X
This feature is available to paying subscribers. Click here to learn about our subscription plans.

Employers of Cyber Security majors in CO

Information Security Analysts
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.

Computer Network Architects
Design and implement computer and information networks, such as local area networks (LAN), wide area networks (WAN), intranets, extranets, and other data communications networks. Perform network modeling, analysis, and planning. May also design network and computer security measures. May research and recommend network and data communications hardware and software.

Database Administrators
Administer, test, and implement computer databases, applying knowledge of database management systems. Coordinate changes to computer databases. May plan, coordinate, and implement security measures to safeguard computer databases.

Displaying 1 - 50 of 78 companies
X
This feature is available to paying subscribers. Click here to learn about our subscription plans.
Career Wiki
X
This feature is available to paying subscribers. Click here to learn about our subscription plans.
Company City State
Cisco Systems, Inc.
Cisco Systems
Northrop Grumman Space & Mission Systems Corp.
Cisco Systems, Inc.
Cisco Systems
Cisco Systems, Inc.
Cisco Systems
Qwest Security Response Center
Science Applications International Corporation
Saic
Science Applications International Corporation
Saic
Freewave Technologies, Inc.
Freewave
Jones Cyber Solutions Ltd
Cyber Sound & Security, Inc.
Cyber Sound
Specialized Security Services, Inc.
Northrop Grumman Corporation
Owl Cybersecurity, LLC
Freewave Holdings, Inc.
Freewave
Cyber Global Risk Exchange, Inc.
Cybergrx
Northrop Grumman Systems Corporation
Standarduser Cyber Security
Standarduser
Cisco Systems, Inc.
Cisco Systems
Phoenix Recycling, LLC
Phoenix Data Protection
Relevant Security Corp.
Cyber Resilience Institute
Forensic Pursuit LLC
Cyber Reality, Inc.
General Dynamics Information Technology, Inc.
Assured Information Security, Inc.
Mantech International Corporation
Global Cyber Access Inc
Alpha Security
Northrop Grumman Systems Corporation
Caci Nss, Inc.
Stratis
Colorado Computer Forensics
Peak Security, Inc.
Peaksec
Science Applications International Corporation
Check Point Software Technologies, Inc.
Trofi Security, LLC
Rent-A-Hacker
Systems Security Services
Cyber Fuzion LLC
Wachsam Cybersecurity Inc
Phoenix Data Protection
Matrix Security, Inc.
Sourcefire LLC
Forensic Animations LLC
Scott Henning
Credant
Cyberactive Security, LLC
Sequoia Cyber Solutions, Inc.
Cyber Infosec Associates, LLC
R.I.P. Reliance International Protection Inc.
Sentient Cyber, LLC
Cyber Security Services, Inc
Martinez Data Protection Consulting Inc
Cyber Torque, LLC
Displaying 1 - 50 of 78 companies
X
This feature is available to paying subscribers. Click here to learn about our subscription plans.