Acquisition Security Analyst
Cyber security analyst job in Los Angeles, CA
MANTECH seeks a motivated, career and customer-oriented Acquisition Security Analyst II to join our team in El Segundo, CA.
The Acquisition Security Analyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle.
Responsibilities include but are not limited to:
In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy.
Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process.
Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers.
Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI.
Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided.
Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)
Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E.
Minimum Qualifications:
Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree.
10+ years of related experience with acquisition programs
6+ years of experience with SCI programs.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process.
Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation)
Preferred Qualifications:
4+ years of experience with SAR program acquisitions desired.
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision.
Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Cyber Security Analyst
Cyber security analyst job in Irvine, CA
Required Skills & Experience:
Bachelor's degree in a related field preferred but not required.
5+ years of experience in a SOC or similar security environment.
Expertise with SIEM, EDR, CSPM tools; strong skills in SQL/KQL/Cypher for data analysis.
Proven ability to lead complex investigations and coordinate across technical and business stakeholders.
Solid understanding of cybersecurity frameworks (MITRE ATT&CK, NIST CSF, NIST SP800-61r3).
Experience with log aggregation technologies and SIEM tuning processes.
Job Description:
A large financial services customer based in Irvine, CA is seeking a Cyber Security Operations Analyst, focused on Incident Response. This individual will lead Incident Response, and act as a technical expert within the SOC. This team protects the organization from cyber threats. This role requires strong analytical skills, leadership in high-severity incidents, and deep knowledge of security tools and frameworks.
Pay:
50-65/hr
Cyber Security Engineer
Cyber security analyst job in San Jose, CA
About the Company
Atomus' mission is to provide world class cybersecurity for the world's most critical organizations. We build security compliance software delivered as managed services sold directly, with relevant professional services and support. Examples of our commercial customers include hypersonic aircraft companies, satellite and space mission systems companies, AI and software companies, among many other companies serving primarily the aerospace and defense industry. At Atomus we are hardworking, we move fast, and we put our customers first.
About the Role
As a Cybersecurity Engineer will work closely with customers to help them implement and fully leverage Atomus' cybersecurity products, maintain compliance with NIST 800-171 and CMMC cybersecurity standards, and solve technical challenges. Our customers depend on Atomus to manage and secure their Windows, MacOS, Ubuntu, iOS, Android devices, and Firewalls while ensuring compliance. We aim to provide the best possible support when they have questions. Our team's main goal is to simplify our customers' lives, for compliance and security. You will serve as the voice of the customer by sharing their feedback and insights with our product team and reporting any issues to our software engineers. We take pride in delivering amazing experiences for our customers.
Responsibilities
Manage and guide new customers through the onboarding process, ensuring proper setup, configuration, and alignment with their security programs and establishing baseline compliance requirements of NIST 800-171 and CMMC while performing technical tasks/project management required for onboardings.
Serve as the first point of contact for technical inquiries, providing debugging, troubleshooting, and solutions for technical IT/security issues related to the Atomus platform.
Work closely with internal teams (sales, product, engineering) along with partners/vendors for customer requirements to communicate customer feedback and advocate for customer needs in product development and rolling out 3rd party products.
Assist customers in managing and maintaining NIST 800-171 and CMMC compliance requirements, ensuring IT documentation is updated and maintained.
Required Skills
Experience in a customer-facing technical role, IT administrator, solutions engineer, Technical Customer Success, or TAM role preferably in cybersecurity or compliance.
Strong experience with cybersecurity frameworks and technologies (e.g., NIST, CMMC, firewalls, routers, encryption tools).
Intermediate networking knowledge of WAN and LAN connectivity, routers, firewalls, switches, security, etc.
Experience with Microsoft Intune, Active Directory, Windows, MacOS and ABM, as well as mobile platforms like Android and iOS.
Advanced understanding of Microsoft products (Exchange, SharePoint, Windows, Windows Server, Active Directory, etc.).
Familiarity with command-line tools (e.g., PowerShell, Terminal) for troubleshooting and deployment.
Strong troubleshooting skills, particularly related to network security, software issues, and IT environments.
Excellent verbal and written communication skills; ability to explain complex topics to both technical and non-technical audiences.
Applicants must have strong emotional intelligence to intuit and match customer sentiment for effective communication.
Preferred Skills
Prior experience with NIST 800-171, CMMC, or other compliance standards.
Ability to manage multiple customer accounts and onboarding projects simultaneously.
Familiarity with CRM platforms (HubSpot), and compliance documentation tools while managing SLAs which include customer satisfaction, initial response, and issue resolution times.
Cybersecurity risk security analyst
Cyber security analyst job in San Francisco, CA
We are seeking a Cybersecurity Risk Analyst to support managing and mitigating security risks across processes, technologies, and cloud environments.
The ideal candidate will combine technical expertise, business acumen, and cybersecurity experience to advise partners, assess risks, and drive improvements in secure operations.
This role requires hands on experience with Kusto Query Language (KQL), cloud security, and risk assessment, as well as the ability to communicate effectively with stakeholders at all levels.
Must be local to San Francisco or Los Angeles (LA) or Salt Lake City (SLC).
