Cyber security analyst jobs in Ceres, CA - 959 jobs
All
Cyber Security Analyst
Security Engineer
Information Security Analyst
Senior Security Engineer
Senior Security Analyst
Information Security Engineer
Securities Analyst
Securities Research Analyst
Security System Engineer
Acquisition Security Analyst
Mantech 4.5
Cyber security analyst job in Los Angeles, CA
MANTECH seeks a motivated, career and customer-oriented Acquisition SecurityAnalyst II to join our team in El Segundo, CA.
The Acquisition SecurityAnalyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle.
Responsibilities include but are not limited to:
In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy.
Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process.
Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers.
Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI.
Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided.
Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)
Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E.
Minimum Qualifications:
Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree.
10+ years of related experience with acquisition programs
6+ years of experience with SCI programs.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process.
Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation)
Preferred Qualifications:
4+ years of experience with SAR program acquisitions desired.
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision.
Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
$67k-89k yearly est. 2d ago
Looking for a job?
Let Zippia find it for you.
Information Security Engineer, Bare Metal
Fluidstack
Cyber security analyst job in San Francisco, CA
At Fluidstack, we're building the infrastructure for abundant intelligence. We partner with top AI labs, governments, and enterprises - including Mistral, Poolside, Black Forest Labs, Meta, and more - to unlock compute at the speed of light.
We're working with urgency to make AGI a reality. As such, our team is highly motivated and committed to delivering world‑class infrastructure. We treat our customers' outcomes as our own, taking pride in the systems we build and the trust we earn. If you're motivated by purpose, obsessed with excellence, and ready to work very hard to accelerate the future of intelligence, join us in building what's next.
About the Role
The Information Security Engineer, Bare Metal will be a critical part of the infrastructure team, responsible for designing, implementing, and maintaining the security of Fluidstack's bare metal fleet. This role is highly technical and requires deep expertise in hardware, operating systems, and network security in a high-scale, high-performance environment.
Key Responsibilities:
Bare Metal Lifecycle Security: Own the security throughout the entire lifecycle of the bare metal fleet, from provisioning and hardening to decommission.
Image Security and Hardening: Design and implement secure, hardened base operating system images (Linux) for all production and development environments, including automated vulnerability scanning and patch management.
Baseboard Management Controller (BMC) Security: Define and enforce security best practices for BMCs, including access controls, credential management, logging, and firmware integrity/patching.
Network Security: Collaborate with network engineering to design and implement secure network architectures, including micro‑segmentation, intrusion detection/prevention systems (IDS/IPS), and firewall policies for the bare metal environment.
Storage and Data Protection: Implement strong security controls for storage systems, focusing on data‑at‑rest encryption, key management, and secure access protocols for both local and networked storage.
Automation: Develop security automation and tooling (e.g., configuration management scripts) to ensure security is enforced consistently and at scale across the fleet.
Security Monitoring and Incident Response: Configure and manage security monitoring for bare metal infrastructure and participate in the incident response process for critical security events.
Security Review: Conduct regular security audits and threat modeling exercises for new hardware and infrastructure designs.
Focus
Securing and hardening base images (Linux/OS).
Baseboard Management Controller (BMC) access control and firmware security.
Infrastructure network segmentation and policy enforcement.
Storage encryption, data integrity, and key management.
About You
7+ years of experience in an Information Security or Infrastructure Engineering role, with a strong focus on bare metal, IaaS, or high‑scale cloud infrastructure.
Deep practical experience with Linux operating system hardening (e.g., SELinux, AppArmor, kernel‑level security).
Expert‑level knowledge of network security principles, including TCP/IP, VPNs, firewall rulesets, and zero‑trust concepts.
Proven ability to implement and manage encryption technologies, including disk‑level encryption (e.g., LUKS) and hardware‑level encryption.
Strong scripting and automation skills in languages such as Python, Go, or Rust, and experience with configuration management tools (e.g., Ansible, Puppet, Chef).
Understanding of hardware security modules (HSMs) and trusted computing concepts (e.g., TPM/TXT).
Excellent problem‑solving and communication skills, with the ability to work collaboratively across engineering teams.
Nice to Haves
Experience with specific BMC platforms (e.g., OpenBMC, Dell iDRAC, HPE iLO).
Familiarity with compliance standards relevant to bare metal environments (e.g., SOC 2, ISO 27001, FedRAMP).
Experience with hardware‑level root of trust and secure boot implementations.
Relevant security certifications (e.g., CISSP, OSCP, CEH).
Salary & Benefits
Competitive total compensation package (salary + equity).
Retirement or pension plan, in line with local norms.
Health, dental, and vision insurance.
Generous PTO policy, in line with local norms.
The base salary range for this position is $150,000 - $250,000 per year, depending on experience, skills, qualifications, and location. This range represents our good faith estimate of the compensation for this role at the time of posting. Total compensation may also include equity in the form of stock options.
We are committed to pay equity and transparency.
Fluidstack is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans' status, or any other characteristic protected by law. Fluidstack will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law.
.
#J-18808-Ljbffr
$150k-250k yearly 4d ago
Senior Cloud Security Engineer - Infrastructure
Klaviyo Inc. 4.2
Cyber security analyst job in San Francisco, CA
A tech company in San Francisco is seeking a Lead Security Engineer to enhance its security posture across various environments. The ideal candidate will have over 5 years of experience in security roles and expertise in cloud security, IAM, and secure systems design. Responsibilities include implementing scalable security controls and collaborating with cross-functional teams. The base pay range for this position is $220,000 - $330,000 USD.
#J-18808-Ljbffr
$220k-330k yearly 3d ago
Senior Security GRC Analyst
Lambda Inc. 4.2
Cyber security analyst job in San Francisco, CA
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
Manage IT Risk Register including risk identification, tracking, and prioritization.
Assist with and drive remediation of control deficiencies and gaps
Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
Assist control owners with root cause analysis and track risk management action plan progress.
Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements
You
Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
Experience in the machine learning or computer hardware industry
Experience with Security by Design and/or Privacy by Design principles
Experience with standard cyber controls frameworks, including CIS Top18, NIST CyberSecurity Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
Familiarity with using third‑party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third‑party risk management
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
Founded in 2012, with 500+ employees, and growing fast
Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In‑Q‑Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
Our values are publicly available: *************************
We offer generous cash & equity compensation
Health, dental, and vision coverage for you and your dependents
Wellness and commuter stipends for select roles
401k Plan with 2% company match (USA employees)
Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
#J-18808-Ljbffr
$127k-172k yearly est. 6d ago
Senior Cloud Visibility & Security PM
Gigamon 4.8
Cyber security analyst job in Santa Clara, CA
A leading technology firm is seeking a Senior Product Manager to drive strategy and execution for cloud visibility and security solutions. This role involves collaborating cross-functionally with engineering, sales, and marketing teams. The ideal candidate should have a master's degree with an MBA preferred, along with over 10 years of experience in product management within cloud technologies. The role offers a competitive salary ranging from $192,000 to $240,000 and various employee benefits including health insurance and 401(k) matching.
#J-18808-Ljbffr
$192k-240k yearly 3d ago
Blockchain Systems Engineer - Cross-Chain & Secure APIs
P2P 3.2
Cyber security analyst job in San Francisco, CA
A blockchain technology company is seeking a Software Engineer in San Francisco to design and build core infrastructure. Responsibilities include developing secure distributed systems and collaborating with teams to enhance blockchain accessibility. The role offers competitive compensation, autonomy in work, and opportunities for international candidates with visa sponsorship. A minimum salary range of $150,000 - $190,000 is provided.
#J-18808-Ljbffr
$150k-190k yearly 5d ago
Enterprise IT Engineer - Identity, Security & Cloud
Arena Intelligence
Cyber security analyst job in San Francisco, CA
A leading tech company in San Francisco is seeking an experienced Enterprise IT Engineer to manage and secure their systems. This role will involve shaping the identity access foundation, administrating SaaS tools, and optimizing workflows. The ideal candidate will have 4-6 years in IT security, deep knowledge of Okta and Google Workspace, and the ability to work effectively in a fast-paced environment. They offer competitive compensation and comprehensive health benefits.
#J-18808-Ljbffr
$111k-158k yearly est. 3d ago
Information Security Engineer - Incident & Vulnerability Expert
Unilin 4.6
Cyber security analyst job in Palo Alto, CA
A leading firm in interior design and construction is seeking an experienced Information Security Engineer to enhance cybersecurity operations and support incident management. The ideal candidate has over 5 years in cybersecurity with expertise in network and endpoint security, complemented by strong analytical skills. This role offers a competitive salary, flexible work environment, and career development opportunities.
#J-18808-Ljbffr
About the Company
Gemini is a global crypto and Web3 platform founded by Cameron and Tyler Winklevoss in 2014, offering a wide range of simple, reliable, and secure crypto products and services to individuals and institutions in over 70 countries. Our mission is to unlock the next era of financial, creative, and personal freedom by providing trusted access to the decentralized future. We envision a world where crypto reshapes the global financial system, internet, and money to create greater choice, independence, and opportunity for all - bridging traditional finance with the emerging cryptoeconomy in a way that is more open, fair, and secure. As a publicly traded company, Gemini is poised to accelerate this vision with greater scale, reach, and impact.
The Department: Platform Security
The Platform Security team secures Gemini's infrastructure through service hardening and by developing and supporting a suite of foundational tools. We provide secure-by-default infrastructure, consumable security services, and expert consultation to engineering teams for secure cloud and non-cloud infrastructure.
