Top Drawer module

Publish up to six modules in this position with 6-columns layout. Choose from 6 module styles. Add icons and badges too using the Warp framework module settings!


Top Drawer module

Publish up to six modules in this position with 6-columns layout. Choose from 6 module styles. Add icons and badges too using the Warp framework module settings!

Mentoring Program

The Denver ISSA Chapter is excited to announce the launch of a new mentorship program! The program is designed to formalize relationships between more senior professional individuals in the chapter (Mentors) and security professionals seeking to learn from these people to gain skills or further their career (Mentees). 

How do I sign up?

You can find the application and expectations for the program below.  A couple of things to note:

- To be a Mentee you have to be a current Denver ISSA chapter member!  Non-members are encouraged to join in order to take advantage of this great career opportunity.  

- Mentor/Mentee matches are made based on several factors including goals, geographic location and experience. Because we aim to make the best possible matches based on several criteria we cannot guarantee that everyone will be matched.

Why should I become a mentor?

  • Contribute to the professional development of the future workforce;
  • Help build stronger community fabric;
  • Impart the principles of an experienced security professional;
  • Gain a broader view of your own community; and
  • Give something back to the profession!

Why should I become a mentee?

  • Explore the world of work through interaction with professionals in the career of their choice;
  • Gain an experienced practitioner's perspective on applying concepts to real-life situations;
  • Familiarize yourself with success in a corporate environment;
  • Identify long-term professional development goals;
  • Grow as an information security professional; 
  • Gain the capacity to translate values and strategies into productive actions; 
  • Increase career development opportunities.

I’d like some more details on how the program will work and what is expected. Where can I find out more?

We’ve created a document outlining the expectations for Mentors and Mentees which you can find HERE. You can also submit questions to This email address is being protected from spambots. You need JavaScript enabled to view it.

We look forward to your participation!

Mentoring Program

First Name(*)

Last Name(*)
Invalid Input

Invalid email address.

Phone Number(*)
Invalid Input

What role are you interested in becoming involved in?(*)
Invalid Input

Please enter your ISSA Membership ID Number(*)
Invalid Input

If you are not an ISSA member, please enter N/A

Location or City:(*)
Invalid Input

Current Job Title or Role(*)
Invalid Input

Organization (if applicable)
Invalid Input

Brief Work, Internship, Volunteer Experience(*)
Invalid Input

How many years of experience do you have in the Information Security Industry?(*)
Invalid Input

Professional Certifications/Memberships Held (if applicable):
Invalid Input

College/University Attended:
Invalid Input

Degree Major(*)
Invalid Input

If still a student, what is your year in school:
Invalid Input

Expected Graduation Date
Invalid Input

Why do you want to participate in the Mentoring Program?(*)
Invalid Input

Select the security domains you are either have experience in (as a mentor) or express interest in (as a mentee):(*)
Invalid Input

What is the best time you can be reached?(*)
Invalid Input

Invalid Input

Thank You

Thank you for your submission. Your position will be posted to the blog section on the chapter website. If we have any questions, one of our staff members will contact you.

Job Opportunities

Career growth and advancement is important to everyone. The ISSA Denver Chapter provides a forum to connect job seekers and hiring companies or managers. If you are a hiring company or manager, please use the form below to submit your information to be advertised to the ISSA Denver Chapter audience. For job seekers, the opportunities will be posted to our Blog as they are received.

If you want to have face-to-face interactions with job seekers or hiring managers, please attend one of our events. Nametags are provided for events and attendees can choose to identify themselves as either hiring or looking. Job seekers put a green sticker on their nametag and those hiring put a blue sticker on their nametag. This allows a personal interaction to connect people together.

If you are an employer who would like to post a position to the website then submit contact information, position, link, location:

Please type your full name.

Phone Number
Invalid Input

Invalid email address.

Job Position
Invalid Input

Job Location
Invalid Input

Links for additional info
Invalid Input

Invalid Input

Invalid Input


Posted June 6, 2018


Position:  IT Compliance Lead

Company:  Keysight Technologies

Location:  Colorado Springs, CO

Position:  IT Compliance Lead

Job link:

Job Description

Keysight is the world’s leading electronic measurement company, helping scientists and engineers address their toughest technical challenges with confidence through innovations in wireless, modular, and software solutions. Our employees leverage their insight and passion to deliver measurement solutions in wireless communications, aerospace and defense, and semiconductor markets with world-class platforms, software and consistent measurement science.

