Senior Security GRC Engineer
Cyber security analyst job in San Ramon, CA
At PriMed, your uniqueness is valued, celebrated, encouraged, supported, and embraced. Whatever your relationship with Hill Physicians, we welcome ALL that you are.
We value and respect your race, ethnicity, gender identity, sexual orientation, age, religion, disabilities, experiences, perspectives, and other attributes. Our celebration of diversity and foundation of inclusion allows us to leverage our differences and capitalize on our similarities to better serve our communities. We do it because it's right!
Job Description
We are seeking a skilled Governance, Risk, and Compliance (GRC) Engineer to strengthen our security posture and ensure adherence to healthcare regulations. The GRC Engineer will play a vital role in designing, implementing, and maintaining risk management processes, compliance frameworks, and policies that align with healthcare regulations such as HIPAA and HITECH. The ideal candidate will have experience with tools like SAI360, CyberArk, and other compliance and security platforms.
Job Responsibilities:
Develop, implement, and maintain GRC policies, processes, and controls in alignment with industry best practices and regulatory requirements (e.g., HIPAA, HITECH, NIST, ISO 27001).
Perform risk assessments and develop mitigation strategies for identified security risks.
Administer and optimize SAI360 for governance, risk management, and compliance activities, including reporting and policy management.
Collaborate with cross-functional teams to ensure new projects and systems are designed with security and compliance in mind.
Monitor and report on compliance status, identifying gaps and proposing remediation strategies.
Oversee third-party vendor risk assessments and ensure adherence to security requirements.
Support internal and external audits by providing documentation, evidence, and responses to audit findings.
Conduct security awareness training programs and promote a culture of compliance within the organization.
Required Experience/Skills/Knowledge:
5+ years of experience in Governance, Risk, and Compliance roles or a related field.
Strong knowledge of healthcare regulations, including HIPAA, HITECH, and other relevant standards.
Proficiency in GRC tools such as SAI360 for compliance and risk management.
Experience with privileged access management tools like CyberArk.
Solid understanding of risk assessment methodologies and security frameworks, including NIST CSF, ISO 27001, or COBIT.
Excellent communication and collaboration skills to engage with technical and non-technical stakeholders.
Strong analytical and organizational skills with attention to detail.
This role is critical in maintaining our organization's compliance with healthcare security standards and reducing risk exposure.
Required Education:
Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field.
Equivalent work experience may be considered in lieu of a degree.
Access Assurance Analyst - USDS
Cyber security analyst job in San Jose, CA
Team Intro The Access Assurance vertical within USDS Data Identity and Access Management (DIAM) Team is responsible for designing and maintaining an access management program with a mission to enforce the principle of least privilege. We strive to establish secure and compliant processes around provisioning, deprovisioning and governance of access to USDS data and infrastructure proactively identifying and reducing risks.
Job Overview:
As an Access Assurance Analyst, you will be part of the team responsible for Access Assurance within TikTok USDS. You will be responsible for supporting the team along with a team of cross-functional cyber, privacy, engineering, and data protection analysts to define, implement, manage, and measure controls to protect data in accordance with USDS policies and standards relevant to geographical regulations, contractual commitments, and confidentiality requirements. The Access Assurance Analyst will play a pivotal role in operationalization of access management programs in USDS.
In order to enhance collaboration and cross-functional partnerships, among other things, at this time, our organization follows a hybrid work schedule that requires employees to work in the office 3 days a week, or as directed by their manager/department. We regularly review our hybrid work model, and the specific requirements may change at any time.
Responsibilities:
* Design access management program that addresses data residency and fine-grained role-based access requirements and controls as necessitated by business need and regulations
* Assist in the development and implementation of Access governance frameworks, policies, and procedures.
* Build and review technical and functional requirements for in-house or external technologies to support access management and assurance needs, including applying appropriate security measures
* Operationalize access management workflows to improve efficiency
* Support periodic reviews of access to USDS data and systems
* Drive remediation of non-compliant access in a timely fashion
* Implement and enforce mechanisms to proactively monitor, respond and report on inappropriate data access events
* Work with other information security teams to classify and categorize data based on sensitivity and compliance requirements
* Support interactions with Risk and Compliance to understand control requirements and provide information to support findings for non-compliance with internal security policies
* Responsible for designing and reporting key metrics and visualizations for weekly, monthly and bimonthly cadences across multiple audiences
* Participate in security reviews to ensure compliance with access governance policies.
* Foster a principle of least privilege for access management
* Collaborate with key stakeholders to ensure alignment of access governance initiatives with organizational goals.Minimum Qualifications:
* Bachelor's degree in a related field (e.g., Information Management, Computer Science, Business Analytics, Cyber Security)
* 5+ years of experience in identity and access management or access governance & 5+ years of experience working with IAM tools and strong knowledge of Access management concepts (RBAC, PAM, Access Reviews, SOD, LCM, provisioning and deprovisioning of Access)
* Experience in designing/deploying Access management solutions, Experience analyzing large data sets across multiple database types (e.g., MySQL, Hive, Redis etc) leveraging SQL etc., Experience with industry frameworks, standards and regulations (e.g. ISO, NIST)
* Ability to write scripts, develop automations, configure tools, work with APIs and databases while being Proficient in at least one software programming language (Python,Java,Ruby etc) along with Familiarity with Cloud-based technology deployments
* Demonstrate ability to quickly assimilate to new knowledge and remain current on new developments in cybersecurity capabilities and industry knowledge
* Strong analytical and problem-solving skills with the Ability to communicate technical concepts to a broad range of technical and non-technical staff
* Comfortable working in a fast-paced, dynamic environment
Preferred Qualifications:
* Strong understanding of technology environments and various databases
* Experience working with technology partners to validate data-related problems
* Experience working with Microservices architecture
* Experience in automating access management workflows to reduce operational overhead
* Experience with risk and controls frameworks including (ISO 27001, NIST CSF, NIST RMF, FAIR, COBIT, NIST RMF, ISO 31000 etc.)
Cyber Security
Cyber security analyst job in Sunnyvale, CA
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information
Develop and implement security policies and controls to support the Cyber Security framework
Manage the existing cyber security training program across global, multilingual business
Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
Continuous improvement in the areas of Information Security technologies, techniques and processes
Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
Ability to interpret penetration test results and describe issues and fixes to non-security expert
Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP)
8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
Vulnerability Assessment testing and/or Penetration Testing (preferred)
Robotic Process Automation/Intelligent Automation (preferred)
Business case development supporting security technology solutions (preferred)
Additional certifications demonstrating cybersecurity/technical mastery (preferred)
Cyber Security Analyst
Cyber security analyst job in Menlo Park, CA
Hello Heart is on a mission to change the way people care for their hearts. The company provides the first app and connected heart monitor to help people track and manage their heart health. With Hello Heart, users take steps to control their risk of heart attacks and stroke - the leading cause of death in the United States. Peer-reviewed studies have shown that high-risk users of Hello Heart have seen meaningful drops in blood pressure, cholesterol and even weight. Recognized as the digital leader in preventive heart health, Hello Heart is trusted by more than 130 leading Fortune 500 and government employers, national health plans, and labor organizations. Founded in 2013, Hello Heart has raised more than $138 million from top venture firms and is a best-in-class solution on the American Heart Association's Innovators' Network and CVS Health Point Solutions Management platform. Visit ****************** for more information.
About the Role
We are seeking a Cyber Security Analyst to strengthen our security operations and compliance posture. Reporting into our Information Security Officer, you will play a key role in protecting sensitive data, ensuring regulatory compliance, and supporting the secure adoption of new technologies such as AI. You will work cross-functionally with IT, Engineering, Compliance, and HR to build and maintain secure, resilient processes across the organization.