The Role: Staff Enterprise Security Engineer (Client Platform)
The Platform Security team builds and delivers security foundations and paved paths for Gemini's corporate endpoints and workforce. As a Staff Corporate Security Engineer focused on client platforms, you will build security services, tools, and automation while hardening our mac OS fleet, securing endpoint management platforms, and implementing configuration-as-code security guardrails. This is a hands‑on engineering role where you'll write production code daily using Go, Swift, Objective‑C, and Python-not just configuration management.
You'll design and build endpoint security platforms that scale across our organization. This role requires deep technical expertise in mac OS security internals, strong software development skills to build production services, and systems engineering experience with MDM and configuration management. You will partner closely with IT, Engineering, and GRC teams to enable secure device management while maintaining least‑privilege access and zero‑standing‑privilege models for endpoints.
This role is required to be in person twice a week at either our San Francisco, CA or New York City, NY office.
Responsibilities
Build and maintain security services, tools, and automation using Go, Swift, Objective‑C, and Python
Design and implement endpoint security controls for mac OS environments using system extensions, network extensions, and native security frameworks
Create reusable libraries, frameworks, and platforms that enable secure‑by‑default patterns for client devices
Develop automated security monitoring, scanning, and remediation services for endpoint events
Build CI/CD pipelines for security software deployment and configuration‑as‑code validation
Implement and manage MDM platforms (Jamf, Fleet) and configuration management systems (Salt, Munki)
Architect binary authorization, DNS filtering, and application control solutions at scale
Partner with Engineering, IT, and GRC teams on architecture decisions and provide security consultation
Participate in on‑call rotation for critical security incidents and endpoint security issues
Minimum Qualifications
Strong software development skills in Go, Python, Swift, or Objective‑C with experience building production services
Deep expertise securing mac OS environments including Endpoint Security framework, System Extensions, Network Extensions, and TCC
Proven experience with MDM platforms such as Jamf Pro or Fleet, including policy management and deployment at scale
Strong configuration management experience with Salt, Puppet, or similar tools
Experience with software packaging and deployment systems like Munki or AutoPkg
Knowledge of cloud infrastructure (AWS) and container orchestration (Kubernetes)
Demonstrated ability to build, deploy, and maintain security tools and services in production
Experience with infrastructure‑as‑code using Terraform or similar tools
Preferred Qualifications
Experience building binary authorization systems such as Santa, Upvote, or Windows Defender Application Control
Development of mac OS system extensions or network extensions using Swift or Objective‑C
Experience with DNS filtering or network security tool development
Background in incident response for mac OS endpoint compromises
Experience with osquery, Fleet, or similar endpoint visibility platforms
Knowledge of compliance frameworks (SOC 2, ISO 27001) as they relate to endpoint security
Experience with container security scanning and supply chain security
Contributions to security tooling projects or client platform management communities
It Pays to Work Here
The compensation & benefits package for this role includes:
Competitive starting salary
A discretionary annual bonus
Long‑term incentive in the form of a new hire equity grant
Comprehensive health plans
401K with company matching
Paid Parental Leave
Flexible time off
Salary Range
The base salary range for this role is between $168,000 - $240,000 in the State of New York, the State of California and the State of Washington. This range is not inclusive of our discretionary bonus or equity package. When determining a candidate's compensation, we consider a number of factors including skillset, experience, job scope, and current market data.
In the United States, we offer a hybrid work approach at our hub offices, balancing the benefits of in‑person collaboration with the flexibility of remote work. Expectations may vary by location and role, so candidates are encouraged to connect with their recruiter to learn more about the specific policy for the role. Employees who do not live near one of our hubs are part of our remote workforce.
At Gemini, we strive to build diverse teams that reflect the people we want to empower through our products, and we are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, or Veteran status. Equal Opportunity is the Law, and Gemini is proud to be an equal opportunity workplace. If you have a specific need that requires accommodation, please let a member of the People Team know.
#J-18808-Ljbffr
$168k-240k yearly 2d ago
Security Engineer, Operating Systems
Menlo Ventures
Cyber security analyst job in San Francisco, CA
About Anthropic
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
Implement and maintain full-disk encryption solutions for diverse storage systems
Build security infrastructure for AI systems, research environments, and production services
Build secure network stacks with appropriate isolation and segmentation
Create OS-level attestation and integrity monitoring systems
Develop security patches, custom kernel modules, and kernel hardening configurations
Design secure boot processes and trusted execution environments
Work with container teams to ensure proper workload isolation at the kernel level
Design privilege separation and mandatory access control policies
Implement secure update mechanisms for OS components
Build tooling for security configuration management and compliance verification
Who You Are:
5+ years of experience in operating systems security or kernel development
Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
Experience with kernel hardening techniques and exploit mitigation
Strong programming skills in C and systems programming languages
Experience with eBPF for security monitoring and enforcement
Understanding of virtualization and containerization security
Track record of identifying and fixing OS-level security vulnerabilities
Experience with security-focused Linux distributions
Strong candidates may also have:
Kernel development experience or contributions to Linux kernel
Experience with real-time or embedded operating systems
Knowledge of hardware security features and their OS integration
Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
Background in vulnerability research, exploit development, or fuzzing
Experience with formal methods for OS verification
Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:$320,000-$405,000 USDLogistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience. Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
#J-18808-Ljbffr
$111k-161k yearly est. 5d ago
GenAI Security Engineer: Secure LLMs & MLOps
Crusoe Energy Systems LLC 4.1
Cyber security analyst job in San Francisco, CA
A leading technology firm in San Francisco is looking for an AI Security Engineer to ensure the safety and integrity of their AI systems. You'll serve as a technical authority, leading secure AI solutions and MLOps governance. The position requires expertise in Generative AI, Python programming, and robust security practices. Benefits include competitive pay, stock options, and comprehensive health insurance. Join us in driving innovation with responsible technology.
#J-18808-Ljbffr
$126k-179k yearly est. 4d ago
Offensive Security Engineer, Agent Security
Openai 4.2
Cyber security analyst job in San Francisco, CA
About the Team
Security is at the foundation of OpenAI's mission to ensure that artificial general intelligence benefits all of humanity. The Security team protects OpenAI's technology, people, and products. We are technical in what we build but are operational in how we do our work, and are committed to supporting all products and research at OpenAI. Our Security team tenets include: prioritizing for impact, enabling researchers, preparing for future transformative technologies, and engaging a robust security culture.
About the Role
We're seeking an exceptional Principal-level Offensive Security Engineer to challenge and strengthen OpenAI's security posture. This role isn't your typical red team job - it's an opportunity to engage broadly and deeply, craft innovative attack simulations, collaborate closely with defensive teams, and influence strategic security improvements across the organization.
You will have the chance to not only find vulnerabilities but actively drive their resolution, automate offensive techniques with cutting‑edge technologies, and use your unique attacker perspective to shape our security strategy.
This role will be primarily focused on continuously testing our agent powered products like Codex and Operator. These systems are uniquely valuable targets because they're rapidly evolving, have access to perform sensitive actions on behalf of users, and have large, diverse attack surfaces. You will play a crucial role in securing our agents by hunting for realistic vulnerabilities that emerge from the interactions between the applications, infrastructure, and models that power them.
In this role you will:
Continuously hunt for vulnerabilities in the interactions between the applications, infrastructure, and models that power our agentic products.
Conduct open‑scope red and purple team operations, simulating realistic attack scenarios.
Collaborate proactively with defensive security teams to enhance detection, response, and mitigation capabilities.
Perform comprehensive penetration testing on our diverse suite of products.
Leverage advanced automation and OpenAI technologies to optimize your offensive security work.
Present insightful, actionable findings clearly and compellingly to inspire impactful change.
Influence security strategy by providing attacker‑driven insights into risk and threat modeling.
You might thrive in this role if you have:
7+ years of hands‑on red team experience or exceptional accomplishments demonstrating equivalent expertise.
Deep expertise conducting offensive security operations within modern technology companies.
Experience designing, developing, or testing assessing the security of AI‑powered systems.
Experience working finding, exploiting and mitigating common vulnerabilities in AI systems like prompt injection, leaking sensitive data, confused deputies, and dynamically generated UI components.
Exceptional skill in code review, identifying novel and subtle vulnerabilities.
Proven experience performing offensive security assessments in at least one hyperscaler cloud environment (Azure preferred).
Demonstrated mastery assessing complex technology stacks, including:
Highly customized Kubernetes clusters
Container environments
CI/CD pipelines
GitHub security
mac OS and Linux operating systems
Data science tooling and environments
Python‑based web services
React‑based frontend applications
Strong intuitive understanding of trust boundaries and risk assessment in dynamic contexts.
Excellent coding skills, capable of writing robust tools and automation for offensive operations.
Ability to communicate complex technical concepts effectively through compelling storytelling.
Proven track record of not just finding vulnerabilities but actively contributing to solutions in complex codebases.
Bonus points:
Background or expertise in AI or data science.
Prior experience working in tech startups or fast‑paced technology environments.
Experience in related disciplines such as Software Engineering (SWE), Detection Engineering, Site Reliability Engineering (SRE), Security Engineering, or IT Infrastructure.
