Post job

Cyber Security Analyst jobs in Berkeley, CA

- 379 Jobs
All
Cyber Security Analyst
Information Security Analyst
Securities Research Analyst
Security Engineer
Securities Analyst
Data Security Analyst
Senior Cyber Security Analyst
  • Security BI Analyst

    Catapult Solutions Group

    Cyber Security Analyst job 7 miles from Berkeley

    Sr. Security Business Intelligence Analyst Hybrid | Oakland, CA Contract | 12 Months About our client Our client is a leading global technology services provider helping some of the world's most innovative organizations accelerate digital transformation. With a strong presence across multiple continents and a commitment to security, infrastructure, and advanced analytics, the company partners with Fortune 500 enterprises to solve critical business challenges. Known for their values of innovation, collaboration, and delivering customer-first outcomes, they maintain a dynamic and inclusive workplace that fosters growth and learning. Job Description We're looking for a Sr Analyst to support enterprise-wide security risk reduction initiatives. You'll be responsible for building performance dashboards, analyzing risk trends, and creating visual reports to help leaders make informed decisions. You'll be collaborating closely with internal security teams, enterprise risk stakeholders, and cross-functional groups to quantify and present risk data effectively. Duties & Responsibilities Build dashboards, balanced scorecards, and analytics to measure security performance Conduct data analysis from concept to delivery, presenting findings to senior leadership Collaborate with internal security, IT risk, and compliance teams Maintain and update playbooks, standards, and procedures for risk reduction Develop and communicate analytical insights clearly and concisely Gather and validate data from multiple sources for accuracy and effectiveness Identify opportunities to enhance data processes and sources Create training materials and assist in educating business partners Support operational and project review reporting Quantify and communicate risk reduction trends Required Skills/Experience 4+ years of experience in data analysis or a related role. Proven ability to manage complex data projects independently Strong proficiency in Power BI, Excel, PowerPoint, and Teams Experience with Power Automate, PowerApps, and SharePoint Exceptional communication and presentation skills Strong organizational and time management skills Demonstrated ability to work cross-functionally and build relationships Understanding of business intelligence, KPIs, and risk quantification Comfortable working in a hybrid environment with occasional Bay Area travel Nice to have Master's degree or professional certifications (Lean Six Sigma, security certs) Experience in enterprise risk quantification Familiarity with AI/LLM tools or automation techniques Knowledge of Lean processes or continuous improvement strategies Programming skills or experience with analytics platforms Education Bachelor's degree in Data Analytics, Computer Science, Engineering, Mathematics, Statistics, or a related field Apply now to help shape the future of enterprise security! Risk & Compliance | Data Analytics | PowerBI | Security | Lean Six Sigma | Business Intelligence | Hybrid
    $90k-135k yearly est. 16d ago
  • Application Security Engineer

    Perplexity Ai

    Cyber Security Analyst job 11 miles from Berkeley

    Job Description Perplexity is an AI-powered answer engine founded in December 2022 and growing rapidly as one of the world's leading AI platforms. Perplexity has raised over $1B in venture investment from some of the world's most visionary and successful leaders, including Elad Gil, Daniel Gross, Jeff Bezos, Accel, IVP, NEA, NVIDIA, Samsung, and many more. Our objective is to build accurate, trustworthy AI that powers decision-making for people and assistive AI wherever decisions are being made. Throughout human history, change and innovation have always been driven by curious people. Today, curious people use Perplexity to answer more than 780 million queries every month–a number that's growing rapidly for one simple reason: everyone can be curious. Perplexity is seeking a highly skilled, experienced and hands-on Application Security Engineer to join our dynamic security team, revolutionizing the way people search and interact with the internet. You'll build the systems, tools, and processes that make security seamless for developers and strong by default, enabling rapid innovation while protecting our users at scale. Responsibilities Design and implement scalable, developer-friendly security solutions that integrate directly into engineering workflows Lead threat modeling, design reviews, and code reviews for new features and major product launches Build and evolve secure-by-default frameworks for authentication, authorization, input validation, and secrets management Develop and integrate automated security tooling into CI/CD pipelines (e.g., linters, dependency scanners, policy enforcement) Collaborate with product and engineering teams to remediate vulnerabilities, and contribute to incident response and postmortems Own, manage, and improve our third-party penetration testing engagements and bug bounty program, working closely with external security researchers to identify and resolve vulnerabilities Stay current on emerging threats and attack techniques, and drive ongoing maturity of our application security posture Qualifications 8+ years of experience in Application Security, Product Security, or similar roles Deep understanding of secure software development practices, threat modeling, and common vulnerabilities (e.g., OWASP Top 10) Familiarity with modern authentication and authorization patterns (OAuth, OIDC, SSO, Zero Trust) Proven track record of building secure infrastructure, reusable libraries, or developer tooling Proficiency with at least one major programming language (e.g., Python, Go, JavaScript, Java) Bonus: Experience with securing cloud infrastructure or AI/ML systems The cash compensation range for this role is $200,000 - $280,000. Final offer amounts are determined by multiple factors, including, experience and expertise, and may vary from the amounts listed above. Equity: In addition to the base salary, equity may be part of the total compensation package. Benefits: Comprehensive health, dental, and vision insurance for you and your dependents. Includes a 401(k) plan.
    $200k-280k yearly 7d ago
  • Lead Security Engineer, Bridge

