More jobs:
Information System Security Officer ; TS/SCI
Job in
Louisville, Boulder County, Colorado, 80028, USA
Listed on 2025-11-30
Listing for:
Pace Industries, LLC
Full Time
position Listed on 2025-11-30
Job specializations:
-
IT/Tech
Cybersecurity, Systems Engineer, Network Security
Job Description & How to Apply Below
Centennial, CO:
Louisville, COtime type:
Full time posted on:
Posted Yesterday job requisition :
R25145#
** Sierra Space Careers:
** At Sierra Space, we build the missions and systems that keep our world secure in the domain above Earth.
Sierra Space team members share a spirit of innovation and collaboration and a belief that we can deliver on the boldest missions in space today. Together with our customers, we aim to safeguard our nation, sustain human presence in space, and secure the freedom of operations in low Earth orbit and beyond.
Our success is measured by the trust of those who rely on what we build and deliver, and our technologies keep the United States and its allies mission-ready throughout space.
We are mission-driven, and together, we are an extraordinary team.#
** About the Role
** The Cybersecurity Engineer I is an entry-level position responsible for designing, implementing, and maintaining security measures to protect the organization's information systems. This role involves working with various security technologies, including, encryption, intrusion detection/prevention systems (IDS/IPS), and multi-factor authentication. They will have foundational knowledge of computer networking concepts, protocols, and network security methodologies, as well as an understanding of cybersecurity and privacy principles.
The Cybersecurity Engineer I will work closely with senior engineers and cross-functional teams to ensure the security and integrity of the organization's information systems. This position offers the opportunity to gain hands-on experience in cybersecurity engineering, stay updated with the latest industry trends, and contribute to the continuous improvement of the organization's security posture.
In this role, you will support the design, implementation, and maintenance of security measures such as encryption, intrusion detection/prevention systems (IDS/IPS), and multi-factor authentication. You will assist in the configuration, deployment, and management of security tools and technologies, while also implementing and managing network security measures to protect data, systems, and networks. Conducting vulnerability assessments and penetration testing to identify and mitigate security risks will be a key responsibility, along with developing and maintaining security policies, procedures, and documentation.
You will collaborate with cross-functional teams to integrate security best practices into system designs and deployments, monitor and respond to security incidents and alerts, and provide technical support and troubleshooting. Staying updated with the latest industry trends, emerging threats, and regulatory requirements will be essential, as will participating in security audits and assessments to ensure compliance with cybersecurity frameworks.#
** About You
** Our mission is driven by an unyielding commitment to advancing space-based technology in service of our customers and safeguarding national security. We seek individuals who are passionate about innovating beyond boundaries and relentlessly pursuing solutions that protect, preserve and empower – to join us in this critical mission.
We’re looking for team members who align with our values, mission and goals – while also meeting the minimum qualifications below. The preferred qualifications are a bonus, not a requirement.##
Minimum Qualifications:
* Requires Bachelor's degree in a related field (or equivalent work experience in lieu of degree).
* Typically entry-level 0 - 2 years of experience.
* Certifications:
(1 or more required) Network+, A+ Certified Ethical Hacker, SANS (Sys Admin, Audit, Network and Security) level 100 courses or similar.
* Knowledge of computer networking concepts, protocols, and network security methodologies.
* Knowledge of cybersecurity and privacy principles.
* Knowledge of cyber threats and vulnerabilities.
* Knowledge of audit and logging techniques.
* Knowledge of structure, architectures, designs, and cybersecurity technologies used in modern communication…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×