About OpenAI
OpenAI is an AI research and deployment company dedicated to ensuring that general‑purpose artificial intelligence benefits all of humanity. We push the boundaries of the capabilities of AI systems and seek to safely deploy them to the world through our products. AI is an extremely powerful tool that must be created with safety and human needs at its core, and to achieve our mission, we must encompass and value the many different perspectives, voices, and experiences that form the full spectrum of humanity.
We are an equal opportunity employer, and we do not discriminate on the basis of race, religion, color, national origin, sex, sexual orientation, age, veteran status, disability, genetic information, or other applicable legally protected characteristic.
For additional information, please see OpenAI's affirmative action and equal employment opportunity policy statement.
Qualified applicants with arrest or conviction records will be considered for employment in accordance with applicable law, including the San Francisco Fair Chance Ordinance, the Los Angeles County Fair Chance Ordinance for Employers, and the California Fair Chance Act. For unincorporated Los Angeles County workers: we reasonably believe that criminal history may have a direct, adverse and negative relationship with the following job duties, potentially resulting in the withdrawal of a conditional offer of employment: protect computer hardware entrusted to you from theft, loss or damage; return all computer hardware in your possession (including the data contained therein) upon termination of employment or end of assignment; and maintain the confidentiality of proprietary, confidential, and non‑public information. In addition, job duties require access to secure and protected information technology systems and related data security obligations.
To notify OpenAI that you believe this job posting is non‑compliant, please submit a report through this form. No response will be provided to inquiries unrelated to job posting compliance.
We are committed to providing reasonable accommodations to applicants with disabilities, and requests can be made via this link.
OpenAI Global Applicant Privacy Policy
At OpenAI, we believe artificial intelligence has the potential to help people solve immense global challenges, and we want the upside of AI to be widely shared. Join us in shaping the future of technology.
#J-18808-Ljbffr
$125k-175k yearly est. 6d ago
Senior Security Analyst - Heartflow Heartflow
Isc2 Eastbay Chapter
Cyber security analyst job in San Francisco, CA
Heartflow is a medical technology company advancing the diagnosis and management of coronary artery disease, the #1 cause of death worldwide, using cutting‑edge technology. The flagship product-an AI‑driven, non‑invasive cardiac test supported by the ACC/AHA Chest Pain Guidelines called the Heartflow FFRCTAnalysis-provides a color‑coded, 3D model of a patient's coronary arteries indicating the impact blockages have on blood flow to the heart. Heartflow is the first AI‑driven non‑invasive integrated heart care solution across the CCTA pathway that helps clinicians identify stenoses in the coronary arteries (RoadMap™Analysis), assess coronary blood flow (FFRCTAnalysis), and characterise and quantify coronary atherosclerosis (Plaque Analysis). Our pipeline of products is growing and so is our team; join us in helping to revolutionise precision heart‑care.
Heartflow is a publicly traded company (HTFL) that has received international recognition for exceptional strides in healthcare innovation, is supported by medical societies around the world, cleared for use in the US, UK, Europe, Japan and Canada, and has been used for more than 500,000 patients worldwide.
Overview
The Heartflow Information Security team is responsible for security across our corporate and product environments, protecting our patient data and medical device ecosystem. We are looking for an investigator that loves the challenge of analysing complex security telemetry to uncover hidden threats and ensure a resilient defence for our corporate and product environments.
The initial focus will be on triaging advanced security events and participating in our security incident response process. Analytical work will span our corporate, clinical and cloud infrastructure and will include threat hunting and the refinement of high‑fidelity detection logic.
What You'll Do
Perform in‑depth analysis of security events, logs, and network traffic using SIEM, EDR, and other security tools to rapidly identify, contain, and remediate complex threats.
Collaborate in developing and implementing custom correlation rules, dashboards, and alerts to enhance detection capabilities.
Drive threat hunts to find “quiet” persistent threats within our clinical and corporate environments.
Participate in continuous refinement of incident response playbooks, operational procedures, and security standards.
Perform security reviews of third‑party vendors to identify risks and ensure they meet company standards.
What You Bring
Education - BS in Computer Science or a related technical degree. No degree? No problem-if you have the equivalent experience and certifications, we want to hear from you.
Experience - At least 2 years in the trenches of a SOC or Incident Response team. However, if you haven't held a formal “Security” title but have at least 2 years on an IT Operations team, we value deep technical expertise in operating systems and networking if you can show us your passion for security.
You're comfortable navigating security platforms like SIEMs, EDR tools (CrowdStrike or similar), and Email Security platforms.
Strong problem‑solving skills with the ability to troubleshoot security issues across networks, operating systems, and applications.
Possess a solid understanding of log correlation and how to write logic for security alerts.
Deep understanding of at least one of the operating system internals (Windows, Linux, or mac OS). Ability to analyse process trees.
Able to analyse network flows and packet data to find hidden threats. You know your way around network tools and can spot anomalies across different types of environments.
What Helps You Stand Out
Certifications: SANS GIAC (GCIH, GCIA), CompTIA (Security+, CySA+), EC‑Council (C|SA) or equivalent.
Proven ability to take initiative- track record of identifying problems and developing solutions independently.
Excellent written and verbal communication skills, with the ability to clearly articulate complex technical issues and remediation plans to both technical and non‑technical audiences.
You are a continuous learner who stays curious about the latest attack trends and loves figuring out how to stop them.
A reasonable estimate of the base salary compensation range is $75,000 to $100,000 per year, and bonus. #LI-IB1
Heartflow is an Equal Opportunity Employer. We are committed to a work environment that supports, inspires, and respects all individuals and do not discriminate against any employee or applicant because of race, color, religion, marital status, age, national origin, ancestry, physical or mental disability, medical condition, pregnancy, genetic information, gender, sexual orientation, gender identity or expression, veteran status, or any other status protected under federal, state, or local law. This policy applies to every aspect of employment at Heartflow, including recruitment, hiring, training, relocation, promotion, and termination.
Positions posted for Heartflow are not intended for or open to third‑party recruiters / agencies. Submission of any unsolicited resumes for these positions will be considered to be free referrals.
Heartflow has become aware of a fraud where unknown entities are posing as Heartflow recruiters in an attempt to obtain personal information from individuals as part of our application or job offer process. Before providing any personal information to outside parties, please verify the following:
A) All legitimate Heartflow recruiter email addresses end with “@heartflow.com” and
B) The position described is found on our careers site at *********************************
#J-18808-Ljbffr
$75k-100k yearly 4d ago
Principal Enterprise Security Engineer
F5 Networks, Inc. 4.6
Cyber security analyst job in Palo Alto, CA
**Location:** Remote **About the Role** We are seeking a seasoned **Principal Enterprise Security Engineer** to design, implement, and manage enterprise-wide security solutions. You'll shape our security strategy across endpoint protection, network, SaaS, IAM, and observability, while aligning to NIST and CIS standards. This role reports to the Head of Enterprise Security, with close collaboration with the CISO, CISO staff, and cross-functional teams. **Key Responsibilities** Experience with Security Service Edge and Software-Defined Perimeter enables ZTNA solutions such as NetSCOPE, Zscaler, and PAN**Qualifications & Experience** **Education:** Bachelor's degree in cybersecurity, computer science, engineering-or equivalent years of corporate security/SOC experience. **Experience:** 7+ years in enterprise or cloud security with hands-on background in IAM, endpoint/network/SaaS security, incident management, vulnerability management, and log analytics. Experience with DoD IL‑4/IL‑5 programs-understand added encryption, personnel restrictions, and control overlays **Technical Skills:** Proficiency with tools like CrowdStrike, Palo Alto, F5, Splunk/ELK, and IAM platforms (Okta, Entra ID, etc.).**Soft Skills:** Strong verbal and written communication; ability to convey complex topics to executives; experience working with stakeholders across multiple time zones. Nice to have experience with F5 BigIP LTM**Personality Traits:** Strategic thinker, collaborative, proactive, with the ability to thrive in fast-moving environments. It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. F5 offers a variety of reasonable accommodations for candidates. Requesting an accommodation is completely voluntary. F5 will assess the need for accommodations in the application process separately from those that may be needed to perform the job. Request by contacting accommodations@f5.com.**Remote**: Primarily work from designated home location but can come into an F5 office to work or travel to an offsite location as needed.
#J-18808-Ljbffr
A technology firm in San Francisco is seeking a Corporate Security Engineer to lead initiatives ensuring the safety of its corporate environment. The ideal candidate will have over 4 years of experience in Corporate Security, familiarity with Identity and Access Management, and a strong understanding of security concepts. This role offers hybrid working arrangements and a competitive compensation and benefits package, including mental health support and career coaching.
#J-18808-Ljbffr
$142k-185k yearly est. 4d ago
Information Security Analyst
E. & J. Gallo Winery 4.7
Cyber security analyst job in Modesto, CA
Job Type: Full-time
Work Category: Hybrid Telecommute
Sponsorship: Not Available
Compensation: $40 - $60
Gallo Privacy Policy
We are GALLO
We're a family-owned company with a 90+ year legacy, that's consistently recognized as a Glassdoor “Best Places to Work.” We have 130+ brands in our total alcohol beverage portfolio including wine, malt, spirits, and ready-to-drink beverages. We're home to the #1 wine and spirits brands in the U.S. - Barefoot Wine & High Noon and are the official sponsors of the NFL, NHL, UFC, and PGA of America.
View our Corporate Values and Mission Statement here.
