Acquisition Security Analyst
Cyber security analyst job in Los Angeles, CA
MANTECH seeks a motivated, career and customer-oriented Acquisition Security Analyst II to join our team in El Segundo, CA.
The Acquisition Security Analyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle.
Responsibilities include but are not limited to:
In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy.
Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process.
Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers.
Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI.
Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided.
Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP)
Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E.
Minimum Qualifications:
Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree.
10+ years of related experience with acquisition programs
6+ years of experience with SCI programs.
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents.
Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process.
Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation)
Preferred Qualifications:
4+ years of experience with SAR program acquisitions desired.
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision.
Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners.
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a polygraph.
Physical Requirements:
Must be able to remain in a stationary position 50%.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
Cyber Security Analyst
Cyber security analyst job in Irvine, CA
Required Skills & Experience:
Bachelor's degree in a related field preferred but not required.
5+ years of experience in a SOC or similar security environment.
Expertise with SIEM, EDR, CSPM tools; strong skills in SQL/KQL/Cypher for data analysis.
Proven ability to lead complex investigations and coordinate across technical and business stakeholders.
Solid understanding of cybersecurity frameworks (MITRE ATT&CK, NIST CSF, NIST SP800-61r3).
Experience with log aggregation technologies and SIEM tuning processes.
Job Description:
A large financial services customer based in Irvine, CA is seeking a Cyber Security Operations Analyst, focused on Incident Response. This individual will lead Incident Response, and act as a technical expert within the SOC. This team protects the organization from cyber threats. This role requires strong analytical skills, leadership in high-severity incidents, and deep knowledge of security tools and frameworks.
Pay:
50-65/hr
Cyber Security Engineer
Cyber security analyst job in San Jose, CA
About the Company
Atomus' mission is to provide world class cybersecurity for the world's most critical organizations. We build security compliance software delivered as managed services sold directly, with relevant professional services and support. Examples of our commercial customers include hypersonic aircraft companies, satellite and space mission systems companies, AI and software companies, among many other companies serving primarily the aerospace and defense industry. At Atomus we are hardworking, we move fast, and we put our customers first.
About the Role
As a Cybersecurity Engineer will work closely with customers to help them implement and fully leverage Atomus' cybersecurity products, maintain compliance with NIST 800-171 and CMMC cybersecurity standards, and solve technical challenges. Our customers depend on Atomus to manage and secure their Windows, MacOS, Ubuntu, iOS, Android devices, and Firewalls while ensuring compliance. We aim to provide the best possible support when they have questions. Our team's main goal is to simplify our customers' lives, for compliance and security. You will serve as the voice of the customer by sharing their feedback and insights with our product team and reporting any issues to our software engineers. We take pride in delivering amazing experiences for our customers.
Responsibilities
Manage and guide new customers through the onboarding process, ensuring proper setup, configuration, and alignment with their security programs and establishing baseline compliance requirements of NIST 800-171 and CMMC while performing technical tasks/project management required for onboardings.
Serve as the first point of contact for technical inquiries, providing debugging, troubleshooting, and solutions for technical IT/security issues related to the Atomus platform.
Work closely with internal teams (sales, product, engineering) along with partners/vendors for customer requirements to communicate customer feedback and advocate for customer needs in product development and rolling out 3rd party products.
Assist customers in managing and maintaining NIST 800-171 and CMMC compliance requirements, ensuring IT documentation is updated and maintained.
Required Skills
Experience in a customer-facing technical role, IT administrator, solutions engineer, Technical Customer Success, or TAM role preferably in cybersecurity or compliance.
Strong experience with cybersecurity frameworks and technologies (e.g., NIST, CMMC, firewalls, routers, encryption tools).
Intermediate networking knowledge of WAN and LAN connectivity, routers, firewalls, switches, security, etc.
Experience with Microsoft Intune, Active Directory, Windows, MacOS and ABM, as well as mobile platforms like Android and iOS.
Advanced understanding of Microsoft products (Exchange, SharePoint, Windows, Windows Server, Active Directory, etc.).
Familiarity with command-line tools (e.g., PowerShell, Terminal) for troubleshooting and deployment.
Strong troubleshooting skills, particularly related to network security, software issues, and IT environments.
Excellent verbal and written communication skills; ability to explain complex topics to both technical and non-technical audiences.
