Cyber Security Analyst
Cyber Security Analyst Job 48 miles from Fontana
Title: Cyber Threat Intelligence Analyst
Type: 12 Month contract with ability to convert
Pay: 130-155k, DOE
Schedule: Full-time
Interview Process: 3 total rounds: phone screening, Teams interview, followed by a client interview
Job Summary:
Our government client is seeking a Cyber Threat Intelligence Analyst to support their security posture. The Cyber Threat Intelligence (CTI) Analyst will focus on technical analysis of threats in order to drive the collection, creation, and dissemination of indicators of compromise and indicators of attack supporting our State Government client's program.
The CTI analysts will leverage the required technologies to continuously monitor, review, and act on intelligence that match the security use cases. Intelligence analysts will maintain 8x5 monitoring on-site, and support on-call after hours and on weekends performing initial investigation, categorization, prioritization, and escalation of potential threats to the state government stakeholders. This role will focus heavily on the tactics, techniques, and procedures employed by adversaries in order to analyze, produce, and disseminate key tactical intelligence products to both internal and external stakeholders
Requirement:
• At least 3 years experience as a CTI analyst, with ability to conduct open-source intelligence collection and analysis.
• Ability to produce intelligence products at the tactical, operational, and strategic levels.
• Familiarity with multiple threat intelligence types, sources, and methods of gathering/ obtaining information and data.
• Basic knowledge of open-source tools, such as Shodan, Maltego, PassiveTotal, and Virus Total.
• At least 2 years experience with CTI tools such as Anomali.
• Good understanding of the intelligence lifecycle and associated analytic methodologies (Cyber Kill Chain, Diamond Model, ATT&CK, etc.)
• Strong written and verbal communication skills to effectively communicate complex concepts at a high level while retaining meaning and highlighting features in a way that maximizes audience engagement.
• Strong problem solving and critical thinking capabilities.
• Ability to work with a high degree of independence.
• Becoming a subject matter expert known adversary, tracking them on a day-by-day basis, and escalating concerning developments, as necessary.
• Triaging tactical reporting to focus on serious threats and/or those likely to be perceived as such.
Eight Eleven Group provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, national origin, age, sex, citizenship, disability, genetic information, gender, sexual orientation, gender identity, marital status, amnesty or status as a covered veteran in accordance with applicable federal, state, and local laws.
Electronic Warfare Security Engineer
Cyber Security Analyst Job 33 miles from Fontana
Qualifications
We're looking for an EW/SDR engineer with experience in securing FPGAs or Software Defined Radio(SDR) systems.
Proficient in one or more languages such as C/C++, Rust, Golang, or Python
Experience evaluating the security of firmware, embedded systems, applications, networks, or IoT devices
Proven track record developing secure features for complex systems, including embedded and Linux-based environments
Familiarity with reverse engineering and anti-tamper technologies
Solid written and verbal communication skills
Must be eligible to obtain and maintain a U.S. Secret security clearance
Responsibilities
Perform deep-dive security architecture reviews and threat modeling
Research and mitigate hardware and software-level vulnerabilities
Design, implement, and improve security features for company products
Partner with engineering teams to exceed modern security benchmarks
Simulate attacks to identify and address potential weaknesses
Collaborate with operations teams to ensure secure deployment and handling procedures
Guide remediation of vulnerabilities across systems and processes
Lead team initiatives and mentor other engineers in secure development practices
Perks Include:
Top-tier healthcare benefits, with company-covered medical, dental, and vision plans
Fully covered life, AD&D, and long-term disability insurance
Extensive PTO and a company-wide holiday break in December
16 weeks of paid leave for caregiving, wellness, or parental needs
Fertility, adoption, and family planning support
24/7 access to mental health and wellness resources
Free legal and financial counseling services
Annual professional development stipend
Daily meals and stocked kitchens in select office locations
Commuter and relocation benefits (role-dependent)
401(k) with both traditional and Roth options (U.S. roles only)
Compensation & Benefits
Salary range: $196,000 - $294,000 USD
Equity grants included in full-time offers
Compensation depends on experience, skills, and other relevant factors
Cloud Security Engineer
Cyber Security Analyst Job 33 miles from Fontana
Cloud Security Engineer - Aerospace & Defense Sector
Are you a cloud security expert with a passion for securing cutting-edge aerospace and defense technology? We are seeking a DevOps Cloud Security Engineer to design, implement, and maintain secure AWS cloud environments while ensuring compliance with NIST SP 800-171 standards.
🔹 Key Responsibilities:
Design & implement security architectures for AWS infrastructure and containerized applications.
Conduct security risk assessments and vulnerability scans to identify and mitigate risks.
Work with Cybersecurity teams to develop security policies, training, and procedures.
Automate security monitoring using AWS tools (CloudTrail, CloudWatch, GuardDuty).
Integrate security measures into DevOps sprints and software releases.
Investigate and respond to security incidents, performing root cause analysis.
Provide security guidance during architecture reviews and system deployments.
Stay up to date with cloud security threats, technologies, and best practices.
🔹 What You Bring:
Proven experience in cloud security engineering, with a strong focus on AWS, Kubernetes, and containerized applications.
Expertise in cloud security frameworks (CSA STAR, NIST, ISO 27001).
Proficiency in scripting or automation (Python, Bash) for security tasks.
Strong knowledge of IAM, VPC, security groups, EC2, and AWS security services.
Experience with AWS Security Hub, WAF, and third-party security solutions.
Ability to obtain a U.S. Government Security Clearance.
Preferred: Security certifications (AWS Certified Security, CISSP, CISM, CKS).
This is an exciting opportunity to play a crucial role in securing cloud environments for cutting-edge aerospace and defense applications. Apply now and be part of the future of cloud security! 🚀
Blockchain Security Engineer
Cyber Security Analyst Job 33 miles from Fontana
Ready to be pushed beyond what you think you're capable of? At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our work culture is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
At Coinbase, security isn't just a priority. It's the foundation of everything we do. In the fast-evolving world of digital currency, where trust is paramount, security breaches can mean the difference between success and failure. That's why we've made security a cornerstone of our mission, setting the standard for protecting millions of customers and billions of dollars in assets.
As a Blockchain Security Engineer on the Decentralized Financial Security Team, you will work closely with engineers, technical product managers and senior leadership on designing secure products from the ground up. You will be responsible for performing secure design reviews, threat modeling, vendor reviews and secure code reviews for upcoming Coinbase products or features that will be used by millions of customers. You will have an opportunity to work on the latest technology and provide leadership visibility of the current risk posture. You'll also have an opportunity to pitch, lead and participate in cross-functional initiatives that uplevel the security of all Coinbase products and services.
What you'll be doing (ie. job duties): To be completed by all business teams except Eng.
Perform design reviews, threat modeling and code reviews of upcoming features and products.
Identify top product risk areas and lead risk-reduction initiatives with cross-functional teams.
Improve and/or automate existing processes to increase efficiency.
Participate in the team on-call rotation to support engineering teams through timely design consultations, vulnerability analysis, bug fix verification, etc.
What we look for in you (ie. job requirements): To be completed by all business teams except Eng.
Bachelor's degree in Computer Science
Expertise in Application Security and fundamental knowledge of cryptography
2+ years of threat modeling/design review experience
Strong communication skills with the ability to translate technical security requirements and risks into terms that anyone can understand.
Ability to work independently and unblock yourself.
Nice to haves:
MS or PhD in Computer Science or related field.
Experience in at least one of: Go, Ruby or Python.
Experience automating manual processes or carrying out process improvements.
Experience in Blockchain, Exchange, or Decentralized Exchange Security.
ID: P69496
Pay Transparency Notice: Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include target bonus + target equity + benefits (including medical, dental, vision and 401(k)).
Pay Range:
$152,405-$179,300 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is committed to diversity in its workforce and is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the Know Your Rights notice here. Additionally, Coinbase participates in the E-Verify program in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations[at]coinbase.com to let us know the nature of your request and your contact information. For quick access to screen reading technology compatible with this site click here to download a free compatible screen reader (free step by step tutorial can be found here).
Global Data Privacy Notice for Job Candidates and Applicants
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available here. By submitting your application, you are agreeing to our use and processing of your data as required. For US applicants only, by submitting your application you are agreeing to arbitration of disputes as outlined here.
Benefits at Coinbase
Medical Plan, Dental and Vision Plan with generous employee contributions
Health Savings Account with company contributions each pay period
Disability and Life Insurance
401(k) plan with company match
Wellness Stipend
Mobile/Internet Reimbursement
Connections Stipend
Volunteer Time Off
Fertility Counseling and Benefits
Generous Time off/Leave Policy
The option of getting paid in digital currency
Learn more about our mission
Cyber Security Analyst
Cyber Security Analyst Job 34 miles from Fontana
We are looking for a skilled Cyber Security Analyst to join our team in Whittier, California. In this role, you will be responsible for safeguarding the organization's information systems and ensuring compliance with security policies to mitigate cyber threats. This position requires a proactive approach to implementing security measures, monitoring vulnerabilities, and addressing incidents effectively.