A Taste of What You'll Do
Join Gallo Winery's Information Security team and play a vital role in protecting the systems, networks, applications, and data that keep our business thriving. In this hands-on role you'll investigate incidents, identify root causes, recommend and implement corrective actions, and continuously tune security tools and controls across on‑prem and cloud environments. You will lead medium-sized projects, support security operations, and collaborate across IT, business partners, auditors, and vendors to keep our environment resilient and compliant.
You'll conduct risk assessments, review penetration test results, and develop practical implementation plans for system, database, application, encryption, logging, backup, and endpoint security. Your clear, actionable reports will translate technical findings into business risk and remediation priorities, and you'll help develop standards that map to industry frameworks such as NIST and ISO. Staying current with threat trends and emerging vulnerabilities will be central to anticipating and preventing breaches.
We value curiosity, ownership, and thoughtful risk-taking. We welcome applicants from diverse backgrounds and career paths who bring strong problem-solving skills, hands-on security experience, and the ability to communicate effectively with technical and non-technical stakeholders. Mentoring and supporting junior colleagues is part of the role, and we offer opportunities for professional growth, certifications, and continuous learning. If you're ready to make a measurable impact on a growing security program while working within a collaborative, inclusive culture, we'd love to hear from you.
What You'll Need
Bachelor's degree in Computer Science, Business Administration, MIS, Mathematics, or Engineering, plus 3 years of experience with information security, System Administration or equivalent with increasing levels of responsibility; OR High School Diploma or State-issued equivalency certificate plus 7 years of experience in Information Security, System Administration or equivalent with increasing levels of responsibility.
Demonstrated technical expertise in IT systems.
Strong analytical ability, communication skills and the ability to work effectively with clients/customers, IT management and staff, vendors, consultants, and auditors.
Required to travel to company offices, sites, and/or meeting locations for onboarding, training, meetings, and events for development, department needs, and business delivery up to 5% of the time, with or without reasonable accommodation. This may be in addition to travel requirements, if applicable, as listed in this .
Required to be 18 years or older. This may be in addition to other age requirements, if applicable, as listed in this .
How You'll Stand Out
Bachelor's degree in Computer Science, Business Administration, MIS, Mathematics, or Engineering, plus 5 years of experience with data security reflecting increasing levels of responsibility.
Extensive professional experience in management and deployment of security tools.
Extensive knowledge of networking, databases, systems and/or Web operations.
In-depth knowledge of data security and protection techniques.
In-depth knowledge of application security and application security best practices. Professional experience in the following: Vulnerability and configuration assessment tools, IDS/IPS tools, logging and monitoring tools (SIM), DLP, audit & assessment (GRC tools), data encryption and network or application firewalls, enterprise monitoring (SIEM). Familiarity with mobile, SaaS & Cloud technologies.
Professional certifications (CISSP, ISACA, GSEC, others)
Knowledge of industry frameworks and best practices (ISO, NIST, CSC, others).
Knowledge of regulatory requirements and compliance (PCI, SOX, HIPAA, GLBA).
To view the full job description, please click here.
Our Benefits & Perks
We are committed to providing competitive compensation, perks, and a culture that supports your well-being. Benefits depend on your work category and may include medical and dental coverage, 401k plans, profit sharing, pet insurance, company holidays, access to an employee wine shop, and more! Additional information will be provided before your first interview.
The Fine Print
The Company does not sponsor for employment-based visas for this position now or in the future.
Actual compensation paid within the range will be determined by factors such as the education, experience, knowledge, skills and abilities of the applicant, internal equity, and alignment with market data. In addition to the salary, this position may be eligible for bonuses, incentive plans, or participate in tasting room tip pools, as applicable.
This position will be based in the location(s) specified in the job posting with an option for occasional telecommuting. You will be expected to live within a commutable distance.
It is the Company's policy for job postings to be open to internal candidates for a minimum of 5 days and to external candidates, if applicable, for a minimum of 3 days.
Gallo's policy is to afford equal employment opportunities to all applicants and employees and not to discriminate on the basis of race, traits associated with race, including but not limited to, hair texture and protective hairstyles (such as braids, locks, and twists), color, national origin, ancestry, creed, religion, physical disability, mental disability, medical condition as defined by applicable state law (including cancer and predisposing genetic characteristics), genetic information, marital status, familial status, sex, gender, gender identity, gender expression, sexual orientation (actual or perceived), transgender status, sex stereotyping, pregnancy, childbirth or related medical conditions, reproductive health decision making, age, military or veteran status, domestic violence or sexual assault victim status, or any other basis protected by applicable law. Nor will Gallo discriminate based on a perception that an individual has any of the foregoing characteristics or is associated with a person who has, or is perceived to have, any of those characteristics.
Gallo will comply with state and local laws prohibiting discrimination for lawful out-of-work behavior, such as off-duty use of cannabis away from the workplace (subject to federal and state law exceptions), the existence of non-psychoactive cannabis metabolites in hair, blood, urine, or other bodily fluids as determined by a drug screening test (subject to federal and state law exceptions).
We also consider qualified applicants with criminal histories, consistent with applicable federal, state and local law. Gallo is committed to providing reasonable accommodation for candidates with disabilities in our recruiting process. If you need any assistance or accommodation due to a disability, please let us know at ************.
Gallo is enrolled in the Department of Homeland Security's E-Verify program and will use the program to verify the employment eligibility of all newly hired employees as required.
E-Verify Notice
Right to Work
Employee Polygraph Protection Act
$40-60 hourly 28d ago
Senior Security Engineer
Specialized 4.4
Cyber security analyst job in Morgan Hill, CA
Are you a versatile cybersecurity professional passionate about strengthening security across a global, cloud-native environment that keeps our teammates connected and secure so we can build the best bikes in the world? Do you thrive in fast-paced settings and enjoy collaborating across diverse security domains to shape the future of cybersecurity at Specialized? If you answered "Yes," we want to talk to you!
HOW YOU'LL MAKE A DIFFERENCE
* Leverage your deep knowledge of network protocols, software security, threats, vulnerabilities, and mitigation strategies to build a secure environment that reduces risk and enables Specialized to achieve its goals.
* Continuously monitor security alerts, refine detection rules, and lead or support incident response efforts.
* Actively hunt for threats across systems, applications, and networks, recommending mitigations and next steps.
* Strengthen cloud security by addressing AI/ML vulnerabilities and partnering with DevOps teams to harden cloud architectures and embed security throughout development and deployment practices.
* Collaborate with Global Technology Operations to ensure secure system administration, endpoint protection, conditional access, and compliance with security standards.
* Contribute to the creation and maintenance of security documentation, playbooks, and metrics.
* Stay current with emerging threats, security trends, and best practices in cloud-native and AI-driven environments.
WHAT YOU NEED TO WIN
* 5+ years of experience in a security engineering role.
* Strong understanding of IT fundamentals across networking, systems, and application layers.
* Familiarity with major cloud platforms (AWS, Azure, OCI) and their security features.
* Experience working across multiple security domains (e.g., detection, application, infrastructure, compliance).
* Solid grasp of cybersecurity principles, common vulnerabilities, secure network design, and current attack vectors.
* Strong problem-solving skills and ability to prioritize tasks in a fast-paced environment.
* Excellent communication skills with the ability to collaborate across technical and non-technical teams.
PREFERRED QUALIFICATIONS / EXPERIENCE
* Experience with bug bounty programs or vulnerability validation.
* Security certifications such as CISSP, CISA, CEH, CISM, GSEC, or OSCP.
* Interest in leveraging AI to automate security tasks and improve threat detection.
PAY
Below is a summary of compensation elements for this role at the company if based in the following locations:
California Base Pay Range: ($85,971 $141,852 )
* At Specialized, your base pay is one part of your total compensation package and will depend on your work experience, skills, certification, and location.
BENEFITS
As a full-time, regular teammate, you are eligible for the following benefits, beginning the first of the month following your start date.
Benefits include:
* Competitive pay with annual performance-based reviews for continued growth and recognition
* Comprehensive healthcare plan options, including PPO, EPO, HDHP, and HMO (acupuncture and physical therapy included)
* Health Savings Account (HSA) with employer HSA contributions when enrolled in the High-Deductible Healthcare Plan (HDHP)
* Dental and Vision plans
* 401(k) Company Matching up to $5,000 annually with immediate 100% vesting and administrative fees paid for by the company
* Annual Profit Sharing: Share in the rewards of our collective success through our profit sharing program, with contributions made directly to 401(k) accounts.
* Company-paid Life, AD&D, Short-Term Disability, and Long-Term Disability Insurance
* Employee Assistance Program that provides access to individualized mental well-being care
* Generous Vacation, Sick, Paid Holidays, and Volunteer Time Off
* 14 weeks of 100% paid leave for birthing parents and 8 weeks of 100% paid leave for non-birthing parents, plus a Specialized bike for your new baby
* Up to $9,000 annually in Career Development & Degree Assistance
* Up to $250 annually in Fitness & Wellness Reimbursement
* Industry Pro-Deal Discounts and Perks
For additional information on benefits and perks, please visit: *********************************
We want to increase representation of all races, genders, and body types in the cycling industry and are committed to building a diverse and inclusive workforce where all people thrive. We encourage everyone - especially those from marginalized groups - to apply to our job postings and help us earn the position as the rider's brand of choice. We are always looking for creative, innovative, and passionate people who are eager to contribute to our mission of pedaling the planet forward. Regardless of your qualifications, if you are ready to make a difference, please apply and let us know how you can make an impact at Specialized!
See what we are up to on LinkedIn, Instagram.