Responsibilities:
Support risk strategies by identifying and mitigating security risks in bank systems and processes.
Apply and interpret security policies, provide guidance and input on policy enhancements.
Advise business and technical partners on security controls, procedures, and best practices.
Assess cloud and on-prem environments to identify risks and recommend control improvements.
Conduct security control assessments, document findings, and develop actionable remediation plans.
Evaluate third-party vendors to determine shared security responsibilities and associated risks.
Communicate security risks and mitigation strategies effectively to technical teams and executives.
Collaborate across teams to drive secure operations and deliver results in a fast-paced environment.
Qualifications:
Bachelor's degree in Cybersecurity, Information Security, Computer Science, or related technical discipline (or equivalent experience).
3+ years of experience in cybersecurity, information security, or technology risk management.
Proficiency in Kusto Query Language (KQL) for data analysis, log correlation, and threat detection.
In-depth understanding of security frameworks such as NIST, ISO 27001, or FedRAMP.
Demonstrated experience assessing and improving security posture across Cloud (Azure, AWS) and on-premises environments.
Proven ability to conduct security control assessments, identify risk exposures, and develop actionable remediation plans.
Skilled at translating technical security concepts into clear, business-relevant insights for stakeholders and executives.
Excellent communication, collaboration, and interpersonal skills, with a focus on building trusted partnerships across technical and business teams.
Strong organizational and analytical skills, with the ability to manage multiple initiatives in a fast-paced, results-driven environment.
Information Security Engineer
Cyber security analyst job in Newark, CA
Job Title: Security Engineer
Department: IT
Reports to: IT Manager
Job Overview: The Security Engineer is responsible for designing, implementing, and managing the security infrastructure that protects our applications, data, and networks. This role plays a critical part in threat detection, risk mitigation, and the development of secure architectures while ensuring compliance with industry standards and regulatory requirements.
Primary Responsibilities:
Design, deploy, and manage security tools and technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection).
Monitor systems and networks for security events, investigate incidents, and lead remediation efforts.
Perform threat modeling, risk assessments, and application security reviews.
Conduct vulnerability assessments and penetration tests to identify and address security gaps.
Develop, implement, and maintain security policies, standards, and procedures aligned with frameworks such as NIST, ISO 27001, SOC 2, and GDPR.
Build and maintain secure cloud and infrastructure configurations (e.g., GCP, Oracle Cloud).
Conduct code and architecture reviews with a focus on security best practices.
Partner with DevOps, IT, and engineering teams to integrate security across the software development lifecycle (DevSecOps).
Stay informed about emerging threats, vulnerabilities, and regulatory updates (e.g., ISO 27001, ITAR, CMMC 2.0).
Deliver security awareness training to internal teams.
Collaborate with compliance, legal, and business stakeholders to support audits and regulatory obligations.
Qualifications:
Bachelor's degree in Computer Science, Cybersecurity, or a related field.
5+ years of hands-on cybersecurity experience.
Strong knowledge of security frameworks and protocols (e.g., NIST, ISO 27001, SOC 2, CIS).
Expertise in network security, system hardening, and secure coding practices.
Practical experience with SIEM, IDS/IPS, EDR, firewalls, and vulnerability management tools.
Due to U.S. export control laws and regulations (ITAR), this position requires U.S. Person status.
Preferred:
Industry certifications such as CISSP, OSCP, or GIAC.
Experience with security audits, penetration testing, or participation in red/blue team exercises.
Strong communication skills with the ability to articulate complex security concepts to both technical and non-technical audiences.
Experience in an Electronics Manufacturing environment is a plus.
Senior Security Cloud Engineer - Top VC Firm
Cyber security analyst job in Menlo Park, CA
Help support the CISO at one of the world's largest venture capital firms, working at the intersection of cloud security, AI and cutting-edge technology.
You'll be joining a lean and highly technical security team, where your impact will be immediate and visible. This role is balanced between seniority and technical depth. You'll be trusted to support and advise the CISO, contribute to strategic decisions and act a senior technical voice, while remaining deeply hands-on as a cloud security engineer.
The environment is heavily cloud based, (primarily Azure, with some AWS) and increasingly focussed on AI platforms and MCP workloads. You'll work closely with AI development, data engineering and platform teams to ensure security is embedded.
Ideally, you'll be coming from a similar role, operating in a senior position while remaining technical day-to-day, with coding in python, terraform or SQL. Whilst this role requires general security experience, you will need to have a background specifically in cloud security.
This role is based in Menlo Park.
Interested in finding out more? No up-to-date resume required.
Information Security Analyst
Cyber security analyst job in Chandler, AZ
STRATEGIC STAFFING SOLUTIONS HAS AN OPENING!
This is a Contract Opportunity with our company that MUST be worked on a W2 Only. No C2C eligibility for this position. Visa Sponsorship is Available! The details are below.
“Beware of scams. S3 never asks for money during its onboarding process.”
Job Title: Information Security Analyst
Location: Chandler, AZ 85286
Onsite Work
Contract Length: 6+ Months
Pay: 45-48 an hr on W2
Overview
We are seeking an Information Security Analysts to support a Central Access Provisioning team during a transition from a manual to an automated Identity and Access Management (IAM) environment. These roles will also provide flexible support across IAM Operations teams to address capacity needs resulting from workforce attrition and evolving operational demands.