Responsibilities:
- Oversee the administration and management of security tools, including firewalls, intrusion detection/prevention systems, and endpoint protection solutions.
- Analyze and monitor security logs and alerts to identify and respond to potential threats.
- Implement and manage identity and access management systems, ensuring secure user provisioning and de-provisioning in Office 365 and Azure environments.
- Configure and enforce conditional access policies to ensure secure data access based on risk levels and user context.
- Strengthen system security with multi-factor authentication for Office 365 and other critical applications.
- Investigate security incidents and collaborate with IT teams to remediate vulnerabilities effectively.
- Conduct regular vulnerability scans and penetration testing to identify weaknesses and maintain a robust security posture.
- Develop and maintain security policies, procedures, and guidelines tailored to cloud services such as Office 365 and Azure.
- Provide cybersecurity training and awareness programs to employees to foster a secure organizational culture.
- Create detailed documentation and generate reports on security configurations, incidents, and compliance efforts.
Requirements - Strong expertise in security technologies, including firewalls, VPNs, intrusion detection systems, and antivirus solutions.
- Hands-on experience with Office 365 and Azure security configurations, including conditional access policies.
- Proficiency in conducting vulnerability scans, penetration testing, and threat assessments.
- Knowledge of industry-standard security frameworks and compliance requirements.
- Bachelor's degree in Cybersecurity, Information Technology, or a related field.
- Minimum of 5 years of experience in cybersecurity or IT administration roles.
- Relevant certifications such as CompTIA Security+, CISSP, or Certified Ethical Hacker are preferred.
- Strong analytical, problem-solving, and communication skills, with the ability to manage priorities independently.
Technology Doesn't Change the World, People Do.
Robert Half is the world's first and largest specialized talent solutions firm that connects highly qualified job seekers to opportunities at great companies. We offer contract, temporary and permanent placement solutions for finance and accounting, technology, marketing and creative, legal, and administrative and customer support roles.
Robert Half works to put you in the best position to succeed. We provide access to top jobs, competitive compensation and benefits, and free online training. Stay on top of every opportunity - whenever you choose - even on the go. Download the Robert Half app (https://www.roberthalf.com/us/en/mobile-app) and get 1-tap apply, notifications of AI-matched jobs, and much more.
Robert Half will consider for employment qualified applicants with arrest or conviction records in accordance with the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act. All applicants applying for U.S. job openings must be legally authorized to work in the United States. Benefits are available to contract/temporary professionals, including medical, vision, dental, and life and disability insurance. Hired contract/temporary professionals are also eligible to enroll in our company 401(k) plan. Visit roberthalf.gobenefits.net for more information.
© 2025 Robert Half. An Equal Opportunity Employer. M/F/Disability/Veterans. By clicking "Apply Now," you're agreeing to Robert Half's Terms of Use (https://www.roberthalf.com/us/en/terms) .
Cyber Security
Cyber Security Analyst Job 36 miles from Fontana
Hi ,
This is Sujith from KRG Technologies; We are looking Cyber Security at Rose Mead, CA for the below mentioned . Kindly forward me your resume, rate and contact details for further process. I also request you to forward this opportunity to your friends or colleagues; so that we can help someone who may be in search of a job or looking for a change.
Job Title: Cyber Security
Location: Rose Mead, CA
Duration: CONTRACT(6-12months)
Job Description:
Must have 5-7 yrs of Cyber security experience.
Have some experience around Vulnerability assessment & Pen test remediation. Able to explain vulnerabilities and remediation.
Have some exposure to OWASP Top 10.
Have some exposure to SDLC, development.
Any experience in NERC-CIP would be great.
Experience around Code review would be added advantage.
Thanks & Regards
Qualifications
Cyber security experience with vulnerability and risk assessment
Additional Information
All your information will be kept confidential according to EEO guidelines.
Virtual Cyber Security SDR, BDR, Contract to Hire
Cyber Security Analyst Job 33 miles from Fontana
Company Overview: Our Client is a leading provider of cutting-edge cybersecurity solutions to protect businesses from evolving digital threats. They pride themselves on our innovative approach to safeguarding sensitive data, networks, and systems. Their team of experts provides comprehensive cybersecurity solutions that empower organizations to navigate the complex digital landscape with confidence.
Position Summary: As a Virtual SDR, BDR at our Client, you will play a pivotal role in driving the success of our cybersecurity solutions across the United States. As one of the first 20 employees, you will play a vital role in shaping the direction of our company and driving growth. Their recent seed round raised an unbelievable $11M at a $36M valuation, and the founders' last venture resulted in a big exit with the sale of the company to Microsoft.
They operate in the IT Security space and are 100% virtual. In this dynamic and customer-facing role, you will leverage your technical expertise and sales acumen to provide strategic guidance and support to our clients throughout the sales process.
This position offers a unique blend of technical knowledge, sales skills, and the opportunity for nationwide travel.
We Are Looking For:
As a mid-level Business Development Rep. (BDR SDR) you'll be at the tip of the spear, responsible for researching and qualifying top of funnel leads while being the first to connect with our potential customers. You'll research and build contact lists, make outbound cold calls/emails to those who fit our Ideal Customer Profile (ICP) and will then partner with AEs to get customers onboarded. This position will spend roughly 80% of the time on the phone or email prospecting for new clients. This position is a great way for individuals to gain in-depth sales experience with a rapidly growing SaaS security company looking to win the category!
What You'll Do:
Generate high volume quality MQLs through various direct sales efforts such as calls, emails, events, webinars, and other channels generated by Marketing.
Make daily outbound calls/emails to prospects who have demonstrated interest.
Follow up on all calls and emails until meetings are booked or you've been able to move the prospect through the funnel.
Record all activities and properly manage lead stage/flow in our Salesforce CRM.
Achieve or exceed monthly quotas of meetings, demos, and qualified leads worked with AEs.
Schedule product demos on AE's calendar.
Discern buyer intent and partner with AEs to get the right customers onboarded.
Work closely with Marketing, Product, and CS/CX to clearly communicate critical top-of-funnel feedback and suggestions that help optimize segmentation, content, & features.
What You'll Need:
Must have BDR/SDR experience in the SaaS or similar software space
Great speaking self-awareness and ability to read prospect signals and adjust accordingly to move the prospect down the funnel.
Must have a clear, easy-to-understand phone voice and a professional Zoom presence with the ability to engage and empathize over the phone.
Hands-on experience with multiple sales prospecting techniques like cold calling, cold emailing, video conference selling, and social outreach is a must.
Knowledge of sales & marketing constructs, the evergreen funnel, and playbooks are important.
Must be a great listener with an ability to address objections graciously and frame the next steps clearly.
Good writers and creative thinkers needed - Must be able to craft well-written (great grammar and spelling), compelling emails, and responses that lead prospects down the funnel.
Verifiable track record of success and goal attainment in a frontline sales-oriented role
Deep knowledge of software and social networks (especially LinkedIn, Facebook, and Twitter) is important.
Track record of (over)achieving sales quotas.
Must have a strong, self-motivated drive, passion, and desire to deliver results.
Experience in a fast-growing startup environment is a big plus.
What We Offer:
Contract to Hire, Strong Salary plus comm after 90 days
Full Benes
PreIPO equity
Be part of an exciting high-growth SaaS organization
An impactful role with lots of growth potential
A lot of freedom to apply your creative and strategic skills
A work-hard, play-hard environment
100% virtual
Virtual Cyber Security SDR, BDR, Contract to Hire
Cyber Security Analyst
Cyber Security Analyst Job 33 miles from Fontana
Monitor and investigate suspicious activity in SIEMs
Perform user and system access reviews
Help develop cybersecurity policies and procedures
Evaluate, develop and implement security controls across infrastructure, systems, application and data.