This position will directly support the Information Compliance Operation Manager and be primarily responsible for leading multiple compliance programs and operation projects. The IT Compliance Lead will apply previously acquired auditing, compliance, project management, analytical, policy writing, diplomatic, and communication skills to immediately add value to the CISO’s Information Security and Compliance (ISC) organization.  Essential duties include, but not limited to:

·       Plan establish, execute, and own multiple compliance validation programs, including NIST800-171, ISO27001, and SOC1/2, to ensure on-going compliance.

·       Front-end internal and external audits for the IT organizations; provide leadership, ensure audit and operation readiness, interpret audit and compliance requirements, drive remediation to closure, and report to management.

·       Assess complex risks and control performance, identify and close gaps leveraging technologies and automated tools, and drive remediation.

·       Collaborate with operation to overcome compliance and security obstacles and timely remediate findings.

·       Influence policy writing based on changing regulatory requirements and best practices

·       Develop and maintain an ongoing advisory relationship and provide compliance and security consultation

·       Participate as a team member or leader on own projects.

·       Possesses relevant professional knowledge and technical skills to be effective with compliance functions and keep up with current developments and trends in areas of expertise.

·       Occasional travel to execute audits and to attend internal meetings

 Job Qualifications

·       BA/BS in Technology, Information Systems, IT Audit or related field of study

·       7+ years of IT compliance, IT audit, IT control assessment or IT governance experience

·       Proficient knowledge in IT General Controls (ITGC)

·       Strong presentation, negotiation, and documentation skills

·       Compliance or security certifications (e.g. CISA, CISM, CISSP, or ISO/IEC 27001 Lead Auditor certification).

·       NIST/ISO27001/SOC assessor experience

·       Control automation experience


Privacy Statement 

***Keysight is an Equal Opportunity Employer.***


Keysight Technologies Inc. is an equal opportunity employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability or any other protected categories under all applicable laws.


Posted June 6, 2018

Job Position : Information Security Administrator

Job Location : Denver, CO

Links for additional info :

Position: Information Security Administrator 
FTE/Direct Hire- downtown Denver, CO 

POSITION OBJECTIVE: Responsible for the security and operations of data network and information systems. This includes monitoring, detecting, and remediating threats. Expected to provide subject matter expert level of service to address the confidentiality, integrity and availability to the daily operation of Client’s network. 

ESSENTIAL FUNCTIONS: Maintains security and network devices throughout the enterprise. This includes monitoring, training, security, troubleshooting, and scheduling of new installations. Perform incident response and remediation for information security threats and events. Perform forensic analysis of computer systems for both intrusion detection and computer misuse. Significant experience with network firewalls and intrusion prevention systems. Maintain and configure network management systems. Installs equipment on-site, testing system for functionality with all necessary software applications. Maintain and operate servers in a hypervisor environment. Familiarity with scripting languages and system administration. Train personnel on information security risks and threats. Write and update technical documentation to describe information security procedures. Keep abreast of changing information security threats and risks. Helps to optimize network performance by researching and recommending enhancements to capabilities and performance. Resolve all reported trouble tickets. Off-Shift and on-call as required outside of normal business hours to include nights and weekends potentially. Other duties as assigned. 

SSCP or CISSP certification preferred but not required. 

EDUCATION & EXPERIENCE Bachelor’s degree is required. Four years of general information technology support experience. Two years of information security and incident response service experience. Experience with Python and other log and reporting programming languages. Experience serving as the subject matter expert for information security. 


Posted  May 15, 2018

 Job Opening:  Information Security Analyst III  -- Denver Health

POC:  Randall Frietzsche 


We're hiring!  Denver Health is hiring an IS Security Analyst III.  This role is a key part of our Information Security team, bringing broad experience and utilizing a great set of layered security controls to secure this amazing organization.  Our hospital is a critical part of the community, and it is truly an honor to be part of the team that protects the organization, patient data and technical infrastructure!

If you enjoy being involved in many different initiatives, getting to work with some really cool security tech, and wearing many different hats, this job might be for you - check it out!

