Get the job you really want.
Maximum of 25 job preferences reached.
Top Hybrid Cybersecurity Jobs in CO
Cloud • eCommerce • Information Technology • Professional Services • Software
The Security Operations Lead will develop security detection strategies, oversee incident response, manage vulnerabilities, ensure cloud security, and mentor a team to enhance security operations.
Top Skills:
AWSEdrSIEM
Information Technology • Productivity • Professional Services • Software
Monitor and analyze security events in Datadog, identify and investigate incidents, document and evolve incident response procedures, provide technical guidance, troubleshoot configuration/script issues, and work directly with customers on implementations and remote services.
Top Skills:
Cloud Native TechnologiesDatadogServicenowSIEMSplunkSumologic
Information Technology • Sales • Security • Cybersecurity • Automation
The Partnership Lead will build and scale Silverfort's ecosystem with cyber insurers and IR firms, manage partnerships, drive revenue through training and marketing, and ensure successful co-marketing efforts.
Top Skills:
Advanced Behavior AnalyticsIdentity SegmentationItdrMfa
Reposted 12 Days AgoSaved
Easy Apply
Easy Apply
Artificial Intelligence • Cloud • Security • Software • Cybersecurity
Lead a team of engineers in security incident response, build tools for efficiency, and improve Datadog's incident handling capabilities.
Top Skills:
Distributed SystemsSecurity Incident ResponseSIEM
Healthtech • Other • Professional Services • Business Intelligence
The role involves leading IT security initiatives, managing Microsoft platform operations, mentoring a tech team, and overseeing service delivery. Responsibilities include configuring cybersecurity measures, managing vendors, and improving IT processes.
Top Skills:
Azure Security CenterCisco NetworkingCopilotDefenderEntra IdExchangeIntuneMicrosoft 365PowershellPurviewTeams
New
Track Smarter, Apply Better.
Ditch the spreadsheets. Organize your job search with our freeApplication Tracker.
Use For Free
Reposted 14 Days AgoSaved
Big Data • Healthtech • Social Impact
The Information Security Manager at CIVHC oversees information security policy development, vendor security assurance, and compliance with regulations, ensuring data integrity and privacy during cloud migrations and partnerships.
Top Skills:
AICloud ArchitectureDatabase ArchitectureFismaHipaaNistSoc 2
Enterprise Web • Fintech • Payments • Software • Financial Services
Serve as Narmi's fraud subject-matter expert across pre-sales, onboarding, and post-live support. Advise customers on fraud strategy, configure fraud tools, partner with Sales and Product, influence roadmap, and expand adoption of fraud solutions like Narmi Guard.
Top Skills:
AlloyAPIsNarmi BankingNarmi GrowNarmi GuardSdksSso
Big Data • Information Technology • Software • Energy • Big Data Analytics
As a Security Analyst II, you will secure the grid by automating security, conducting vulnerability management, monitoring cloud configurations, and supporting compliance audits.
Top Skills:
AWSAws InspectorAzureBashCloudFormationMicrosoft DefenderMicrosoft SentinelOracle CloudPowershellPythonQualysRapid7SplunkTenableTerraform
Reposted 3 Hours AgoSaved
Easy Apply
Easy Apply
Mobile • Security • Software • Cybersecurity
Design and execute integration and security-focused test plans for PAM and Keeper Secrets Manager. Validate integrations across cloud providers, IAM, CI/CD, and OS/databases; perform reliability and security testing; analyze logs and defects; contribute to automation and collaborate with engineering, product, and security teams to ensure reliability and compliance.
Top Skills:
.NetActive DirectoryAWSAzureAzure DevopsDatabasesGCPGitlabGoJavaJavaScriptJenkinsKeeper Secrets Manager (Ksm)LinuxOktaPing IdentityPrivileged Access Management (Pam)PythonWindows
Reposted 3 Hours AgoSaved
Easy Apply
Easy Apply
Mobile • Security • Software • Cybersecurity
Validate functionality, performance, and reliability of Keeper's endpoint privilege management platform across Windows, macOS, and Linux. Execute manual functional, integration, and regression tests; document test plans and defects in Jira; validate RBAC and audit logging; collaborate with engineering, DevOps, and product teams and contribute to QA automation where applicable.
Top Skills:
Active DirectoryAPIsAWSCi/CdGroup PolicyIamJIRALinuxmacOSRbacScripting LanguagesTest Automation FrameworksWindows
Cloud • Security • Software
Provide escalated technical support for Ping Identity products, investigate issues using knowledge bases and test labs, manage customer expectations, contribute to public community and knowledge base, participate in on-call rotation, and communicate proactively with customers.
Top Skills:
DevOpsDirectory ServicesDnsFirewallsHttp Tracing ToolsHttpsIpLdapLinuxLoad BalancersOauthOidcPingaicPingamPingdsPinggatewayPingidmPkiRestSAMLScimScripting LanguagesSslTlsWindows ServerX.509
Top hybrid Companies in CO Hiring Cybersecurity Roles
See AllAll Filters
Total selected ()
No Results
No Results



