Maintain and administer email security systems
Collaborate with team members to implement security controls
Review Azure resources for secure configurations
Assist with incident response by gathering and investigating information
Assist with cybersecurity audits and penetration testing
Maintain and administer Microsoft network security
Maintain and administer Microsoft endpoint security
Document and review secure configurations for unauthorized changes and compliance
Help develop and maintain disaster recovery, business continuity and incident response procedures
Assist with company-wide cybersecurity training and awareness
POSITION PREREQUISITES:
Education and Experience:
Undergraduate degree in an applicable professional, business, or technical discipline preferred
CISSP certification preferred
Three to five years of experience administering Microsoft cloud technologies (M365, Azure, Server and Storage, Exchange, SharePoint)
Three to five years of experience working in a cybersecurity role
Three to five years of experience in administering cybersecurity systems:
Email security
Endpoint security
Network security
Security Appliances
Enterprise Mobility
Patch Management
SIEM
Skills and Abilities:
Strong organization and process-oriented skills
Strong project management
Attention to detail and excellence
Demonstrated ability to multi-task in a high-paced environment
Strong written and verbal communication skills
Strong Help Desk customer service skills
Ability to logically and methodically breakdown and resolve complex issues
Ability to work independently on aggressive schedules
Must work well in a remote team environment
Strong Microsoft cloud technologies experience required
Physical Requirements:
Moderate lifting of computers and IT related equipment
Ability to work nights and weekends as needed
Travel to locations across the US as needed
At LEAPROS™, we are committed to our core values and guiding ethical principles, to conducting business in a non-discriminatory manner, and to operating in strict compliance with applicable federal and state laws pertaining to Equal Employment Opportunity. This commitment enhances our ability to conduct business with the highest level of integrity, solidifying our position as the most trusted workforce solutions partner. To learn more about LEAPROS™ or to speak with one of our recruitment partners, call 866-920-LEAP or visit our website at ****************
Cyber Security Engineer (HBSS/ENS)
Cyber Security Analyst Job 9 miles from Fontana
Top Secret Clearance Jobs is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours.
Galapagos Federal Systems LLC is looking for an enthusiastic, well-qualified individual to fill the Cyber Security Engineer (HBSS/ENS) position and to join our team of qualified, diverse individuals in NSWC Corona Division, Norco, CA 92860.
As an Endpoint Security (ENS) and Host-Based Security System (HBSS) Engineer dedicated to the Corona Classified RDT&E Network (CCRN), you will play a pivotal role in ensuring the robust cybersecurity posture of our classified research, development, test, and evaluation network. In this senior-level position, you will be responsible for designing, implementing, and maintaining advanced endpoint security solutions, with a specific focus on McAfee's Endpoint Security and Host-Based Security System. Your role will involve configuring and optimizing security policies, conducting vulnerability assessments, and collaborating with cross-functional teams to respond to and mitigate security incidents. Additionally, you will contribute to the development and enforcement of security protocols, ensuring compliance with classified network standards and regulations. This position offers a unique opportunity to lead and shape the cybersecurity landscape within a classified research environment, leveraging your expertise in ENS and HBSS to safeguard.
Skills / Experience Required
Top Secret/Sensitive Compartmented Information
5-8 years of relevant work experience
Lead the design, implementation, and maintenance of the Corona Classified RDT&E Network (CCRN), ensuring optimal performance, security, and availability
Provide performance tuning to systems and troubleshoot HBSS components which span a large and complex environment
Install updates to McAfee software as released and in compliance with STIG requirements
Deploy, maintain, and tune McAfee clients to meet current and future standards
Develop/create, deploy, and manage custom HBSS signatures
Monitor HBSS for intrusions, failures and other issues, repair/re-engineer as needed
Monitor HBSS software to ensure that the clients/servers are operational and reporting properly; test and provide software fixes as needed
Monitor the health and performance of the systems
Demonstrate an ability to listen and collaborate with audiences ranging from IT administrators to executive level stakeholders to help deliver solutions
Excellent troubleshooting skills and ability to identify root causes of issues and provide solutions
Strong interpersonal and presentation skills, both oral and written, with the ability to articulate and educate others about complex technology with business acumen
Lead complex troubleshooting efforts and on-site/remote support
Technical writing to produce written reports and document customer security infrastructures, recommendations, and best practices
Provide recommendations and support the creation of policies and procedures including final configuration, tuning, and troubleshooting of McAfee products adapted to customer environment
Required Qualifications
Familiar with working in an environment with development, engineering, sustainment, and overall O&M activities for a secure government system
Experience in Windows/Linux/OS-X operating systems
Demonstrated experience (hands-on) with databases such as MSSQL, Oracle, MYSQL
Hands-on experience with any or all products (not all inclusive): ePO, ENS, Application Control, Advanced Threat Detection/Prevention, DLP, IPS/IDS
Education / Certifications
Bachelor's degree - IT Cybersecurity
IASAE II
CASP+ CE CISSP (or Associate) CSSLP
HBSS Administrator 201, 301, 501 ePO Certificate
Benefits
Medical, dental, vision, disability, and life insurance
Flexible Spending Accounts
401(k)
PTO
Paid Paternal leave
Tuition reimbursement
Paid federal holidays
Security Clearance
Must be a U.S. Citizen. A high-level Department of Defense active security clearance is required. Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to government information.
Physical Requirements
Work may involve sitting or standing for extended periods of time and typing and reading from a computer screen. The candidate must have enough mobility, including bending, reaching, and kneeling, to complete daily duties in a prompt and efficient manner and that may include lifting to thirty pounds, as necessary.
Company Summary
Headquartered in Hawaii, Galapagos Federal Systems, LLC is an SBA Certified Native Hawaiian Organization 8(a) Small Business specializing in global information technology and offering professional solutions in IT Design & Installation, Cybersecurity Engineering & Support, Application Integration & Development, Software & Hardware Engineering, Network & Systems Management, Information Systems Security, and Business Management Services.
Leveraging over 30 years of providing IT services to the federal & commercial market with projects found around the world, our team has innovative expertise in the development of a wide range of technological solutions. Galapagos Federal Systems, LLC is an equal opportunity employer.
Our service commitment is simple - "Quality IT Solutions... On Time & On Budget."
Company Employment Statement
Galapagos Federal Systems, LLC reserves the right to change or modify job duties and assignments at any time. The above job description is not all encompassing as positions, functions, and qualifications may vary depending on business needs. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Galapagos Federal Systems, LLC is an equal opportunity employer and does not discriminate against applicants based on race, color, creed, religion, medical condition, legally protected genetic information, national origin, sex (including pregnancy, childbirth, or related medical condition), sexual orientation, gender identity and expression, age, disability, or Vietnam era, or other eligible veteran status or legally protected characteristics.
Salary range
$105,000 - $120,000
Information Security Analyst
Cyber Security Analyst Job 14 miles from Fontana
div Under the direction of the Manager, Information Security Operations, the Security Analyst I supports efforts to ensure that information assets are adequately protected and proper security controls are in place for all current and future IT and Information Security systems.
br/br/Champions a security mindset to all enterprise team members and recognizes the value of standards, policy and procedures, operational effectiveness, and high availability.
This role supports incident response activities and post-incident actions.
p/pp/ppbu ESSENTIAL DUTIES AND RESPONSIBILITIES/u/b/pp/pp1.
Executes incident response and issue management resulting from security investigations.
Works with technical experts and leadership on security incident follow up, assists with the resolution of daily incidents such as intrusion detection, malware infections, denial of service attacks, data leak protections, privileged account misuse and network breaches.
/pp2.
Analyzes and validates environment controls validation to ensure systems are operating securely and data is protected from both internal and external attacks.
/pp3.
Monitors security logs and alerts to identify and investigate potential security incidents.
Participates in on-call rotation to support after-hours security incidents and operational support.
/pp4.
Assists with security controls remediation and enhancements to reduce risk throughout enterprise systems, data, and network.
/pp5.
Documents existing enterprise security systems configuration, processes, procedures and recommends improvements and/or alternatives.
/pp6.
Supports the cybersecurity toolset lifecycle management including assisting with SMEs on design, acquisition, inventory, process documentation, deployment, maintenance, change management, monitoring, reporting, decommission and other service assurance activities.
/pp7.
Conducts research on emerging security technologies to support system development efforts and submits findings to support decision making on technologies to increase cost effectiveness and flexibility in a holistically secure environment.
b /b/pp8.
Performs other duties as assigned to support the efficient operation of the department.
/pp/ppbu EDUCATIONAL, EXPERIENCE AND QUALIFICATIONS/u/b/pullip Bachelor's degree in information security, technology, statistics, mathematics, or related field required.
/p/lilip Minimum two (2) years of experience in an information technology or information security role required.
/p/lilip Experience with Casino amp; Tribal government technology and security goals strongly preferred.
/p/lilipspan Ability to troubleshoot through Open Systems Interconnection (OSI) Model:/span/pullip Network security monitoring, traffic analysis, packet capture.
/p/lilip Transmission Control Protocol and the Internet Protocol (TCP/IP) networking and routing protocols.
/p/lilip Implementing two-factor authentication.
/p/li/ul/lilipspan Experience with the following technology preferred:/span/pullip Artificial Intelligence.
/p/lilip Data Loss Protection.
/p/lilip Endpoint Detection amp; Response/p/lilip Vulnerability Management/p/lilip Network Infrastructure.
/p/lilip Network Security.
/p/lilip Email Security.
/p/li/ul/lilip Related, relevant, and/or direct experience may be considered in lieu of minimum educational requirements indicated above.