Responsibilities
Support secure access lifecycle processes, including provisioning, deprovisioning, role-based access, and MFA/SSO management
Conduct periodic access reviews and ensure identity data quality
Perform vulnerability scans across systems and applications, track remediation progress, and partner with teams to prioritize risk-based fixes
Assist with security assessments of cloud systems and applications, aligning with HIPAA, HITECH, NIST, and HITRUST frameworks
Support internal and external audit preparation and execution
Enforce encryption, access controls, and data loss prevention strategies for sensitive data
Conduct third-party vendor risk assessments and oversee remediation efforts
Support secure adoption of AI tools by monitoring for risks such as data leakage and prompt injection, establishing governance guardrails, and delivering awareness training
Participate in endpoint security monitoring, disaster recovery exercises, tabletop simulations, and awareness training initiatives
Contribute to ongoing security operations, risk management efforts, and special security projects
Qualifications
3+ years of experience in IAM, IAM operations, or security analyst roles (healthcare technology or other regulated environments preferred)
Hands-on experience with identity platforms such as Okta, Azure AD, or Google IdP, plus SCIM, SAML/OIDC/OAuth, directory services, group policy, and conditional access
Experience with vulnerability management platforms (Tenable, Qualys, Rapid7, AWS Inspect, Kandji) and patch orchestration workflows
Working knowledge of HIPAA, HITECH, NIST CSF/800-66, and CIS Controls (familiarity with HITRUST CSF is a plus)
Knowledge of cloud security basics (AWS, Azure, GCP), least-privilege IAM, and networking fundamentals (TCP/IP, DNS, HTTP, VPN, segmentation)
Familiarity with endpoint security solutions (CrowdStrike Falcon, Cynet, SentinelOne) and DLP tools
Familiarity with GenAI, keeping up to date with innovative security programs and artificial intelligence systems
Proactive communication and documentation skills, with the ability to collaborate across technical and non-technical teams globally
The US base salary range for this full-time position is $130,000.00 to $145,000.00. Salary ranges are determined by role and level. Compensation is determined by additional factors, including job-related skills, experience, and relevant education or training. Please note that the compensation details listed in US role postings reflect the salary only, and do not include equity or benefits.
#LI-DNP
Hello Heart has a positive, diverse, and supportive culture - we look for people who are collaborative, creative, and courageous. Oh, and if you want to see some recent evidence of the fun things we do at Hello Heart, check out our Instagram page.
Auto-ApplyCyber Security Analyst
Cyber security analyst job in San Francisco, CA
Our client seeking a Cyber Security Operations Analyst to support an operations team that supports a large government customer. The candidate will be relied upon to assist teammates and perform troubleshooting as needed. The candidate should excel in a fast-paced work environment and be willing to face new challenges.
Qualifications
• Proficiency with vulnerability scanning, remediation and reporting
• Knowledge in web application scanning using various tools
• Demonstrated proficiency with Windows, UNIX, & LINUX operating systems
• Experience working in a customer service information technology environment
• Network security and system security experience
• Ability to discuss real world troubleshooting; problems and solutions encountered
• Knowledge of IT security best practices, US federal government standards, regulations and policy (FedRamp, TIC, NIST 800-37rev1 & 800-53rev3)
• Must be motivated and able to work independently
• Proven project leadership (PowerPoint presenting, MS Project Planning)
• Experience working with change implementation in a controlled environment
• Excellent verbal, written communication and technical writing skills
Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.
2-5 years of related experience in data security administration.
Experience using some of the following tools:
o Nessus
o Tenable Security Center
o Netsparker
o WebInspect
o BurpSite
Additional Information
Work with blue Stone recruiting to find your next Cyber Security role. You can find us at ******************************* We look forward to speaking with you.
Senior Cyber Security Analyst
Cyber security analyst job in Santa Clara, CA
reports to the Cyber Security Manager and is responsible for reviewing and analyzing threat feeds in order to assist in optimizing currently deployed tools/procedures/processes throughout the organization. Analyst must analyze escalated security incidents from linear departments to validate, understand,
and create lessons learned to help strengthen the posture of the organization.
Analyst must also be able to advise on IT initiatives, IT business projects,
and IT engineering in regards to security industry best practice. The analyst
must also have a firm understanding of penetration testing and vulnerability
assessments. A strong networking background and security certifications are
preferred.
Qualifications
Demonstrate a comprehensive understanding of security processes for installation, management, monitoring and response of enterprise networks
In depth experience with Information System Security (ISS), PKI, firewalls, intrusion detection/protection and related vulnerability assessment tools for network periphery and internal network/service discovery and topology mapping
Experience working with a Security Operation Center
Experience in full life cycle information technology solution implementation from conceptualization, requirements, design and specification through development (coding), integration testing and commissioning
Demonstrate the ability to communicate clearly, to both technical and non-technical audiences, risks, threats, and vulnerabilities identified during assessments
Demonstrated understanding of TCP/IP networking
Must have strong incident handling experience including knowledge of common probing and attack methods, network/service discovery, system auditing, viruses, and worms
Security testing of Enterprise networks through ethical hacking
Experience responding to incidents in a 24/7 environment
Experience working in a fast paced industry dealing with sensitive data
Demonstrate strong understanding of Windows, networking, telephony and wireless security skills
System Engineer - Security
Cyber security analyst job in Cupertino, CA
The TV u0026 Sports Engineering team delivers the Apple TV+ streaming service, bringing customers Apple Original shows and movies, and live sports from MLS and MLB on Apple, Windows, Android, and third-party TV platforms. The team works on the Apple Sports app, the ultra-fast and easy-to-navigate app with real-time scores and stats for sports fans. This team is also responsible for ensuring the security of our Apple devices, users' identity, and content with FairPlay technologies.
Our team is seeking a Software System Engineer to work on our software security technologies to develop and launch new products. You'll work on projects that touch all aspects of Apple products, and will demonstrate your strong software and interpersonal skills as you integrate new technology on multiple platforms and architectures. We are looking for someone who has a track record of software developement. You have a familiarity with various architectures (x86/ARM, mac OS/iOS, Android and others), and the ability to work with dynamic teams to produce reliable, robust code. Familiarity with security technologies (DRM, TrustZone, cryptography) is a huge plus. This is an outstanding opportunity to be involved in something new from the beginning. Show us your talent. It's meaningful, fun, and exciting. It's what makes us Apple.
5+ years of Experience with or passion for Systems security 5+ years of Experience with containerized server applications and their deployment
Strong Software Engineering programming skills (C, C++) Experience with Embedded Systems Development Experience with or passion for Systems Security Experience with Android development Able to clearly communicate ideas and concerns Able to work effectively with different teams
Principal Cyber Security Engineer
Cyber security analyst job in San Ramon, CA
Key Responsibilities
Architectural Leadership: Design, develop, and maintain the comprehensive security architecture for Cloud Software Group's products and corporate infrastructure.
Cloud Security Expertise: Lead the security strategy for our cloud environments, including AWS, Azure, and Google Cloud, ensuring best practices and compliance.
Security Domain Knowledge: Provide expert guidance across a broad range of security domains, including application security, network security, identity and access management (IAM), data protection, and incident response.
Collaboration and Communication: Work closely with engineering, DevOps, product, and leadership teams to embed security into every stage of the software development lifecycle. Present complex security concepts to both technical and non-technical audiences.
Threat Modeling & Risk Analysis: Conduct threat modeling and risk assessments to identify vulnerabilities and recommend mitigation strategies.
Mentorship: Mentor and guide junior security professionals, fostering a culture of security awareness and continuous improvement.
Compensation may vary depending on your location, qualifications including job-related education, training, experience, licensure, and certification, that could result at a level outside of these ranges. Certain roles are eligible for additional rewards, including annual bonus, and sales incentives depending on the terms of the applicable plan and role as well as individual performance. NY generally ranges: $190,720-$286,080 CA generally ranges: $199,012-$298,518 All other locations fall under our General State range: $165,843-$248,765 Benefits may vary depending on the nature of your employment with Cloud Software Group and the country where you work. U.S. based employees are typically offered access to healthcare, life insurance and disability benefits, 401(k) plan and company match, among others. This requisition has no specific deadline for completion.
About Us:
Cloud Software Group is one of the world's largest cloud solution providers, serving more than 100 million users around the globe. When you join Cloud Software Group, you are making a difference for real people, each of whom count on our suite of cloud-based products to get work done - from anywhere. Members of our team will tell you that we value passion for technology and the courage to take risks. Everyone is empowered to learn, dream, and build the future of work. We are on the brink of another Cambrian leap -- a moment of immense evolution and growth. And we need your expertise and experience to do it. Now is the perfect time to move your skills to the cloud.