The IS Security Analyst III is responsible for multiple day-to-day security tasks and various information security projects as part of supporting the organization’s information security needs. Day-to-day tasks include incident response, evaluation of requests for security changes, and monitoring of various security devices and audit logs. Responsibilities also involve providing ongoing support and advice to IT staff and end users on a variety of security issues, and ensuring that Denver Health’s security policy and procedures are adhered to.

Education and Experience 
1. Bachelor’s degree required.
2. Four years related experience.

Knowledge, Skills and Abilities
1. Familiarity with regulations and compliance issues related to organization and technology. 
2. Ability to understand multiple requirements across systems, users, and workflow. 
3. Ability to communicate with technical and non-technical people across the organization.
Computers and Technology
1. Familiarity with general networking concepts.
2. Strong Understanding of Microsoft Windows Operating Systems.
3. Familiarity with Linux operating systems.
4. Working knowledge of Web Security Solutions.
5. Working knowledge E-Mail Security Solutions.
6. Working knowledge of Security Incident Event Management (SIEM) systems.
7. Working knowledge of Vulnerability Management.
8. Familiarity of overall security architecture standards.

Certificates, Licenses and Registration
1. Either Certified Information System Security Professional (CISSP) or Global Information Assurance Certifications (GIAC) required.

Supervisory Responsibilities 
This position has no supervisory responsibilities

All job applicants for safety-sensitive positions must pass a pre-employment drug test, once a conditional offer of employment has been made.

Denver Health is an integrated, efficient, high-quality academic health care system that is considered a model for the nation. The Denver Health system includes the Rocky Mountain Regional Level I Trauma Center, a 525-bed acute care medical center, Denver’s 911 emergency medical response system, 8 family health centers, 15 school-based health centers, the Rocky Mountain Poison and Drug Center, the Denver Public Health Department, an HMO, and The Denver Health Foundation.

As Colorado’s primary safety net institution, Denver Health is a mission-driven organization that has provided more than $3.3 billion in care for the uninsured in the last ten years. Denver Health is a leader in performance and quality improvements and remains financially secure, in part, due to its nationally recognized implementation of lean principles in healthcare. Denver Health is a major resource to the community, serving approximately 185,000 individuals and 67,000 children a year.

Located just south of downtown Denver, Denver Health is just minutes away from many of the cultural and recreational activities Denver has to offer.

We strongly support diversity in the workforce and Denver Health is an equal opportunity employer (EOE).


“Denver Health is committed to provide equal treatment and equal employment opportunities to all applicants and employees. Denver Health is an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, and basis of disability or any other federal, state or local protected class.”


Posted  May 14, 2018

Job Opening:  Information Security Manager, Compliance  -- Western Union (Englewood, CO)

POC:  David Kaczmarczyk

Recruiter | North American Talent Acquisition

Brookfield, WI 53005, U.S.A.

Career Center: +1 844.216.3455

Direct: +1 262.439.1719

Mobile: +1 720.893.0250 Find me on LinkedIn


Job URL:

Western Union is changing. Yes, we’re the company that moves money around the world quickly and reliably in 200 countries and territories. We are also present in over 510,000 locations bringing immense distribution convenience to our consumers. But we’re on the cusp of becoming much more than that. Our vision is to be the preferred financial services provider for the underserved – billions of people and businesses with unmet financial service needs. That means aggressively pursuing digital, mobile, ATM/kiosk and stored value card strategies that meet the needs of today’s global consumers and businesses. So if you’re looking for a company on the move – and truly one of the most diverse work environments on the planet – then Western Union could be for you.

Right now, we are seeking an Information Security Manager, Compliance based at our Global Headquarters in Englewood, Colorado. 

As an Information Security Manager, you will lead Domestic and International regulatory examinations with a team of Information Security Analysts to meet Western Union’s commitment to security governance.  On a day-to-day basis, you will be managing activities of the team, including research, analysis and documentation, testing security controls, training, status reporting, and client support. Would you like the opportunity to build a world-class information security team?