/p/li/ulp/ppbu KNOWLEDGE, SKILLS AND ABILITIES (KSA)/u/b/pullipspan Must have strong communication and presentation skills.
/span/p/lilipspan Must understand the value of standards, policy and procedures, operational effectiveness, and high availability.
/span/p/li/ulp/ppbu LICENSES, CERTIFICATIONS AND REGISTRATIONS/u/b/pullip At the discretion of the San Manuel Tribal Gaming Commission, you may be required to obtain and maintain a gaming license.
/p/lilip Certifications in one or more of the following: Information Technology Infrastructure Library (ITIL), Information Systems Audit and Control Association (ISACA), The Computing Technology Industry Association (CompTIA), International Information System Security Certification Consortium (ISC2), SysAdmin, Audit, Network, and Security (SANS), Global Information Assurance Certification (GIAC) strongly preferred.
/p/lilip No Driving Responsibilities: Role does not require a driver's license or insurance.
/p/li/ulp/ppbu PHYSICAL REQUIREMENTS/ WORKING CONDITIONS - span ENVIRONMENT/span/u/b/pp/pp The physical demands and working environment described here are representative of those that an employee encounters and must be met by an employee to successfully perform the essential functions of this job.
/pullipspan Primary/span spanwork/span spanenvironment/span spanis/span spanin/span spana/span spanclimate-controlled/span spanoffice/span spansetting.
/span/p/lilip Work requires travel to attend meetings, trade shows, and spanconferences.
/span/p/lilip Incumbents may be required to work evening, weekend and holiday spanshifts.
/span/p/lilip Must be able to work in a fast-paced, high-demand spanenvironment.
/span/p/lilip Strength sufficient to exert up to 10 pounds of force occasionally and/or a negligible amount of force frequently or constantly to lift, carry, push, pull or otherwise move objects and/or move up to 40 pounds occasionally.
/p/lilip Sedentary work: involves sitting most of the time.
Constantly operates a computer and spanother/span spanoffice/span spanproductivity/span spanmachinery,/span spansuch/span spanas/span spana/span spancalculator,/span spancopy/span spanmachine,/span spanand/span spancomputer/span spanprinter.
/span/p/lilip Physical activities that apply to the essential functions of the position are balancing, stooping, kneeling, crouching, reaching, pushing, pulling, lifting, grasping, talking, hearing, and repetitive spanmotions.
/span/p/lilipspan Hearing/span spansufficient/span spanto/span spanhear/span spanconversational/span spanlevels/span spanin/span spanperson,/span spanvia/span spanvideoconference/span spanand/span spanover/span spanthe telephone.
/span/p/lilip Speech sufficient to make oneself heard and understood in person, in front of groups, in spanmeetings,/span via videoconference and over the spantelephone.
/span/p/lilip Visual acuity that meets the requirements of the position: The worker is required to have close visual acuity to perform an activity such as preparing and analyzing data and figures; transcribing; viewing a computer terminal; expansive reading and visual inspection of employees, visitors or facility.
/p/lilipspan Mobility/span spansufficient/span spanto/span spansafely/span spanmove/span spanin/span spanan/span spanoffice/span spanenvironment,/span spanwalk,/span spanstoop,/span spanbend/span spanand/span spankneel,/span spanand/span spanenter, /spanexit and operate a motor vehicle in the course of travel to promotional events, meetings, conferences, trade shows and San Manuel properties.
/p/lilipspan Endurance/span spansufficient/span spanto/span spansit,/span spanwalk/span spanand/span spanstand/span spanfor/span spanextended/span spanperiods,/span spanand/span spanmaintain/span spanefficiency /spanthroughout the entire work shift and during extended work hours.
/p/lilip The employee may be exposed to fumes or airborne particles including secondhand spansmoke.
/span/p/li/ulp/pp Reasonable accommodation will be made in compliance with all applicable law.
/pp style="text-align:inherit"/pp style="text-align:left"As one of the largest private employers in the Inland Empire, San Manuel deeply cares about the future, growth and well-being of its employees.
Join our team today!/p/div
Senior Information Security, Risk & Compliance Specialist
Cyber Security Analyst Job 10 miles from Fontana
Who we are Geotab is a global leader in IoT and connected transportation and certified “Great Place to Work™.” We are a company of diverse and talented individuals who work together to help businesses grow and succeed, and increase the safety and sustainability of our communities. Geotab is advancing security, connecting commercial vehicles to the internet and providing web-based analytics to help customers better manage their fleets. Geotab's open platform and Geotab Marketplace , offering hundreds of third-party solution options, allows both small and large businesses to automate operations by integrating vehicle data with their other data assets. Processing billions of data points a day, Geotab leverages data analytics and machine learning to improve productivity, optimize fleets through the reduction of fuel consumption, enhance driver safety and achieve strong compliance to regulatory changes. Our team is growing and we're looking for people who follow their passion, think differently and want to make an impact. Ours is a fast paced, ever changing environment. Geotabbers accept that challenge and are willing to take on new tasks and activities - ones that may not always be described in the initial job description. Join us for a fulfilling career with opportunities to innovate, great benefits, and our fun and inclusive work culture. Reach your full potential with Geotab. To see what it's like to be a Geotabber, check out our blog and follow us @InsideGeotab on Instagram. Join our talent network to learn more about job opportunities and company news.Who you are:
We are always looking for amazing talent who can contribute to our growth and deliver results! We are seeking a Senior Information Security, Compliance & Risk Specialist, that will keep the legal and ethical integrity of Geotab through policy enforcement and program planning. The Senior Information Security, Compliance & Risk Specialist, will ensure all departments of our business are complying with the rules and regulations the company upholds. If you are a compliance guru, a team player, and are keen to join an industry leader - we would love to hear from you!
What you'll do:
As a Senior Information Security, Compliance & Risk Specialist, your key area of responsibility will be to support the development of information security policies to achieve the Geotab's security goals. In this role you will provide technical drafts for individual policies addressing Programs, Network Connectivity Security, Wireless Security, Incident Handling, and Password Utilization. You will also need to prepare gap analyses for management regarding policies that will advance Geotab's technology goals and objectives.
To be successful in this role you will be a need to be able to work independently and in a team when required, with strong written and verbal communication skills, and have the ability to quickly understand complex security concepts. In addition, the successful candidate will need to have excellent project management skills with an ability to identify needs, develop effective solutions, and manage projects and programs through to completion. The successful candidate will also be able to manage multiple timelines and contrasting priorities to ensure timely results.
How you'll make an impact:
Develop deep knowledge of Geotab's security programs as well as our internal systems and data infrastructure, in order to consult effectively on Security best practices.
Provide information assurance and subject matter expertise as required in support of panels, committees, and working groups.
Ensures security compliance with legal and regulatory standards.
Incorporate findings to develop, update, or revise policies and standards for customers.
Oversee and manage security audits against the systems, processes, and network infrastructure according to existing security policies and standards.
Collaborate with and advise internal departments to improve on security-related risks.
Act as a technical mentor/SME to other team members, and act as a point of escalation for more complex issues and initiatives.
Support Geotab global strategic initiatives.
What you'll bring to the role:
Post-Secondary Diploma/Degree specialization in Computer Science, Engineering or a related field.
5-8 years experience in security evaluation/analysis and/or risk assessments, within a technology-focused industry.
Working knowledge of system and network security engineering best practices.
Familiarity with basic information security documentation requirements, certification and accreditation processes, and abreast with general reporting requirements for industry security standards (e.g. ISO 27001, NIST SP 800-53).
Expertise in common security tool use.
High accuracy and meticulous attention to detail.
Able to work well under pressure and respond to fast changing priorities and deadlines.
Highly organized and able to manage multiple tasks and projects simultaneously.
Excellent verbal and written communication skills, including comfort with delivering presentations and training.
Strong interpersonal relationship building skills.
Strong analytical skills with the ability to problem solve with well-judged decisions.
Strategic mindset, has a keen sense of priorities, along with an ability to pivot as the landscape changes.
A strong team-player with the ability to engage with all levels of the organization.
Technical competence using software programs, including, but not limited to, Google Suite for business (Sheets, Docs, Slides).
Entrepreneurial mindset and comfortable in a flat organization.