Cloud Software Group is firmly committed to Equal Employment Opportunity (EEO) and to compliance with all federal, state and local laws that prohibit employment discrimination. All qualified applicants will receive consideration for employment without regard to age, race, color, creed, sex or gender, sexual orientation, gender identity, gender expression, ethnicity, national origin, ancestry, citizenship, religion, genetic carrier status, disability, pregnancy, childbirth or related medical conditions (including lactation status), marital status, military service, protected veteran status, political activity or affiliation, taking or requesting statutorily protected leave and other protected classifications.
Cloud Software Group will consider qualified applicants with a criminal history and conduct the recruiting process in accordance with the California Fair Chance Act, Los Angeles County Fair Chance Ordinance for Employers and San Diego Fair Chance Ordinance. For access to the laws see the following links: California FCA and Los Angeles FCO.
If you need a reasonable accommodation due to a disability during any part of the application process, please contact us at **************, HR directly via ************** or email at *************** for assistance.
Auto-ApplyINFORMATION SECURITY ANALYST
Cyber security analyst job in San Jose, CA
Opportunity Type CLASSIFIED EMPLOYMENT OPPORTUNITY Position Title INFORMATION SECURITY ANALYST Posting Number S2549 Close/First Review Date 11/16/2025 Department ITSS (Information Technology Support Services) Work Location District Office Position Status Full Time Salary Range $141,330 - $172,437 Annual Salary (Range 150: Classified Salary Schedule Fiscal Year 2025-2026). Starting placement is generally at Step 1. Benefits Summary
In addition to the salary, this position qualifies for the choice of one of the District's excellent Health Benefits and Welfare plans, which the premium cost is 100% paid by the District for the employee and their eligible dependents, and one health plan costing an estimated $60,000 for the District for fiscal year 2025-2026. We offer two medical plans (Anthem Blue Cross [PPO] and Kaiser Permanente (HMO]); dental (Delta Dental PPO); vision (VSP Choice); life insurance for the employee (The Hartford); life insurance for eligible dependents (The Hartford); a long term disability/income protection plan (The Hartford); and an employee assistance plan (Anthem EAP).
In addition, the District contributes an additional 26.81% of the employee's salary towards an eligible employee's pension (CalPERS).
Employees may also elect to participate in optional plans including purchasing additional life insurance for themselves and their eligible dependent(s); enroll in a medical, transportation, and/or dependent care Flexible Spending Account(s) (with the $4 monthly administrative fee paid by the District); and set pre-taxed dollars aside to supplement their pension in a 403b (tax shelter annuity) and/or a 457 (deferred compensation) plan(s).
Classified employees also earn 10 to 22 days per year of vacation (based on years of service), and up to 12 sick leave days (pro-rated for less than full-time positions). There are currently 20 paid holidays.
Position Description
POSITION SUMMARY
The Information Security Analyst reports to Executive Director of ITSS (Information Technology Support Services) at the District Office. The work schedule is 12 months per year; 40 hours per week; Monday - Friday; 8:00 a.m. - 5:00 p.m.
This position is represented by CSEA (California School Employees Association), Chapter 363.
POSITION PURPOSE
Reporting to Executive Director, ITSS or an assigned administrator, the Information Security Analyst performs complex work related to the District's information security program including testing, analysis and evaluation of the integrity and confidentiality of enterprise systems, network, assets and communication technology throughout the District. The position monitors security systems and conducts periodic risk assessments to identify, troubleshoot, diagnose, resolve and report security problems and breaches; assists in coordinating and conducting investigations involving District technology resources, and assists with security awareness training.
DISTINGUISHING CHARACTERISTICS
This position focuses on threat and vulnerability management with exposure and support on all aspects of the cybersecurity practice. Incumbent in this position should have advanced knowledge on risk identification, protection and compliance, threat detection, incident response plan development and annual review, and recovery services to achieve business resilience.
KEY DUTIES AND RESPONSIBILITIES
1. Analyze, evaluate and implement security applications, policies, standards and procedures intended to prevent the unauthorized use, disclosure, modification, loss or destruction of data; work with the campus community and other staff to ensure the integrity and security of the information technology infrastructure.
2. Lead the development, testing and implementation of information security products and control techniques in all locations throughout the District.
3. Work with campus and district technology teams to ensure the security of all applications and assets.
4. Monitor and review security systems and logs. Identify, troubleshoot, diagnose, resolve, document and report security problems and incidents; help coordinate and conduct investigations of suspected breaches; respond to emergency information security situations.
5. Collaborate with application programming team and other IT staff to ensure production applications meet established security policies and standards.
6. Assist with training and education on information security and privacy awareness topics for District administrators, faculty and staff; assist in the development of appropriate security-incident notification procedures for District management.
7. Work with vendors to conduct vulnerability assessments to identify existing or potential electronic data and assets compromises and their sources; participate in investigative matters with appropriate law enforcement agencies.
8. Perform audits and periodic inspections of District information systems to ensure security measures are functioning and effectively utilized and recommend appropriate remedial measures to eliminate or mitigate future system compromises.
9. Review, evaluate, and recommend software products related to IT systems security, such as virus scanning and repair, encryption, firewalls, internet filtering and monitoring, intrusion detection, etc.
10. Monitor and maintain the District's security event information system (SEIM) and data loss prevention software.
11. Manage security systems and policies including but not limited to servers, firewalls, email security, and Microsoft 365 environment.
12. Recommend and implement security policies, protocols, practices and lead in creation of security training and guidance to staff.
13. Assist in the secure management and maintenance of the District's network authentication systems for wired and wireless network access.
14. Review security practices and controls of third-party service providers that handle District sensitive data, and review security controls and features of third-party software systems.
15. Ensure that maintenance, configuration, repair and patching of systems occurs on a scheduled and timely basis utilizing best practices in change management and consistent with policies and procedures.
16. Keep current with latest emerging security issues and threats through list servers, blogs, newsletters, conferences, user groups, and networking and collaboration with peers in other institutions.
17. Perform other duties reasonably related to the job classification.
EMPLOYMENT STANDARD
Knowledge of:
1. Compliance and industry cybersecurity standards frameworks such as NIST 800 and ISO standards.
2. Emerging technologies and the possible impact on existing information systems, instructional processes and business operations.
3. Incident response best practices and software license compliance laws.
4. Troubleshooting tools for computing hardware, servers and network equipment including but not limited to switches, routers, and firewalls.
5. Enterprise resource planning systems, Microsoft 365 and Active Directory and Azure Active Directory.
6. Principles of program design, coding, testing and implementation.
7. Advanced knowledge of desktop and server operating systems including Windows and Linux.
8. Disaster recovery and backup including business continuity planning.
9. Principles of training, support, and services to end-users.
10. General research techniques and data driven analytics.
11. Modern office administrative practices and use of tools including computers, websites and other applications related to this job.
Skills and Ability to:
1. Apply current NIST and ISO standards to current operations.
2. Respond to incidents and events in a timely manner.
3. Prepare clear and concise system documentation and reports.
4. Prioritize assigned tasks and projects.
5. Communicate complicated technical issues and the risks they pose to stakeholders and management.
6. Establish and maintain effective and cooperative working relationships with others.
7. Analyze situations accurately and adopt effective course of action.
8. Coordinate, develop, and implement projects.
9. Work with attention to detail and independently with minimum supervision.
Required Qualifications
EDUCATION AND EXPERIENCE
1. A Bachelor's degree from an accredited institution with major course work in computer information systems, computer science, business administration, or related field.
2. Two years of experience performing information security duties, which may include implementing, overseeing, and/or managing information security technologies, process, or programs, including identification, protection, detection, response, and recovery activities.
Certification:
1. Professional security or privacy certification, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or other similar credentials.