    Monograph

    Cyber Security Analyst job 11 miles from Berkeley

    Who we are About Bridge Bridge is Stripe's fintech innovation hub focused on building a modern, stablecoin-powered cross-border payments network. We operate like a startup within Stripe: fast-paced, entrepreneurial, and product-obsessed, but with the backing of one of the most trusted names in fintech. About the team We're hiring our Lead Security Engineer to build and scale Bridge's security foundation. This is a rare opportunity to design a security program from the ground up, while also leveraging the infrastructure, best practices, and tooling of one of the most mature security organizations in the industry. What you'll do Design, own, and implement Bridge's security roadmap from first principles to production. Identify and tackle Bridge's most important security risks quickly and pragmatically. Integrate with Stripe's infrastructure where it makes sense, and find custom solutions where it doesn't. Lead threat modeling and hardening efforts for Bridge's money movement systems in collaboration with crypto and infra teams. Build key security capabilities (monitoring, secrets management, incident response, access controls, CI/CD hardening, etc). Reinforce engineering best practices around secure development and infrastructure. Ensure Bridge meets compliance and audit expectations as we scale to more regulated markets. Collaborate cross-functionally with engineering, product, and Stripe's security org to move fast without compromising safety. Minimum requirements Have 8+ years of experience in Security engineering, ideally with time spent in fast-paced startup environments where you've built security practices from the ground up. Have a startup mindset: you're scrappy, pragmatic, and move quickly to solve the most critical problems. Are comfortable writing and debugging backend application code (Ruby is a plus, but not required). Thrive in ambiguity and know how to ruthlessly prioritize. Can balance security rigor with speed, especially in fast-moving environments. Communicate clearly across technical and non-technical partners. Have experience building or scaling security programs, either at a startup or in an embedded role. Are excited about the potential of crypto and stablecoins to power global financial infrastructure (you don't need deep prior knowledge-just curiosity and openness to learn). Office-assigned Stripes spend at least 50% of the time in a given month in their local office or with users. This hits a balance between bringing people together for in-person collaboration and learning from each other, while supporting flexibility about how to do this in a way that makes sense for individuals and their teams. The annual US base salary range for this role is $224,000 - $336,000. For sales roles, the range provided is the role's On Target Earnings ("OTE") range, meaning that the range includes both the sales commissions/sales bonuses target and annual base salary for the role. This salary range may be inclusive of several career levels at Stripe and will be narrowed during the interview process based on a number of factors, including the candidate's experience, qualifications, and location. Applicants interested in this role and who are not located in the US may request the annual salary range for their location during the interview process. Additional benefits for this role may include: equity, company bonus or sales commissions/bonuses; 401(k) plan; medical, dental, and vision benefits; and wellness stipends. Office locations San Francisco Bridge HQ Team Money Movement and Storage Job type Full time Apply for this role #J-18808-Ljbffr
    $224k-336k yearly 21d ago
  • Security Engineer, Lead

    Dimensioncap.com

    Cyber Security Analyst job 11 miles from Berkeley

    About Chai Discovery Chai Discovery is re-architecting drug discovery by building frontier AI foundation models to design molecules. The founding Chai team has brought together the leading researchers in this space, with seminal research accomplishments at top AI labs. The team has led AI-for-biology programs at premier labs, co-invented protein language modelling, built state-of-the-art folding algorithms, and sold AI adopted by top-10 pharma companies. The company is backed by top-tier investors, including OpenAI, Thrive Capital, Dimension, Conviction, Lachy Groom, Amplify, and many more. We're looking to add a few members to our team of scientists and engineers, who obsess over creating the most powerful AI models for antibody discovery, and turning them into products that can transform how medicines are made. About the role As a Security Engineer, you will serve as the technical and strategic driver for the company's security posture. In this landscape, security is a top priority and your mission is to build the security backbone that protects the data and models driving tomorrow's life-saving therapies - every control you design helps turn breakthrough science into medicines for millions. You will lead a small but growing team of security engineers, partnering with product and infrastructure groups to design, implement, and continuously improve secure‑by‑design solutions that scale. You design, deploy, and operate detection & response capabilities and serve as incident commander for high‑severity security incidents, coordinating investigation, containment, and remediation. At Chai, we're entering a pivotal stage. After years of foundational R&D, our models are moving beyond protein structure prediction and into real-world therapeutic engineering. We're now tasking our AI models on a broad spectrum of drug development challenges, at an exciting scale of wet-lab validation. This is not a typical role - it's a chance to push the boundaries of drug discovery by building some of the most advanced AI drug design models ever built. About you We're looking for a builder-mindset security leader who wants to set the gold standard for protecting AI-driven drug discovery. You should have: Significant security experience: 8+ years of progressive experience in information security, with at least 2 years leading or managing engineering teams Demonstrated expertise in cloud security (AWS, GCP, or Azure) and container security (Docker/Kubernetes) Hands‑on experience building and operating detection & response pipelines and handling incidents end‑to‑end Deep understanding of network protocols, authentication, encryption, and modern zero‑trust architectures Familiarity with compliance and risk frameworks (SOC 2, ISO 27001, PCI‑DSS) and ability to translate requirements into technical controls Technical leadership: Can architect and enforce zero‑trust network segmentation, IAM policies, and least‑privilege access Proven ability to define a security-engineering roadmap that balances R&D velocity, compliance, and business risk Track record producing clear security metrics, KPIs, and risk-posture updates for executives and boards Collaboration and mindset: Exceptional verbal and written communication skills Comfortable partnering with DevOps, ML infrastructure, compliance, and legal to embed security in every layer of the stack Ability to lead and mentor a team of security engineers, setting clear objectives and reviewing performance Thrives in fast-moving, high-ambiguity environments where first-principles thinking matters more than checklists What we offer Frontier technology: we're developing the next frontier of AI-driven drug discovery that will fundamentally change how new therapeutics are created. World-class team: opportunity to work with world-renowned leaders in the AI x biology and technology ecosystem who have created some of the most impactful advancements. Highly competitive compensation: we offer highly competitive salary, equity package, and healthcare and wellness benefits. Velocity and ownership: we move incredibly fast, which means continuous learning and career growth opportunities are a guarantee. Every team member owns a significant slice of the roadmap. Strong team culture: Collaborative and supportive startup culture in a small and high-energy team who are guided by our mission to increase the efficiency of creating new medicines and positively impact millions of lives. #J-18808-Ljbffr
    $114k-163k yearly est. 18d ago
  • Security Researcher

    Code Red Partners 4.0company rating

    Cyber Security Analyst job 47 miles from Berkeley

    Join an early-stage startup that's building at the frontier of AI and cybersecurity. They're on a mission to design autonomous security systems capable of detecting, triaging, and remediating software vulnerabilities, all without human intervention! This is a greenfield opportunity to help shape the foundational logic of their product's vulnerability discovery engine. You'd be working shoulder-to-shoulder with a world-class AI team to push the boundaries of what "self-healing software" can look like. Key Responsibilities AI-Driven Security Research: Partner with AI engineers to design and build intelligent systems that autonomously detect code vulnerabilities. Leverage large language models (LLMs), industry-leading security tools, supervised fine-tuning, and reinforcement learning to uncover novel security flaws. Vulnerability Triage and Analysis: Investigate and validate identified vulnerabilities to assess severity, exploitability, and potential impact. Responsible Disclosure: Work with impacted organizations to report vulnerabilities responsibly, adhering to established timelines and industry disclosure standards. Required Qualifications Proven expertise in cybersecurity research and vulnerability analysis. Proficient with static and dynamic code analysis techniques and tools. Hands-on experience in penetration testing or red teaming. Familiarity with machine learning principles and their security applications. Strong communication skills for documenting findings and engaging stakeholders. Practical experience managing responsible disclosure workflows. Preferred Qualifications Programming skills in Python, C/C++, or similar languages. Active participation in bug bounty programs or security challenges. Track record of published security research, CVE contributions, or speaking at security conferences. Deep understanding of secure coding practices across various programming languages.
    $115k-161k yearly est. 5d ago
  • Cyber Security