Applicants must have strong emotional intelligence to intuit and match customer sentiment for effective communication.
Preferred Skills
Prior experience with NIST 800-171, CMMC, or other compliance standards.
Ability to manage multiple customer accounts and onboarding projects simultaneously.
Familiarity with CRM platforms (HubSpot), and compliance documentation tools while managing SLAs which include customer satisfaction, initial response, and issue resolution times.
Cybersecurity risk security analyst
Cyber security analyst job in San Jose, CA
We are seeking a Cybersecurity Risk Analyst to support managing and mitigating security risks across processes, technologies, and cloud environments.
The ideal candidate will combine technical expertise, business acumen, and cybersecurity experience to advise partners, assess risks, and drive improvements in secure operations.
This role requires hands on experience with Kusto Query Language (KQL), cloud security, and risk assessment, as well as the ability to communicate effectively with stakeholders at all levels.
Must be local to San Francisco or Los Angeles (LA) or Salt Lake City (SLC).
Responsibilities:
Support risk strategies by identifying and mitigating security risks in bank systems and processes.
Apply and interpret security policies, provide guidance and input on policy enhancements.
Advise business and technical partners on security controls, procedures, and best practices.
Assess cloud and on-prem environments to identify risks and recommend control improvements.
Conduct security control assessments, document findings, and develop actionable remediation plans.
Evaluate third-party vendors to determine shared security responsibilities and associated risks.
Communicate security risks and mitigation strategies effectively to technical teams and executives.
Collaborate across teams to drive secure operations and deliver results in a fast-paced environment.
Qualifications:
Bachelor's degree in Cybersecurity, Information Security, Computer Science, or related technical discipline (or equivalent experience).
3+ years of experience in cybersecurity, information security, or technology risk management.
Proficiency in Kusto Query Language (KQL) for data analysis, log correlation, and threat detection.
In-depth understanding of security frameworks such as NIST, ISO 27001, or FedRAMP.
Demonstrated experience assessing and improving security posture across Cloud (Azure, AWS) and on-premises environments.
Proven ability to conduct security control assessments, identify risk exposures, and develop actionable remediation plans.
Skilled at translating technical security concepts into clear, business-relevant insights for stakeholders and executives.
Excellent communication, collaboration, and interpersonal skills, with a focus on building trusted partnerships across technical and business teams.
Strong organizational and analytical skills, with the ability to manage multiple initiatives in a fast-paced, results-driven environment.
Information Security Engineer
Cyber security analyst job in San Francisco, CA
We are in need of a InfoSec Engineer to join our global client on a direct hire basis. In this role you will be responsible for leading and executing information security operations across multiple locations, with a primary focus on incident response, security technologies, change management, and continuous improvement. This role safeguards the organization's digital assets by designing, implementing, and maintaining key processes and technologies such as intrusion detection, malware protection, zero-day threat mitigation, firewalls, internet filtering, and SIEM tools.
Location: San Francisco, CA (Hybrid - 3 days on-site)
This job expects to pay about $125,000 - $155,000 per year plus benefits
What You Will Do:
Security Operations & Incident Response
Assist with 24x7 security operations, ensuring continuous availability and performance of critical security systems.
Support aspects of incident response, including detection, escalation, containment, service recovery, and root cause analysis.
Tune and configure IDS/IPS, antivirus, firewall, vulnerability management, and application assessment tools to ensure optimal protection and performance.
Implement and maintain automated monitoring and logging processes; conduct regular log reviews and threat detection.
Manage escalations from the Security Operations Center (SOC) and drive timely resolution of critical issues.
Identify, track, and communicate key risks and security concerns using a metrics-based approach.
Continuously improve incident response processes, system documentation, monitoring tools, and recovery procedures.
Security Technologies & Compliance
Administer and support a range of security tools and technologies including SIEM, intrusion detection/prevention systems, malware protection, encryption, and content filtering.
Ensure compliance with internal information security policies and external regulatory frameworks (e.g., NIST, ISO).
Develop, maintain, and enforce security documentation, workflows, and access control procedures.
Monitor compliance across systems; identify gaps and coordinate remediation with stakeholders.
Governance, Metrics & Strategic Planning
Develop and maintain security metrics to inform leadership and guide strategic decisions.