$86k-141.9k yearly Auto-Apply 19d ago
Senior Security Engineer
Specialized Bicycles 4.5
Cyber security analyst job in Morgan Hill, CA
Are you a versatile cybersecurity professional passionate about strengthening security across a global, cloud-native environment that keeps our teammates connected and secure so we can build the best bikes in the world? Do you thrive in fast-paced settings and enjoy collaborating across diverse security domains to shape the future of cybersecurity at Specialized? If you answered “Yes,” we want to talk to you!
HOW YOU'LL MAKE A DIFFERENCE
Leverage your deep knowledge of network protocols, software security, threats, vulnerabilities, and mitigation strategies to build a secure environment that reduces risk and enables Specialized to achieve its goals.
Continuously monitor security alerts, refine detection rules, and lead or support incident response efforts.
Actively hunt for threats across systems, applications, and networks, recommending mitigations and next steps.
Strengthen cloud security by addressing AI/ML vulnerabilities and partnering with DevOps teams to harden cloud architectures and embed security throughout development and deployment practices.
Collaborate with Global Technology Operations to ensure secure system administration, endpoint protection, conditional access, and compliance with security standards.
Contribute to the creation and maintenance of security documentation, playbooks, and metrics.
Stay current with emerging threats, security trends, and best practices in cloud-native and AI-driven environments.
WHAT YOU NEED TO WIN
5+ years of experience in a security engineering role.
Strong understanding of IT fundamentals across networking, systems, and application layers.
Familiarity with major cloud platforms (AWS, Azure, OCI) and their security features.
Experience working across multiple security domains (e.g., detection, application, infrastructure, compliance).
Solid grasp of cybersecurity principles, common vulnerabilities, secure network design, and current attack vectors.
Strong problem-solving skills and ability to prioritize tasks in a fast-paced environment.
Excellent communication skills with the ability to collaborate across technical and non-technical teams.
PREFERRED QUALIFICATIONS / EXPERIENCE
Experience with bug bounty programs or vulnerability validation.
Security certifications such as CISSP, CISA, CEH, CISM, GSEC, or OSCP.
Interest in leveraging AI to automate security tasks and improve threat detection.
PAY
Below is a summary of compensation elements for this role at the company if based in the following locations:
California Base Pay Range: ($85,971 $141,852 )
*At Specialized, your base pay is one part of your total compensation package and will depend on your work experience, skills, certification, and location.
BENEFITS
As a full-time, regular teammate, you are eligible for the following benefits, beginning the first of the month following your start date.
Benefits include:
Competitive pay with annual performance-based reviews for continued growth and recognition
Comprehensive healthcare plan options, including PPO, EPO, HDHP, and HMO (acupuncture and physical therapy included)
Health Savings Account (HSA) with employer HSA contributions when enrolled in the High-Deductible Healthcare Plan (HDHP)
Dental and Vision plans
401(k) Company Matching up to $5,000 annually with immediate 100% vesting and administrative fees paid for by the company
Annual Profit Sharing: Share in the rewards of our collective success through our profit sharing program, with contributions made directly to 401(k) accounts.
Company-paid Life, AD&D, Short-Term Disability, and Long-Term Disability Insurance
Employee Assistance Program that provides access to individualized mental well-being care
Generous Vacation, Sick, Paid Holidays, and Volunteer Time Off
14 weeks of 100% paid leave for birthing parents and 8 weeks of 100% paid leave for non-birthing parents, plus a Specialized bike for your new baby
Up to $9,000 annually in Career Development & Degree Assistance
Up to $250 annually in Fitness & Wellness Reimbursement
Industry Pro-Deal Discounts and Perks
For additional information on benefits and perks, please visit: *********************************
We want to increase representation of all races, genders, and body types in the cycling industry and are committed to building a diverse and inclusive workforce where all people thrive. We encourage everyone - especially those from marginalized groups - to apply to our job postings and help us earn the position as the rider's brand of choice. We are always looking for creative, innovative, and passionate people who are eager to contribute to our mission of pedaling the planet forward. Regardless of your qualifications, if you are ready to make a difference, please apply and let us know how you can make an impact at Specialized!
See what we are up to on LinkedIn, Instagram.
$86k-141.9k yearly Auto-Apply 20d ago
Information Systems Analyst III - Security Analyst
San Joaquin County, Ca 3.8
Cyber security analyst job in Stockton, CA
Introduction This examination is being given to fill one vacancy in the Information Systems Department and to establish an eligible list which may be used to fill future vacancies. Resumes will not be accepted in lieu of an application. A completed application must be postmarked or received online by the final filing deadline.
NOTE: All correspondences relating to this recruitment will be delivered via e-mail. The e-mail account used will be the one provided on your employment application during time of submittal. Please be sure to check your e-mail often for updates. If you do not have an e-mail account on file, Human Resources will send you correspondences via US Mail.
DEFINITION
Under direction, performs specialized and advanced professional computer and related systems support work within the Information Systems Division; troubleshoots, analyzes and resolves difficult systems and applications hardware and software problems; and performs other related work as required in accordance with Rule 3, Section 3 of the Civil Service Rules.
CLASS CHARACTERISTICS
This is the advanced journey level class in the Information Systems Analyst series. Incumbents perform work of a professional nature, utilizing skills that require an advanced understanding of complex analytical procedures and processes while working with a significant amount of independent authority and judgment. As assigned, some positions may exercise technical supervision over lower level staff; however, these supervisory duties are ancillary in nature and are not considered to be the primary purpose of the class. The program assignment will determine the emphasis of an incumbent's duties as described below. This class is distinguished from the Information Systems Analyst II level by it's requirement for specialized, functional or technical expertise beyond the journey level. Incumbents perform the more difficult and responsible types of duties assigned to classes within the series including systems analysis, development and direct client/maintenance support to large and complex systems and applications.
This class is distinguished from the Information Systems Analyst IV in that the latter provides highly advanced systems analysis, design and development support to one or more departments with highly complex systems and programs. Incumbents at the Information Systems Analyst IV level may also serve in the capacity of database administrator or as a project lead on a component of assigned information systems projects.
TYPICAL DUTIES
* Performs professional level specialized and complex duties to support information technology systems in assigned area; areas of responsibility include the analysis, evaluation, design, programming, development, testing, implementation, documentation and maintenance of large and complex systems, networks, programs and applications across multiple platforms and technologies.
* Designs and develops components of current or new systems; serves on assigned projects for large and complex systems; in conjunction with project team members, analyzes user requirements and recommends technology solution; reviews and evaluates current and third party systems and applications; determines method of integrating new programming code into existing programs to meet user needs; develops data flow diagrams and other systems documentation; creates program specifications; designs data structures, screens, file structures, reports, forms, and menus; develops optimum system configurations; locates and downloads existing system data; develops and implements testing plan; performs quality assurance duties; determines whether new program meets the client's business and technology requirements; recommends changes as needed.
* Serves as resource and provides highly specialized support to maintaining existing systems; assesses, reviews and conducts research on system operational problems and functionality; provides technical solutions to client on alternative systems or applications.
* Performs a variety of complex analytical duties in planning, developing, installing, implementing, integrating, testing and evaluating the County's local and wide area networks; installs, configures and manages servers; coordinates the installation and maintenance of computers, circuits, data communications equipment, printers and other peripheral equipment.
* Investigates, analyzes and resolves network-related problems; resolves compatibility problems; troubleshoots network failures, router problems and telecommunications problems; recommends and implements changes and improvements.
* Monitors network security and performance; identifies unauthorized access and potential security risks; measures volume and performance of network traffic; identifies utilization and performance issues; recommends improvements to security and network performance.
* Develops, implements and maintains the County's Internet and Intranet sites; recommends design and layouts; writes code; creates database connections; develops written technical procedures; implements interactive website components; provides Internet training for County staff.
* Performs technical writing duties in the development and production of system documentation, instructional and procedural manuals.
* Identifies training issues and coordinates training sessions for client users on assigned systems or applications; develops training schedule; designs training manuals; conducts training sessions.
* Attends and participates in professional group meetings; stays abreast of new trends and innovations in the field of information technology.
* May exercise technical supervision over lower level staff; assists in selecting, training, motivating and evaluating assigned staff; provides or coordinates staff training; works with employees to correct deficiencies.
MINIMUM QUALIFICATIONS
Note: The following special requirements were approved by the Director of Human Resources on May 19, 2025.
Education: Graduation from an accredited four-year college or university with a major in computer science, information systems, mathematics, business administration or a related field.
Experience: Two years of increasingly responsible professional, cybersecurity analytical and related systems work in an information systems environment.
Substitution #1: Possession of an approved information systems technology certificate, or completion of an approved information systems training course may substitute for all or part of the above required education. A list of approved certificates and/or courses shall be maintained within the Human Resources Department.
Substitution #2: Additional qualifying experience may substitute for the above required education on a year-for-year basis to a maximum of two years.
Special Requirement: The above required experience and any certification used to qualify under substitution pattern #1, may need to be within the assigned specialist or functional area.