    Forhyre

    Cyber Security Analyst job 11 miles from Berkeley

    Job Description Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients. Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. Responsibilities: Engineer, implement and monitor security measures for the protection of computer systems, networks and information Develop and implement security policies and controls to support the Cyber Security framework Manage the existing cyber security training program across global, multilingual business Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity Continuous improvement in the areas of Information Security technologies, techniques and processes Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard Ability to interpret penetration test results and describe issues and fixes to non-security expert Responsible for leading an accurate & comprehensive status reporting to the executive steering committee Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap Skills & Experience Bachelor’s degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree. Certified Information Systems Security Professional (CISSP) 8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology. Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment. Vulnerability Assessment testing and/or Penetration Testing (preferred) Robotic Process Automation/Intelligent Automation (preferred) Business case development supporting security technology solutions (preferred) Additional certifications demonstrating cybersecurity/technical mastery (preferred)
    $88k-125k yearly est. 52d ago
  • Cyber Security Analyst

    Bluestone 4.1company rating

    Cyber Security Analyst job 11 miles from Berkeley

    Our client seeking a Cyber Security Operations Analyst to support an operations team that supports a large government customer. The candidate will be relied upon to assist teammates and perform troubleshooting as needed. The candidate should excel in a fast-paced work environment and be willing to face new challenges. Qualifications • Proficiency with vulnerability scanning, remediation and reporting • Knowledge in web application scanning using various tools • Demonstrated proficiency with Windows, UNIX, & LINUX operating systems • Experience working in a customer service information technology environment • Network security and system security experience • Ability to discuss real world troubleshooting; problems and solutions encountered • Knowledge of IT security best practices, US federal government standards, regulations and policy (FedRamp, TIC, NIST 800-37rev1 & 800-53rev3) • Must be motivated and able to work independently • Proven project leadership (PowerPoint presenting, MS Project Planning) • Experience working with change implementation in a controlled environment • Excellent verbal, written communication and technical writing skills Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. 2-5 years of related experience in data security administration. Experience using some of the following tools: o Nessus o Tenable Security Center o Netsparker o WebInspect o BurpSite Additional Information Work with blue Stone recruiting to find your next Cyber Security role. You can find us at ******************************* We look forward to speaking with you.
    $88k-123k yearly est. 38d ago
  • Security Analyst-Cyber Intelligence

    Mindlance 4.6company rating

    Cyber Security Analyst job 11 miles from Berkeley

    Mindlance is a national recruiting company which partners with many of the leading employers across the country. Feel free to check us out at ************************* Hope you are doing fine, Please have a look at the job description and if you are comfortable with the role and responsibilities please revert with your updated resume. Job title:- Threat Intelligence Analyst/Security Analyst Location:- San Francisco CA Duration:- 6- 12 Months Contract Responsibilities: • Differentiate, collect, and evaluate technical and open source data to produce threat intelligence products; • Identify credible, new intelligence and subject matter resources relative to current/emerging threats; • Analyze reports to understand threat campaign techniques and lateral movements and extract indicators of compromise (IOCs). • Manage and maintain threat intelligence platforms and feeds • Conduct research on emerging products, services, protocols, and standards relative to the information security arena Required Qualifications: • 3-5 year's experience performing threat i management operational activities, including threat intelligence gathering and analysis, and threat metrics development and reporting • Experience working with large/multi-national organizations • Demonstrated use of analytic tools and platforms • In-depth knowledge of information security threats Windows and Unix/Linux platforms • The demonstrated ability to work effectively in a collaborative team environment as an individual contributor. • The ability to provide support after normal business hours, as needed. Preferred Qualifications: • Direct experience with Threat intelligence Platform tools • Experience with developing threat intelligence briefings Additional Information Thanks & Regards, Vikrant Thakur ************
    $82k-110k yearly est. 60d+ ago
  • Information Security Analyst, Government Engagement

    Apple Inc. 4.8company rating

    Cyber Security Analyst job 11 miles from Berkeley

    Imagine what you could do here. At Apple, new ideas have a way of becoming great products, services, and customer experiences very quickly. Bring passion and dedication to your job and there's no telling what you can accomplish. Security is woven into the fabric of everything we do. Apple Information Security (AIS) develops services, systems, and tools to mitigate security risks. We empower teams across the company, ensuring they innovate and create with security and privacy as a priority. We are seeking an exceptional individual with a deep passion for information security at the intersection of the public and private sectors. The ideal candidate will possess a strong background in both information security and public policy, along with a proven track record in producing security analysis for diverse audiences. This is a hands-on role that emphasizes engagement, relationships, and expanding the avenues through which AIS safeguards Apple and our customers. Navigating the evolving global geopolitical cybersecurity landscape is not merely a compliance obligation but a strategic imperative.Apple is seeking a security professional to join its newly established Information Security government engagement function. As cybersecurity policy has become an integral component of national and international politics, this individual will be responsible for engaging with internal business units and collaborating with partners to develop new mechanisms that enhance Apple's resilience against threat actors and cybersecurity risks. Trusted partnerships provide the means for engaging in cybersecurity-related public policy, where our objective is to create a more stable and secure ecosystem for Apple's business and customers. This role will work closely with various Apple teams, including government affairs. This work will directly impact our current security operations and future security service endeavors. Through thorough research, we will identify and communicate relevant cybersecurity narratives, context, and security implications to key stakeholders. You will provide context to complex security information, enabling AIS decision makers to be better informed as they shape the security services that empower businesses to succeed, securely. At Apple, people matter, and you will develop a network that facilitates interactions between the information security community, policymakers, and other important entities in the public sector. You will have the opportunity to work on security innovation and processes with global reach.Bachelor's degree in Government, International Affairs, or Information Security, or equivalent practical experience Ability to foster an environment that emphasizes collaboration, relationships, and accountability Experienced working with compliance regulations and standards (NIS2, PCI, CIS) Proficient in developing information security-focused communications Expertise in the communication process and the impact of different inputs and messaging on various audiences Strong project management experience, with the ability to manage multiple priorities simultaneously within deadlines and budgets Persuasive approach and a proven track record of effective collaboration with cross-functional partners Ability to model collaboration across the organization and facilitate open dialogue with a diverse range of contributors and stakeholders Proficiency in influencing without direct authority Array
    $138k-181k yearly est. 60d+ ago
  • Principal Data Security Analyst - Data Classification & Governance

