Past 24 hours
Colorado Springs, CO (247)
Fountain, CO (3)
Cripple Creek, CO (1)
Years of Experience
0-4 years (84)
5-7 years (158)
8-10 years (92)
11-14 years (102)
15+ years (8)
Vice President (0)
Individual Contributor (0)
Linquest Corporation (28)
Northrop Grumman Corporation (16)
Booz Allen Hamilton (16)
Leidos holdings (12)
Easy Apply only
Conducting operations and maintenance of AFIN boundary devices, vulnerability management systems, and end point protection. When assigned, supporting the ESU's directory services, messaging, collabora...
Provide training to system users on preferred security practices. Author risk assessments and support certification and accreditation activities. Participate in system reviews, to include custom, CO...
The Software Security Research (SSR) team specializes in approaching security from the perspective of how we build and use software. SSR is responsible for conducting security research which leads to...
You’ll be able to broaden your skillset into areas like Cybersecurity with a vast array of IT systems involving end user, including enterprise-level networks while building peace of mind in a critical...
Provide system/program engineering, technical support, and technical training to support programs/initiatives, including but not limited to: acquisition, development, integration, sustainment, continu...
Ensure that the cybersecurity architecture and design of the customer's systems shall be functional and secure with the ability to detect and respond to Cyber events...
Support or lead a team of System Security Engineers and Certification and Accreditation Analysts responsible for ensuring the customer’s national and international security interests are protected as...
Identifying, evaluating, and driving new opportunities through an expert-level comprehension of network design, routing \ switching, and the protocols used in the network stack to deliver intelligence...
Researches, develops, and recommends appropriate Cybersecurity countermeasures for networks, systems, and/or applications based upon test and evaluation information...
Manage performance of the core CALEA architecture to ensure it is operating at peak performance and intervene with operational teams as necessary to maintain established performance expectations...
Investigate security-related events, situations, and incidents. Identfiy and determine causes of security violations and recommend corrective actions to ensure data security...
Maintain a comprehensive and holistic system view while addressing stakeholder security risks and concerns regarding software integrity and assurance implementation through the application of Systems...