The ideal candidates will have hands-on experience with IAM tools, strong foundational knowledge of authentication standards, and the ability to operate effectively in a regulated, security-focused environment.
Key Responsibilities
Support Identity and Access Management (IAM) operations, including access provisioning and related security processes.
Participate in low- to moderately complex information security initiatives and identify opportunities for process improvement.
Review, analyze, and resolve basic to intermediate information security assignments requiring research, evaluation, and selection of appropriate solutions.
Assist with low- to medium-risk deliverables in alignment with established policies, procedures, and compliance requirements.
Develop and present recommendations to address security-related issues, exercising independent judgment within defined guidelines.
Provide timely and accurate information to internal stakeholders and client personnel related to information security analysis.
Collaborate with cross-functional teams and interact effectively with multiple levels of leadership.
Manage priorities, meet deadlines, and deliver high-quality results in a fast-paced environment.
Required Qualifications
Minimum of 2 years of experience in Information Security Analysis or a related field, or equivalent experience demonstrated through a combination of work experience, consulting, training, military service, or education.
Hands-on experience with IAM tools, such as:
SailPoint
Okta
CyberArk
Ping
Microsoft Entra ID (Azure AD)
Working knowledge of authentication and identity standards, including:
LDAP
SAML
OAuth
OpenID
SCIM
Familiarity with security and compliance frameworks, such as ISO, NIST, SOX, and PCI.
Strong organizational skills with the ability to multitask and prioritize competing requests.
Customer-service mindset with a demonstrated ability to respond to requests in a timely and professional manner.
Proficiency in Microsoft Office applications, including Word, Excel, Outlook, PowerPoint, Access, and Project.
Application Security Engineer
Cyber security analyst job in Manhattan Beach, CA
WHO WE ARE:
Headquartered in Southern California, Skechers-the Comfort Technology Company -has spent over 30 years helping men, women, and kids everywhere look and feel good. Comfort innovation is at the core of everything we do, driving the development of stylish, high-quality products at a great value. From our diverse footwear collections to our expanding range of apparel and accessories, Skechers is a complete lifestyle brand.
ABOUT THE ROLE:
Skechers is seeking a passionate Application Security Engineer to join our team and serve as a security champion who bridges the gap between development and security operations. This role is critical to strengthening our security posture by embedding security practices throughout the software development lifecycle and fostering a security-first culture across our development teams.
The ideal candidate will be a hands-on security professional who thrives on collaboration, enjoys mentoring developers, and has the technical expertise to identify vulnerabilities while providing practical remediation guidance. You will play a pivotal role in scaling our application security program and ensuring our applications are secure by design.
WHAT YOU'LL DO:
Successfully integrate security practices into development workflows, resulting in measurable reduction of security vulnerabilities in production applications
Conduct thorough security-focused code reviews that identify critical vulnerabilities while providing actionable feedback to development teams
Establish and implement efficient processes for triaging, prioritizing, and tracking remediation of security findings with clear SLAs and accountability measures
Enhance developer engagement through proactive security awareness initiatives, building trusted relationships that enable developers to implement secure coding practices throughout the development process.
Assist with management and optimization of SAST, DAST, OSS, WAF, and other application security tools to maximize coverage and minimize false positives
Provide analysis and support as needed during security incidents to contribute to faster resolution times
WHAT YOU'LL BRING:
Proficiency with application security tools including SAST, DAST, dependency scanning, and WAF technologies
Strong understanding of common web application vulnerabilities (OWASP Top 10) and secure coding practices
Experience with at least one programming language (Java, Python, JavaScript, C#, or similar)
Knowledge of API security, authentication mechanisms, and authorization frameworks
Familiarity with DevSecOps practices and CI/CD pipeline integration
REQUIREMENTS:
3-5 years of hands-on application security experience with demonstrated expertise in secure code review
Retail or e-commerce experience a plus
The pay range for this position is $110,000-$155,000/yr USD.
Information Security Engineer
Cyber security analyst job in Phoenix, AZ
We're looking for an Information Security Engineer to join our team and help strengthen our endpoint, access, and compliance security posture across the organization. If you thrive in a fast-paced environment and enjoy solving complex security challenges, we'd love to connect.
🔐 Key Responsibilities
Support endpoint and access security across Windows and mac OS environments.
Review and validate privileged access requests using least-privilege principles.
Assist in developing and implementing security policies, elevation rules, and device configurations.
Troubleshoot security-related issues, including elevation failures and policy conflicts, using tools like BeyondTrust EPM.
Participate in compliance and governance initiatives, including secure analytics and data protection efforts.
Prepare clear documentation, meeting updates, and stakeholder communications.
Contribute to continuous improvements in cyber engineering and endpoint security.
💡 Ideal Candidate
Experience with endpoint security tools (e.g., BeyondTrust, EDR, MDM).
Strong understanding of access control, least-privilege frameworks, and security best practices.
Ability to collaborate with cross-functional teams and communicate effectively.