Sound interesting? Here are some specifics:

  • Demonstrate experience with compliance management of laws and regulations Demonstrate knowledge of a broad range of risk management concepts to include; Risk Assessment / Auditing Methodologies and Approaches, Information Security Policies and Procedures, PCI Standards, ISO 2700x Standards Legal, Regulatory, Compliance mandates
  • Demonstrate knowledge of a broad range of technology / security concepts
  • Lead Regulatory examinations on IT and information security and compliance through interviews with government examiners, required exam documents, clarification of issues, coordinated meetings with internal SMEs, and development of action plans and management responses
  • Design and prepare work papers and customized reports responding to assessment / audit assignments in accordance with defined standards

What you will need to succeed: 

·         Experience running and managing regulatory assessments for a company with significant regulatory requirements

·         Substantial Information Security experience, coupled with leadership and management skills

·         Risk management experience, including developing and deploying remediation actions

·         Knowledge of a broad range of technology / security concepts

·         Knowledge of a broad range of risk assessment / management concepts for example Risk Assessment / Auditing Methodologies and Approaches to Information Security Policies, Standards and Procedures, PCI and HIPAA Standards, ISO 2700x Standards, Regulatory, Compliance mandates

·         Bachelor’s Degree or Master's Degree and/or technical certifications are preferred

·         Strong verbal and written communication skills including fluency in English is required

CISA certification preferred or the ability to obtain within 6 months of hire

 What it’s like here:

Western Union (WU) is a company on the move! We believe that when money moves, better things can happen. From small businesses and global corporations, to families near and far, or NGO’s in the most remote communities on Earth, WU helps people and business move money globally. We have a rich legacy of innovation, and are continuing to develop new and more convenient ways for our customers to send and receive money through digital, mobile and retail channels. We have a combined digital and retail network that spans over 200 countries and territories. Some companies specialize in cash-based retail money transfer and others play only in digital. We are leaders in both!

Being on the Western Union team means being tenacious and goal-oriented. It means taking risks and quickly finding the path to success. It means having integrity, and finding ways to make things work. It means thriving as part of a diverse, global team of over 10,000 people who are committed to moving money for better. It means being driven to win, and to do work that makes a difference… on a global stage. Sound like you? Apply now!

Inclusion and diversity are fundamental to our culture and success. Achieving our common vision depends on people with diverse backgrounds working together. Who knows; your unique point of view could be the key to our next groundbreaking idea. We’d love to explore that possibility!

Western Union is proud to be an Equal Opportunity-Affirmative Action Employer. We are committed to equal employment opportunity regardless of race, color, religion, sex (including pregnancy or related medical conditions), national origin, veteran status, sexual orientation, gender identity, age, disability, marital status or other protected category.  


Posted  March 28, 2018

Job Position : Security Architect

Job Location : Broomfield, CO

Links for additional info :

Comment : Security Architect
Broomfield, CO, USAFull-time

Company Description
Conga’s suite of solutions creates more efficient organizations by simplifying and automating data, documents, contracts and reporting. As the provider of the #1 paid application on the Salesforce AppExchange, we have more than a decade of experience increasing the value of the Sales Cloud by removing systems and process pain points that impede the customer lifecycle. Our 8000+ customers are passionate about our platform and support giving us 5 stars on the Salesforce AppExchange.

Conga offers a fast-paced, dynamic environment for professionals looking to help build and enhance a seamless customer experience. Our top of the line product suite, dedicated employees, and proven leadership team provide a solid foundation to support our continued growth and success. We offer competitive compensation and benefits, including 100% paid health insurance for employees, 401k plan, generous PTO schedule, and lots of additional perks!

Job Description
The Security Architect will contribute to the organization by providing expertise in the architecture and design of security infrastructure as well as work closely with partner teams to integrate best security practices in the development of applications and infrastructure at a dynamic and rapidly growing company in the Salesforce marketplace with a core of the operations within Amazon Web Services (AWS). This individual is responsible for designing and implementing a world-class information security program to protect their customer's information further distinguishing itself in the competitive landscape.

In addition to designing and implementing the customer-facing security program, this position will work closely with internal teams to ensure the secure design of all internal applications, infrastructure, and security toolsets.