KNOWLEDGE
Operations, services and activities of a comprehensive information systems program across multiple operating platforms; advanced principles and practices of computer science and information systems; methods and techniques of highly complex system analysis, design and development; advanced methods and techniques of system hardware and software troubleshooting and installation; advanced principles and practices of structured programming; operational characteristics of systems hardware and software across multiple environments; methods and techniques of evaluating business operations to develop technology solutions; principles and procedures of quality assurance; methods and techniques of developing testing procedures; methods and techniques of designing, implementing and maintaining internet and intranet web sites; operations, services and activities of local and wide area network design, development, security and administration; local and wide area network protocols, routing techniques and installation methods; methods and techniques of installing and maintaining and administering network servers, hardware and software; pertinent Federal, State and local codes, laws and regulations.
ABILITY
Provide advanced level technical support for system analysis, implementation and maintenance; detect, isolate and resolve complex information system problems; recommend, design, implement and install systems and programs; independently perform complex systems and applications programming and analysis duties; design, configure, install and test local and wide area network servers, hardware, software, routers and associated components; analyze procedures and data to develop logical solutions to complex systems problems; troubleshoot and analyze complex local and wide area network operating system or hardware and software problems; learn to analyze and assess the technological needs of departments with large and highly complex systems; learn operations and characteristics of database management systems, tools and utilities; learn and apply concepts and principles of database management and administration; learn principles, practices, methods and techniques of serving as project lead on assigned information systems projects; communicate clearly and concisely, both orally and in writing; establish and maintain effective working relationships with those contacted in the course of work.
PHYSICAL/MENTAL REQUIREMENTS
Mobility - Frequent use of keyboards; frequent sitting, standing or walking for long periods; occasional pushing/pulling, bending, squatting and crawling; driving. Lifting - frequently 5-30 pounds; occasionally 70 pounds or less. Vision - constant use of good overall vision; frequent reading/close-up work; occasional color, depth and peripheral vision. Dexterity - frequent repetitive motion; frequent writing; frequent grasping, holding, reaching. Hearing/Talking - frequent talking/hearing in person and on the telephone. Emotional/Psychological - frequent decision making and concentration; frequent public contact; occasional working alone, working nights and traveling. Environmental - frequent exposure to noise.
San Joaquin County complies with the Americans with Disabilities Act and, upon request, will consider reasonable accommodations to enable individuals with disabilities to perform essential job functions.
Equal Opportunity Employer
San Joaquin County is an Equal Employment Opportunity (EEO) Employer and is committed to providing equal employment to all without regard to age, ancestry, color, creed, marital status, medical condition, national origin, physical or mental disability, political affiliation or belief, pregnancy, race, religion, sex, or sexual orientation. For more information go to Equal Employment Opportunity Division (sjgov.org).
Accommodations for those covered by the Americans with Disabilities Act (ADA):
San Joaquin County complies with the Americans with Disabilities Act and, upon request, will consider reasonable accommodations to enable individuals with disabilities to perform essential job functions.
BENEFITS
Employees hired into this classification are members of a bargaining unit which is represented by SEIU Local 1021.
Health Insurance: San Joaquin County provides employees with a choice of three health plans: a Kaiser Plan, a Select Plan, and a Premier Plan. Employees pay a portion of the cost of the premium. Dependent coverage is also available.
Dental Insurance: The County provides employees with a choice of two dental plans: Delta Dental and United Health Care-Select Managed Care Direct Compensation Plan. There is no cost for employee only coverage in either plan; dependent coverage is available at the employee's expense.
Vision Insurance: The County provides vision coverage through Vision Service Plan (VSP). There is no cost for employee only coverage; dependent coverage is available at the employee's expense.
For more detailed information on the County's benefits program, visit our website at ************* under Human Resources/Employee Benefits.
Life Insurance: The County provides eligible employees with life insurance coverage as follows:
1 but less than 3 years of continuous service: $1,000
3 but less than 5 years of continuous service: $3,000
5 but less than 10 years of continuous service: $5,000
10 years of continuous service or more: $10,000
Employee may purchase additional term life insurance at the group rate.
125 Flexible Benefits Plan: This is a voluntary program that allows employees to use pre-tax dollars to pay for health-related expenses that are not paid by a medical, dental or vision plan (Health Flexible Spending Account $2550 annual limit with a $500 carry over); and dependent care costs (Dependent Care Assistance Plan $5000 annual limit).
Retirement Plan: Employees of the County are covered by the County Retirement Law of 1937. Please visit the San Joaquin County Employees' Retirement Association (SJCERA) at ************** for more information. NOTE: If you are receiving a retirement allowance from another California county covered by the County Employees' Retirement Act of 1937 or from any governmental agency covered by the California Public Employees' Retirement System (PERS), you are advised to contact the Retirement Officer of the Retirement Plan from which you retired to determine what effect employment in San Joaquin County would have on your retirement allowance.
Deferred Compensation: The County maintains a deferred compensation plan under Section 457 of the IRS code. You may annually contribute $22,500 or 100% of your includible compensation, whichever is less. Individuals age 50 or older may contribute to their plan, up to $30,000. The Roth IRA (after tax) is also now available.
Vacation: Maximum earned vacation is 10 days each year up to 3 years; 15 days after 3 years; 20 days after 10 years; and 23 days after 20 years.
Holidays: Effective July 1, 2017, all civil service status employees earn 14 paid holidays each year. Please see the appopriate MOU for details regarding holidays, accruals, use, and cashability of accrued time.
Sick Leave: 12 working days of sick leave annually with unlimited accumulation. Sick leave incentive: An employee is eligible to receive eight hours administrative leave if the leave balance equals at least one- half of the cumulative amount that the employee is eligible to accrue. The employee must also be on payroll during the entire calendar year.
Bereavement Leave: 3 days of paid leave for the death of qualifying family member, 2 additional days of accrued leave for death of employee's spouse, domestic partner, parent or child.
Merit Salary Increase: New employees will receive the starting salary, which is the first step of the salary range. After employees serve 52 weeks (2080 hours) on each step of the range, they are eligible for a merit increase to the next step.
Job Sharing: Employees may agree to job-share a position, subject to approval by a Department Head and the Director of Human Resources.
Educational Reimbursement Program: Eligible employees may be reimbursed for career-related course work up to a maximum of $850 per fiscal year. Eligible employees enrolled in an approved four (4) year College or University academic program may be reimbursed up to $800 per semester for a maximum of $1600 per fiscal year.
Parking Supplemental Downtown Stockton: The County contributes up to $20 per pay period for employees who pay for parking and are assigned to work in the Downtown Core Area.
School Activities: Employees may take up to 40 hours per year, but not more than eight (8) hours per month, to participate in their children's school activities.
Selection Procedures
Applicants who meet the minimum qualifications will go through the following examination process:
* Written Exam: The civil service written exam is a multiple choice format. If the written exam is administered alone, it will be 100% of the overall score. Candidates must achieve a minimum rating of 70% in order to be placed on the eligible list.
* Oral Exam: The oral exam is a structured interview process that will assess the candidate's education, training, and experience and may include a practical exercise. The oral exam selection process is not a hiring interview. A panel of up to four people will determine the candidate's score and rank for placement on the eligible list. Top candidates from the eligible list are referred for hiring interviews. If the oral exam is administered alone, it will be 100% of the overall score. Candidates must achieve a minimum rating of 70% in order to be placed on the eligible list.
* Written & Oral Exam: If both a written exam and an oral exam is administered, the written exam is weighted at 60% and the oral exam is weighted at 40% unless otherwise indicated on the announcement. Candidates must achieve a minimum rating of 70% on each examination in order to be placed on the eligible list.
* Rate-out: A rate-out is an examination that involves a paper rating of the candidate's application using the following criteria: education, training, and experience. Candidates will not be scheduled for the rate-out process.
Note: The rating of 70 referred to may be the same or other than an arithmetic 70% of the total possible points.
Testing Accommodation: Candidates who require testing accommodation under the Americans with Disabilities Act (ADA) must call Human Resources Division at ************** prior to the examination date.
Veteran's Points: Eligible veterans, unmarried widows and widowers of veterans of the United States Armed Forces who have been honorably discharged and who have served during wartime shall be given veteran's points in initial appointment to County service. Eligible veterans receive 5 points and eligible disabled veterans receive 10 points. Disabled veterans must submit a recent award letter stating a 10% service connected disability issued by the United States Veterans Administration. Note: A copy of your DD214 showing the discharge type must be received in the Human Resources by the date of the examination.
Acceptable wartime service dates:
* September 16, 1940 to December 31, 1946
* June 27, 1950 to January 31, 1955
* August 5, 1964 to May 7, 1975
* Persian Gulf War, August 2, 1990, through a date to be set by law or Presidential Proclamation.
Eligible Lists: Candidates who pass the examination will be placed on an eligible list for that classification. Eligible lists are effective for nine months, but may be extended by the Human Resources Director for a period which shall not exceed a total of three years from the date established.
Certification/Referral: Names from the eligible list will be referred to the hiring department by the following methods.
* Rule of the Rank: The top rank or ranks of eligibles will be referred for hiring interviews. The minimum number of names to be referred will be equal to the number of positions plus nine, or 10% of the eligible list, whichever is higher. When filling nine or more positions in a department at the same time, the top rank or ranks will be referred and the minimum number of names shall be two times the number of positions to be filled or 10% of the eligible list, whichever is higher. This applies only to open competitive recruitments.
* Rule of Five: The top five names will be referred for hiring interviews. This applies only to department or countywide promotional examination.
* Rule of the List: For classifications designated by the Director of Human Resources, the entire eligible list will be referred to the department.
Physical Exam: Some classifications require physical examinations. Final appointment cannot be made until the eligible has passed the physical examination. The County pays for physical examinations administered in its medical facilities.