If you got this far, we hope you're feeling excited about this role! Even if you don't feel you meet every single requirement, we still encourage you to apply. Please note: Geotab does not accept agency resumes and is not responsible for any fees related to unsolicited resumes. Please do not forward resumes to Geotab employees. #LI-DNI Why job seekers choose Geotab
Flex working arrangements
Home office reimbursement program
Baby bonus & parental leave top up program
Online learning and networking opportunities
Electric vehicle purchase incentive program
Competitive medical and dental benefits
Retirement savings program
*The above are offered to full-time permanent employees only
How we work At Geotab, we have adopted a flexible hybrid working model in that we have systems, functions, programs and policies in place to support both in-person and virtual work. However, you are welcomed and encouraged to come into our beautiful, safe, clean offices as often as you like. When working from home, you are required to have a reliable internet connection with at least 50mb DL/10mb UL. Virtual work is supported with cloud-based applications, collaboration tools and asynchronous working. The health and safety of employees are a top priority. We encourage work-life balance and keep the Geotab culture going strong with online social events, chat rooms and gatherings. Join us and help reshape the future of technology! We believe that ensuring diversity is fundamental to our future growth and progress and is an integral part of our business. We believe that success happens where new ideas can flourish - in an environment that is rich in diversity and a place where people from various backgrounds can work together. Geotab encourages applications from all qualified individuals. We are committed to accommodating people with disabilities during the recruitment and assessment processes and when people are hired. We will ensure the accessibility needs of employees with disabilities are taken into account as part of performance management, career development, training and redeployment processes. If you require accommodation at any stage of the application process or want more information about our diversity and inclusion as well as accommodation policies and practices, please contact us at ******************. By submitting a job application to Geotab Inc. or its affiliates and subsidiaries (collectively, “Geotab”), you acknowledge Geotab's collection, use and disclosure of your personal data in accordance with our Privacy Policy. Click here to learn more about what happens with your personal data.
Cyber Security Engineer
Cyber Security Analyst Job 33 miles from Fontana
span id="spandesc"p style="border-width:0px; border-style:solid; margin:0px 0px 10px; padding:0px; font-weight:400; color:rgb(56, 68, 82); font-family:Roboto, sans-serif; font-size:16px; font-style:normal; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal; background-color:rgb(255, 255, 255)"Your role will involve reviewing software and infrastructure components within the technology landscape.
This role also will support the development and operations of our in-house and commercial security tooling (CSPM, SAST, API Security).
br//pp style="border-width:0px; border-style:solid; margin:0px 0px 10px; padding:0px; font-weight:400; color:rgb(56, 68, 82); font-family:Roboto, sans-serif; font-size:16px; font-style:normal; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal; background-color:rgb(255, 255, 255)" bspan /span/bcoding, some automation/scripting is mandatorybr//pdiv JavaScript or Java.
br style="border-width:0px; border-style:solid; margin:0px; padding:0px"/br style="border-width:0px; border-style:solid; margin:0px; padding:0px"/Minimum 3-5 year coding experience needed/divdivbr//div/spanbr/span id="spanreq"h3Requirements/h3p style="border-width:0px; border-style:solid; margin:0px 0px 10px; padding:0px; font-weight:400; color:rgb(56, 68, 82); font-family:Roboto, sans-serif; font-size:16px; font-style:normal; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal; background-color:rgb(255, 255, 255)"Responsibilitiesbr//pul style="border-width:0px; border-style:solid; margin:0px 0px 10px; padding:0px; color:rgb(56, 68, 82); font-family:Roboto, sans-serif; font-size:16px; font-style:normal; font-weight:400; letter-spacing:normal; orphans:2; text-indent:0px; text-transform:none; widows:2; word-spacing:0px; white-space:normal; background-color:rgb(255, 255, 255)"li style="border-width:0px; border-style:solid; margin:0px; padding:0px"Review software components within the SDLC for potential security vulnerabilities.
br//lili style="border-width:0px; border-style:solid; margin:0px; padding:0px"Ability to review source code for security vulnerabilitiesbr//lili style="border-width:0px; border-style:solid; margin:0px; padding:0px"Communicate security vulnerabilities and remediations to software development teams.
Where possible provide hands on software remediations to development teams.
br//lili style="border-width:0px; border-style:solid; margin:0px; padding:0px"Triage cloud infrastructure vulnerabilities identified by our CSPM solution.
br//lili style="border-width:0px; border-style:solid; margin:0px; padding:0px"Contribute to in-house developed security automations and tooling.
Including supporting cloud resources and CI/CD pipelines.
br//lili style="border-width:0px; border-style:solid; margin:0px; padding:0px"Strong object oriented (Python, Go, node JS, etc.
) and SQL programming backgroundbr//li/uldivbr//div/spanbr/
SIP Content Security Sr Analyst Project Hire
Cyber Security Analyst Job 47 miles from Fontana
**SIP Content Security Senior Analyst Project Hire** The SIP Content Security Sr Analyst will report to the Manager of the Content Security Program and Sensitive Information Protection Segment. This role is pivotal in ensuring the security of sensitive media content within the production ecosystem of The Walt Disney Company. The SIP Sr Analyst will oversee the planning, execution, and management of content security assessments and remediation efforts focused on Third-Party Service Providers/Vendors, ensuring that both external partners and internal workflows adhere to the highest standards of security.
**About the team...**
You and the team will play a critical part in protecting the company's intellectual property and sensitive information throughout the production and distribution process, specifically within the complex and interconnected TV/Streaming production environment. This program will provide assessment, consulting, and advisory services to ensure the entire supply chain, from partners to suppliers, is secure, resilient, and capable of supporting the creation of films, TV shows, and series seen globally.
**A Day in the Life of a SIP Content Security Analyst...**
Execute Daily Operations for Remote Site Security Assessments
o Conduct comprehensive security assessments of third-party vendors and service providers, specifically focusing on remote site locations and ensuring compliance with Disney's content security requirements.
o Collaborate with external vendors to evaluate security measures across various points of the media production process, from pre-production to final distribution, ensuring that sensitive information (e.g., scripts, production files, video footage) is secure.
o Analyze vendor systems, procedures, and policies to identify potential risks and vulnerabilities to Disney's intellectual property and confidential media content.
o Lead remediation efforts with vendors, ensuring identified security gaps are addressed and resolved in a timely manner.
o Prepare detailed security assessment reports and actionable recommendations for improvement, ensuring stakeholders understand potential risks and solutions.
Support Operational Action Items and Enterprise Initiatives (20%)
o Provide support for ongoing content security efforts across multiple business segments within The Walt Disney Company, helping to drive initiatives that enhance the company's overall content protection strategies.
o Collaborate with cross-functional teams, including legal, IT, production, and business affairs, to ensure content security practices are integrated into workflows across different departments.
o Assist in defining and updating internal security policies, standards, and procedures, ensuring they align with industry best practices and legal/regulatory requirements.
o Track progress on operational tasks and ensure timely execution of action items across the enterprise, helping to coordinate and implement security initiatives effectively.
Support Management of Core SIP Team Processes (20%)
o Assist in managing and optimizing the core processes of the Sensitive Information Protection (SIP) team, both domestically and internationally, ensuring smooth and consistent operations across all markets.
o Contribute to the development of SIP team strategies, methodologies, and tools used for content security assessments, remediation, and monitoring.
o Coordinate with domestic and international teams to ensure consistent security standards are applied across different regions, addressing any unique challenges that arise in global content security efforts.
o Provide input into the continuous improvement of SIP processes and share best practices across teams.
**Here's what you will need to succeed...**
- +3yrs experience in: media workflows and media industry security related fields.
o Assessing security regulatory requirements, industry best practices and remediation management.
- Expertise in the following technologies, tools and techniques would be beneficial:
o Cybersecurity (i.e., Trusted Partner Network, National Institute of Standards & Technology)
o Storage Solutions (i.e., Network storage mechanisms, Cloud Storage Solutions)
o Digital Transfer Tools (i.e., IBM's Aspera, Signiant Media Shuttle).
- Familiarity and practice within TV & Movie Studio industry, Content Production Workflows, IP Protection, or other Media & Entertainment Industry experience.
**Education is important here is what we are looking for...**
- Bachelor's degree in; Information Systems Technology, Software Engineering, Applied Business Intelligence, Technical Project Management, Business Systems Administration or other field.
**It would be a plus if you had these skills..**
- Project Management Professional/Scrum Certifications are a plus.
- CompTIA and ISC2 Security Certifications are a plus (i.e., Network +, Security +, CISSP, CCSP)
- Production Development Lifecycle experience in the media/entertainment industry, is a strong plus.
o Organizational management, learning & development, corporate communications, or similar media production development lifecycle.
o Successfully managing projects from inception through completion.
- Proficiency in evaluating physical [or remote] site security protocols, policies, and procedures.
o Masters degree in any discipline
Disney offers a rewards package to help you live your best life. This includes health and savings benefits, educational opportunities, and special extras that only Disney can provide. Learn more about our benefits and perks at *************************************** .
_*This is a temporary assignment with no guarantee of placement._
\#DisneySecurity #twdcmedia and #corp_media
The hiring range for this position in Glendale, California is $85,800.00 - $115,000.00 per year. The base pay actually offered will take into account internal equity and also may vary depending on the candidate's geographic region, job-related knowledge, skills, and experience among other factors. A bonus and/or long-term incentive units may be provided as part of the compensation package, in addition to the full range of medical, financial, and/or other benefits, dependent on the level and position offered.