Provide input into the organization's overall information security strategy to ensure alignment with business goals.
Contribute to the continuous improvement of documentation, monitoring capabilities, automation, and recovery plans.
Vendor & Partner Oversight
Manage relationships with third-party security vendors and service providers, ensuring contractual obligations, service quality, and compliance are met.
Oversee change management activities related to externally managed security platforms and services.
Collaborate with managed service providers (MSPs) to drive operational improvements and automation.
Additional Responsibilities
Partner with cross-functional teams to support the deployment and maintenance of security tools and services.
Oversee daily security operations and escalate critical issues as appropriate.
Support additional information security projects or initiatives as assigned.
What You Bring to The Table:
Bachelor's Degree in relevant field or other relevant professional experience
4-5+ years of experience in enterprise information security operations, with hands-on expertise in IDS/IPS, SIEM, malware protection, firewalls, and incident response
Strong understanding of compliance and risk frameworks: NIST, ISO 27001
Demonstrated experience with security monitoring, threat detection, and forensic analysis.
Proven ability to develop, execute, and mature operational security processes and documentation
Skilled in managing security vendors and third-party services, including contract and performance oversight
Excellent written and verbal communication skills, with the ability to present technical concepts clearly to both technical and non-technical stakeholders
Strong attention to detail
Proficient in Microsoft Office, web-based collaboration tools, and security platforms
CISSP, CISM, CISA, GCIH, CEH or other related information security certifications preferred
Experience with Rapid7, Zscaler, and Fortinet firewalls is a plus
Experience working in a Microsoft environment is a plus
Irvine Technology Corporation (ITC) is a leading provider of technology and staffing solutions for IT, Security, Engineering, and Interactive Design disciplines servicing startups to enterprise clients, nationally. We pride ourselves in the ability to introduce you to our intimate network of business and technology leaders - bringing you opportunity coupled with personal growth, and professional development! Join us. Let us catapult your career!
Irvine Technology Corporation provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Irvine Technology Corporation complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities.
IT Security and Network Engineer
Cyber security analyst job in Los Angeles, CA
IT Security & Network Engineer - JM Eagle
Los Angeles, CA | Onsite 4 Days / Remote Fridays | $150,000 - $170,000 + Comprehensive Benefits
About Us
JM Eagle is the world's largest manufacturer of plastic pipe, providing the infrastructure that keeps communities connected across North America. Behind every operation is a secure, stable IT environment supporting 1,000+ users across 20+ locations.
We're strengthening that foundation - and seeking a hands-on IT Security & Network Engineer who can own our daily security operations and help modernize our network and cybersecurity posture.
This is a high-impact, individual contributor role for a senior engineer who thrives in both the strategic and technical trenches.
The Opportunity
This role is ideal for a seasoned IT security professional who wants broad ownership without stepping into management. You'll work closely with the Director of IT Operations and outsourced partners to secure our enterprise, harden our infrastructure, and enhance our cybersecurity frameworks.
Your time will be split approximately:
60% Cybersecurity: tools, monitoring, vulnerability management, incident response
40% Network Engineering: SD-WAN, firewalls, VPN, wireless, connectivity across 20+ sites
You will be the technical driver behind our security improvement roadmap.
What You'll Do
Cybersecurity Operations
Own day-to-day cybersecurity operations, including monitoring, threat response, and risk mitigation.
Manage security tools and platforms: endpoint protection, SIEM, MFA, SSO, VPN, firewalls, and vulnerability management tools.
Perform recurring vulnerability scans and penetration-testing coordination; track and validate remediation.
Monitor security alerts using Fortinet, Darktrace, CrowdStrike, Nessus, Microsoft Defender, etc.
Lead internal security awareness initiatives and social engineering simulations.
Maintain documentation for configurations, policies, and security processes.
Network Engineering
Support secure network architecture across 20+ locations.
Oversee SD-WAN, firewall policies, VPN configuration, internet filtering, and remote-access security.
Support wireless infrastructure, site connectivity, and network performance monitoring.
Partner with third-party providers to ensure uptime, reliability, and strong security posture.
Governance & Collaboration
Work with IT leadership to strengthen cybersecurity governance and reporting.
Contribute to incident response planning, tabletop exercises, and monthly security briefings.
Evaluate threats and emerging technologies; propose continuous improvements.