Pre-Employment Drug Screening Exam: Some classifications require a new employee successfully pass a pre-employment drug screen as a condition of employment. Final appointment cannot be made until the eligible has passed the drug screen. The County pays for the initial drug screen.
Employment of Relatives: Applicants who are relatives of employees in a department within the 3rd degree of relationship, (parent, child, grand parent, grand child or sibling) either by blood or marriage, may not be appointed, promoted, transferred into or within the department when;
* They are related to the Appointing Authority or
* The employment would result in one of them supervising the work of the other.
Department Head may establish additional limitations on the hiring of relatives by departmental rule.
Proof of Eligibility: If you are offered a job you will be required to provide proof of U.S. citizenship or other documents that establish your eligibility to be employed in the U.S.
HOW TO APPLY
Apply Online:
*************/department/hr
By mail or in person:
San Joaquin County Human Resources
44 N. San Joaquin Street Suite 330
Stockton, CA 95202
Office hours:
Monday - Friday 8:00 am to 5:00 pm; excluding holidays.
Phone: **************
Job Line:
For current employment opportunities please call our 24-hour job line at **************.
When a final filing date is indicated, applications must be filed with the Human Resources Division before 5:00 p.m. or postmarked by the final filing date. Resumes will not be accepted in lieu of an application. Applications sent through county inter-office mail, which are not received by the final filing date, will not be accepted. (The County assumes no responsibility for mailed applications which are not received by the Human Resources Division).
San Joaquin County Substance Abuse Policy: San Joaquin County has adopted a Substance Abuse Policy in compliance with the Federal Drug Free Workplace Act of 1988. This policy is enforced by all San Joaquin County Departments and applies to all San Joaquin County employees.
Equal Opportunity Employer: San Joaquin County is an Equal Employment Opportunity (EEO) Employer and is committed to providing equal employment to all without regard to age, ancestry, color, creed, marital status, medical condition, national origin, physical or mental disability, political affiliation or belief, pregnancy, race, religion, sex, or sexual orientation. For more information go to *************/department/hr/eeo.
Click on a link below to apply for this position:
$22.5k yearly 9d ago
Information Systems Analyst III - Security Analyst
Sjgov
Cyber security analyst job in Stockton, CA
Introduction
This examination is being given to fill one vacancy in the Information Systems Department and to establish an eligible list which may be used to fill future vacancies. Resumes will not be accepted in lieu of an application. A completed application must be postmarked or received online by the final filing deadline.
NOTE: All correspondences relating to this recruitment will be delivered via e-mail. The e-mail account used will be the one provided on your employment application during time of submittal. Please be sure to check your e-mail often for updates. If you do not have an e-mail account on file, Human Resources will send you correspondences via US Mail.
DEFINITION Under direction, performs specialized and advanced professional computer and related systems support work within the Information Systems Division; troubleshoots, analyzes and resolves difficult systems and applications hardware and software problems; and performs other related work as required in accordance with Rule 3, Section 3 of the Civil Service Rules. CLASS CHARACTERISTICS This is the advanced journey level class in the Information Systems Analyst series. Incumbents perform work of a professional nature, utilizing skills that require an advanced understanding of complex analytical procedures and processes while working with a significant amount of independent authority and judgment. As assigned, some positions may exercise technical supervision over lower level staff; however, these supervisory duties are ancillary in nature and are not considered to be the primary purpose of the class. The program assignment will determine the emphasis of an incumbent's duties as described below. This class is distinguished from the Information Systems Analyst II level by it's requirement for specialized, functional or technical expertise beyond the journey level. Incumbents perform the more difficult and responsible types of duties assigned to classes within the series including systems analysis, development and direct client/maintenance support to large and complex systems and applications.
This class is distinguished from the Information Systems Analyst IV in that the latter provides highly advanced systems analysis, design and development support to one or more departments with highly complex systems and programs. Incumbents at the Information Systems Analyst IV level may also serve in the capacity of database administrator or as a project lead on a component of assigned information systems projects. TYPICAL DUTIES
Performs professional level specialized and complex duties to support information technology systems in assigned area; areas of responsibility include the analysis, evaluation, design, programming, development, testing, implementation, documentation and maintenance of large and complex systems, networks, programs and applications across multiple platforms and technologies.
Designs and develops components of current or new systems; serves on assigned projects for large and complex systems; in conjunction with project team members, analyzes user requirements and recommends technology solution; reviews and evaluates current and third party systems and applications; determines method of integrating new programming code into existing programs to meet user needs; develops data flow diagrams and other systems documentation; creates program specifications; designs data structures, screens, file structures, reports, forms, and menus; develops optimum system configurations; locates and downloads existing system data; develops and implements testing plan; performs quality assurance duties; determines whether new program meets the client's business and technology requirements; recommends changes as needed.
Serves as resource and provides highly specialized support to maintaining existing systems; assesses, reviews and conducts research on system operational problems and functionality; provides technical solutions to client on alternative systems or applications.
Performs a variety of complex analytical duties in planning, developing, installing, implementing, integrating, testing and evaluating the County's local and wide area networks; installs, configures and manages servers; coordinates the installation and maintenance of computers, circuits, data communications equipment, printers and other peripheral equipment.
Investigates, analyzes and resolves network-related problems; resolves compatibility problems; troubleshoots network failures, router problems and telecommunications problems; recommends and implements changes and improvements.
Monitors network security and performance; identifies unauthorized access and potential security risks; measures volume and performance of network traffic; identifies utilization and performance issues; recommends improvements to security and network performance.
Develops, implements and maintains the County's Internet and Intranet sites; recommends design and layouts; writes code; creates database connections; develops written technical procedures; implements interactive website components; provides Internet training for County staff.
Performs technical writing duties in the development and production of system documentation, instructional and procedural manuals.
Identifies training issues and coordinates training sessions for client users on assigned systems or applications; develops training schedule; designs training manuals; conducts training sessions.
Attends and participates in professional group meetings; stays abreast of new trends and innovations in the field of information technology.
May exercise technical supervision over lower level staff; assists in selecting, training, motivating and evaluating assigned staff; provides or coordinates staff training; works with employees to correct deficiencies.
MINIMUM QUALIFICATIONS Note: The following special requirements were approved by the Director of Human Resources on May 19, 2025.
Education: Graduation from an accredited four-year college or university with a major in computer science, information systems, mathematics, business administration or a related field.
Experience: Two years of increasingly responsible professional, cybersecurity analytical and related systems work in an information systems environment.
Substitution #1: Possession of an approved information systems technology certificate, or completion of an approved information systems training course may substitute for all or part of the above required education. A list of approved certificates and/or courses shall be maintained within the Human Resources Department.
Substitution #2: Additional qualifying experience may substitute for the above required education on a year-for-year basis to a maximum of two years.
Special Requirement: The above required experience and any certification used to qualify under substitution pattern #1, may need to be within the assigned specialist or functional area. KNOWLEDGE Operations, services and activities of a comprehensive information systems program across multiple operating platforms; advanced principles and practices of computer science and information systems; methods and techniques of highly complex system analysis, design and development; advanced methods and techniques of system hardware and software troubleshooting and installation; advanced principles and practices of structured programming; operational characteristics of systems hardware and software across multiple environments; methods and techniques of evaluating business operations to develop technology solutions; principles and procedures of quality assurance; methods and techniques of developing testing procedures; methods and techniques of designing, implementing and maintaining internet and intranet web sites; operations, services and activities of local and wide area network design, development, security and administration; local and wide area network protocols, routing techniques and installation methods; methods and techniques of installing and maintaining and administering network servers, hardware and software; pertinent Federal, State and local codes, laws and regulations. ABILITY Provide advanced level technical support for system analysis, implementation and maintenance; detect, isolate and resolve complex information system problems; recommend, design, implement and install systems and programs; independently perform complex systems and applications programming and analysis duties; design, configure, install and test local and wide area network servers, hardware, software, routers and associated components; analyze procedures and data to develop logical solutions to complex systems problems; troubleshoot and analyze complex local and wide area network operating system or hardware and software problems; learn to analyze and assess the technological needs of departments with large and highly complex systems; learn operations and characteristics of database management systems, tools and utilities; learn and apply concepts and principles of database management and administration; learn principles, practices, methods and techniques of serving as project lead on assigned information systems projects; communicate clearly and concisely, both orally and in writing; establish and maintain effective working relationships with those contacted in the course of work. PHYSICAL/MENTAL REQUIREMENTS Mobility - Frequent use of keyboards; frequent sitting, standing or walking for long periods; occasional pushing/pulling, bending, squatting and crawling; driving. Lifting - frequently 5-30 pounds; occasionally 70 pounds or less. Vision - constant use of good overall vision; frequent reading/close-up work; occasional color, depth and peripheral vision. Dexterity - frequent repetitive motion; frequent writing; frequent grasping, holding, reaching. Hearing/Talking - frequent talking/hearing in person and on the telephone. Emotional/Psychological - frequent decision making and concentration; frequent public contact; occasional working alone, working nights and traveling. Environmental - frequent exposure to noise.
San Joaquin County complies with the Americans with Disabilities Act and, upon request, will consider reasonable accommodations to enable individuals with disabilities to perform essential job functions.
