization. You will lead and contribute in projects to implement next generation access and security infrastructure components. Provide technical design, implementation planning, testing and troubleshooting expertise. Design, develop and lead implementation of new technical security infrastructures. Responsible for technical planning, design, development and modification of new solution specifications and implementation. Manage large information technology vendors in the technical aspects of designing, developing and implementing solutions. Qualifications We'd love to speak to you, if: You hold a Bachelors or Masters Degree or University Degree. You've more than 8 years with some technology certifications. You've in-depth expertise in Network and Security technologies. What can we offer: A base salary of $95,000 - $123,000 + Full benefits Relocation Assistance Additional Information I love talking to passionate people. Please do not hesitate to reach out to me at shruthi.n at roljobs dot com
    $95k-123k yearly 60d+ ago

Learn more about security engineer jobs

How much does a security engineer earn in Pueblo, CO?

The average security engineer in Pueblo, CO earns between $64,000 and $117,000 annually. This compares to the national average security engineer range of $77,000 to $141,000.

Average security engineer salary in Pueblo, CO

$87,000
Job type you want
Full Time
Part Time
Internship
Temporary