Curious, proactive, and ready to solve complex security problems.
Information Security Engineer 3 - Contingent
Cyber security analyst job in Chandler, AZ
This candidate will provide tuning support for Security AI for structured and unstructured scanning to executes data classification efficacy validation strategy.
This position will require that the candidate apply accurate feedback and prevent cascading misclassifications across thousands of columns.
Monitor tuning impact and ensure compliance alignment.
Maintain governance integrity and audit readiness.
Without this role, misclassifications could propagate unchecked, leading to compliance risks and poor data quality.
Key skills include data classification and semantic similarity of enterprise data, analytics and governance and platform technical awareness.
In this contingent resource assignment, candidate may:
Consult on or participate in moderately complex initiatives and deliverables within Information Security Engineering and contribute to large-scale planning related to Information Security Engineering deliverables.
Review and analyze moderately complex Information Security Engineering challenges that require an in-depth evaluation of variable factors.
Contribute to the resolution of moderately complex issues and consult with others to meet Information Security Engineering deliverables while leveraging solid understanding of the function, policies, procedures, and compliance requirements.
Collaborate with client personnel in Information Security Engineering.
Required Qualifications:
4 plus years of Information Security Engineering experience, or equivalent demonstrated through one or a combination of the following: work or consulting experience, training, military experience, education.
Pay Range: $55-60$
The specific compensation for this position will be determined by a number of factors, including the scope, complexity and location of the role as well as the cost of labor in the market; the skills, education, training, credentials and experience of the candidate; and other conditions of employment. Our full-time consultants have access to benefits including medical, dental, vision and 401K contributions as well as any other PTO, sick leave, and other benefits mandated by appliable state or localities where you reside or work.
Staff Blockchain Security Engineer
Cyber security analyst job in Irvine, CA
About the Company:
Blizzard Entertainment, a global leader in interactive entertainment, has been shaping the world of video games since its founding. Renowned for iconic franchises like
World of Warcraft
,
Overwatch
, and
Diablo
, Blizzard is dedicated to creating immersive, innovative, and high-quality gaming experiences that captivate millions of players worldwide. Our mission is to inspire and connect players through engaging gameplay, compelling storytelling, and vibrant online communities. As we continue to expand our reach in the gaming industry, we remain committed to pushing the boundaries of creativity, technology, and entertainment.
The Role: Staff Blockchain Security Engineer
Blizzard's Application Security (AppSec) team is entrusted with safeguarding the company and its players from software vulnerabilities and security threats. As a Staff Blockchain Security Engineer within AppSec, you will specialize in securing blockchain-based game features, in-game economies, and Web3 integrations. You'll collaborate closely with game development and engineering teams to provide guidance, perform security assessments, and implement best practices throughout the blockchain software lifecycle.
This role requires in-person collaboration two days per week at our Irvine, California headquarters.
Key Responsibilities:
Conduct comprehensive security reviews of blockchain integrations, smart contracts, in-game economy systems, and Web3 features for vulnerabilities and architectural flaws
Advise game development teams on secure blockchain practices and remediation strategies
Establish and maintain secure development processes within the blockchain software lifecycle
Develop, maintain, and improve blockchain-specific security tooling (e.g., fuzzers, static analysis frameworks)
Collaborate with legal, compliance, and risk teams to evaluate security, operational, and regulatory risks of blockchain implementations
Minimum Qualifications:
8+ years in application security, Web3 security, or related disciplines
Proven experience auditing smart contracts, blockchain protocols, or Web3 applications
Expertise in design reviews, threat modeling, secure code review, or penetration testing with a hacker mindset
Strong knowledge of application security principles and common vulnerabilities (e.g., SSRF, race conditions, privilege escalation)
Experience with secure key management, wallet systems, or cryptography
Familiarity with blockchain security tools such as Slither, Echidna, or similar
Scripting or programming experience in Python, C++, JavaScript, or other relevant languages
Ability to balance business goals with security priorities and communicate risks clearly to cross-functional teams
Preferred Qualifications:
Experience in formal verification of smart contracts
Background in blockchain-enabled gaming, DeFi platforms, or NFT ecosystems
Contributions to blockchain security communities, bug bounty programs, or published research
Experience defining and executing long-term blockchain security strategies alongside engineering leadership
Why Blizzard?
Competitive base salary and discretionary annual bonus
Equity opportunities and long-term incentives
Comprehensive health, dental, and vision plans
401(k) with company match
Paid parental leave and flexible time off
A hybrid work model that balances collaboration with flexibility
Salary Range: $170,000 - $250,000. This excludes discretionary bonuses or equity grants, which are determined based on experience, skills, and market standards.
Blizzard Entertainment is committed to building diverse teams that reflect the communities we serve. We are an equal opportunity employer and do not discriminate based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or veteran status. If you require accommodation, please reach out to our People Team.
Information Security Engineer
Cyber security analyst job in Chandler, AZ
Role: Information Security Engineer
Contract: 12 months
Key Responsibilities)
Provide tuning and optimization support for Securiti AI data discovery and classification (structured & unstructured data).
Execute data classification efficacy validation strategies to ensure high accuracy and consistency.