    Okta 4.3company rating

    Cyber Security Analyst job 11 miles from Berkeley

    Get to know Okta Okta is The World's Identity Company. We free everyone to safely use any technology, anywhere, on any device or app. Our flexible and neutral products, Okta Platform and Auth0 Platform, provide secure access, authentication, and automation, placing identity at the core of business security and growth. At Okta, we celebrate a variety of perspectives and experiences. We are not looking for someone who checks every single box - we're looking for lifelong learners and people who can make us better with their unique experiences. Join our team! We're building a world where Identity belongs to you. Role Summary: We seek an experienced and detail-oriented Principal Data Security Analyst to contribute to our strategic Data Classification and Governance Program. In this role, you will be instrumental in the operational execution of our data governance strategy. You will work hands-on with data discovery and classification tools, apply data protection policies, and collaborate extensively with cross-functional teams, including Business Technology (BT), Legal, Data & Insights (D&I), and other Security teams. Your focus will be on implementing and maintaining the data classification framework, supporting the rollout of technical controls, and ensuring that our data handling practices align with our security and compliance objectives. Key Responsibilities: Data Classification & Labeling: Actively participate in data discovery initiatives to identify and inventory sensitive data (PII, SPI, financial, IP, AI training data) across key enterprise systems (e.g., Google Workspace, Salesforce, Workday, NetSuite, Snowflake). Assist in executing pilot programs for data classification on high-priority systems and contribute to refining classification processes. Policy Operationalization & Control Support: Assist data Stewards and system owners in implementing the data classification policy and data handling standards to support their operationalization. Collaborate with BT and Security engineering teams to test and validate the implementation of technical controls (e.g., DLP rules, CASB configurations) based on data classification. Help define and test controls related to sensitive data input into enabled AI tools. Tooling & Process Support: Become proficient in using selected data discovery, classification, and governance tools (potential tools include Varonis, native Google/Snowflake capabilities). Assist with the configuration, including helping to set up scans and reviewing results. Contribute to developing and maintaining documentation for classification procedures and tool usage. Collaboration & Stakeholder Engagement: Work closely with Data Stewards (from D&I and business units) to understand data context, validate classification results, and ensure alignment with business needs. Partner with BT application owners to facilitate classification efforts and implement necessary data handling changes. Support Security GRC by providing data and insights for risk assessments and compliance reporting related to data classification. Monitoring, Reporting & Continuous Improvement: Assist in establishing and tracking key metrics for data classification coverage, accuracy, and the effectiveness of associated controls. Contribute to developing dashboards and reports for program stakeholders and the Data Governance Council. Required Qualifications & Skills: Bachelor's degree in Information Security, Computer Science, Information Systems, or a related field, or equivalent practical experience. 10+ years of experience in data security, governance, IT risk management, or a similar analytical role focusing on data protection. Strong, demonstrable understanding of data classification principles, methodologies, data lifecycle management, and data handling best practices. Hands-on experience with data discovery and/or data classification tools and technologies. Solid understanding of data protection concepts and technologies (e.g., DLP, data masking, tokenization, encryption, IAM). Knowledge of key data privacy regulations (e.g., CCPA, GDPR) and their impact on data handling. Excellent analytical, problem-solving, and critical-thinking skills with meticulous attention to detail. Proven ability to work effectively in a cross-functional team environment and manage multiple tasks. Strong written and verbal communication skills, with the ability to articulate technical concepts to varied audiences. Preferred Qualifications: Experience with specific data governance or classification platforms (e.g., Varonis, OneTrust, Google Cloud DLP, Snowflake Data Classification). Experience implementing or operating data security controls in SaaS environments (e.g., Salesforce, Workday, Google Workspace, M365) and cloud platforms (AWS, Azure, GCP). Familiarity with security considerations for AI/ML systems and data inputs, including knowledge of AI-native solutions for data labeling and classification. Hands-on experience with AI governance principles and frameworks, including implementing controls for responsible AI use. Experience in developing and delivering training or awareness materials. Relevant industry certifications (e.g., CISM, CISSP, CIPP, CDMP, or tool-specific certifications). #LI-BF1 #LI-Hybrid The annual base salary range for this position for candidates located in the San Francisco Bay area is between: $170,000—$254,000 USD Below is the annual base salary range for candidates located in California, Colorado, New York and Washington. Your actual base salary will depend on factors such as your skills, qualifications, experience, and work location. In addition, Okta offers equity (where applicable), bonus, and benefits, including health, dental and vision insurance, 401(k), flexible spending account, and paid leave (including PTO and parental leave) in accordance with our applicable plans and policies. To learn more about our Total Rewards program please visit: **************************** The annual base salary range for this position for candidates located in California (excluding San Francisco Bay Area), Colorado, New York, and Washington is between:$151,000—$227,000 USD What you can look forward to as a Full-Time Okta employee! Amazing Benefits Making Social Impact Developing Talent and Fostering Connection + Community at Okta Okta cultivates a dynamic work environment, providing the best tools, technology and benefits to empower our employees to work productively in a setting that best and uniquely suits their needs. Each organization is unique in the degree of flexibility and mobility in which they work so that all employees are enabled to be their most creative and successful versions of themselves, regardless of where they live. Find your place at Okta today! ************************************** Some roles may require travel to one of our office locations for in-person onboarding. Okta is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, ancestry, marital status, age, physical or mental disability, or status as a protected veteran. We also consider for employment qualified applicants with arrest and convictions records, consistent with applicable laws. If reasonable accommodation is needed to complete any part of the job application, interview process, or onboarding please use this Form to request an accommodation. Okta is committed to complying with applicable data privacy and security laws and regulations. For more information, please see our Privacy Policy at *************************************
    $151k-254k yearly 10d ago
  • Senior Cyber Security Analyst