District's Diversity
* Demonstrated sensitivity, knowledge and understanding of the diverse academic, socioeconomic, gender identity, sexual orientation, cultural, disability, and ethnic background of groups historically underrepresented, and groups who may have experienced discrimination.
* Success integrating diversity as appropriate into the major duties outlined in the job description and in the duties listed in the District's hiring policy; or demonstrated equivalent transferable skills to do so.
Desired Qualifications
1. Bilingual abilities, desirable.
Foreign Degree
For positions that require a degree or coursework:
Degree(s) must have been awarded by a college or university accredited by an accrediting body recognized by the U.S. Council on Post-Secondary Accreditation and/or the U.S. Department of Education.
All degrees and credits earned outside of the United States must have a U.S. evaluation (course by course) of the transcripts and must be submitted with the application.
Degrees earned outside of the U.S. without a U.S. credential evaluation attached, will not be considered.
Working Environment
Physical Demands:
1. Must sit for long periods of time, use hands and fingers to operate an electronic keyboard, reach with hands and arms, and speak clearly and distinctly to ask questions and provide information, hear and understand voices over telephone and in person.
2. The physical demands described here are representative of those that must be met by an individual to successfully perform the essential functions of this job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
About San Jose/Evergreen Community College District
The District is represented by dedicated and talented employees who are passionate about providing our student population with the best educational experience possible. The District recognizes that cultural diversity in the academic environment promotes academic excellence; fosters cultural, racial and human understanding; provides positive roles models for all students, and creates an inclusive and supportive educational and work environment for its employees, students, and the community it serves.
As of Spring 2024, with enrollment of approximately 15,655 students per semester, and an extremely diverse student population (Hispanic/Latino 45.20%, Black/African-American 3.45%, Asian/Pacific Islander 31.70%, American Indian/Native American 0.36%, White/Caucasian 12.76%) attaining educational goals reflecting 56% - Transfer to a 4-Year College/ University, the District's emphasis on student success makes it a recognized educational leader in the State.
The District encourages a diverse pool of applicants to serve as colleagues to an existing diverse classified staff consisting of 43.9% Latinx, 25.3% Asian/Pacific Islander, 4.2% Black/African American, 0.3% American Indian/Native American, 17.9% White/Caucasian, and as well as encouraging applications from all qualified, outstanding applicants.
Important Information
EQUAL OPPORTUNITY EMPLOYER STATEMENT:
San José-Evergreen Community College District is an Equal Opportunity Employer committed to nondiscrimination on the basis of ethnic group identification, race, color, language, accent, immigration status, ancestry, national origin, age, gender, gender identity, religion, sexual orientation, transgender, marital status, veteran status, medical condition, and physical or mental disability consistent with applicable federal and state laws.
CONTACT:
Employment Services,
Human Resources, SJECCD
40 S. Market Street, San Jose, CA 95113
Phone: **************
Email: *******************************
Employment Website: ******************************
District Website: **************
APPLICATION PROCEDURES:
Interested applicants MUST SUBMIT ONLINE ALL of the following materials by the First Review Date/Closing Date as listed on the job announcement. Applications received after the First Review Date will only be forwarded to the hiring committee at their request.
1. A completed online San José-Evergreen Community College District APPLICATION.
2. A COVER LETTER (Stating how you feel you meet the qualifications as outline in the job announcement).
3. A current RESUME/CURRICULUM VITAE
4. TRANSCRIPT - (If Required) If a degree is listed as a requirement, transcripts (Not Diplomas) MUST INCLUDE confer or award date of stated degree. Unofficial transcripts will be accepted; however if the position is offered, official transcripts will be required prior to employment. If the transcripts or degrees are from outside of the United States, an official certification of equivalency to U.S. degrees by a certified U.S. credential review service (course by course of the transcripts) MUST also be submitted. (See below for a list of suggested services that provide foreign degree equivalency evaluation to U.S. degrees).
Note: Some positions may require additional documents and/or certificates, in addition to the items listed above. Please refer to the job announcement.
OTHER APPLICANT INFORMATION:
1. Only complete application materials will be considered. No exceptions.
2. Letters of Recommendation are NOT required and will not be forwarded to the hiring committee.
3. Upon hire the successful candidate must provide the required documents of identity and authorization to work and attest he/she is authorized to work in the United States.
4. Application materials become the property of the District and will not be returned or duplicated.
5. Travel expenses to attend the interview are the responsibility of the candidate.
6. Meeting the minimum qualifications does NOT assure an interview.
7. The District may re-advertise, delay, choose not to fill the position, or choose to fill more than one position.
Suggested services that provide foreign degree equivalency evaluation to U.S. degrees:
Academic Credentials Evaluation Institute, Inc.
Website: ***************************
Education Records Evaluation Services
Website: ************
International Education Research Foundation
Website: ********************
World Education Services
Website: ***********
Easy ApplySenior Security Analyst, Detection and Response
Cyber security analyst job in Palo Alto, CA
xAI's mission is to create AI systems that can accurately understand the universe and aid humanity in its pursuit of knowledge. Our team is small, highly motivated, and focused on engineering excellence. This organization is for individuals who appreciate challenging themselves and thrive on curiosity. We operate with a flat organizational structure. All employees are expected to be hands-on and to contribute directly to the company's mission. Leadership is given to those who show initiative and consistently deliver excellence. Work ethic and strong prioritization skills are important. All engineers are expected to have strong communication skills. They should be able to concisely and accurately share knowledge with their teammates.
About the Role
You will be responsible for leading day-to-day security threat management. You will help identify and manage potential incidents and work with partner teams on known or suspected security threats. You will support threat intelligence, threat hunting, intrusion detection, and incident response efforts that adhere to, and push forward, best practices.
Responsibilities
Drive continual improvement in processes, procedures and automations to improve the quality and effectiveness of the team.
Participate in a 24/7 on-call rotation performing security incident response
Commandeering security incidents and updating stakeholders.
Identify and develop new detection use cases and optimize existing detections.
Collaborate on technical directions and solutions with other teams.
Research and analyze patterns in security events across X's global infrastructure.
Identify, design, and lead threat hunting missions to quantify and reduce threats.
Manage and support the log collection, security scanning, intrusion detection, and other security-related systems.
Design and assist in the development of automation to reduce false positives and handle events automatically.
Analyze the security posture of systems via testing and vulnerability impact analysis.
Required Qualifications
2+ years of relevant information security experience
Self starter, can receive a task and execute with minimal supervision
Strong Python scripting skills for implementing security automation
Knowledge of networking and mac OS, Windows or Linux operating systems.
Knowledge of cloud security fundamentals and practices (vendor agnostic).
Experience managing and/or deploying security technology.
Experience with building queries and dashboards for security monitoring.
Knowledge of current threats and techniques and a desire to research and learn more.
Experience with malware analysis, forensics or penetration testing.
Problem solving skills or experience with troubleshooting.
Preferred Qualifications
Elastic / OpenSearch or similar platforms
Open Source security automation tooling
Annual Salary Range
$140,000 - $180,000 USD
Benefits
Base salary is just one part of our total rewards package at xAI, which also includes equity, comprehensive medical, vision, and dental coverage, access to a 401(k) retirement plan, short & long-term disability insurance, life insurance, and various other discounts and perks.
xAI is an equal opportunity employer.
California Consumer Privacy Act (CCPA) Notice
Auto-ApplySenior Security GRC Analyst
Cyber security analyst job in San Francisco, CA
Lambda, The Superintelligence Cloud, is a leader in AI cloud infrastructure serving tens of thousands of customers. Our customers range from AI researchers to enterprises and hyperscalers. Lambda's mission is to make compute as ubiquitous as electricity and give everyone the power of superintelligence. One person, one GPU.
If you'd like to build the world's best AI cloud, join us.
*Note: This position requires presence in our San Francisco or San Jose office location 4 days per week; Lambda's designated work from home day is currently Tuesday.
What You'll Do
Validate and verify the organization's security controls and practices meet the requirements of ISO 27001, 27701, PCI, SOC 2 and other relevant regulatory requirements to ensure alignment to business objectives
Manage IT Risk Register including risk identification, tracking, and prioritization.