**Job ID:** 10120174
**Location:** Glendale,California
**Job Posting Company:** The Walt Disney Company (Corporate)
The Walt Disney Company and its Affiliated Companies are Equal Employment Opportunity employers and welcome all job seekers including individuals with disabilities and veterans with disabilities. If you have a disability and believe you need a reasonable accommodation in order to search for a job opening or apply for a position, email Candidate.Accommodations@Disney.com with your request. This email address is not for general employment inquiries or correspondence. We will only respond to those requests that are related to the accessibility of the online application system due to a disability.
Information Systems Security Officer (ISSO)
Cyber Security Analyst Job 15 miles from Fontana
Bowhead seeks a ISSO to join our team supporting NSWC Corona - Corona Division. The ISSO will work directly with the Navy Qualified Validator and site Information Systems Security Manager (ISSM) to analyze complex and unique technical support assignments and collaborate with other cyber security engineers, system administrators, and program analysts within a scaled agile environment. The ISSO will work directly to support and manage all eMASS packages in the NSWC Corona portfolio
**Responsibilities**
- Support all RMF packages for the NSWC Corona - Corona Division.
- Support site Information Systems Security Manager (ISSM) in compliance reviews of systems.
- The ISSO may be called on to author, review and critique perspective artifacts and required RMF documentation
- Work with ISSM to support all cybersecurity actions for division.
- Contribute to the development of cybersecurity policies and procedures.
- Responsible for reviewing and assessing cybersecurity risks.
- Responsible for the management of Risk Management Framework (RMF) best practices to attain/ maintain continuous Authority-to-Operate (ATO) capability.
- Ensure the cybersecurity posture of assigned systems.
- Research National Institute of Standards and Technology (NIST), DoD and Navy Guidance on Cybersecurity and related topics in response to requests for data or information related to cybersecurity topics, posture, impacts, or issues and reviews.
- Review architectures and designs for cybersecurity compliance and provide recommendations.
- Ability to perform and troubleshoot security measures including analysis, periodic testing, evaluation, verification, accreditation, and review of information system installations at appropriate classification levels.
- Review results in a cybersecurity impact assessment report when required.
- Compile, review, and manage system POA&Ms.
- Other duties as assigned.
**Qualifications**
- Bachelor of Science degree in Information Systems, Engineering, Computer Science, or Business or similar field (MS preferred)
- Minimum of seven (7+) years of experience to include the following:
- Nessus/ACAS Scanner Experience
o ACAS dashboard, setup, ability to run scans, ability to troubleshoot scanner and scanner results
- NIST/STIG Experience
o Experience with STIG Viewer/validation/analyzing and compiling results into a POA&M
- RMF Experience
o Experience with eMASS, Artifacts, Test Plans, Control Assessments, and compiling tools to process and collate test results
- Security + (IAT Level II Certified)
SECURITY CLEARANCE REQUIREMENTS: Must currently hold a security clearance at the minimum Secret level.
Physical Demands:
- Must be able to lift up to 25 pounds
- Must be able to stand and walk for prolonged amounts of time
- Must be able to twist, bend and squat periodically
\#LI-MN1
Applicants may be subject to a pre-employment drug & alcohol screening and/or random drug screen, and must follow UIC's Non-DOT Drug & Alcohol Testing Program requirements. If the position requires, an applicant must pass a pre-employment criminal background history check. All post-secondary education listed on the applicant's resume/application may be subject to verification.
Where driving may be required or where a rental car must be obtained for business travel purposes, applicants must have a valid driver license for this position and will be subject to verification. In addition, the applicant must pass an in-house, online, driving course to be authorized to drive for company purposes.
UIC is an equal opportunity employer. We evaluate qualified applicants without regard to race, age, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, and other protected characteristics EOE/D/V. In furtherance, pursuant to The Alaska Native Claims Settlement Act 43 U.S.C. Sec. 1601 et seq., and federal contractual requirements, UIC and its subsidiaries may legally grant certain preference in employment opportunities to UIC Shareholders and their Descendants, based on the provisions contained within The Alaska Native Claims Settlement Act. Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities.
All candidates must apply online at ****************** and submit a completed application for all positions they wish to be considered. Once the employment application has been completed and submitted, any changes to the application after submission may not be reviewed. Please contact a UIC HR Recruiter if you have made a significant change to your application. In accordance with the Americans with Disabilities Act of 1990 (ADA), persons unable to complete an online application should contact UIC Human Resources for assistance (********************************************
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
UIC Government Services (UICGS / Bowhead) provides innovative business solutions to federal and commercial customers in the areas of engineering, maintenance services, information technology, program support, logistics/base support, and procurement. Collectively, the fast-growing Bowhead Family of Companies offers a breadth of services which are performed with a focus on quality results. Headquartered in Springfield, VA, we are a fast-growing, multi-million-dollar company recognized as a top Alaska Native Corporation providing services across the Department of Defense and many federal agencies. Bowhead offers competitive benefits including medical, dental, vision, life insurance, accidental death and dismemberment, short/long-term disability, and 401(k) retirement plans as well as a paid time off programs for eligible full-time employees. Eligible part-time employees are able to participate in the 401(k) retirement plans and state or contract required paid time off programs.
**Join our Talent Community!**
Join our Talent Community (************************************************************************ to receive updates on new opportunities and future events.
**ID** _2025-22823_
**Category** _Information Technology_
**Location : Location** _US-CA-Corona_
**Min** _USD $120,000.00/Yr._
**Max** _USD $135,000.00/Yr._
**Minimum Clearance Required** _Secret_
**Travel Requirement** _Less than 10%_
Cybersecurity - Information System Security Officer (ISSO)
Cyber Security Analyst Job 42 miles from Fontana
Company:
The Boeing Company
The Boeing Company is currently seeking a Cybersecurity - Information System Security Officer (ISSO) to support Department of Defense (DoD) and Special Program activities in El Segundo, CA and Huntington Beach, CA.
The selected candidate will rely on Cybersecurity and Information Assurance (IA) background to be a technical leader and support Enterprise activities and Boeing customers throughout multiple classified computing domains. The ISSO is responsible for maintaining and implementing all Information System Security policies, standards, and directives to ensure assessment and authorization of information systems processing classified information.
Position Responsibilities:
Contribute to the development and deployment of program information security for assigned systems to meet the program and enterprise requirements, policies, standards, guidelines and procedures
Implement Assessment and Authorization (A&A) processes under the Risk Management Framework (RMF), as well as product development and product maintenance for assigned systems
Perform security compliance continuous monitoring (CONMON)
Participate in security assessments and audits
Prepare and present technical reports and briefings
Contribute to the identification of root causes, the prioritization of threats, and recommend/implement corrective action
Provide mentoring and technical leadership within the information security program team
Explore the enterprise and industry for the evolving state of industry knowledge and methods regarding information security best practices
Support development of enterprise-wide information security policies, standards, guidelines and procedures that may reach across multiple stakeholder organizations
Basic Qualifications (Required Skills/Experience):
Successfully completed Tier 5 Investigation (T5), formerly known as a Single Scope Background Investigation (SSBI) by the federal government within the last 5 years, or requires candidate to have been enrolled in a Continuous Vetting program within the last 5 years
IAM Level 1 DoD 8140.01 (previously 8570.01) compliant certification (i.e. CAP, GSLC, Security+ CE, CISSP, CASP, CISM)
1+ years of experience with cyber security policies and implementation of Risk Management Framework (RMF): e.g. DAAPM, CNSSI 1253, ICD-503, JSIG, and/or NIST SP 800 series
Active Counterintelligence (CI) Polygraph with ability to obtain a Full Scope (FS) Polygraph
Preferred Qualifications (Desired Skills/Experience):
1+ years of experience as an information system security officer (ISSO) or information system security manager (ISSM) supporting classified programs
1+ years of experience utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include NESSUS, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS
1+ years of experience in assessing and documenting test or analysis data to show cyber security compliance
Drug Free Workplace:
Boeing is a Drug Free Workplace where post offer applicants and employees are subject to testing for marijuana, cocaine, opioids, amphetamines, PCP, and alcohol when criteria is met as outlined in our policies.
Pay & Benefits:
At Boeing, we strive to deliver a Total Rewards package that will attract, engage and retain the top talent. Elements of the Total Rewards package include competitive base pay and variable compensation opportunities.
The Boeing Company also provides eligible employees with an opportunity to enroll in a variety of benefit programs, generally including health insurance, flexible spending accounts, health savings accounts, retirement savings plans, life and disability insurance programs, and a number of programs that provide for both paid and unpaid time away from work.
The specific programs and options available to any given employee may vary depending on eligibility factors such as geographic location, date of hire, and the applicability of collective bargaining agreements.
Pay is based upon candidate experience and qualifications, as well as market and business considerations.