    Bayside 4.5company rating

    Cyber Security Analyst job 39 miles from Berkeley

    reports to the Cyber Security Manager and is responsible for reviewing and analyzing threat feeds in order to assist in optimizing currently deployed tools/procedures/processes throughout the organization. Analyst must analyze escalated security incidents from linear departments to validate, understand, and create lessons learned to help strengthen the posture of the organization. Analyst must also be able to advise on IT initiatives, IT business projects, and IT engineering in regards to security industry best practice. The analyst must also have a firm understanding of penetration testing and vulnerability assessments. A strong networking background and security certifications are preferred. Qualifications Demonstrate a comprehensive understanding of security processes for installation, management, monitoring and response of enterprise networks In depth experience with Information System Security (ISS), PKI, firewalls, intrusion detection/protection and related vulnerability assessment tools for network periphery and internal network/service discovery and topology mapping Experience working with a Security Operation Center Experience in full life cycle information technology solution implementation from conceptualization, requirements, design and specification through development (coding), integration testing and commissioning Demonstrate the ability to communicate clearly, to both technical and non-technical audiences, risks, threats, and vulnerabilities identified during assessments Demonstrated understanding of TCP/IP networking Must have strong incident handling experience including knowledge of common probing and attack methods, network/service discovery, system auditing, viruses, and worms Security testing of Enterprise networks through ethical hacking Experience responding to incidents in a 24/7 environment Experience working in a fast paced industry dealing with sensitive data Demonstrate strong understanding of Windows, networking, telephony and wireless security skills
    $114k-153k yearly est. 60d+ ago
  • Information Security Analyst

    Fortinet Inc. 4.8company rating

    Cyber Security Analyst job 36 miles from Berkeley

    Join Fortinet, a cybersecurity pioneer with over two decades of excellence, as we continue to shape the future of cybersecurity and redefine the intersection of networking and security. At Fortinet, our mission is to safeguard people, devices, and data everywhere. We are currently seeking a dynamic SOC Analyst to contribute to the success of our rapidly growing business. You would act as a SOC Analyst for global Security Operations Center (SOC) team at our Sunnyvale HQ office. This highly technical role requires continuous security event monitoring, threat identification, risk assessment, incident response, and collaboration with regional leaders to advance Fortinet's security posture and compliance. As part of a 24x7x365 "follow the sun" SOC model, this role involves working five days per week (40 hours), which may include weekend shifts as part of the standard workweek. As an SOC Analyst, your responsibilities will include: * Actively monitor and analyze security events, alerts, and logs using SIEM, SOAR, EDR, DLP, Threat Intelligence and Cloud Security platforms. * Investigate incidents to mitigate risks. Define and refine SOC automation workflows, including playbooks, alerts, reports, and dashboards, to improve threat detection and incident response. * Analyze security logs to identify anomalies, policy violations, or potential attacks, and take appropriate action based on procedures. * Provide support and guidance to system administrators, developers, and end-users on security best practices and control implementation. * Contribute to the maintenance and enforcement of security policies, standards and procedures to ensure compliance. We are looking for: * Experience: Minimum of 5 years of hands-on experience in Information Technology, cybersecurity, or working in a Security Operations Center (SOC) or Network Operations Center (NOC). * Technical Skills: * Solid understanding of the threat landscape, attacker tactics (e.g., phishing, malware, APTs, DoS attacks), and defensive strategies. * Proficiency in at least one scripting language (e.g., Python preferred). * Skilled in security technologies such as SIEM, SOAR, EDR, ID/IPS, access control, vulnerability management, cloud security, and External Attack Surface Management (EASM). * Experience with cloud security concepts, tools, and best practices across platforms like AWS, Azure, or GCP. * Soft Skills: * Exceptional written, verbal, and interpersonal communication skills, with strong attention to detail. * Proven ability to collaborate across teams and foster a customer-focused and security-aware culture. Educational & Certification Requirements: * Education: Bachelor's degree in Computer Science, Information Security, or a related field. * Certifications: Preferred certifications: CISSP, CCSP, CISA, CISM, CRISC, CCNA, GIAC GCFE, GCFA, GCIH. About Our Team: Join our team, known for its collaborative ethos, working seamlessly with global customers, internal engineering teams and product development groups. Our team culture emphasizes continuous learning, innovation, and a strong commitment to customer satisfaction. We embrace Fortinet's core values of openness, teamwork and innovation, fostering an environment where team members support each other, share knowledge, and leverage AI to solve complex technical challenges. Our inclusive and dynamic team thrives on collaboration and is driven by the shared goal of maintaining Fortinet's high standards of excellence in cybersecurity solutions. Why Join Us: We encourage candidates from all backgrounds and identities to apply. We offer a supportive work environment and a competitive Total Rewards package to support you with your overall health and financial well-being. Embark on a challenging, enjoyable, and rewarding career journey with Fortinet. Join us in bringing solutions that make a meaningful and lasting impact to our 660,000+ customers around the globe. The US base salary range for this full-time position is $160,000-$180,000. Fortinet offers employees a variety of benefits, including medical, dental, vision, life and disability insurance, 401(k), 11 paid holidays, vacation time, and sick time as well as a comprehensive leave program. Wage ranges are based on various factors including the labor market, job type, and job level. Exact salary offers will be determined by factors such as the candidate's subject knowledge, skill level, qualifications, experience, and geographic location. All roles are eligible to participate in the Fortinet equity program, Bonus eligibility is reviewed at time of hire and annually at the Company's discretion. #GD
    $160k-180k yearly 60d+ ago
  • Principal Cyber Security Analyst

    A10 Networks 4.8company rating

    Cyber Security Analyst job 47 miles from Berkeley

    A Principal Cyber Security Analyst is a seasoned, hands-on role responsible for monitoring an organization's networks, systems, applications, external industrial events, and trends for security threats. This role involves analyzing security data, identifying Vulnerabilities, and responding to security incidents. Cyber Security Analysts work closely with other security professionals to maintain the organization's security posture. Principal Cyber Security Analyst has the following responsibilities: * Monitor networks, systems, and applications for security threats * Perform Threat Hunting using industry and A10 specific datasets to * identify threats to the company and our customers * Incident Response for threats against the company and our customers * Monitor industry trends in various areas of cybersecurity * Provide cybersecurity direction through insightful writeups and presentations * Conduct periodic penetration tests and vulnerability assessments Principal Cyber Security Analyst requires the following skills: * Master's degree in Computer Science or Information Technology, or a related field with 5+ years in Cyber Security with 10+ years overall experience * Knowledge of security principles and best practices * Understanding of Threat Hunting methods * Basic ELK stack expertise * Operational familiarity with an array of host, application, cloud and network cybersecurity technologies * Threat Intelligence and other Open source intelligence * Basic binary reverse engineering using tools like Ghidra or IDA * IP networking troubleshooting and design * Knowledge of programming languages such as Python and Go * Operational understanding of penetration testing tools * Proven track record of identifying and remediating cybersecurity threats * Analytical and problem-solving skills * Excellent communication and interpersonal skills Principal Cyber Security Analyst may use the following tools and software: * Security information and event management (SIEM) systems * Intrusion detection/prevention systems (IDS/IPS) * Firewalls and other Network security appliances * Vulnerability scanners and penetration testing tools * Malware analysis tools * Forensic tools * Programming languages, such as Python and Go Preferred Certifications: CompTIA Security+, CEH, or GIAC A10 Networks is an equal opportunity employer and a VEVRAA federal subcontractor. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability status, protected veteran status, or any other characteristic protected by law. A10 also complies with all applicable state and local laws governing nondiscrimination in employment. #LI-AN1 Compensation: up to $220K USD
    $220k yearly 10d ago
  • Information Security