Assist with and drive remediation of control deficiencies and gaps
Provide guidance to Control Owners in the planning, design, implementation, operation, maintenance & remediation of control activities and other supporting requirements (e.g. policies, standards, processes, system configurations, etc.)
Communicate with technical and non-technical stakeholders and leaders on cybersecurity risk and controls management topics and program-specific reporting
Assist with the Customer Trust program which may include managing customer assessments, and security questionnaires
Assist control owners with root cause analysis and track risk management action plan progress.
Create risk metrics for management regarding information security control maturity, compliance status, risks, performance and findings
Assist with the third-party risk management assessment process, ensuring consistent enforcement of information security requirements
You
Have a minimum of 8 years of experience supporting cybersecurity risk or controls management programs with in-depth knowledge and experience of cybersecurity frameworks including ISO 27001 and 27701, PCI-DSS, SOC, NIST CSF and other regulatory requirements
Have experience managing and running audits, certification programs and control assessments. This includes but is not limited to scope planning, defining control procedures based on requirements, policies and standards, control testing, and mapping issues to risks
Have experience collaborating closely with engineers, business teams, and security partners, including incident response, red teams, and architects to seamlessly incorporate cybersecurity controls and risk management processes into their day-to-day operations
Possess a strong ability to define, drive and execute a program vision, strategy, approach and milestones in alignment with organization priorities and initiatives
Nice to Have
Experience in the machine learning or computer hardware industry
Experience with Security by Design and/or Privacy by Design principles
Experience with standard cyber controls frameworks, including CIS Top18, NIST Cyber Security Framework (CSF), NIST 800.53, NIST 800.171, CMMC, Cybersecurity Maturity Model Certification (CMMC), ISO 27001 and 27701, and SOX ITGC control frameworks.
Broad knowledge of IT infrastructure and architecture of computer systems as well as exposure to a variety of platforms such as operating systems, networks, databases, and ERP systems
Familiarity with using third-party tools such as Audit Board, Whistic, RSA Archer, ServiceNow for third-party risk management
Certified Information Systems Auditor (CISA)
Certified Information Security Manager (CISM)
Certified Information Systems Security Professional (CISSP)
Certified in Risk and Information Systems Control (CRISC)
Experience in the AI infrastructure, machine learning and/or computer hardware industry
Salary Range Information
The annual salary range for this position has been set based on market data and other factors. However, a salary higher or lower than this range may be appropriate for a candidate whose qualifications differ meaningfully from those listed in the job description.
About Lambda
Founded in 2012, with 500+ employees, and growing fast
Our investors notably include TWG Global, US Innovative Technology Fund (USIT), Andra Capital, SGW, Andrej Karpathy, ARK Invest, Fincadia Advisors, G Squared, In-Q-Tel (IQT), KHK & Partners, NVIDIA, Pegatron, Supermicro, Wistron, Wiwynn, Gradient Ventures, Mercato Partners, SVB, 1517, and Crescent Cove
We have research papers accepted at top machine learning and graphics conferences, including NeurIPS, ICCV, SIGGRAPH, and TOG
Our values are publicly available: *************************
We offer generous cash & equity compensation
Health, dental, and vision coverage for you and your dependents
Wellness and commuter stipends for select roles
401k Plan with 2% company match (USA employees)
Flexible paid time off plan that we all actually use
A Final Note:
You do not need to match all of the listed expectations to apply for this position. We are committed to building a team with a variety of backgrounds, experiences, and skills.
Equal Opportunity Employer
Lambda is an Equal Opportunity employer. Applicants are considered without regard to race, color, religion, creed, national origin, age, sex, gender, marital status, sexual orientation and identity, genetic information, veteran status, citizenship, or any other factors prohibited by local, state, or federal law.
Auto-ApplyProduct Security Engineer, Operating System
Cyber security analyst job in Palo Alto, CA
Palo Alto, CA (on-site)
About 1X We build humanoid robots that work alongside people to solve labor shortages and create abundance.
The Role We are seeking a Product Security Engineer with expertise in operating system security to strengthen the foundation of our robotics platform. In this role, you will design and implement security features such as secure boot, trusted execution environments, and system service hardening. Your work will ensure that sensitive operations and data remain protected while enabling developers to follow security best practices. This position is critical to increasing the resilience and trustworthiness of our systems.
You Will
Develop and maintain secure critical services for Linux systems
Implement secure boot chains using fused hardware keys with rollback protection
Integrate OP-TEE to safeguard sensitive assets including mTLS certificates and disk encryption keys
Harden system services using least-privilege operations, systemd features, namespacing, and syscall filtering
Build hardening templates and automation tools to streamline security enforcement for developers
Automate security validation processes within CI/CD pipelines
Design and enforce device access controls for Linux systems
Contribute and ship C/C++ code (or similar) to production environments
Job requirements
Must Have
Strong experience with Linux operating system internals and security mechanisms
Hands-on expertise with secure boot and verified boot implementations
Familiarity with Trusted Execution Environments such as OP-TEE
Proven track record of applying least-privilege principles and hardening root-level services
Proficiency with systemd and sandboxing tools including namespacing, privilege restrictions, and syscall filtering
Experience designing developer-focused security tools, automation, and templates
Knowledge of device access control and Linux permissions management
Solid understanding of CI/CD security validation integration
Expertise in software development and code auditing
Experience with NVIDIA Orin or similar SoC platforms (preferred)
Benefits & Compensation
Salary Range: $137,861 - $240,000 + Equity
Health, dental, and vision insurance
401(k) with company match
Paid time off and holidays
Equal Opportunity Employer
1X is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, ancestry, citizenship, age, marital status, medical condition, genetic information, disability, military or veteran status, or any other characteristic protected under applicable federal, state, or local law.
On-site
Palo Alto, California, United States
$137,861 - $240,000 per year Software EngineeringAll done!
Your application has been successfully submitted!
Other jobs
Cyber Security Engineer
Cyber security analyst job in San Jose, CA
** 9 time INC 500/5000, 9 time BBJ "Pacesetter ", 5 time SIA-fastest growing** ___________________________________________________________ Kashif Meraj | TalentBurst, Inc. Boston | San Francisco | Miami | Milwaukee | Toronto | New Delhi | Bangalore
Work: **************
575 Market Street, Suite 3025 | San Francisco, CA 94105 | *******************
Certified Minority Business Enterprise (MBE)
Job Description
Job Title: IT Security Engineer
Location: San Jose, CA 95110
Duration: 6 Months+
Responsibilities:
• Work with Client's Identity and Access Management team to administer and implement appropriate security controls and workflows.
• Work with various internal employees to help train and educate on good security practices and specifics about end-user security tools.
• Work with a team of Security Engineers to handle incoming requests, respond to issues, troubleshoot reported problems, and identify solutions.
• Work closely with the teams that provisions, customizes, monitors, manages and upgrades our enterprise password vault solution.
• Communicate with customers to address their security requirements and provide guidance.
Requirements:
• Experience with and understanding of enterprise password vault configurations and automations. Specific CyberArk experience is preferred
Additional Information
Please reach me for further query or drop your updated resume at ***********************************
Easy ApplyInformation Security Engineer
Cyber security analyst job in Emeryville, CA
Atomic Machines is ushering in a new era of micromanufacturing with its Matter Compiler technology platform. This platform enables new classes of micromachines to be designed and built by providing manufacturing processes and a materials library that are inaccessible to semiconductor manufacturing methods. It unlocks MEMS manufacturing not only for device classes that could never be produced by semiconductor methods, but also for entirely new categories. Furthermore, this digital platform is fully programmable in the way 3D printing is digital-but whereas 3D printing produces parts of a single material using a single process, the Matter Compiler technology platform is a multi-process, multi-material system: bits and raw materials go in, and complete, functional micromachines come out. The Atomic Machines team has also created an exciting first device-made possible only through the Matter Compiler technology platform-that we will be unveiling to the world soon.
Our offices are in Emeryville and Santa Clara, California.