Summary pay range: $99,450 - $134,550
Language Requirements:
Not Applicable
Education:
Not Applicable
Relocation:
This position offers relocation based on candidate eligibility.
Export Control Requirement:
This position must meet export control compliance requirements. To meet export control compliance requirements, a “U.S. Person” as defined by 22 C.F.R. §120.15 is required. “U.S. Person” includes U.S. Citizen, lawful permanent resident, refugee, or asylee.
Safety Sensitive:
This is not a Safety Sensitive Position.
Security Clearance:
This position requires an active Top Secret/Sensitive Compartmented Information (TS/SCI) U.S. Security Clearance with an adjudicated Counterintelligence or Full Scope Polygraph (U.S. Citizenship Required). (A U.S. Security Clearance that has been active in the past 24 months is considered active.).
Visa Sponsorship:
Employer will not sponsor applicants for employment visa status.
Contingent Upon Award Program
This position is not contingent upon program award
Shift:
Shift 1 (United States of America)
Stay safe from recruitment fraud! The only way to apply for a position at Boeing is via our Careers website. Learn how to protect yourself from recruitment fraud - Recruitment Fraud Warning
Boeing is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic factors, military/veteran status or other characteristics protected by law.
EEO is the law
Boeing EEO Policy
Request an Accommodation
Applicant Privacy
Boeing Participates in E - Verify
E-Verify (English)
E-Verify (Spanish)
Right to Work Statement
Right to Work (English)
Right to Work (Spanish)
Information Security Analyst
Cyber Security Analyst Job 33 miles from Fontana
The Company: VeSync is a portfolio company with brands that cover different categories of health & wellness products. We wouldn't be surprised if you have one of our Levoit air purifiers in your living room or a COSORI air fryer whipping up healthy and delicious meals for you every night.
We're a young and energetic company, we've had tremendous success, and we are constantly growing our team. As we garner more industry attention - just check out our accomplishments and awards by CES Innovation, iF Design, IGA, and Red Dot - we also need driven and talented people to join our team.
That brings us to you, and what you'll be joining. Our teams are smart and diligent and take ownership of their work - they're confident in their work but know how to collaborate with open ears and a spirit of learning. If you're down-to-earth, approachable, and easy to strike up a conversation with, this may be a great fit for you.
Check out our brands:
levoit.com | cosori.com | etekcity.com
The Opportunity:
As an Information Security Analyst, this role is vital in protecting the organization's IT infrastructure and ensuring the confidentiality, integrity, and availability of systems and data. The position plays a key part in maintaining a secure and resilient digital environment, safeguarding sensitive information, ensuring compliance with regulatory standards, and proactively addressing potential risks.
This role directly supports the organization's ability to defend against emerging cyber threats, respond swiftly to incidents, and uphold the trust of customers and stakeholders. Through collaboration with cross-functional teams, the Information Security Analyst helps develop and implement comprehensive security strategies, drives ongoing improvements in the organization's security posture, and ensures alignment with industry best practices.
What you will do at VeSync:
Information Security Planning
• Develop and implement comprehensive information security plans to safeguard the security of company data and assets.
• Thoroughly analyze the company's business processes and data characteristics, and combine industry best practices to create customized security plans, ensuring the confidentiality, integrity, and availability of information assets in various scenarios.
Policy Development and Compliance
• Create security policies and ensure that the company's operations are in strict compliance with industry standards and regulatory requirements.
• Continuously monitor industry trends and regulatory changes, and adjust security policies in a timely manner to provide a solid security and compliance framework for the company's business operations.
System and Network Security
• Maintain and enhance security measures for systems and networks to prevent potential threats.
• Utilize advanced technical means and tools to conduct real - time monitoring and risk early warning of systems and networks, promptly detect and block various attack behaviors, and ensure the stable operation of systems and networks.
Security Monitoring and Incident Response
• Monitor security events in real - time, respond promptly to emergencies, and effectively mitigate risks.
• Build an efficient security monitoring platform, use intelligent analysis technology to promptly capture abnormal behaviors, activate emergency response plans, and minimize the impact of security incidents.
Security Awareness and Training
• Develop and deliver security training programs to enhance employees' security awareness and encourage their adherence to best practices.
• Design targeted training courses according to the needs of different positions and use diverse training methods to ensure that employees have a deep understanding of and implement security requirements.
Access Control and Identity Management
• Oversee user access controls, regularly review permissions, and ensure secure identity management. Implement a strict access control mechanism,
• Conduct regular audits of user permissions, and use reliable identity management systems to prevent unauthorized access and ensure the security of company resources.
Risk Assessment and Management
• Conduct comprehensive risk assessments, identify vulnerabilities, and implement effective mitigation strategies.
• Use scientific risk assessment methods to evaluate potential threats and vulnerabilities, formulate corresponding mitigation measures based on the assessment results, and continuously improve the company's security defense capabilities.
What you bring to the role:
• Bachelor's degree in Information Security, Computer Science, or a related field.
• 3+ years of experience in information security, with a strong background in security event analysis, incident response, vulnerability management, and risk assessment.
• Familiarity with security regulatory compliance standards.
• Knowledge of network security principles, intrusion detection/prevention, and firewalls.
• Understanding these aspects is essential for ensuring the company's security compliance and building a robust security defense system.
• Strong analytical and problem - solving skills, with the ability to quickly identify and mitigate security threats.
• Relevant security certifications such as CISSP, CISM, CEH are a plus.
Location: This is an on-site, office-based role in Anaheim, CA.
Salary: Starting at $110,000 annually
Perks and Benefits:
• 100% covered Medical/Dental/Vision for employee AND spouse + dependents!
• 401K with 4% employer match (eligible after 90 days of employment) and immediate vesting
• Generous Sick + Vacation policy + paid holidays
• Life Insurance
• Voluntary Life Insurance
• Disability Insurance
• Critical Illness Coverage
• Accident Insurance
• Healthcare FSA
• Dependent Care FSA
• Travel Assistance Program
• Employee Assistance Program (EAP)
• Fully stocked kitchen
Information Security Analyst
Cyber Security Analyst Job 33 miles from Fontana
div class="cleanslate" style="--job-description-text-color: #555555; --job-description-font-family: Roboto;" p style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"strong Information Security Analyst - $110K+ DOE/strong/pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"strong On-Site | Anaheim, CA/strong/pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"strong Full-Time | Direct Hire/strong/pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"strong Start Immediately | Excellent Benefits /strong/pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"strong /strong/pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Are you a cybersecurity pro who thrives in high-growth, tech-forward environments? A leading health amp; wellness brand is hiring a stronghands-on Information Security Analyst/strong to help safeguard its digital infrastructure, protect customer data, and support compliance across the organization./pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"br//pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"This is a key opportunity to bring your security expertise to a collaborative team where your contributions will directly impact operations, risk management, and digital trust./pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"br//pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"strong What You'll Do:/strong/pul style="margin:0px;padding-left:40px;"
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Design and implement robust information security plans to protect sensitive company data/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Monitor systems and respond swiftly to threats, vulnerabilities, and incidents/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Oversee access control, identity management, and user permissions/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Ensure compliance with industry standards (e.g., SOC 2, GDPR, ISO 27001)/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Build and deliver security awareness training for companywide adoption/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Support audits, conduct risk assessments, and optimize internal security frameworks/li
/ulp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"br//pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"strong What We're Looking For:/strong/pul style="margin:0px;padding-left:40px;"
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"3+ years of experience in InfoSec, risk analysis, or incident response/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Knowledge of firewalls, intrusion detection/prevention systems, and network security best practices/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Familiarity with regulatory and compliance frameworks/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Strong communication and analytical problem-solving skills/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Bachelor's in Information Security, Computer Science, or related field/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Certifications like CISSP, CISM, or CEH are a plus/li
/ulp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"br//pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"strong Perks amp; Benefits:/strong/pul style="margin:0px;padding-left:40px;"
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"100% company-paid Medical, Dental, and Vision for you + dependents/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"401K with 4% company match/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Generous vacation, sick time, and paid holidays/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Life amp; Disability Insurance + FSA options/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"Employee Assistance Program/li
li style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"On-site kitchen, stocked daily/li
/ulp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"br//pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"This strongon-site/strong role is based in strong Anaheim, CA/strong and pays strong$110K+ annually/strong, depending on experience./pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"br//pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"🔗 Apply today and become a vital part of a mission-driven, innovation-powered team transforming how health and wellness products reach millions of customers./pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"br//pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"em TCWGlobal is an equal opportunity employer. We do not discriminate based on age, ethnicity, gender, nationality, religious belief, or sexual orientation./em/pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"br//pp style="line-height:1.1;font-family:Calibri;font-size:14px;color:rgb(0, 0, 0);margin:0px;"#LI-EM1/p
/div
Information Systems Security Officer (ISSO)
Cyber Security Analyst Job 34 miles from Fontana
ISSO Employment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:
* Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades.