What You Bring
Bachelor's degree in Computer Science, Information Systems, or equivalent experience.
8+ years of experience in IT security and network engineering supporting 1,000+ users across distributed sites.
4+ years of hands-on experience with enterprise security tools and platforms.
Deep experience with the Microsoft ecosystem: Azure, M365, Active Directory / Entra ID, SCCM / Intune.
Strong working knowledge of:
MFA, SSO, VPN
Endpoint protection
SIEM solutions
Network segmentation, encryption, hardening
Monitor and respond to security alerts using tools like Fortinet, Darktrace, CrowdStrike, Nessus, and Microsoft Defender.
Familiarity with SD-WAN architectures, wireless networking, and network monitoring tools.
Understanding of ITIL, ITSM, NIST frameworks; CISSP or similar preferred but not required.
Excellent communication skills with the ability to work across teams.
Comfort managing outsourced security and network service providers.
A highly proactive, self-starting approach - someone who solves problems end-to-end.
Why JM Eagle
Directly influence and modernize the cybersecurity posture of the world's largest pipe manufacturer.
Join an enterprise undergoing major IT transformation with full executive backing.
Work with a Microsoft-centric environment supporting 1,000+ users and 20+ distributed locations.
Competitive salary: $150K-$170K + bonus + excellent benefits.
4 days onsite in Los Angeles; remote Fridays.
Work Environment
Primarily a professional headquarters environment. Occasional travel to manufacturing and distribution facilities may be required. Some exposure to plant or outdoor areas during site visits.
Senior Security Cloud Engineer - Top VC Firm
Cyber security analyst job in Menlo Park, CA
Help support the CISO at one of the world's largest venture capital firms, working at the intersection of cloud security, AI and cutting-edge technology.
You'll be joining a lean and highly technical security team, where your impact will be immediate and visible. This role is balanced between seniority and technical depth. You'll be trusted to support and advise the CISO, contribute to strategic decisions and act a senior technical voice, while remaining deeply hands-on as a cloud security engineer.
The environment is heavily cloud based, (primarily Azure, with some AWS) and increasingly focussed on AI platforms and MCP workloads. You'll work closely with AI development, data engineering and platform teams to ensure security is embedded.
Ideally, you'll be coming from a similar role, operating in a senior position while remaining technical day-to-day, with coding in python, terraform or SQL. Whilst this role requires general security experience, you will need to have a background specifically in cloud security.
This role is based in Menlo Park.
Interested in finding out more? No up-to-date resume required.
Information Security Engineer
Cyber security analyst job in Newark, CA
Job Title: Security Engineer
Department: IT
Reports to: IT Manager
Job Overview: The Security Engineer is responsible for designing, implementing, and managing the security infrastructure that protects our applications, data, and networks. This role plays a critical part in threat detection, risk mitigation, and the development of secure architectures while ensuring compliance with industry standards and regulatory requirements.
Primary Responsibilities:
Design, deploy, and manage security tools and technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection).
Monitor systems and networks for security events, investigate incidents, and lead remediation efforts.
Perform threat modeling, risk assessments, and application security reviews.
Conduct vulnerability assessments and penetration tests to identify and address security gaps.
Develop, implement, and maintain security policies, standards, and procedures aligned with frameworks such as NIST, ISO 27001, SOC 2, and GDPR.
Build and maintain secure cloud and infrastructure configurations (e.g., GCP, Oracle Cloud).
Conduct code and architecture reviews with a focus on security best practices.
Partner with DevOps, IT, and engineering teams to integrate security across the software development lifecycle (DevSecOps).
Stay informed about emerging threats, vulnerabilities, and regulatory updates (e.g., ISO 27001, ITAR, CMMC 2.0).
Deliver security awareness training to internal teams.
Collaborate with compliance, legal, and business stakeholders to support audits and regulatory obligations.
Qualifications:
Bachelor's degree in Computer Science, Cybersecurity, or a related field.
5+ years of hands-on cybersecurity experience.
Strong knowledge of security frameworks and protocols (e.g., NIST, ISO 27001, SOC 2, CIS).
Expertise in network security, system hardening, and secure coding practices.
Practical experience with SIEM, IDS/IPS, EDR, firewalls, and vulnerability management tools.