    Tech-Mex

    Cyber Security Analyst job 25 miles from Berkeley

    This job requires relocation to the United States, Silicon Valley, through the use of a TN visa. If selected for this job, the process of coming to the United States will be handled by Tech-Mex. The Information Security Engineer maintains 24x7 support, responds to vendor security questionnaires, performs monitoring and maintenance of the security infrastructure and components, participates in project planning and deployment of new technologies and will be responsible for remediation of identified compliance and risk gaps. He/she works independently, operating under the defined guidelines established by the Director of Information Technology and Security. ESSENTIAL Job Duties & Responsibilities Monitor and advise on information security issues related to the systems and workflow to ensure the internal and external security controls for the company are appropriate and operating as intended Documenting gaps between vendor requirements and National MIs infrastructure Coordinate and execute IT security projects Coordinate response to information security incidents Conduct company-wide audits and manage remediation plans Collaborate with other areas of IT to manage security vulnerabilities Conduct research to keep abreast of latest security issues Ensures that system documentation is accurate and updated as needed Participates in disaster recovery (DR) exercises as directed Logfile review and analysis Install and maintain new systems Prioritize remediation of gaps based on internal and external audits Prepares compliance reports by collecting, analyzing, and summarizing data Evaluates information to determine compliance with laws, regulations, or standards MINIMUM QUALIFICATIONS 3-5 plus years related work experience Vendor audit and compliance experience, preferably with the SIG framework Strong technical skills in anti-virus, DLP, and PKI Strong experience with the McAfee suite of products Solid understanding of networking concepts and system administration Experience with Nessus, RSA envision, RedHat Linux and database security Knowledge of data compliance and privacy standards and regulations as they apply to insurance and banking industries Knowledge of Information Security Standards (ISO27001, NIST, etc) Self-motivated, self-directed and shows attention to detail while working Ability to effectively prioritize and execute reporting tasks in a fast-paced, results-driven environment Extensive experience working in a team-oriented, collaborative environment with a diverse team of business and IT staff Bachelor's degree in Computer Science or Information Systems preferred; Professional certifications are an advantage Essential Worker Competencies The ability to function independently with minimal supervision. Works ethically and with integrity supporting organizational goals and values Displays commitment to excellence Completes work in a timely manner and meets deadlines Good verbal and written communication skills Meets productivity standards and achieves key outcomes Is dependable and keeps commitments Contributes to building a positive team spirit and treats others with respect Candidate will be relocated to the United States
    $100k-149k yearly est. 60d+ ago
  • Information Security Analyst (Governance, Risk, & Compliance)

