Get the job you really want.
Maximum of 25 job preferences reached.
Top Hybrid Cybersecurity Jobs in CO
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The role involves leading incident response engagements, conducting investigations, performing forensics, and communicating findings to stakeholders. Candidates should possess strong leadership, technical expertise, and project management skills.
Top Skills:
AIAWSAzureComputer ForensicsCybersecurityGCPIncident ResponseNetwork Analysis
Digital Media • Gaming • Information Technology • Software • Sports • Esports • Big Data Analytics
Lead and mentor a team in security monitoring, incident response, and threat hunting, enhancing operations and scaling capabilities across cloud platforms.
Top Skills:
AWSAzureEdr/Xdr ToolsGCPSiem Platforms
YesterdaySaved
Easy Apply
Easy Apply
Big Data • Cloud • Software • Database
The Senior Site Reliability Engineer will lead security design and implementation for cloud infrastructures, mentor teams, and automate security solutions.
Top Skills:
AnsibleAWSAzureCloud Security ToolsCloudFormationGCPGoTerraform
YesterdaySaved
Easy Apply
Easy Apply
Big Data • Cloud • Software • Database
The Security Software Engineer will design and implement security controls for MongoDB Atlas, collaborating across engineering teams and ensuring adherence to high security standards.
Top Skills:
ApparmorC/C++CgroupsEbpfGoGrafanaJavaKubernetesPythonRustSeccompSelinuxSplunkTerraformVictoria Metrics
Fintech • Software
The Network Security Architect will assess network security, guide teams, enhance security policies, design network solutions, and mentor engineers while aligning with a Zero Trust Strategy.
Top Skills:
AWSAzureCi/CdContainersDdosFirewallGCPLoad BalancerNetwork SecurityOrchestration SolutionsRoutersSaseScripting LanguagesSdwanSwitchesWaf
New
Track Smarter, Apply Better.
Ditch the spreadsheets. Organize your job search with our freeApplication Tracker.
Use For Free
Aerospace • Hardware • Information Technology • Security • Software • Cybersecurity • Defense
The Imagery Analyst will support the NGA by performing imagery research and analysis, creating geospatial intelligence products, and communicating findings through reports and briefings.
Top Skills:
CedalionEsri Arcgis ProIecExcelMicrosoft PowerpointMicrosoft WordNesRemoteview
Enterprise Web • HR Tech • Information Technology • Software • Cybersecurity
The Cyber Resilience Advisor supports customers in achieving cybersecurity objectives, utilizes the Immersive Platform, and drives adoption through strategic partnerships.
Top Skills:
Anti-MalwareCybersecurityFirewallsLinuxPublic Cloud EnvironmentsSaaSSecurity Tools (IdsSiem)Windows
Artificial Intelligence • Cloud • Information Technology • Sales • Security • Software • Cybersecurity
The Penetration Testing Analyst performs technical testing on various targets, produces reports, collaborates with teams, and assists with incident response.
Top Skills:
AssemblyCC++Ieee 802.11Internet Protocol SuiteJavaLinuxPenetration Testing ToolsPHPPythonRubyUnixWindows
Cloud • Information Technology • Security • Software • Cybersecurity
The REACT Principal Consultant will manage threat intelligence, respond to security incidents, and engage with customers to analyze cyber threats across environments.
Top Skills:
AWSAzureCifs/SmbFtpGCPGoHttpsLinuxmacOSNfsPythonRdpSftpSshTcp/IpWindows
Consumer Web • Coupons • Healthtech • Social Impact • Pharmaceutical
Lead security architecture, threat modeling, and enterprise risk management. Drive incident response, DevSecOps enablement, secure SDLC practices, and mentor engineers while aligning security with compliance and business needs.
Top Skills:
AWSCi/CdDynamic AnalysisGCPGoJavascript FrameworksKubernetesMicroservice ArchitectureObservability PlatformsOktaPythonRustSAMLSIEMSoc ToolingStatic AnalysisVulnerability Scanning
Reposted 2 Days AgoSaved
Big Data • Food • Hardware • Machine Learning • Retail • Automation • Manufacturing
Lead the strategy, engineering, and management of enterprise privileged access and non-human identity security platforms within a global IAM organization, driving adoption and governance of PAM and NHI capabilities across various environments.
Top Skills:
Automation FrameworksCyberarkDevOpsIdentity SecurityMicrosoft Entra IdPrivileged Access ManagementSecrets ManagementZero Trust
Top hybrid Companies in CO Hiring Cybersecurity Roles
See AllAll Filters
Total selected ()
No Results
No Results





