Due to U.S. export control laws and regulations (ITAR), this position requires U.S. Person status.
Preferred:
Industry certifications such as CISSP, OSCP, or GIAC.
Experience with security audits, penetration testing, or participation in red/blue team exercises.
Strong communication skills with the ability to articulate complex security concepts to both technical and non-technical audiences.
Experience in an Electronics Manufacturing environment is a plus.
Infrastructure & Security Engineer (Platform)
Cyber security analyst job in San Francisco, CA
In this role, you will drive the evolution of our infrastructure and security posture. You will have substantial ownership over our technology choices and implementation for deployment, observability, storage, and security. You will identify, triage, and implement incremental improvements in all of these domains, working closely with backend engineers and internal and external auditors to develop appropriately scoped interventions. You will work with engineers to ensure that security considerations are baked into software development from the outset.
You should have a broad understanding of modern best practices around cloud architecture, data governance and infrastructure as code. You should approach questions of infrastructure and security risk with a sense of nuance and good judgment. You should be able to build consensus around your threat models such that the necessary consequences seem natural to other stakeholders.
In this role, you will need to be fluent in Python and Terraform (at least to start).
Company & Funding
We're building the world's largest long-term insurer, using digital money and AI to serve billions of people profitably. We want anyone, anywhere, to be able to save for their future, protect their family, and build wealth across generations.
We face a once-in-a-century opportunity to build a vertically integrated life (re)insurer. Our product offerings are globally unique, making it possible for us to scale our balance sheet, build modern systems from scratch, and then directly compete to win a market that is 3% of global GDP.
We've raised over $140M to date. Sam Altman and Lachy Groom led our initial raise, and they've since been joined by leading investors in AI, insurance, and Bitcoin, including Northwestern Mutual, Apollo, Bain Capital, Pantera, Haun, Framework, Fulgur Ventures, MS&AD, Mouro, Stillmark, and Wences Casares.
Our Bermuda operating subsidiary holds the the world's only license to issue life insurance denominated entirely in Bitcoin. It's also the only company in the world with audited financials stated in Bitcoin. (If you join us, you can expect to do a lot of things no one's ever done before.)
Engineering at Meanwhile
With the advent of ubiquitous AI tooling, the dynamic range in individual engineering effectiveness is only widening.
At Meanwhile, we're planning for a world in which small, tight-knit engineering teams (supported by a small, tight-knit platform team) own entire lines of business, and are compensated accordingly.
We're attacking a huge market with the leanest, most effective team in insurance. Where incumbents employ a thousand people, we think we can make it work with a hundred or a dozen.
We're looking for hungry ICs (and former managers who see the writing on the wall) interested in pushing the boundaries of engineering productivity in a vertically integrated, regulated organization.
We're growing quickly. You will fix million-dollar bugs.
On the business side, we hire for deep domain expertise, ambition, and the creativity to figure out the previously impossible. Because our engineers work closely with people from the business, they need curiosity, flexibility, an appetite for (and the ability to digest) complex context, and strong communication skills.
Our view is that ownership is taken, not given. You will be successful here if your work progressively builds others' trust in your ability to identify, attack, and solve larger and larger problems, including those that no one else has anticipated.
We believe that "code wins arguments," that prototyping is often the best first step in a design process, and that the impact of velocity is non-linear.
You are excited by putting up multiple meaningful changes, or writing thousands of lines of code, in a day (even though you know that deleting lines of code is more exciting than writing them, and that, occasionally, deep reflection is required in order to ship anything).
You aren't fazed by building systems that don't work out - sometimes, you have to throw code away.
Intellectual honesty is non-negotiable. You love to learn and to teach, to ask questions and to answer them, and to be transparent about your uncertainty.
You are eager to learn, with the rest of the team, how to work with AI tools, including agents, in order to move faster and ship better, more complete versions of your ideas. You will experiment with new ways of working, with the expectation that some of them will be unsuccessful, and you will teach others what works.
This is the most exciting time in decades to be a competent, technically ambitious engineer. We want to offer you the opportunity to see what's really possible and how much better you can get at your craft.
