- BAE Systems (Broomfield, CO)
- …awards. Other incentives may be available based on position level and/or job specifics. ** Cyber Security Professional II ** **102750BR** EEO Career Site ... enterprise unclassified computer networks to detect, analyze, and respond to cyber security threats. Gather cyber threat intelligence, analyze information,… more
- Lumen (Denver, CO)
- …threat detection mechanisms. . Update and maintain response guides for accuracy. . Support Security projects to improve Cyber Defense Team or Lumen's security ... analysis. . Candidate must possess, or be willing to pursue, applicable professional /technical certifications, such as Security +, C|EH, OSCP, GCIH, CISSP,… more
- Lumen (Denver, CO)
- …and Enablement teams to ensure solution development and deployment of telecom, professional services, Cyber and IT solutions for Public Sector customers. ... capture efforts + Must be an organized, aggressive, highly skilled professional , knowledgeable in Public Sector contracting with excellent leadership and… more
- Parsons Corporation (Denver, CO)
- …Secret/SCI with CI Polygraph. + Bachelor's Degree + Certified Information Systems Security Professional (CISSP) certification. + 8 years of experience with ... start date)CompTIA Sec+ 0 - 3 years of Information Technology experience. **ISSO - II requirements:** + Active TS/SCI security clearance. + An active CI POLY… more
- ABBTECH Professional Resources, Inc. (Boulder, CO)
- …to create complex technical reports based on analytic findings. - DoD 8570 IAT level II or higher certification such as CompTIA Security + CE, ISC2 SSCP, SANS ... Top Secret or adjudicated Secret This position is part of the NCSC Security Operations Center (SOC) that executes 24x7 cybersecurity monitoring and incident response… more
- National Renewable Energy Laboratory (Golden, CO)
- …and data analysis, devops, client and infrastructures services, service delivery, and cyber security to produce sustainable solutions aligned with NREL's data, ... to understand capabilities and compliance requirements, participating in vulnerability management/ cyber operations activities ensuring the stability and security … more