Equal Opportunity Employer
San Joaquin County is an Equal Employment Opportunity (EEO) Employer and is committed to providing equal employment to all without regard to age, ancestry, color, creed, marital status, medical condition, national origin, physical or mental disability, political affiliation or belief, pregnancy, race, religion, sex, or sexual orientation. For more information go to Equal Employment Opportunity Division (sjgov.org).
Accommodations for those covered by the Americans with Disabilities Act (ADA):
San Joaquin County complies with the Americans with Disabilities Act and, upon request, will consider reasonable accommodations to enable individuals with disabilities to perform essential job functions.
BENEFITS
Employees hired into this classification are members of a bargaining unit which is represented by SEIU Local 1021.
Health Insurance: San Joaquin County provides employees with a choice of three health plans: a Kaiser Plan, a Select Plan, and a Premier Plan. Employees pay a portion of the cost of the premium. Dependent coverage is also available.
Dental Insurance: The County provides employees with a choice of two dental plans: Delta Dental and United Health Care-Select Managed Care Direct Compensation Plan. There is no cost for employee only coverage in either plan; dependent coverage is available at the employee's expense.
Vision Insurance: The County provides vision coverage through Vision Service Plan (VSP). There is no cost for employee only coverage; dependent coverage is available at the employee's expense.
For more detailed information on the County's benefits program, visit our website at ************* under Human Resources/Employee Benefits.
Life Insurance: The County provides eligible employees with life insurance coverage as follows:
1 but less than 3 years of continuous service: $1,000
3 but less than 5 years of continuous service: $3,000
5 but less than 10 years of continuous service: $5,000
10 years of continuous service or more: $10,000
Employee may purchase additional term life insurance at the group rate.
125 Flexible Benefits Plan: This is a voluntary program that allows employees to use pre-tax dollars to pay for health-related expenses that are not paid by a medical, dental or vision plan (Health Flexible Spending Account $2550 annual limit with a $500 carry over); and dependent care costs (Dependent Care Assistance Plan $5000 annual limit).
Retirement Plan: Employees of the County are covered by the County Retirement Law of 1937. Please visit the San Joaquin County Employees' Retirement Association (SJCERA) at ************** for more information. NOTE: If you are receiving a retirement allowance from another California county covered by the County Employees' Retirement Act of 1937 or from any governmental agency covered by the California Public Employees' Retirement System (PERS), you are advised to contact the Retirement Officer of the Retirement Plan from which you retired to determine what effect employment in San Joaquin County would have on your retirement allowance.
Deferred Compensation: The County maintains a deferred compensation plan under Section 457 of the IRS code. You may annually contribute $22,500 or 100% of your includible compensation, whichever is less. Individuals age 50 or older may contribute to their plan, up to $30,000. The Roth IRA (after tax) is also now available.
Vacation: Maximum earned vacation is 10 days each year up to 3 years; 15 days after 3 years; 20 days after 10 years; and 23 days after 20 years.
Holidays: Effective July 1, 2017, all civil service status employees earn 14 paid holidays each year. Please see the appopriate MOU for details regarding holidays, accruals, use, and cashability of accrued time.
Sick Leave: 12 working days of sick leave annually with unlimited accumulation.
Sick leave incentive
: An employee is eligible to receive eight hours administrative leave if the leave balance equals at least one- half of the cumulative amount that the employee is eligible to accrue. The employee must also be on payroll during the entire calendar year.
Bereavement Leave: 3 days of paid leave for the death of qualifying family member, 2 additional days of accrued leave for death of employee's spouse, domestic partner, parent or child.
Merit Salary Increase: New employees will receive the starting salary, which is the first step of the salary range. After employees serve 52 weeks (2080 hours) on each step of the range, they are eligible for a merit increase to the next step.
Job Sharing: Employees may agree to job-share a position, subject to approval by a Department Head and the Director of Human Resources.
Educational Reimbursement Program: Eligible employees may be reimbursed for career-related course work up to a maximum of $850 per fiscal year. Eligible employees enrolled in an approved four (4) year College or University academic program may be reimbursed up to $800 per semester for a maximum of $1600 per fiscal year.
Parking Supplemental Downtown Stockton: The County contributes up to $20 per pay period for employees who pay for parking and are assigned to work in the Downtown Core Area.
School Activities: Employees may take up to 40 hours per year, but not more than eight (8) hours per month, to participate in their children's school activities.
Selection Procedures
Applicants who meet the minimum qualifications will go through the following examination process:
Written Exam: The civil service written exam is a multiple choice format. If the written exam is administered alone, it will be 100% of the overall score. Candidates must achieve a minimum rating of 70% in order to be placed on the eligible list.
Oral Exam: The oral exam is a structured interview process that will assess the candidate's education, training, and experience and may include a practical exercise. The oral exam selection process is not a hiring interview. A panel of up to four people will determine the candidate's score and rank for placement on the eligible list. Top candidates from the eligible list are referred for hiring interviews. If the oral exam is administered alone, it will be 100% of the overall score. Candidates must achieve a minimum rating of 70% in order to be placed on the eligible list.
Written & Oral Exam: If both a written exam and an oral exam is administered, the written exam is weighted at 60% and the oral exam is weighted at 40% unless otherwise indicated on the announcement. Candidates must achieve a minimum rating of 70% on each examination in order to be placed on the eligible list.
Rate-out: A rate-out is an examination that involves a paper rating of the candidate's application using the following criteria: education, training, and experience. Candidates will not be scheduled for the rate-out process.
Note: The rating of 70 referred to may be the same or other than an arithmetic 70% of the total possible points.
Testing Accommodation: Candidates who require testing accommodation under the Americans with Disabilities Act (ADA) must call Human Resources Division at ************** prior to the examination date.
Veteran's Points: Eligible veterans, unmarried widows and widowers of veterans of the United States Armed Forces who have been honorably discharged and who have served during wartime shall be given veteran's points in initial appointment to County service. Eligible veterans receive 5 points and eligible disabled veterans receive 10 points. Disabled veterans must submit a recent award letter stating a 10% service connected disability issued by the United States Veterans Administration. Note: A copy of your DD214 showing the discharge type must be received in the Human Resources by the date of the examination.
Acceptable wartime service dates:
September 16, 1940 to December 31, 1946
June 27, 1950 to January 31, 1955
August 5, 1964 to May 7, 1975
Persian Gulf War, August 2, 1990, through a date to be set by law or Presidential Proclamation.
Eligible Lists: Candidates who pass the examination will be placed on an eligible list for that classification. Eligible lists are effective for nine months, but may be extended by the Human Resources Director for a period which shall not exceed a total of three years from the date established.
Certification/Referral: Names from the eligible list will be referred to the hiring department by the following methods.
Rule of the Rank: The top rank or ranks of eligibles will be referred for hiring interviews. The minimum number of names to be referred will be equal to the number of positions plus nine, or 10% of the eligible list, whichever is higher. When filling nine or more positions in a department at the same time, the top rank or ranks will be referred and the minimum number of names shall be two times the number of positions to be filled or 10% of the eligible list, whichever is higher. This applies only to open competitive recruitments.
Rule of Five: The top five names will be referred for hiring interviews. This applies only to department or countywide promotional examination.
Rule of the List: For classifications designated by the Director of Human Resources, the entire eligible list will be referred to the department.
Physical Exam: Some classifications require physical examinations. Final appointment cannot be made until the eligible has passed the physical examination. The County pays for physical examinations administered in its medical facilities.
Pre-Employment Drug Screening Exam: Some classifications require a new employee successfully pass a pre-employment drug screen as a condition of employment. Final appointment cannot be made until the eligible has passed the drug screen. The County pays for the initial drug screen.
Employment of Relatives: Applicants who are relatives of employees in a department within the 3rd degree of relationship, (parent, child, grand parent, grand child or sibling) either by blood or marriage, may not be appointed, promoted, transferred into or within the department when;
They are related to the Appointing Authority or
The employment would result in one of them supervising the work of the other.
Department Head may establish additional limitations on the hiring of relatives by departmental rule.
Proof of Eligibility: If you are offered a job you will be required to provide proof of U.S. citizenship or other documents that establish your eligibility to be employed in the U.S.
HOW TO APPLY
Apply Online:
*************/department/hr
By mail or in person:
San Joaquin County Human Resources
44 N. San Joaquin Street Suite 330
Stockton, CA 95202
Office hours:
Monday - Friday 8:00 am to 5:00 pm; excluding holidays.
Phone: **************
Job Line:
For current employment opportunities please call our 24-hour job line at **************.
When a final filing date is indicated, applications must be filed with the Human Resources Division before 5:00 p.m. or postmarked by the final filing date. Resumes will not be accepted in lieu of an application. Applications sent through county inter-office mail, which are not received by the final filing date, will not be accepted. (The County assumes no responsibility for mailed applications which are not received by the Human Resources Division).
San Joaquin County Substance Abuse Policy: San Joaquin County has adopted a Substance Abuse Policy in compliance with the Federal Drug Free Workplace Act of 1988. This policy is enforced by all San Joaquin County Departments and applies to all San Joaquin County employees.
Equal Opportunity Employer: San Joaquin County is an Equal Employment Opportunity (EEO) Employer and is committed to providing equal employment to all without regard to age, ancestry, color, creed, marital status, medical condition, national origin, physical or mental disability, political affiliation or belief, pregnancy, race, religion, sex, or sexual orientation. For more information go to *************/department/hr/eeo.
How much does a cyber security analyst earn in Ceres, CA?
The average cyber security analyst in Ceres, CA earns between $74,000 and $145,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Ceres, CA