Security Analyst
Cyber security analyst job in Los Angeles, CA
We are seeking an Information Security Analyst to support enterprise security operations with a focus on vendor risk management, security control integration, and infrastructure security. This role is responsible for conducting security assessments, coordinating the implementation of core security services (including SSO, logging, IAM, and data protection), and supporting compliance activities aligned with frameworks such as NIST and ISO 27001. The ideal candidate has experience in cybersecurity risk management, cloud environments (AWS/Azure), and collaborating with technical teams to ensure the effective delivery of security controls.
At least 2+ years of experience in the following:
Security & Compliance Frameworks
NIST CSF
ISO 27001
CIS Controls
ITIL
SOC 2
PCI DSS
FedRAMP
GDPR / CCPA
Vendor Risk & GRC Tools
OneTrust
SIG (Standardized Information Gathering)
Other GRC/TPRM platforms
Identity, SSO & Access Management
SSO (PingFederate, SAML)
Active Directory
Azure AD
AWS IAM
Senior Backend Engineer - Cloud Security
Cyber security analyst job in Sunnyvale, CA
About Company,
Droisys is an innovation technology company focused on helping companies accelerate their digital initiatives from strategy and planning through execution. We leverage deep technical expertise, Agile methodologies, and data-driven intelligence to modernize systems of engagement and simplify human/tech interaction.
Amazing things happen when we work in environments where everyone feels a true sense of belonging and when candidates have the requisite skills and opportunities to succeed. At Droisys, we invest in our talent and support career growth, and we are always on the lookout for amazing talent who can contribute to our growth by delivering top results for our clients. Join us to challenge yourself and accomplish work that matters.
We're hiring Senior Backend Engineer - Cloud Security in Sunnyvale, CA
What You Will Do
Build containerized microservices and related components for a multi-tenant, distributed system that ingests and processes real-time cloud events, system telemetry, and network data across major cloud platforms. Your work will enable customers to detect risks and strengthen their cloud security posture.
Mentor junior engineers, interns, and new graduates, helping them develop strong technical skills and become effective contributors.
Write production-quality software primarily in Java using Spring Boot, and work extensively with Kafka, SQL, and other data interfaces.
Work within a Kubernetes-based service infrastructure, while learning new technologies as needed.
Take ownership of major features and subsystems through the entire development lifecycle-requirements, design, implementation, deployment, and customer adoption.
Participate in operational responsibilities, gaining firsthand experience with real-world performance, reliability, and support scenarios-informing how you design and build better systems.
Prioritize quality at every stage, performing thorough developer testing, functional validation, integration checks, and performance testing to ensure highly resilient systems.
Collaborate closely with Product Management to review, refine, and finalize requirements.
Develop a deep understanding of customer needs by engaging with peers, stakeholders, and real-world use cases.
What You Bring
Bachelor's degree in computer science or similar (Master's preferred).
5+ years of experience building scalable, distributed systems.
Passion for software engineering, continuous learning, and working in a collaborative environment.
Hands-on experience with AWS, Azure, or GCP, with strong familiarity at the API/programming level.
Experience with networking and/or security concepts is a plus.
Experience developing containerized services on Kubernetes is strongly desired.
Strong programming experience in Java/Spring Boot or Golang.
Experience building or using REST APIs.
Knowledge of infrastructure-as-code tools such as CloudFormation, Terraform, or Ansible is a plus.
Understanding of TCP/IP networking fundamentals.
Experience developing in Unix/Linux environments.
Droisys is an equal opportunity employer. We do not discriminate based on race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law. Droisys believes in diversity, inclusion, and belonging, and we are committed to fostering a diverse work environment
Staff Blockchain Security Engineer
Cyber security analyst job in Irvine, CA
About the Company:
Blizzard Entertainment, a global leader in interactive entertainment, has been shaping the world of video games since its founding. Renowned for iconic franchises like
World of Warcraft
,
Overwatch
, and
Diablo
, Blizzard is dedicated to creating immersive, innovative, and high-quality gaming experiences that captivate millions of players worldwide. Our mission is to inspire and connect players through engaging gameplay, compelling storytelling, and vibrant online communities. As we continue to expand our reach in the gaming industry, we remain committed to pushing the boundaries of creativity, technology, and entertainment.
The Role: Staff Blockchain Security Engineer
Blizzard's Application Security (AppSec) team is entrusted with safeguarding the company and its players from software vulnerabilities and security threats. As a Staff Blockchain Security Engineer within AppSec, you will specialize in securing blockchain-based game features, in-game economies, and Web3 integrations. You'll collaborate closely with game development and engineering teams to provide guidance, perform security assessments, and implement best practices throughout the blockchain software lifecycle.