Apply precise feedback mechanisms to prevent cascading misclassifications across thousands of columns and datasets.
Monitor and analyze tuning impact on classification results and ensure ongoing compliance alignment.
Maintain data governance integrity and support audit readiness.
Perform internal data scanning across servers and virtual machines.
Scan and analyze large-scale datasets (up to 100+ TB) across enterprise platforms.
Work with cloud-based data sources, primarily on AWS.
Collaborate with analytics, governance, security, and platform teams to align classification outcomes.
Support regulatory compliance efforts related to GDPR, SOX, and other data protection frameworks.
Utilize SQL or other database technologies to analyze, validate, and troubleshoot classification results.
Develop scripts and automation to support scanning, tuning, and reporting activities.
Required Skills & Qualifications
4-6 years of experience in data classification, data governance, or data analytics roles.
Hands-on experience with Securiti AI or similar data discovery and classification platforms.
Strong understanding of data classification techniques and semantic similarity across enterprise data.
Experience scanning structured and unstructured data at scale.
Proficiency in SQL and experience with relational or enterprise databases.
Experience working with cloud platforms, preferably AWS.
Knowledge of GDPR, SOX, or other data privacy and compliance regulations.
Strong problem-solving and analytical skills.
Experience with scripting (Python, Shell, or similar) for automation and analysis.
Ability to scan data from servers and virtual machines.
Nice-to-Have Skills
Experience with data governance frameworks and tools.
Familiarity with metadata management, data catalogs, and audit reporting.
Exposure to AI/ML-driven classification or NLP-based data discovery.
Prior experience in large-scale enterprise data environments.
“Mindlance is an Equal Opportunity Employer and does not discriminate in employment on the basis of - Minority/Gender/Disability/Religion/LGBTQI/Age/Veterans.”
Sr. Security Engineer
Cyber security analyst job in Scottsdale, AZ
My client seeking a Security Engineer with deep experience in Azure cloud environments and Fortinet security technologies. This role is responsible for strengthening the organization's cloud security posture, supporting defensive and offensive security initiatives, and ensuring ongoing compliance with SOC2 and GDPR requirements.
The ideal candidate has a strong foundation in Azure security architecture, hands-on experience deploying and managing FortiGate solutions in cloud environments, and a practical understanding of both blue-team and red-team methodologies.
This is a highly collaborative position in a fast-moving, multi-tenant environment, requiring strong technical judgment, attention to detail, and the ability to design secure solutions at scale.
Details:
$120k - $130k
Full-Time, Permanent Position
Scottsdale, AZ | 5 Days On-Site
Key Responsibilities:
Design, implement, and maintain security controls across Azure workloads, identities, networks, and data services.
Manage Azure security posture using Microsoft Defender for Cloud, Azure Policy, and associated tooling.
Ensure proper network segmentation, firewall enforcement, and secure connectivity across cloud environments.
Deploy, configure, and manage Fortinet technologies within Azure, including FortiGate firewalls and related services.
Optimize firewall rules, routing, logging, and monitoring to enhance threat visibility and reduce attack surface.
Support offensive-focused initiatives by identifying misconfigurations, modeling potential attack paths, and validating risks.
Support SOC2 control implementation, evidence collection, access reviews, and continuous compliance efforts.
Contribute to the development, documentation, and enforcement of security policies and procedures.
Support secure deployment pipelines, identity governance practices, and operational security improvements.
Participate in security architecture reviews for new systems and integrations.
Required Qualifications
5-7 years of experience in cloud security or cloud engineering roles.
5+ years of Azure experience, including networking, identity, governance, and security services
5+ years of experience with Fortinet, ideally FortiGate firewalls deployed in Azure.
Practical understanding of both defensive (blue team) and offensive (red team) security concepts.
Experience working within or supporting SOC2 programs.
Proficiency with scripting/automation (PowerShell or C#)
Good-to-Haves:
Exposure to DevSecOps practices, CI/CD pipeline hardening, or IaC security scanning.
Certifications such as AZ-500, SC-200, SC-300, Fortinet NSE certifications, or similar.
Exposure to GDBR
Oscar Associates Limited (US) is acting as an Employment Agency in relation to this vacancy.
Security Architect GCP
Cyber security analyst job in Sunnyvale, CA
Security Architect / Implementation Engineer
Duration: 6 Months contract with possibility of extension
We are seeking a highly skilled Security Architect / Security Implementation Engineer with expertise in designing, implementing, and integrating Google Cloud Security Command Center (SCC), Chronicle SIEM, and Cybereason XDR. The candidate will be responsible for architecting the end-to-end solution, implementing GCP native security controls, integrating third-party security tools, and producing detailed design and operational documentation.
Key Responsibilities:
Design and architect cloud-native security controls in GCP aligned with security and compliance frameworks (CIS, ISO 27001, NIST, etc.).
Implement Google Security Command Center (SCC) for threat detection, vulnerability management, and risk insights.
Architect and configure Chronicle SIEM for log ingestion, correlation, and advanced threat analytics.
Integrate Cybereason XDR with SCC, Chronicle, and other security tools to establish end-to-end threat detection and response workflows.