About The Role:
This is a broad-responsibility, high-judgment technical leadership role managing the cyber security function and implementing the security and IT infrastructure of a rapidly growing startup company with engineering offices in Emeryville and Santa Clara. As a Cyber Security Engineer, you will lead and oversee the design, implementation, and maintenance of robust security solutions within platform, data, engineering, and office environments. The ideal candidate will possess strong leadership skills, deep technical expertise, and a strategic mindset to safeguard the organization's digital assets. This is a full-time, onsite position in either our Emeryville or Santa Clara office, with a need to work from the other office occasionally.
What You'll Do:
* Build and manage cyber security at Atomic Machines.
* Develop and implement a strategic vision for securing Atomic Machines' assets, including IP, financial records, personal data, and physical infrastructure, while designing scalable security architectures for both cloud-native and on-prem systems.
* Conduct security risk assessments, threat modeling, and incident response, identifying vulnerabilities, implementing mitigations, and managing escalations as needed.
* Lead IT risk and compliance initiatives, implementing cybersecurity best practices (e.g., ISO 27001, NIST), conducting internal audits, assessing vendor security certifications, and reviewing contractual security requirements.
* Integrate security into CI/CD pipelines and Git-driven Infrastructure-as-Code (IaC) workflows to support secure software releases.
* Manage security across networking and infrastructure across engineering teams, including physical access control, on-prem servers, cloud services, CI/CD pipelines, and embedded systems, ensuring scalability and reliability.
* Develop and deliver formal and informal security training sessions to educate the engineering organization on best practices, risk mitigation strategies, and secure development principles.
* Partner with and manage external agencies and vendors when additional security coverage and support are needed.
What You'll Need:
* 8+ years of experience in Information Security, including at least 3 years in a management role.
* Experience managing all aspects of Information Security for a company, including Cyber Security, risk assessment, and incident response (startup experience preferred).
* Previous industry experience as a System Administrator, with hands-on knowledge of infrastructure management, user access controls, and system security best practices.
* Expertise in cloud security for modern AWS architectures, including IAM, security monitoring, logging, security configuration, and Infrastructure-as-Code (IaC).
* Proficiency in Infrastructure-as-Code (IaC) workflows (e.g., Terraform, Ansible, Git).
* Ability to enable secure cloud environments for production software releases using AWS services (e.g., EC2, Redshift, S3) and hybrid security solutions (e.g., Tailscale, WireGuard).
* Strong networking expertise across physical and virtual environments, including VLANs, firewalls, DNS, and secure access solutions.
* Experience balancing infrastructure automation, security, scalability, and developer productivity.
* Extensive hands-on experience with security tools and technologies, including SIEM, MDR, IDS/IPS, WAF, DLP, and vulnerability scanners.
* High-level proficiency in SAML/SSO solutions and using hardware MFA keys.
* Experience developing and presenting cybersecurity training programs for employees.
* Knowledge of IT processes, risk, and control frameworks, including CoBIT, ISO 27001, NIST, ITIL, and PCI.
* Familiarity with security regulatory requirements and standards (e.g., SOC 1/2/3, SANS Top 20, NIST 800-53).
* Security certifications preferred (e.g., CISSP, CCSP, CISM, CSSP).
* Ability to explain complex security issues to both technical and non-technical audiences.
* Proven ability to work in fast-paced environments with minimal guidance.
* Flexibility to work daily in the Emeryville office and commute to Santa Clara as needed.
* BS in Computer Science, Cybersecurity, Information Security, or a related field preferred.
The compensation for this position also includes equity and benefits.
Salary Range
$175,000-$235,000 USD
Information Security Analyst
Cyber security analyst job in Sunnyvale, CA
• Analyzes information security practices to ensure alignment with industry standards and guidelines. • Identifies, investigates, and resolves security breaches detected by security solutions. • Contributes to the creation and maintenance of security policies, standards,
guidelines, and procedures.
• Leads and delivers staff training on information security and breach prevention.
What You Will Do:
• Staying current on information security trends, news and security standards,
especially those related to the healthcare industry
• Participating in the development of security standards and best practices for the
organization
• Participating in the evaluation, design and implementation of new information
security solutions to protect the organization's computer networks from cyber
attacks
• Assessing the efficacy of existing security measures and processes to ensure that
these measures and processes meet Health Insurance Portability and
Accountability Act (HIPAA) and Federal Information System Controls Audit Manual
(FISCAM) security standards and making recommendations for improvement
• Recommending security enhancements to management and senior ITS staff
• Analyzing software and systems requirements and providing objective advice on the
level of security risks and remediation options
• Monitoring computer networks for security issues in order to reduce the risk of
security incidents
• Leading investigation of security breaches and other cyber security incidents in
collaboration with the Information Security Manager and the infrastructure team
• Documenting security breaches and assessing the damage caused
• Collaborating with the infrastructure team to ensure security measures and
software to protect systems and information infrastructure, including firewalls and
data encryption programs, are up to date
• Conducting system vulnerability audits and assessments on a proactive basis and
collaborating with the infrastructure team to perform tests and uncover network
vulnerabilities
• Managing efforts with vendors on annual security audit, including pen testing
• Assisting with developing and documenting preventive measures to ensure system
security
• Staying informed of best practices and new developments in the field, analyzing
applicability, making related recommendations, and developing written
documentation of adopted practices
• Documenting computer security procedures, and tests
• Assisting with the development of policies, procedures, standards, and guidelines
related to information security
• Developing information, training materials and presentations to educate the
organization about information security management, data security, and prevention
of breaches
• Assisting staff with the installation and utilization of new security products and
procedures
• Conferring with staff regarding issues such as computer data access needs,
security violations, and programming changes
• Monitoring systems and providing frequent training to staff regarding how to detect
and avoid phishing attempts
• Reviewing any violations of security procedures and providing remedial training to
staff, as needed
• Performs other duties as assigned
You Will Be Successful If:
• In-depth knowledge of HIPAA and FISCAM security guidelines.
• Strong understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts.
• Proficiency with operating systems, virtualization, and security systems.
• High proficiency in Windows-based PC systems and Microsoft Office Suite.
• Working knowledge of penetration testing, patch management, and security
frameworks (NIST, ISO 27001, COBIT).
• Familiarity with project management principles and customer service practices.
• Awareness of emerging security technologies such as AI, IoT, and blockchain.
• Strong analytical, problem-solving, and decision-making skills.
• Clear and concise writing and communication skills, with ability to present
technical content to non-technical audiences.
• Experience creating training materials and leading staff training.
• Ability to manage multiple priorities, meet deadlines, and adapt to shifting needs.
• Leadership ability to facilitate meetings, resolve issues, and guide staff.
• Strong collaboration skills and diplomacy across teams and levels of the
organization.
• Willingness to respond to after-hours information security incidents.
What You Will Bring:
• Bachelor's degree in Information Technology, Cybersecurity, Computer Science, or a related field.
• 8 years of professional level information technology experience
• 3 years of experience performing information security functions in a health care environment (a Master?s degree may substitute for two years of the required
experience); or an equivalent combination of education and experience may be
qualifying
• Experience working in the health care industry
• Certification as a Certified Information Systems Security Professional (CISSP)
issued by the International Information System Security Certification Consortium
(ISC2), Certified Information Security Manager (CISM) issued by the Information
Systems Audit and Control Association (ISACA), and/or Certified Ethical Hacker
(CEH) issued by the Council of E-commerce Consultants (EC-Council), or
equivalent
Distributed Systems Engineer: Secure Sandboxes
Cyber security analyst job in San Francisco, CA
Magic's mission is to build safe AGI that accelerates humanity's progress on the world's most important problems. We believe the most promising path to safe AGI lies in automating research and code generation to improve models and solve alignment more reliably than humans can alone. Our approach combines frontier-scale pre-training, domain-specific RL, ultra-long context, and inference-time compute to achieve this goal.
About the role
As a Software Engineer on the Supercomputing Platforms and Infrastructure team, you will build the next generation systems that power large scale AI research and deployment. You will focus on sandboxed execution environments, distributed systems orchestration, and performance optimized compute workflows. You will work closely with ML and Research teams and infrastructure teams to deliver both high throughput, scale, and strong isolation guarantees in a cluster environment.