This role requires in-person collaboration two days per week at our Irvine, California headquarters.
Key Responsibilities:
Conduct comprehensive security reviews of blockchain integrations, smart contracts, in-game economy systems, and Web3 features for vulnerabilities and architectural flaws
Advise game development teams on secure blockchain practices and remediation strategies
Establish and maintain secure development processes within the blockchain software lifecycle
Develop, maintain, and improve blockchain-specific security tooling (e.g., fuzzers, static analysis frameworks)
Collaborate with legal, compliance, and risk teams to evaluate security, operational, and regulatory risks of blockchain implementations
Minimum Qualifications:
8+ years in application security, Web3 security, or related disciplines
Proven experience auditing smart contracts, blockchain protocols, or Web3 applications
Expertise in design reviews, threat modeling, secure code review, or penetration testing with a hacker mindset
Strong knowledge of application security principles and common vulnerabilities (e.g., SSRF, race conditions, privilege escalation)
Experience with secure key management, wallet systems, or cryptography
Familiarity with blockchain security tools such as Slither, Echidna, or similar
Scripting or programming experience in Python, C++, JavaScript, or other relevant languages
Ability to balance business goals with security priorities and communicate risks clearly to cross-functional teams
Preferred Qualifications:
Experience in formal verification of smart contracts
Background in blockchain-enabled gaming, DeFi platforms, or NFT ecosystems
Contributions to blockchain security communities, bug bounty programs, or published research
Experience defining and executing long-term blockchain security strategies alongside engineering leadership
Why Blizzard?
Competitive base salary and discretionary annual bonus
Equity opportunities and long-term incentives
Comprehensive health, dental, and vision plans
401(k) with company match
Paid parental leave and flexible time off
A hybrid work model that balances collaboration with flexibility
Salary Range: $170,000 - $250,000. This excludes discretionary bonuses or equity grants, which are determined based on experience, skills, and market standards.
Blizzard Entertainment is committed to building diverse teams that reflect the communities we serve. We are an equal opportunity employer and do not discriminate based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or veteran status. If you require accommodation, please reach out to our People Team.
Application Security Engineer
Cyber security analyst job in Manhattan Beach, CA
WHO WE ARE:
Headquartered in Southern California, Skechers-the Comfort Technology Company -has spent over 30 years helping men, women, and kids everywhere look and feel good. Comfort innovation is at the core of everything we do, driving the development of stylish, high-quality products at a great value. From our diverse footwear collections to our expanding range of apparel and accessories, Skechers is a complete lifestyle brand.
ABOUT THE ROLE:
Skechers is seeking a passionate Application Security Engineer to join our team and serve as a security champion who bridges the gap between development and security operations. This role is critical to strengthening our security posture by embedding security practices throughout the software development lifecycle and fostering a security-first culture across our development teams.
The ideal candidate will be a hands-on security professional who thrives on collaboration, enjoys mentoring developers, and has the technical expertise to identify vulnerabilities while providing practical remediation guidance. You will play a pivotal role in scaling our application security program and ensuring our applications are secure by design.
WHAT YOU'LL DO:
Successfully integrate security practices into development workflows, resulting in measurable reduction of security vulnerabilities in production applications
Conduct thorough security-focused code reviews that identify critical vulnerabilities while providing actionable feedback to development teams
Establish and implement efficient processes for triaging, prioritizing, and tracking remediation of security findings with clear SLAs and accountability measures
Enhance developer engagement through proactive security awareness initiatives, building trusted relationships that enable developers to implement secure coding practices throughout the development process.
Assist with management and optimization of SAST, DAST, OSS, WAF, and other application security tools to maximize coverage and minimize false positives
Provide analysis and support as needed during security incidents to contribute to faster resolution times
WHAT YOU'LL BRING:
Proficiency with application security tools including SAST, DAST, dependency scanning, and WAF technologies
Strong understanding of common web application vulnerabilities (OWASP Top 10) and secure coding practices
Experience with at least one programming language (Java, Python, JavaScript, C#, or similar)
Knowledge of API security, authentication mechanisms, and authorization frameworks
Familiarity with DevSecOps practices and CI/CD pipeline integration
REQUIREMENTS:
3-5 years of hands-on application security experience with demonstrated expertise in secure code review
Retail or e-commerce experience a plus
The pay range for this position is $110,000-$155,000/yr USD.