Define use cases, rules, policies, and security playbooks to automate detection and response.
Document the solution architecture, design decisions, configuration standards, and integration workflows.
Conduct knowledge transfer sessions with security operations and support teams.
Collaborate with GCP Cloud Platform teams, SOC teams, and compliance teams to align solutions with enterprise policies.
Required Skills & Experience:
8-12 years of overall IT security experience with at least 4-5 years in Google Cloud Security.
Proven experience with Google Security Command Center (SCC), Chronicle SIEM, and XDR platforms (Cybereason preferred).
Strong knowledge of GCP IAM, VPC Service Controls, Cloud Armor, DLP, Cloud Logging, Cloud Monitoring.
Hands-on experience in integrating SIEM, XDR, and native GCP security tools.
Experience with Terraform, Deployment Manager, or automation frameworks for security deployment.
Strong documentation and presentation skills.
Security certifications preferred: Google Professional Cloud Security Engineer, GCP Professional Architect, CISSP, CISM, CCSP.
Infrastructure & Information Security Architect
Cyber security analyst job in Industry, CA
We don't just offer jobs; we cultivate careers. Become part of our dynamic team of professionals and experience what it means to truly be valued. We're passionate about empowering our associates to reach their full potential, fostering growth, and celebrating success together.
When you join Sigma, you're stepping into a fast-growing, innovative global food organization that's redefining excellence in the industry.
Are you ready to elevate your career? Come join our table!
Position Summary
Responsible for designing, implementing, supporting and administering the IT infrastructure and information security applications. Analyzes system requirements and defines system architecture that will meet business needs, including server infrastructure, capacity planning, storage requirements and networking protocols.
Essential Job Functions
Responsible for designing and implementing information systems that will adequately support the infrastructure of the organization.
Examines system requirements and system architecture and provides new processes/standards that will meet business needs, including server infrastructure, capacity planning, storage requirements, and networking protocols.
Ensures that architecture project roll-outs meet security standards and are effectively integrated with current applications.
Completes tasks designed to ensure security of the organization's systems and information assets.
Protects against unauthorized access, modification, or destruction and develops IT security policies and standards.
Authorize user access and familiar with domain structures and digital signatures.
Oversees and guides the work of lower-level IT personnel or other IT teams.
Develops, implements and maintains policies, procedures, and programs for ensuring the security and integrity of company data, databases, information systems, and technology.
Conducts risk management analysis and creates business continuity, contingency, and disaster recovery plans.
Leads the development, update, and execution of Business Continuity Plans for systems and data within Enterprise Data.
Develops and executes the testing processes utilized to validate the disaster recovery plans and to identify weaknesses and failure points in the plans.
Works on advanced, complex technical projects or business issues.
Other duties as assigned.
Minimum Qualifications
Associate degree in Computer Science, Computer Engineering, Technology, Information Systems or equivalent work experience.
Eight years of infrastructure or security architecture.
Experience in enterprise and security architecture.
Experience on day to day IT operation management.
Experience on Data Center environments.
License/Certifications: N/A
Preferred Qualifications
Formal training ITIL, COBIT, or Microsoft certification.
Project Management certification.
Knowledge, Skills & Abilities (KSA's)
Knowledge on consolidation of Active Directory environments on a medium to large company.
Strong technical knowledge across infrastructure and security services support.
Working understanding of Active Directory structure (e.g. GPOs).
Working understanding of Agile and RACU Frameworks.
Understand industry threats and the methods to apply appropriate controls.
Knowledge of PowerShell and other automation methods.
Understanding of server hardening.
Proficient with Microsoft Office, including skills with Outlook, Word and Excel.
Ability to lead and effectively communicate with technical and non-technical staff across multiple disciplines and levels of the organization.
Ability to identify complex problems, review information to develop and evaluate options then implement solutions.
Environmental/Working Conditions
N/A
Physical Requirements
Usual office environment with frequent sitting, walking, and standing, and occasional climbing, stooping, kneeling, crouching, crawling, and balancing. Frequent use of eye, hand, and finger coordination enabling the use of office machinery. Oral and auditory capacity enabling interpersonal communication as well as communication through automated devices such as the telephone.
Security Analyst-Cyber Intelligence
Cyber security analyst job in San Francisco, CA
Mindlance is a national recruiting company which partners with many of the leading employers across the country. Feel free to check us out at *************************
Hope you are doing fine,
Please have a look at the job description and if you are comfortable with the role and responsibilities please revert with your updated resume.
Job title:- Threat Intelligence Analyst/Security Analyst
Location:- San Francisco CA
Duration:- 6- 12 Months Contract
Responsibilities:
• Differentiate, collect, and evaluate technical and open source data to produce threat intelligence products;
• Identify credible, new intelligence and subject matter resources relative to current/emerging threats;
• Analyze reports to understand threat campaign techniques and lateral movements and extract indicators of compromise (IOCs).