    TDC Brand 3.6company rating

    Cyber Security Analyst job 30 miles from Berkeley

    The Doctors Company is currently seeking an Information Security Analyst. This is a hybrid opportunity based in East Lansing, MI or Napa, CA. Mission The Information Security Analyst works closely with management and senior security team, analyst will assist team to complete tasks designed to ensure the confidentiality, integrity, and availability of the organization's systems and informational assets. Support incident response and forensics efforts for all security related investigations, including collecting logs, documenting response steps, and collecting critical evidence. Assist in security risk management processes, including security assessments for both internal and 3rd party systems and software. Assist in compliance auditing internal systems against baseline configuration requirements and adherence to TDC Security Policy. Works with project teams to assist with security related deliverables of limited complexity in a supporting role. Assists management team with developing and maintaining information security policies and procedures and tracking compliance throughout the organization. Role requires analyst to maintain security certifications to demonstrate command of knowledge in the security industry and to maintain up to date knowledge of security threats, vulnerabilities, exploits, and trends in the security environment and their impact to the IT systems. Work is closely managed. Qualifications Associate degree (2 years college) or equivalent educational experience; and an expressed interest in Cybersecurity, Secure Systems Engineering and/or IT Governance Can substitute degree with additional certification from list below. One or more of the following certifications are required (2 w/o Associated Degree): CEH: Certified Ethical Hacker CompTIA Security+ CompTIA Network+ CompTIA Linux+ (ISC)2 Associate (or higher) GSEC: SANS GIAC Security Essentials. CRISC: Certified in Risk and Information Systems Control CIPP/US: Certified Information Privacy Professional/US CISM: Certified Information Security Manager CISA: Certified Information System Auditor CISSP: Certified Information Systems Security Professional CCNA: Cisco Certified Network Associate Security CCNP: Cisco Certified Network Professional Security C|HFI: Computer Hacking Forensics Investigator Similar entry level certifications which cover cyber security may be leveraged. Demonstrated desire to complete future certifications in cybersecurity or other IT fields is required. Knowledge of enterprise identity management systems such as Active Directory, Azure Active Directory. Knowledge of Identity Management Lifecycle. Knowledge of managing and securing Microsoft Windows or Linux Operating Systems. Knowledge of NTFS file system permissions management and model. Knowledge of networking, routing, switching and firewalls. Knowledge of security, vulnerability, exploits, forensics, incident response. Knowledge of virtualization technologies, including VMware, desirable. Relevant background in programming in either PowerShell, Batch or Bash Shell Knowledge of relevant IT industry concepts, practices, standards and procedures. Ability to prioritize multiple projects and meet deadlines. Excellent oral and written communication skills. Ability to work with diverse personalities. Ability to read, analyze and interpret general business periodicals, professional journals, technical procedures, or governmental regulations. Ability to write comprehensive reports, business correspondence, and technical procedure manuals. Ability to effectively present information and respond to questions from groups of managers, clients, customers, and the general public. Ability to calculate figures and amounts such as discounts, interest, commissions, proportions, percentages. Ability to define problems, collect data, establish facts, and draw valid conclusions. Ability to interpret an extensive variety of technical instructions in mathematical or diagram form and deal with several abstract and set variables. (2 - 5+) years' experience supporting technical environments required. Experience may include servers, networking, telephonic, and/or storage systems. (2 - 5+) years' experience building, administrating, and monitoring systems in a multi-site network environment with more than 500 users preferred. Ability to be on-call to support security incident response scenarios that may occur outside of standard business hours. Willingness to occasionally work outside of business hours to support project teams and perform assigned system maintenance tasks in order to minimize business interruptions. Responsibilities Security Risk Management Participate in risk management process, including cyber security assessments of both internal platforms, software, and 3rd party cloud systems. Work with team to present security findings to business partners and provide security requirements and recommendations for secure implementations Compliance and Audit Management Review organizations adherence to TDC cybersecurity policies and defined standards. Prepare audit reports describing any deficiencies or configuration issues identified during an audit. Identity and Access Management Leverage and maintains identity and access management systems, workflows, and policies designed to provision and decommission user and system accounts. Following the principle of least privilege, grant individual users and departments access to applications, data, or networks. Monitoring and Operations of Security Systems Responsibilities also include proactively monitoring the health of security systems, analyzing and troubleshooting system issues as they occur, documenting system designs, data flows, standard operating procedures, and system health validation documents. Monitoring and responds to real-time security system alerts and service tickets to protects against unauthorized access, modification, or destruction of corporate data and systems.. Vulnerability and Patch Management Assist in vulnerability identification and remediation on systems and configurations within all internal and external systems. Assist in the installation of security patching on operating systems and applications, including application health and security posture validations. Assist in developing secure configuration designs leveraging vendor best practice recommendations for all internal and external systems. Project Management & Execution Work with project teams on advanced, technical projects or business issues, requiring ability to learn state-of-the-art security infrastructure and best practices. Perform basic project management tasks such as task decomposition, basic time and cost estimating, scheduling, and basic reporting skills. Other Duties As Assigned Available for all duties, accepts delegated tasks readily and completes assigned duties as directed. Salary Range: $87,171 - $101,700 Compensation varies based on skills, knowledge, and education. We consider factors such as specialized skills, depth of knowledge in the field, and educational background to ensure fair and competitive pay. Benefits We offer competitive compensation, incentive bonus plans, outstanding career opportunities, an exceptional work environment, and an impressive benefits package, which starts with medical, family and bereavement leave; same-sex domestic partner benefits; short- and long-term disability programs; and an employee assistance program. There's more: Health, dental, and vision insurance Health care tax-free spending accounts with a company match 401(k) and Roth IRA with company match, as well as catch-up plans for both Vacation days, sick days, and paid personal days each calendar year (with vacation increases based on length of service) Paid holidays each calendar year Life and travel insurance Tax-free commuter benefits In-person and online learning opportunities Cross-function career opportunities Business casual work environment Time off to volunteer Matching donations to qualifying nonprofit organizations Company-sponsored participation at non-profit events About The Doctors Company The Doctors Company is the nation's largest physician-owned medical malpractice insurer. Founded and led by physicians, we are committed to advancing, protecting, and rewarding the practice of good medicine. The Doctors Company is proud to be Certified™ by Great Place to Work .
    $87.2k-101.7k yearly 60d+ ago
  • Information Security Analyst

    Effone Software Inc. 3.4company rating

    Cyber Security Analyst job 36 miles from Berkeley

    These leaders have IT Management experience having grown through the ranks performing hands-on systems administration and IT operations tasks and must have worked in a medium to large heterogeneous systems environment with a breadth of experience. Qualifications * Bachelor's Degree in Computer Science (or related field) * Minimum of 5+ years of hands-on experience in IT Systems and Network, installation, configuration and administration tasks * At least 1+ years of experience leading a team of IT Admins * Strong knowledge of both Windows and Linux operating systems * Some knowledge of Active Directory/LDAP servers is expected * Exposure to one more of HPOV, Nagios, Unicenter, Tivoli or similar environments is required * Understanding of database administration tasks is assumed * Some exposure to VMWare, Citrix, LANDesk and/or other environments is a plus. * Ability to direct the efforts of IT engineers at various levels * Strong communication skills and the ability to work with onsite and client teams Responsibilities * Manage at least 1 team of medium to large IT engineers * Efficient planning of IT tasks * Manage the workflow of team members * Drive problem analysis and solution design phases * Coordinate the implementation cycles * Participate client meetings * Provide continuous status to all stakeholders Position ID: * The correct ID must be referenced when applying for this position * 301005 : Location: India Applying: * Email: Please send your resume in Microsoft Word or .PDF formats to *************** with the correct position ID in the subject line * Postal Mail: Please include a cover letter with the position ID clearly referenced at the top of the letter
    $88k-118k yearly est. Easy Apply 60d+ ago
  • Security Researcher

    Code Red Partners 4.0company rating

    Cyber Security Analyst job 46 miles from Berkeley

    Join an early-stage startup that's building at the frontier of AI and cybersecurity. They're on a mission to design autonomous security systems capable of detecting, triaging, and remediating software vulnerabilities, all without human intervention! This is a greenfield opportunity to help shape the foundational logic of their product's vulnerability discovery engine. You'd be working shoulder-to-shoulder with a world-class AI team to push the boundaries of what "self-healing software" can look like. Key Responsibilities AI-Driven Security Research: Partner with AI engineers to design and build intelligent systems that autonomously detect code vulnerabilities. Leverage large language models (LLMs), industry-leading security tools, supervised fine-tuning, and reinforcement learning to uncover novel security flaws. Vulnerability Triage and Analysis: Investigate and validate identified vulnerabilities to assess severity, exploitability, and potential impact. Responsible Disclosure: Work with impacted organizations to report vulnerabilities responsibly, adhering to established timelines and industry disclosure standards. Required Qualifications Proven expertise in cybersecurity research and vulnerability analysis. Proficient with static and dynamic code analysis techniques and tools. Hands-on experience in penetration testing or red teaming. Familiarity with machine learning principles and their security applications. Strong communication skills for documenting findings and engaging stakeholders. Practical experience managing responsible disclosure workflows. Preferred Qualifications Programming skills in Python, C/C++, or similar languages. Active participation in bug bounty programs or security challenges. Track record of published security research, CVE contributions, or speaking at security conferences. Deep understanding of secure coding practices across various programming languages.
    $117k-164k yearly est. 5d ago
  • Cyber Security Analyst