What you might work on
Build highly scalable, highly performant, software that facilitates arbitrary code execution with strong isolation guarantees.
Design and build systems that allow our AI models to interface with machines in various modes, interactive terminal, GUI applications, etc.
Provision and operate high density compute and storage nodes (NVMe, high IOPS SSDs, high bandwidth networks), and build software that performs efficient load balancing, and resource utilization across them.
Instrument and optimize end to end performance including storage IO, network bandwidth, CPU, memory, and endurance constraints.
Develop APIs, self service platforms, and automation and tools so researchers and engineers can deploy and monitor workloads at scale.
Troubleshoot complex infrastructure issues across OS, drivers, hardware, storage systems (local NVMe, block storage, NFS), networking, namespace isolation, and cloud or hybrid environments.
Produce clean, documented code and developer workflows, and collaborate with SRE and security teams to ensure safe, reliable, and self serviceable compute offerings.
What we are looking for
Strong software engineering background (C, C++, Go, Rust, or similar systems languages).
Experience designing or operating sandboxed or isolated execution environments (namespaces, cgroups, container runtime internals), or strong interest in this area.
Experience building or operating distributed systems or parallel processing frameworks (scatter aggregate processing, worker pools, multi thread and multi process coordination, shared memory, atomics, merging strategies).
Solid understanding of storage and IO subsystems (NVMe, SSD endurance, write amplification), network performance, CPU and memory resource constraints in high performance compute clusters.
Comfortable working on low level systems (OS, threading, memory management, synchronization) as well as higher level orchestration or automation.
Experience with cloud infrastructure (GCP, AWS, Azure, etc.) including IaC tools such as OpenTofu, Terraform, Pulumi, or CDK is a plus.
Intellectual curiosity, strong ownership, and the ability to make tradeoffs in ambiguous environments such as latency versus throughput and isolation versus performance.
Nice to haves
Prior experience with GPU scheduling, RDMA networking, or bare metal HPC clusters
Contributions to open source container runtimes or sandboxing frameworks
Experience with kernel internals, device drivers, or SSD and NVMe endurance modeling
Familiarity with Rust for systems programming or Go for infrastructure orchestration
Why join us
You will work at the cutting edge of AI infrastructure including large compute clusters, advanced metrics engines, and next generation sandboxing systems for untrusted workloads.
The problems you solve will be foundational, for example how to securely and efficiently run arbitrary research code across thousands of GPUs or high end SSDs.
You will join a collaborative and hands-on team where you are building rather than only modeling.
Excellent compensation and equity, generous benefits, and high impact.
Our culture:
Integrity. Words and actions should be aligned
Hands-on. At Magic, everyone is building
Teamwork. We move as one team, not
N
individuals
Focus. Safely deploy AGI. Everything else is noise
Quality. Magic should feel like magic
Compensation and benefits (US)
Annual salary range: 200,000 USD to 550,000 USD depending on seniority
Significant equity component
401(k) with matching, comprehensive health, dental, and vision insurance, unlimited paid time off, visa sponsorship and relocation support
Fast paced, mission driven environment focused on safely advancing AGI for humanity
Auto-ApplySecurity Engineer, Operating Systems
Cyber security analyst job in San Francisco, CA
Anthropic's mission is to create reliable, interpretable, and steerable AI systems. We want AI to be safe and beneficial for our users and for society as a whole. Our team is a quickly growing group of committed researchers, engineers, policy experts, and business leaders working together to build beneficial AI systems.
About the Role
We're looking for an Operating Systems Security Engineer to harden and secure the OS layer of our infrastructure. You'll be responsible for designing and implementing OS-level security controls, from kernel hardening to runtime protection, ensuring our systems can withstand sophisticated attacks while maintaining the performance required for AI model training.
This is a hands-on role where you'll work with cutting-edge hardware and implement novel security solutions for environments that don't exist anywhere else in the world. You'll need to balance extreme security requirements with the operational needs of researchers training models at unprecedented scale.
What You'll Do:
* Design and implement hardened OS configurations for AI workloads across diverse hardware platforms
* Minimize attack surfaces by removing as many unnecessary components as possible from kernelspace and userspace
* Develop kernel security policies using SELinux, AppArmor, and custom Linux Security Modules and runtime enforcement mechanisms
* Implement and maintain full-disk encryption solutions for diverse storage systems
* Build security infrastructure for AI systems, research environments, and production services
* Create OS-level attestation and integrity monitoring systems
* Apply security patches, develop patches for custom kernel modules, and kernel hardening configurations
* Design secure boot processes and trusted execution environments
* Work with container teams to ensure proper workload isolation at the kernel level
* Design privilege separation and mandatory access control policies
* Implement secure update mechanisms for OS components
* Build tooling for security configuration management and compliance verification
* Serve as a subject matter expert for OS security questions and designs
Who You Are:
* 5+ years of experience in operating systems security or kernel development
* Deep knowledge of Linux internals, including kernel subsystems and security frameworks (SELinux, AppArmor, seccomp, etc.)
* Experience with kernel hardening techniques and exploit mitigation
* Strong programming skills in C and systems programming languages
* Experience with eBPF for security monitoring and enforcement
* Understanding of virtualization and containerization security
* Track record of identifying and fixing OS-level security vulnerabilities
* Experience with security-focused Linux distributions
Strong candidates may also have:
* Kernel development experience or contributions to Linux kernel
* Experience with real-time or embedded operating systems
* Knowledge of hardware security features and their OS integration
* Experience with secure boot technologies
* Experience with confidential computing and memory encryption technologies (SEV, TDX, SGX)
* Background in vulnerability research, exploit development, or fuzzing
* Experience with formal methods for OS verification
* Knowledge of hardware security features and their OS integration (TPM, HSM, secure enclaves)
Deadline to apply: None. Applications will be reviewed on a rolling basis.
The expected base compensation for this position is below. Our total compensation package for full-time employees includes equity, benefits, and may include incentive compensation.
Annual Salary:
$300,000-$405,000 USD
Logistics
Education requirements: We require at least a Bachelor's degree in a related field or equivalent experience.
Location-based hybrid policy: Currently, we expect all staff to be in one of our offices at least 25% of the time. However, some roles may require more time in our offices.
Visa sponsorship: We do sponsor visas! However, we aren't able to successfully sponsor visas for every role and every candidate. But if we make you an offer, we will make every reasonable effort to get you a visa, and we retain an immigration lawyer to help with this.
We encourage you to apply even if you do not believe you meet every single qualification. Not all strong candidates will meet every single qualification as listed. Research shows that people who identify as being from underrepresented groups are more prone to experiencing imposter syndrome and doubting the strength of their candidacy, so we urge you not to exclude yourself prematurely and to submit an application if you're interested in this work. We think AI systems like the ones we're building have enormous social and ethical implications. We think this makes representation even more important, and we strive to include a range of diverse perspectives on our team.
How we're different
We believe that the highest-impact AI research will be big science. At Anthropic we work as a single cohesive team on just a few large-scale research efforts. And we value impact - advancing our long-term goals of steerable, trustworthy AI - rather than work on smaller and more specific puzzles. We view AI research as an empirical science, which has as much in common with physics and biology as with traditional efforts in computer science. We're an extremely collaborative group, and we host frequent research discussions to ensure that we are pursuing the highest-impact work at any given time. As such, we greatly value communication skills.
The easiest way to understand our research directions is to read our recent research. This research continues many of the directions our team worked on prior to Anthropic, including: GPT-3, Circuit-Based Interpretability, Multimodal Neurons, Scaling Laws, AI & Compute, Concrete Problems in AI Safety, and Learning from Human Preferences.
Come work with us!
Anthropic is a public benefit corporation headquartered in San Francisco. We offer competitive compensation and benefits, optional equity donation matching, generous vacation and parental leave, flexible working hours, and a lovely office space in which to collaborate with colleagues. Guidance on Candidates' AI Usage: Learn about our policy for using AI in our application process
Auto-ApplyInformation Security Analyst
Cyber security analyst job in Mountain View, CA
**Be visionary** Teledyne Technologies Incorporated provides enabling technologies for industrial growth markets that require advanced technology and high reliability. These markets include aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, deepwater oil and gas exploration and production, medical imaging and pharmaceutical research.
