What are the responsibilities and job description for the Cybersecurity and IT Operations Analyst position at Piper Companies?
Zachary Piper Solutions is seeking an Cybersecurity & IT Lead in Denver, CO
Responsibilities of the Cybersecurity & IT Lead include :
- IT Infrastructure Management : Administer and maintain company-wide IT systems (laptops, servers, network devices, cloud services, digital collaboration tools).
- User Access & Device Management : Configure, deploy, and maintain MAC OS laptops, software tools, and cloud accounts for remote and hybrid employees.
- System Monitoring & Incident Management : Monitor and troubleshoot internal IT systems to ensure availability, security, and performance.
- Office Network & Security : Ensure the office network is secure, Set up firewalls and VPNs, Manage local backups for business continuity.
- Compliance Management & Security Controls Implementation : Collaborate with the Information Systems Security Manager to implement and enforce cybersecurity measures in line with NIST controls. Ensure ongoing compliance with federal security standards (CMMC, FedRAMP, SOC 2, etc.).
- Endpoint Security : Oversee the deployment and maintenance of endpoint security solutions (antivirus, EDR, MDM).
- Security Monitoring : Deploy and monitor intrusion detection systems (IDS), security information and event management (SIEM), and other tools.
- COMSEC Equipment Management : Manage COMSEC equipment (inventory control, technical support, security procedures, user training).
Qualifications for the Cybersecurity & IT Lead include :
Compensation for the Cybersecurity & IT Lead include :
This job opens for applications on 2 / 10 / 25. Applications for this job will be accepted for at least 30 days from the posting date
Keywords : IT systems, laptops, servers, network devices, cloud services, digital collaboration tools, MAC OS laptops, software tools, cloud accounts, remote employees, hybrid employees, system monitoring, troubleshooting, availability, security, performance, office network, network security, firewalls, VPNs, local backups, business continuity, cybersecurity measures, NIST controls, federal security standards, CMMC, FedRAMP, SOC 2, endpoint security solutions, antivirus, EDR, MDM, intrusion detection systems (IDS), security information and event management (SIEM), COMSEC equipment, inventory control, technical support, security procedures, user training