• Manage and maintain threat intelligence platforms and feeds
• Conduct research on emerging products, services, protocols, and standards relative to the information security arena
Required Qualifications:
• 3-5 year's experience performing threat i management operational activities, including threat intelligence gathering and analysis, and threat metrics development and reporting
• Experience working with large/multi-national organizations
• Demonstrated use of analytic tools and platforms
• In-depth knowledge of information security threats Windows and Unix/Linux platforms
• The demonstrated ability to work effectively in a collaborative team environment as an individual contributor.
• The ability to provide support after normal business hours, as needed.
Preferred Qualifications:
• Direct experience with Threat intelligence Platform tools
• Experience with developing threat intelligence briefings
Additional Information
Thanks & Regards,
Vikrant Thakur
************
Information Security Analyst (Journeyman)
Cyber security analyst job in California
Dynamic Solutions Technology, LLC, a premier strategic services firm that meets IT and Service needs for commercial and government clients. We are is seeking a full-time Information Security Analyst to support DoD customer. This position is to provide support in the China Lake, CA area.
Responsibilities:
Serves as a team member providing network monitoring and scanning functions.
Provides network vulnerability scanning to ensure IAVA compliance and remediation.
Provides antivirus management using antivirus tools.
Provides wireless scanning using network detection software.
Implements system security policies, and scans
Provides Cybersecurity reporting requirements to appropriate authorities.
Provides assistance for personnel / users needing information/assistance with Information Assurance (IA) related issues.
Directly supports Information Assurance (IA) requirements, within the immediate area of responsibility (AOR), managing and tracking system administrator elevated level of access to network resources.
Works with team members to identify IA trends and suggests long-term strategies to help mitigate IA issues.
Assesses procedures and identifies opportunities to improve customer service.
Champions customer service and sets and monitors parameters for customer service excellence.
Qualifications Requirements:
Active SECRET clearance
Bachelor's Degree in Engineering, Computer Science, or Information Assurance
6 years' additional work experience may be substituted for a Bachelor's Degree
Min 3 to 10 years of relevant focused experience
Must meet specific certification and training requirements in accordance with DoD 8570.1-M, DoDD 8570.1
Experience and Skills:
Excellent oral and written skills.
Excellent critical thinking skills.
Proficient in Microsoft applications such as Word, Excel, PowerPoint, and Outlook.
Ability to work independently and as a team member
Cyber Security Engineer
Cyber security analyst job in Fremont, CA
About the Company
Atomus' mission is to provide world class cybersecurity for the world's most critical organizations. We build security compliance software delivered as managed services sold directly, with relevant professional services and support. Examples of our commercial customers include hypersonic aircraft companies, satellite and space mission systems companies, AI and software companies, among many other companies serving primarily the aerospace and defense industry. At Atomus we are hardworking, we move fast, and we put our customers first.
About the Role
As a Cybersecurity Engineer will work closely with customers to help them implement and fully leverage Atomus' cybersecurity products, maintain compliance with NIST 800-171 and CMMC cybersecurity standards, and solve technical challenges. Our customers depend on Atomus to manage and secure their Windows, MacOS, Ubuntu, iOS, Android devices, and Firewalls while ensuring compliance. We aim to provide the best possible support when they have questions. Our team's main goal is to simplify our customers' lives, for compliance and security. You will serve as the voice of the customer by sharing their feedback and insights with our product team and reporting any issues to our software engineers. We take pride in delivering amazing experiences for our customers.
Responsibilities
Manage and guide new customers through the onboarding process, ensuring proper setup, configuration, and alignment with their security programs and establishing baseline compliance requirements of NIST 800-171 and CMMC while performing technical tasks/project management required for onboardings.
Serve as the first point of contact for technical inquiries, providing debugging, troubleshooting, and solutions for technical IT/security issues related to the Atomus platform.
Work closely with internal teams (sales, product, engineering) along with partners/vendors for customer requirements to communicate customer feedback and advocate for customer needs in product development and rolling out 3rd party products.
Assist customers in managing and maintaining NIST 800-171 and CMMC compliance requirements, ensuring IT documentation is updated and maintained.
Required Skills
Experience in a customer-facing technical role, IT administrator, solutions engineer, Technical Customer Success, or TAM role preferably in cybersecurity or compliance.
Strong experience with cybersecurity frameworks and technologies (e.g., NIST, CMMC, firewalls, routers, encryption tools).
Intermediate networking knowledge of WAN and LAN connectivity, routers, firewalls, switches, security, etc.
Experience with Microsoft Intune, Active Directory, Windows, MacOS and ABM, as well as mobile platforms like Android and iOS.
Advanced understanding of Microsoft products (Exchange, SharePoint, Windows, Windows Server, Active Directory, etc.).
Familiarity with command-line tools (e.g., PowerShell, Terminal) for troubleshooting and deployment.
Strong troubleshooting skills, particularly related to network security, software issues, and IT environments.
Excellent verbal and written communication skills; ability to explain complex topics to both technical and non-technical audiences.
Applicants must have strong emotional intelligence to intuit and match customer sentiment for effective communication.
Preferred Skills
Prior experience with NIST 800-171, CMMC, or other compliance standards.
Ability to manage multiple customer accounts and onboarding projects simultaneously.
Familiarity with CRM platforms (HubSpot), and compliance documentation tools while managing SLAs which include customer satisfaction, initial response, and issue resolution times.
