Get the job you really want.
Maximum of 25 job preferences reached.
Top Hybrid Cybersecurity Jobs in CO
Digital Media • Gaming • Information Technology • Software • Sports • Esports • Big Data Analytics
As a Principal Security Engineer, you will lead security initiatives, design secure systems, automate processes, and mentor teams, ensuring safe technology usage.
Top Skills:
AIAutomationEmerging TechnologyProgramming LanguagesPublic Cloud SecurityScalable SystemsSecurity Tools
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The Security Architect will design and configure information systems per security standards, enhance security posture, develop policies, assess vulnerabilities, and lead security initiatives while collaborating with teams.
Top Skills:
Amazon Web Services (Aws)CisCybersecurity Frameworks Such As NistGoogle Cloud Platform (Gcp)Iso
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Act as embedded technical advisor for strategic customers to plan, deploy, and optimize Next‑Gen SIEM. Implement detections, ingest and tune log sources, migrate legacy content, develop dashboards/reports, troubleshoot issues, and mentor customer teams to drive operational excellence.
Top Skills:
AWSAzureBashChronicleCqlCrowdstrike FalconEdrGCPKqlLogscaleMicrosoft SentinelNext-Gen SiemOciPowershellPythonQradarSoarSplSplunkSQL
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
Serve as a technical advisor to strategic customers to deploy, configure, and optimize CrowdStrike Next-Gen SIEM. Responsibilities include data ingestion tuning, detection rule and correlation development, dashboards, migrations from legacy SIEMs, health checks, troubleshooting, automation opportunities, and mentoring customer teams on SIEM best practices and threat hunting.
Top Skills:
AWSAzureBashChronicleCqlCrowdstrike FalconEdrGCPKqlLinuxLogscaleNetwork DevicesNext-Gen SiemOciPowershellPythonQradarSentinelSoarSplSplunkSQLThreat Intelligence PlatformsWindows
Cloud • Information Technology • Security • Software • Cybersecurity
As a Threat Hunter, you will identify and manage customer incidents, enhance security maturity, and communicate effectively with customers to address threats and anomalies.
Top Skills:
Cloud SecurityEdrIdentity SecurityJupyter NotebooksPython
Big Data • Fintech • Information Technology • Business Intelligence • Financial Services • Cybersecurity • Big Data Analytics
The Manager of Insider Threat Operations will lead a team in the detection and prevention of insider threats, manage operations, collaborate with various teams, ensure compliance with regulations, and report on program effectiveness.
Top Skills:
CisCybersecurityData Loss PreventionDtexForcepointGdprInsider Threat DetectionIso 27001Microsoft PurviewNetskopeNist CsfPci-DssProofpointSymantecUser And Entity Behavior Analytics
New
Cut your apply time in half.
Use ourAI Assistantto automatically fill your job applications.
Use For Free
Cloud • Information Technology • Security • Software • Cybersecurity
As a Senior Threat Intelligence Analyst, you will monitor cyber threats, analyzing East Asian adversaries' TTPs while collaborating with teams to enhance threat intelligence insights.
Top Skills:
Data Analysis PlatformMetadata AnalysisNetworking ProtocolsOsintPacket AnalysisSQL
Artificial Intelligence • Cloud • Information Technology • Sales • Security • Software • Cybersecurity
The Penetration Testing Analyst performs technical testing on various targets, produces reports, collaborates with teams, and assists with incident response.
Top Skills:
AssemblyCC++Ieee 802.11Internet Protocol SuiteJavaLinuxPenetration Testing ToolsPHPPythonRubyUnixWindows
Consumer Web • Coupons • Healthtech • Social Impact • Pharmaceutical
Lead security architecture, threat modeling, and enterprise risk management. Drive incident response, DevSecOps enablement, secure SDLC practices, and mentor engineers while aligning security with compliance and business needs.
Top Skills:
Aws,Gcp,Javascript Frameworks,Microservice Architecture,Ci/Cd,Static Analysis,Dynamic Analysis,Vulnerability Scanning,Okta,Saml,Siem,Soc Tooling,Observability Platforms,Python,Rust,Go,Kubernetes
Information Technology
Design and build production-grade security automation and AI-assisted SOAR playbooks to convert detections into policy-driven responses. Integrate across identity, endpoint, network, cloud, and SaaS, embed guardrails, ensure measurable and auditable outcomes, and enable self-healing and resilient automation. Collaborate with platform owners and response teams and embed security controls into CI/CD and policy-as-code pipelines.
Top Skills:
Ai/MlAPIsAzure AdCi/CdCrowdstrikeEntra IdEvent-Driven ArchitectureInfrastructure As CodeMicrosoft DefenderMicrosoft SentinelMitre Att&CkPalo Alto XsoarPolicy-As-CodePowershellPythonSIEMSoarSplunkXdrXsiam
Healthtech • Biotech • App development
Lead cybersecurity requirements for the Digital Health Application (DiGA), including regulatory compliance and vulnerability management tasks.
Top Skills:
Cryptographic Standards (Aes-256Owasp Top 10Tls 1.3)
Artificial Intelligence • Cloud • Sales • Security • Software • Cybersecurity • Data Privacy
The Director of Cyber Product Security will lead a team to secure technology platforms, collaborate on security standards, and improve security programs.
Top Skills:
Ai Coding SecurityGdprIso 27001KubernetesNistSbom
Top hybrid Companies in CO Hiring Cybersecurity Roles
See AllAll Filters
Total selected ()
No Results
No Results





















