Get the job you really want.
Maximum of 25 job preferences reached.
Top Hybrid Cybersecurity Jobs in CO
Big Data • Food • Hardware • Machine Learning • Retail • Automation • Manufacturing
Lead the strategy and engineering for enterprise authentication and external identity management, ensuring secure access through various platforms and technologies.
Top Skills:
Microsoft Entra IdOauth2Openid ConnectPing IdentitySAML
2 Hours AgoSaved
Big Data • Food • Hardware • Machine Learning • Retail • Automation • Manufacturing
Lead the strategy, engineering, and management of enterprise privileged access and non-human identity security platforms within a global IAM organization, driving adoption and governance of PAM and NHI capabilities across various environments.
Top Skills:
Automation FrameworksCyberarkDevOpsIdentity SecurityMicrosoft Entra IdPrivileged Access ManagementSecrets ManagementZero Trust
2 Hours AgoSaved
Big Data • Food • Hardware • Machine Learning • Retail • Automation • Manufacturing
The Senior Manager - IAM Product Lead oversees strategy, engineering, and management of enterprise directory and machine identity platforms, enhancing identity security and governance.
Top Skills:
Active DirectoryCloud Identity ServicesInfrastructure As CodeMicrosoft Entra IdVenafi
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The role involves providing threat hunting expertise and intelligence analysis to safeguard customers' environments, along with maintaining customer relationships and performing tailored threat intelligence operations.
Top Skills:
Ai-Native PlatformsAPIsCrowdstrike Query Language (Cql)LogscaleScripting LanguagesThreat Intelligence
Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
The role involves leading incident response engagements, conducting investigations, performing forensics, and communicating findings to stakeholders. Candidates should possess strong leadership, technical expertise, and project management skills.
Top Skills:
AIAWSAzureComputer ForensicsCybersecurityGCPIncident ResponseNetwork Analysis
Automotive • Big Data • Information Technology • Robotics • Software • Transportation • Manufacturing
Design, build, and maintain secure, scalable SecOps platforms using C++, Rust, and scripting. Implement CI/CD and DevOps practices, integrate systems via APIs/webhooks and AI-driven tools, architect cloud (AWS/Azure/GCP) environments, optimize Linux/kernel configurations, automate infrastructure, and collaborate with SecOps on monitoring, detection, and response to protect enterprise assets.
Top Skills:
Ai-Driven ToolsAPIsAWSAzureC++Ci/CdDevOpsGCPLinuxLinux KernelRustScripting LanguagesWebhooks
New
Track Smarter, Apply Better.
Ditch the spreadsheets. Organize your job search with our freeApplication Tracker.
Use For Free
Digital Media • Gaming • Information Technology • Software • Sports • Esports • Big Data Analytics
Lead and mentor a team in security monitoring, incident response, and threat hunting, enhancing operations and scaling capabilities across cloud platforms.
Top Skills:
AWSAzureEdr/Xdr ToolsGCPSiem Platforms
Artificial Intelligence • Cloud • Sales • Security • Software • Cybersecurity • Data Privacy
The Senior Vulnerability Management Analyst will manage vulnerability lifecycle, perform risk analysis, automate processes, and provide strategic expertise within SailPoint's Cybersecurity team.
Top Skills:
CrowdstrikeMitre Att&CkNistOrcaOwaspQualysTeneable
Consumer Web • Coupons • Healthtech • Social Impact • Pharmaceutical
Lead security architecture, threat modeling, and enterprise risk management. Drive incident response, DevSecOps enablement, secure SDLC practices, and mentor engineers while aligning security with compliance and business needs.
Top Skills:
AWSCi/CdDynamic AnalysisGCPGoJavascript FrameworksKubernetesMicroservice ArchitectureObservability PlatformsOktaPythonRustSAMLSIEMSoc ToolingStatic AnalysisVulnerability Scanning
Artificial Intelligence • Cloud • Information Technology • Sales • Security • Software • Cybersecurity
The Penetration Testing Analyst performs technical testing on various targets, produces reports, collaborates with teams, and assists with incident response.
Top Skills:
AssemblyCC++Ieee 802.11Internet Protocol SuiteJavaLinuxPenetration Testing ToolsPHPPythonRubyUnixWindows
Cloud • Information Technology • Security • Software • Cybersecurity
As a Senior Threat Intelligence Analyst, you will monitor cyber threats, analyzing East Asian adversaries' TTPs while collaborating with teams to enhance threat intelligence insights.
Top Skills:
Data Analysis PlatformMetadata AnalysisNetworking ProtocolsOsintPacket AnalysisSQL
Enterprise Web • HR Tech • Information Technology • Software • Cybersecurity
The Cyber Resilience Advisor supports customers in achieving cybersecurity objectives, utilizes the Immersive Platform, and drives adoption through strategic partnerships.
Top Skills:
Anti-MalwareCybersecurityFirewallsLinuxPublic Cloud EnvironmentsSaaSSecurity Tools (IdsSiem)Windows
Big Data • Fintech • Information Technology • Business Intelligence • Financial Services • Cybersecurity • Big Data Analytics
The Manager of Insider Threat Operations will lead a team in the detection and prevention of insider threats, manage operations, collaborate with various teams, ensure compliance with regulations, and report on program effectiveness.
Top Skills:
CisCybersecurityData Loss PreventionDtexForcepointGdprInsider Threat DetectionIso 27001Microsoft PurviewNetskopeNist CsfPci-DssProofpointSymantecUser And Entity Behavior Analytics
Top hybrid Companies in CO Hiring Cybersecurity Roles
See AllAll Filters
Total selected ()
No Results
No Results





