We are looking for individuals who thrive on making an impact and want the excitement of being on a team that wins.
**Job Description**
**Make an impact where security meets innovation.** At Teledyne RF & Microwave, we design and deliver advanced technologies that power aerospace, defense, and communications worldwide. Our team thrives on precision, collaboration, and a commitment to protecting critical systems. If you're passionate about cybersecurity and want to work for a trusted leader in high-tech solutions, this role is for you.
**What you'll do**
+ Maintain the security posture of classified systems in line with approved policies
+ Verify implementation of security controls and keep documentation current
+ Manage system accounts and ensure proper authorization procedures
+ Conduct regular system assessments and report findings to the ISSM
+ Monitor audit logs and analyze user activity for compliance
+ Respond to security incidents and oversee recovery processes
+ Notify ISSM of system changes that impact authorization
+ Support hardware maintenance, backups, and virus updates
+ Train employees on internal security policies and assist with spill containment
+ Participate in configuration control activities when designated
**What you need**
+ Strong problem-solving and organizational skills (required)
+ Ability to analyze security data and enforce compliance (required)
+ Excellent communication and teamwork skills (required)
+ U.S. citizenship and eligibility for security clearance (required)
+ Bachelor's degree in Information Systems or Security+ certification (required)
+ Experience with classified systems and security audits (advantage)
+ Familiarity with DAAPM and ITPSO policies (advantage)
+ Hands-on technical competence with system administration (advantage)
**What we offer**
+ Competitive pay and comprehensive health benefits
+ 401(k) with company match and retirement plans
+ Paid time off and flexible work arrangements
+ Professional development and training opportunities
+ Employee wellness programs and assistance resources
+ A collaborative environment working on mission-critical technology
**What happens next**
Apply online through Teledyne's careers page. If your qualifications align, our team will contact you for interviews and guide you through the clearance process.
_Teledyne is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status._
**Salary Range:**
$61,600.00-$82,100.000
**Pay Transparency**
The anticipated salary range listed for this role is only an estimate. Actual compensation for successful candidates is carefully determined based on several factors including, but not limited to, location, education/training, work experience, key skills, and type of position.
Teledyne and all of our employees are committed to conducting business with the highest ethical standards. We require all employees to comply with all applicable laws, regulations, rules and regulatory orders. Our reputation for honesty, integrity and high ethics is as important to us as our reputation for making innovative sensing solutions.
Teledyne is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other characteristic or non-merit based factor made unlawful by federal, state, or local laws.
You may not realize it, but Teledyne enables many of the products and services you use every day **.**
Teledyne provides enabling technologies to sense, transmit and analyze information for industrial growth markets, including aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, energy, medical imaging and pharmaceutical research.
Cyber Security Analyst
Cyber security analyst job in San Francisco, CA
blue Stone Recruiting is a national search firm with a focus of placing top Cyber Security talent from the Analyst level to CISO with prestigious organizations nationwide
Job Description
Our client seeking a Cyber Security Operations Analyst to support an operations team that supports a large government customer. The candidate will be relied upon to assist teammates and perform troubleshooting as needed. The candidate should excel in a fast-paced work environment and be willing to face new challenges.
Qualifications
• Proficiency with vulnerability scanning, remediation and reporting
• Knowledge in web application scanning using various tools
• Demonstrated proficiency with Windows, UNIX, & LINUX operating systems
• Experience working in a customer service information technology environment
• Network security and system security experience
• Ability to discuss real world troubleshooting; problems and solutions encountered
• Knowledge of IT security best practices, US federal government standards, regulations and policy (FedRamp, TIC, NIST 800-37rev1 & 800-53rev3)
• Must be motivated and able to work independently
• Proven project leadership (PowerPoint presenting, MS Project Planning)
• Experience working with change implementation in a controlled environment
• Excellent verbal, written communication and technical writing skills
Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.
2-5 years of related experience in data security administration.
Experience using some of the following tools:
o Nessus
o Tenable Security Center
o Netsparker
o WebInspect
o BurpSite
Additional InformationWork with blue Stone recruiting to find your next Cyber Security role. You can find us at ******************************* We look forward to speaking with you.
Information Security Analyst
Cyber security analyst job in Sunnyvale, CA
Analyzes information security practices to ensure alignment with industry standards and guidelines. Identifies, investigates, and resolves security breaches detected by security solutions. Contributes to the creation and maintenance of security policies, standards,
guidelines, and procedures.
Leads and delivers staff training on information security and breach prevention.
What You Will Do:
Staying current on information security trends, news and security standards,
especially those related to the healthcare industry
Participating in the development of security standards and best practices for the
organization
Participating in the evaluation, design and implementation of new information
security solutions to protect the organization's computer networks from cyber
attacks
Assessing the efficacy of existing security measures and processes to ensure that
these measures and processes meet Health Insurance Portability and
Accountability Act (HIPAA) and Federal Information System Controls Audit Manual
(FISCAM) security standards and making recommendations for improvement
Recommending security enhancements to management and senior ITS staff
Analyzing software and systems requirements and providing objective advice on the
level of security risks and remediation options
Monitoring computer networks for security issues in order to reduce the risk of
security incidents
Leading investigation of security breaches and other cyber security incidents in
collaboration with the Information Security Manager and the infrastructure team
Documenting security breaches and assessing the damage caused
Collaborating with the infrastructure team to ensure security measures and
software to protect systems and information infrastructure, including firewalls and
data encryption programs, are up to date
Conducting system vulnerability audits and assessments on a proactive basis and
collaborating with the infrastructure team to perform tests and uncover network
vulnerabilities
Managing efforts with vendors on annual security audit, including pen testing
Assisting with developing and documenting preventive measures to ensure system
security
Staying informed of best practices and new developments in the field, analyzing
applicability, making related recommendations, and developing written
documentation of adopted practices
Documenting computer security procedures, and tests
Assisting with the development of policies, procedures, standards, and guidelines
related to information security
Developing information, training materials and presentations to educate the
organization about information security management, data security, and prevention
of breaches
Assisting staff with the installation and utilization of new security products and
procedures
Conferring with staff regarding issues such as computer data access needs,
security violations, and programming changes
Monitoring systems and providing frequent training to staff regarding how to detect
and avoid phishing attempts
Reviewing any violations of security procedures and providing remedial training to
staff, as needed
Performs other duties as assigned
You Will Be Successful If:
In-depth knowledge of HIPAA and FISCAM security guidelines.
Strong understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts.
Proficiency with operating systems, virtualization, and security systems.
High proficiency in Windows-based PC systems and Microsoft Office Suite.
Working knowledge of penetration testing, patch management, and security
frameworks (NIST, ISO 27001, COBIT).
Familiarity with project management principles and customer service practices.
Awareness of emerging security technologies such as AI, IoT, and blockchain.
Strong analytical, problem-solving, and decision-making skills.
Clear and concise writing and communication skills, with ability to present
technical content to non-technical audiences.
Experience creating training materials and leading staff training.
Ability to manage multiple priorities, meet deadlines, and adapt to shifting needs.
Leadership ability to facilitate meetings, resolve issues, and guide staff.
Strong collaboration skills and diplomacy across teams and levels of the
organization.
Willingness to respond to after-hours information security incidents.
What You Will Bring:
Bachelor's degree in Information Technology, Cybersecurity, Computer Science, or a related field.
8 years of professional level information technology experience
3 years of experience performing information security functions in a health care environment (a Master?s degree may substitute for two years of the required
experience); or an equivalent combination of education and experience may be
qualifying
Experience working in the health care industry
Certification as a Certified Information Systems Security Professional (CISSP)
issued by the International Information System Security Certification Consortium
(ISC2), Certified Information Security Manager (CISM) issued by the Information
Systems Audit and Control Association (ISACA), and/or Certified Ethical Hacker
(CEH) issued by the Council of E-commerce Consultants (EC-Council), or
equivalent