    Bluestone 4.1company rating

    Cyber Security Analyst job 11 miles from Berkeley

    blue Stone Recruiting is a national search firm with a focus of placing top Cyber Security talent from the Analyst level to CISO with prestigious organizations nationwide Job Description Our client seeking a Cyber Security Operations Analyst to support an operations team that supports a large government customer. The candidate will be relied upon to assist teammates and perform troubleshooting as needed. The candidate should excel in a fast-paced work environment and be willing to face new challenges. Qualifications • Proficiency with vulnerability scanning, remediation and reporting • Knowledge in web application scanning using various tools • Demonstrated proficiency with Windows, UNIX, & LINUX operating systems • Experience working in a customer service information technology environment • Network security and system security experience • Ability to discuss real world troubleshooting; problems and solutions encountered • Knowledge of IT security best practices, US federal government standards, regulations and policy (FedRamp, TIC, NIST 800-37rev1 & 800-53rev3) • Must be motivated and able to work independently • Proven project leadership (PowerPoint presenting, MS Project Planning) • Experience working with change implementation in a controlled environment • Excellent verbal, written communication and technical writing skills Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. 2-5 years of related experience in data security administration. Experience using some of the following tools: o Nessus o Tenable Security Center o Netsparker o WebInspect o BurpSite Additional InformationWork with blue Stone recruiting to find your next Cyber Security role. You can find us at ******************************* We look forward to speaking with you.
    $88k-123k yearly est. 60d+ ago
  • Cyber Security

    Forhyre

    Cyber Security Analyst job 36 miles from Berkeley

    Job Description Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients. Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. Responsibilities: Engineer, implement and monitor security measures for the protection of computer systems, networks and information Develop and implement security policies and controls to support the Cyber Security framework Manage the existing cyber security training program across global, multilingual business Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity Continuous improvement in the areas of Information Security technologies, techniques and processes Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard Ability to interpret penetration test results and describe issues and fixes to non-security expert Responsible for leading an accurate & comprehensive status reporting to the executive steering committee Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap Skills & Experience Bachelor’s degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree. Certified Information Systems Security Professional (CISSP) 8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology. Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment. Vulnerability Assessment testing and/or Penetration Testing (preferred) Robotic Process Automation/Intelligent Automation (preferred) Business case development supporting security technology solutions (preferred) Additional certifications demonstrating cybersecurity/technical mastery (preferred)
    $88k-125k yearly est. 52d ago
  • Information Security Analyst

    Fortinet 4.8company rating

    Cyber Security Analyst job 36 miles from Berkeley

    Join Fortinet, a cybersecurity pioneer with over two decades of excellence, as we continue to shape the future of cybersecurity and redefine the intersection of networking and security. At Fortinet, our mission is to safeguard people, devices, and data everywhere. We are currently seeking a dynamic SOC Analyst to contribute to the success of our rapidly growing business. You would act as a SOC Analyst for global Security Operations Center (SOC) team at our Sunnyvale HQ office. This highly technical role requires continuous security event monitoring, threat identification, risk assessment, incident response, and collaboration with regional leaders to advance Fortinet's security posture and compliance. As part of a 24x7x365 “follow the sun” SOC model, this role involves working five days per week (40 hours), which may include weekend shifts as part of the standard workweek. As an SOC Analyst, your responsibilities will include: Actively monitor and analyze security events, alerts, and logs using SIEM, SOAR, EDR, DLP, Threat Intelligence and Cloud Security platforms. Investigate incidents to mitigate risks. Define and refine SOC automation workflows, including playbooks, alerts, reports, and dashboards, to improve threat detection and incident response. Analyze security logs to identify anomalies, policy violations, or potential attacks, and take appropriate action based on procedures. Provide support and guidance to system administrators, developers, and end-users on security best practices and control implementation. Contribute to the maintenance and enforcement of security policies, standards and procedures to ensure compliance. We are looking for: Experience: Minimum of 5 years of hands-on experience in Information Technology, cybersecurity, or working in a Security Operations Center (SOC) or Network Operations Center (NOC). Technical Skills: Solid understanding of the threat landscape, attacker tactics (e.g., phishing, malware, APTs, DoS attacks), and defensive strategies. Proficiency in at least one scripting language (e.g., Python preferred). Skilled in security technologies such as SIEM, SOAR, EDR, ID/IPS, access control, vulnerability management, cloud security, and External Attack Surface Management (EASM). Experience with cloud security concepts, tools, and best practices across platforms like AWS, Azure, or GCP. Soft Skills: Exceptional written, verbal, and interpersonal communication skills, with strong attention to detail. Proven ability to collaborate across teams and foster a customer-focused and security-aware culture. Educational & Certification Requirements: Education: Bachelor's degree in Computer Science, Information Security, or a related field. Certifications: Preferred certifications: CISSP, CCSP, CISA, CISM, CRISC, CCNA, GIAC GCFE, GCFA, GCIH. About Our Team: Join our team, known for its collaborative ethos, working seamlessly with global customers, internal engineering teams and product development groups. Our team culture emphasizes continuous learning, innovation, and a strong commitment to customer satisfaction. We embrace Fortinet's core values of openness, teamwork and innovation, fostering an environment where team members support each other, share knowledge, and leverage AI to solve complex technical challenges. Our inclusive and dynamic team thrives on collaboration and is driven by the shared goal of maintaining Fortinet's high standards of excellence in cybersecurity solutions. Why Join Us: We encourage candidates from all backgrounds and identities to apply. We offer a supportive work environment and a competitive Total Rewards package to support you with your overall health and financial well-being. Embark on a challenging, enjoyable, and rewarding career journey with Fortinet. Join us in bringing solutions that make a meaningful and lasting impact to our 660,000+ customers around the globe. The US base salary range for this full-time position is $160,000-$180,000. Fortinet offers employees a variety of benefits, including medical, dental, vision, life and disability insurance, 401(k), 11 paid holidays, vacation time, and sick time as well as a comprehensive leave program. Wage ranges are based on various factors including the labor market, job type, and job level. Exact salary offers will be determined by factors such as the candidate's subject knowledge, skill level, qualifications, experience, and geographic location. All roles are eligible to participate in the Fortinet equity program, Bonus eligibility is reviewed at time of hire and annually at the Company's discretion. #GD
    $160k-180k yearly 60d+ ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Berkeley, CA?

The average cyber security analyst in Berkeley, CA earns between $75,000 and $146,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Berkeley, CA

$105,000
Job type you want
Full Time
Part Time
Internship
Temporary