Acquire a complete understanding of a company’s technology and information systems
Foster a security-centric and consultative relationship with the business, DevOps, developers, and product teams
Design, build and implement enterprise-class security systems for a production environment
Align standards, frameworks, and security with overall business, technology strategy and regulatory compliance. Consulting and engineering in the development and design of security best practices and implementation of solid security principles across the organization, to meet business goals along with customer and regulatory requirements
Security considerations of cloud computing: They include serverless environments, data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DDoS attacks
Align standards, frameworks, and security with overall business and technology strategy
Analyze potential impact of new threats and exploits, develop and implement solutions to mitigate those threats, and communicate risks to relevant business units
Consults on projects with regard to security architecture and risk management, including cloud environments, application, and data security as well as on emerging technologies
Create solutions that balance business requirements with information and cyber security requirements
Identify security design gaps in existing and proposed architectures and recommend changes or enhancements

Bachelor’s degree in Computer Science or equivalent work experience, Master’s degree or advanced related certifications preferred
10+ years of progressive experience in Information Technology, experience in SaaS industry strongly preferred
Minimum of 5 years of information security program implementation and management
Proven ability to implement security compliance programs with direct or indirect staff
Experience with cloud-based technologies and services
Knowledge and experience with IP networking, firewalls, intrusion detection systems
Experience with designing secure AWS solutions a plus
Experience with development and coding a plus
Experience with encryption at rest standards via general EKMS services as well as AWS KMS
Exceptional communication skills with the ability to convey complex technical solutions to stakeholders with differing levels of technical expertise
Ability to communicate architecture and security controls to potential, new, and existing customers with differing levels of technical expertise
Ability to work well in cross-functional teams, including software engineers, marketing, account management, sales operations with the ability to provide solutions and incorporate constructive feedback
Ability to multi-task and thrive in a fast-paced, customer driven environment
Additional Information
All your information will be kept confidential according to EEO guidelines.

POC Info:

Name : Caitlin Eldridge

Phone Number : 720-316-6469

E-mail : This email address is being protected from spambots. You need JavaScript enabled to view it.








Be A Speaker

The ISSA Denver Chapter has monthly chapter meetings, a conference, and several full-day trainings each year. Every one of those events needs at least one speaker to present on a vendor-neutral topic. Our chapter members and event attendees are diverse so we are looking for topics in many areas including Information Security, Information Risk Management, IT Auditing, and other related topics. The content could focus on a technical, management, executive, or a combined level audience. Monthly chapter meeting presentations should be between 60 and 90 minutes, conference sessions should be 60 minutes, and full-day trainings should have 6 to 8 hours of content.

If you are interested in speaking, please fill out this form.

Be A Volunteer

ISSA is a volunteer based organization and it thrives on having a large pool of volunteers to help get chapter business done. Volunteering not only helps the chapter but helps volunteers build new contacts, build new skills, and may earn CPE credits. If you are interested in becoming a volunteer, please review the volunteer opportunities and use the form at the bottom of this page to submit your information.

Membership Committee

Our members are what drive our organization. The membership committee is tasked with reaching out to new members to welcome them to chapter, speaking with current members to learn how to best meet their needs, and to reach out to expiring or expired members to encourage them to continue their membership. If you are a people person (or want an excuse to get better skills in this area), this is perfect for you.

Programs Committee

Programs are how we deliver our educational content to our members and guests. The program committee is charged with helping to recruit speakers, find venues for events, and managing the operational aspects of running our programs. Members of the program committee should be able to regularly attend ISSA Denver Chapter programs in Denver, DTC, Boulder, or multiple locations.

Social Committee

Networking with peers is one the great benefits of being an ISSA member. The social committee organizes happy hours, mixers, and other social events. These events are usually held in the evening but creative committee members may want to stage breakfasts, nights out, or weekend events. If you are a social person or like planning social events, this committee is for you. Committee members should be able to regularly attend ISSA Denver Chapter social events in Denver, DTC, Boulder, or other locations of social events.

Educational Outreach Committee

Interfacing with students is a strategic goal of ISSA. Educational Outreach Committee members are the interface to local educational institutions and their students. There are several institutions that are partners with the ISSA Denver Chapter but committee members will be reaching out to many high school, undergraduate, and graduate level programs. If you are interested in education and helping the next generation of security professionals, then the Educational Outreach Committee is for you.

Mentoring Program Committee

The Denver ISSA Chapter is excited to announce the launch of a new mentorship program! The program is designed to formalize relationships between more senior professional individuals in the chapter (Mentors) and security professionals seeking to learn from these people to gain skills or further their career (Mentees). Since 2016 is the pilot year for this program for our chapter we need your participation to make it successful! Click Here for more information.

Please type your full name.

Phone Number
Invalid Input

Invalid email address.

Desired Volunteer Position
Invalid Input

Invalid Input

Invalid Input


Sign up to receive news
about our upcoming events


Recent Posts

View recent blog posts about
industry trends and events

View Blog