* Maintain responsibility for managing cybersecurity risk from an organizational perspective.
* Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.
* Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.
* Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).
* Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.
* Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.
* Provide subject matter expertise for cyber security and trusted system technology.
* Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.
* Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes.
* Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.
* Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:
* Bachelor's Degree.
* A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.
* eMASS experience.
* Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.
* Strong desktop publishing skills using Microsoft Word and Excel.
* Experience with industry writing styles such as grammar, sentence form, and structure.
* Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:
* CISSP, CASP, or a similar certificate is preferred.
* Master's Degree in Cybersecurity or related field.
* Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.
* Demonstrated ability to work well independently and as a part of a team.
* Excellent work ethic and a high commitment to quality.
Our Commitment:
Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.
Health, Dental, and Vision
Life Insurance
401k
Flexible Spending Account (Health, Dependent Care, and Commuter)
Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!
Explore additional job opportunities with CGS on our Job Board:
*************************************
For more information about CGS please visit: ************************** or contact:
Email: *******************
$92,213.33 - $125,146.66 a year
SIP Content Security Sr Analyst Project Hire
Cyber Security Analyst Job 47 miles from Fontana
SIP Content Security Senior Analyst Project Hire
The SIP Content Security Sr Analyst will report to the Manager of the Content Security Program and Sensitive Information Protection Segment. This role is pivotal in ensuring the security of sensitive media content within the production ecosystem of The Walt Disney Company. The SIP Sr Analyst will oversee the planning, execution, and management of content security assessments and remediation efforts focused on Third-Party Service Providers/Vendors, ensuring that both external partners and internal workflows adhere to the highest standards of security.
About the team…
You and the team will play a critical part in protecting the company's intellectual property and sensitive information throughout the production and distribution process, specifically within the complex and interconnected TV/Streaming production environment. This program will provide assessment, consulting, and advisory services to ensure the entire supply chain, from partners to suppliers, is secure, resilient, and capable of supporting the creation of films, TV shows, and series seen globally.
A Day in the Life of a SIP Content Security Analyst…
Execute Daily Operations for Remote Site Security Assessments
o Conduct comprehensive security assessments of third-party vendors and service providers, specifically focusing on remote site locations and ensuring compliance with Disney's content security requirements.
o Collaborate with external vendors to evaluate security measures across various points of the media production process, from pre-production to final distribution, ensuring that sensitive information (e.g., scripts, production files, video footage) is secure.
o Analyze vendor systems, procedures, and policies to identify potential risks and vulnerabilities to Disney's intellectual property and confidential media content.
o Lead remediation efforts with vendors, ensuring identified security gaps are addressed and resolved in a timely manner.
o Prepare detailed security assessment reports and actionable recommendations for improvement, ensuring stakeholders understand potential risks and solutions.
Support Operational Action Items and Enterprise Initiatives (20%)
o Provide support for ongoing content security efforts across multiple business segments within The Walt Disney Company, helping to drive initiatives that enhance the company's overall content protection strategies.
o Collaborate with cross-functional teams, including legal, IT, production, and business affairs, to ensure content security practices are integrated into workflows across different departments.
o Assist in defining and updating internal security policies, standards, and procedures, ensuring they align with industry best practices and legal/regulatory requirements.
o Track progress on operational tasks and ensure timely execution of action items across the enterprise, helping to coordinate and implement security initiatives effectively.
Support Management of Core SIP Team Processes (20%)
o Assist in managing and optimizing the core processes of the Sensitive Information Protection (SIP) team, both domestically and internationally, ensuring smooth and consistent operations across all markets.
o Contribute to the development of SIP team strategies, methodologies, and tools used for content security assessments, remediation, and monitoring.
o Coordinate with domestic and international teams to ensure consistent security standards are applied across different regions, addressing any unique challenges that arise in global content security efforts.
o Provide input into the continuous improvement of SIP processes and share best practices across teams.
Here's what you will need to succeed…
• +3yrs experience in: media workflows and media industry security related fields.
o Assessing security regulatory requirements, industry best practices and remediation management.
• Expertise in the following technologies, tools and techniques would be beneficial:
o Cybersecurity (i.e., Trusted Partner Network, National Institute of Standards & Technology)
o Storage Solutions (i.e., Network storage mechanisms, Cloud Storage Solutions)
o Digital Transfer Tools (i.e., IBM's Aspera, Signiant Media Shuttle).
• Familiarity and practice within TV & Movie Studio industry, Content Production Workflows, IP Protection, or other Media & Entertainment Industry experience.
Education is important here is what we are looking for…
• Bachelor's degree in; Information Systems Technology, Software Engineering, Applied Business Intelligence, Technical Project Management, Business Systems Administration or other field.
It would be a plus if you had these skills..
• Project Management Professional/Scrum Certifications are a plus.
• CompTIA and ISC2 Security Certifications are a plus (i.e., Network +, Security +, CISSP, CCSP)
• Production Development Lifecycle experience in the media/entertainment industry, is a strong plus.
o Organizational management, learning & development, corporate communications, or similar media production development lifecycle.
o Successfully managing projects from inception through completion.
• Proficiency in evaluating physical [or remote] site security protocols, policies, and procedures.
o Masters degree in any discipline
Disney offers a rewards package to help you live your best life. This includes health and savings benefits, educational opportunities, and special extras that only Disney can provide. Learn more about our benefits and perks at ****************************************
*This is a temporary assignment with no guarantee of placement.
#DisneySecurity #twdcmedia and #corp_media
The hiring range for this position in Glendale, California is $85,800.00 - $115,000.00 per year. The base pay actually offered will take into account internal equity and also may vary depending on the candidate's geographic region, job-related knowledge, skills, and experience among other factors. A bonus and/or long-term incentive units may be provided as part of the compensation package, in addition to the full range of medical, financial, and/or other benefits, dependent on the level and position offered.
Job Posting Segment:
Security
Job Posting Primary Business:
Misson Security Services
Primary Job Posting Category:
Sensitive Information Protection
Employment Type:
Full time
Primary City, State, Region, Postal Code:
Glendale, CA, USA
Alternate City, State, Region, Postal Code:
Date Posted:
2025-05-02
Information Security Analyst
Cyber Security Analyst Job 9 miles from Fontana
This position is responsible for ensuring that the Bank's Security operations and preventive controls are managed and maintained in accordance with established Information Security policies, standards and procedures, published regulations and industry best practices.
Primarily responsible for the constant review of vendor security controls in comparison with policies and industry frameworks, risk assessments, determination of control gaps and their remediation.
ESSENTIAL FUNCTIONS
* Performs vendor security risk assessments to determine inherent risk on proposed projects and assesses vendor security controls to determine residual risk.
* Evaluates the potential exposure to application security risks and threats based on industry security frameworks and recommends appropriate mitigation.
* Periodically assesses the information security controls design and execution applied by vendors for completeness and efficacy.
* Assesses vendor security practices including Information Security governance, Identity and access control, Incident monitoring and response, Vulnerability assessment and Penetration tests, Network Security and Endpoint Security, among others.
* Acts as liaison with Third Party Risk Management, Information Technology and business department Relationship Managers related to vendor risk assessments.
* Remediate audit and regulatory findings and recommendations related to Information Security and Vendor Risk Management.
* Participates in the implementation of Endpoint and Network Security solutions and monitors their correct usage.
* Supports the execution of Penetration tests, contacts the appropriate parties and arranges the information and resources needed.
* Supports the review of security baselines and ensures their implementation in network devices and endpoints.
* Supports the review of vulnerability management metrics and proposes improvements to the control process.
QUALIFICATIONS
Education:
* College degree in Information Technology or Information Security or equivalent.
* Security+, SSCP, CISSP, CISM or similar information security certifications preferred.
Experience:
* Minimum 3 years of experience in Information Security Risk, Information Security Operations or Security Auditing.
* Proven experience on third-party risk management and vendor security assessments.
* Proven experience operating and/or implementing SIEM, EDR/XDR, NAC, IDS/IPS, WAF, IAM, FW, AD, EntraID and AVs.
* Experience in securing and implementing policies for Cloud Technologies (M365, Azure, AWS) and the Microsoft (E5) technology stack including Microsoft Defender, Microsoft Intune or similar preferred.
* Experience working with Vendor Risk Management (VRM) applications preferred.
* Working knowledge of other security practices in the Endpoint Security, Network Security, Security Operations and Security Governance areas required.
Skills/Ability:
* Proven ability to initiate and manage projects.
* Excellent communication and problem-solving skills.
* Strong inter-personal communication and collaboration skills.
* Self-starter, highly motivated, and able to work with general supervision.
OTHER DETAILS
$29.33 - $42.07 / hour
Pay determined based on job-related knowledge, skills, experience, and location.
This position may be eligible for a discretionary bonus.