Cybersecurity risk security analyst
Cyber security analyst job in Fremont, CA
We are seeking a Cybersecurity Risk Analyst to support managing and mitigating security risks across processes, technologies, and cloud environments.
The ideal candidate will combine technical expertise, business acumen, and cybersecurity experience to advise partners, assess risks, and drive improvements in secure operations.
This role requires hands on experience with Kusto Query Language (KQL), cloud security, and risk assessment, as well as the ability to communicate effectively with stakeholders at all levels.
Must be local to San Francisco or Los Angeles (LA) or Salt Lake City (SLC).
Responsibilities:
Support risk strategies by identifying and mitigating security risks in bank systems and processes.
Apply and interpret security policies, provide guidance and input on policy enhancements.
Advise business and technical partners on security controls, procedures, and best practices.
Assess cloud and on-prem environments to identify risks and recommend control improvements.
Conduct security control assessments, document findings, and develop actionable remediation plans.
Evaluate third-party vendors to determine shared security responsibilities and associated risks.
Communicate security risks and mitigation strategies effectively to technical teams and executives.
Collaborate across teams to drive secure operations and deliver results in a fast-paced environment.
Qualifications:
Bachelor's degree in Cybersecurity, Information Security, Computer Science, or related technical discipline (or equivalent experience).
3+ years of experience in cybersecurity, information security, or technology risk management.
Proficiency in Kusto Query Language (KQL) for data analysis, log correlation, and threat detection.
In-depth understanding of security frameworks such as NIST, ISO 27001, or FedRAMP.
Demonstrated experience assessing and improving security posture across Cloud (Azure, AWS) and on-premises environments.
Proven ability to conduct security control assessments, identify risk exposures, and develop actionable remediation plans.
Skilled at translating technical security concepts into clear, business-relevant insights for stakeholders and executives.
Excellent communication, collaboration, and interpersonal skills, with a focus on building trusted partnerships across technical and business teams.
Strong organizational and analytical skills, with the ability to manage multiple initiatives in a fast-paced, results-driven environment.
Cyber Security Engineer
Cyber security analyst job in Santa Rosa, CA
About the Company
Atomus' mission is to provide world class cybersecurity for the world's most critical organizations. We build security compliance software delivered as managed services sold directly, with relevant professional services and support. Examples of our commercial customers include hypersonic aircraft companies, satellite and space mission systems companies, AI and software companies, among many other companies serving primarily the aerospace and defense industry. At Atomus we are hardworking, we move fast, and we put our customers first.
About the Role
As a Cybersecurity Engineer will work closely with customers to help them implement and fully leverage Atomus' cybersecurity products, maintain compliance with NIST 800-171 and CMMC cybersecurity standards, and solve technical challenges. Our customers depend on Atomus to manage and secure their Windows, MacOS, Ubuntu, iOS, Android devices, and Firewalls while ensuring compliance. We aim to provide the best possible support when they have questions. Our team's main goal is to simplify our customers' lives, for compliance and security. You will serve as the voice of the customer by sharing their feedback and insights with our product team and reporting any issues to our software engineers. We take pride in delivering amazing experiences for our customers.
Responsibilities
Manage and guide new customers through the onboarding process, ensuring proper setup, configuration, and alignment with their security programs and establishing baseline compliance requirements of NIST 800-171 and CMMC while performing technical tasks/project management required for onboardings.
Serve as the first point of contact for technical inquiries, providing debugging, troubleshooting, and solutions for technical IT/security issues related to the Atomus platform.
Work closely with internal teams (sales, product, engineering) along with partners/vendors for customer requirements to communicate customer feedback and advocate for customer needs in product development and rolling out 3rd party products.
Assist customers in managing and maintaining NIST 800-171 and CMMC compliance requirements, ensuring IT documentation is updated and maintained.
Required Skills
Experience in a customer-facing technical role, IT administrator, solutions engineer, Technical Customer Success, or TAM role preferably in cybersecurity or compliance.
Strong experience with cybersecurity frameworks and technologies (e.g., NIST, CMMC, firewalls, routers, encryption tools).
Intermediate networking knowledge of WAN and LAN connectivity, routers, firewalls, switches, security, etc.
Experience with Microsoft Intune, Active Directory, Windows, MacOS and ABM, as well as mobile platforms like Android and iOS.
Advanced understanding of Microsoft products (Exchange, SharePoint, Windows, Windows Server, Active Directory, etc.).
Familiarity with command-line tools (e.g., PowerShell, Terminal) for troubleshooting and deployment.
Strong troubleshooting skills, particularly related to network security, software issues, and IT environments.
Excellent verbal and written communication skills; ability to explain complex topics to both technical and non-technical audiences.
Applicants must have strong emotional intelligence to intuit and match customer sentiment for effective communication.
Preferred Skills
Prior experience with NIST 800-171, CMMC, or other compliance standards.
Ability to manage multiple customer accounts and onboarding projects simultaneously.
Familiarity with CRM platforms (HubSpot), and compliance documentation tools while managing SLAs which include customer satisfaction, initial response, and issue resolution times.