Security Architect GCP
Cyber security analyst job in Sunnyvale, CA
Security Architect / Implementation Engineer
Duration: 6 Months contract with possibility of extension
We are seeking a highly skilled Security Architect / Security Implementation Engineer with expertise in designing, implementing, and integrating Google Cloud Security Command Center (SCC), Chronicle SIEM, and Cybereason XDR. The candidate will be responsible for architecting the end-to-end solution, implementing GCP native security controls, integrating third-party security tools, and producing detailed design and operational documentation.
Key Responsibilities:
Design and architect cloud-native security controls in GCP aligned with security and compliance frameworks (CIS, ISO 27001, NIST, etc.).
Implement Google Security Command Center (SCC) for threat detection, vulnerability management, and risk insights.
Architect and configure Chronicle SIEM for log ingestion, correlation, and advanced threat analytics.
Integrate Cybereason XDR with SCC, Chronicle, and other security tools to establish end-to-end threat detection and response workflows.
Define use cases, rules, policies, and security playbooks to automate detection and response.
Document the solution architecture, design decisions, configuration standards, and integration workflows.
Conduct knowledge transfer sessions with security operations and support teams.
Collaborate with GCP Cloud Platform teams, SOC teams, and compliance teams to align solutions with enterprise policies.
Required Skills & Experience:
8-12 years of overall IT security experience with at least 4-5 years in Google Cloud Security.
Proven experience with Google Security Command Center (SCC), Chronicle SIEM, and XDR platforms (Cybereason preferred).
Strong knowledge of GCP IAM, VPC Service Controls, Cloud Armor, DLP, Cloud Logging, Cloud Monitoring.
Hands-on experience in integrating SIEM, XDR, and native GCP security tools.
Experience with Terraform, Deployment Manager, or automation frameworks for security deployment.
Strong documentation and presentation skills.
Security certifications preferred: Google Professional Cloud Security Engineer, GCP Professional Architect, CISSP, CISM, CCSP.
Security Architect
Cyber security analyst job in Santa Ana, CA
1. Security, Compliance and Audit Readiness
a. Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy.
b. Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies.
c. Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies.
d. Provide documentation and evidence for security audits and compliance reviews.
2. Implementation, Operations and Support
a. Serve as the hands-on engineer for network deployment, upgrades, and incident response.
b. Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints.
c. Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP).
3. SME Leadership and Staff Development
a. Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations.
b. Train, coach, and mentor internal IT staff, including junior and mid-level network technicians.
c. Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities.
d. Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff.
e. Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired.
4. Any other activities reasonably related to the foregoing, as assigned by OCSD.
Infrastructure & Information Security Architect
Cyber security analyst job in Industry, CA
We don't just offer jobs; we cultivate careers. Become part of our dynamic team of professionals and experience what it means to truly be valued. We're passionate about empowering our associates to reach their full potential, fostering growth, and celebrating success together.
When you join Sigma, you're stepping into a fast-growing, innovative global food organization that's redefining excellence in the industry.
Are you ready to elevate your career? Come join our table!
Position Summary
Responsible for designing, implementing, supporting and administering the IT infrastructure and information security applications. Analyzes system requirements and defines system architecture that will meet business needs, including server infrastructure, capacity planning, storage requirements and networking protocols.
Essential Job Functions
Responsible for designing and implementing information systems that will adequately support the infrastructure of the organization.
Examines system requirements and system architecture and provides new processes/standards that will meet business needs, including server infrastructure, capacity planning, storage requirements, and networking protocols.
Ensures that architecture project roll-outs meet security standards and are effectively integrated with current applications.
Completes tasks designed to ensure security of the organization's systems and information assets.
Protects against unauthorized access, modification, or destruction and develops IT security policies and standards.
Authorize user access and familiar with domain structures and digital signatures.
Oversees and guides the work of lower-level IT personnel or other IT teams.
Develops, implements and maintains policies, procedures, and programs for ensuring the security and integrity of company data, databases, information systems, and technology.
Conducts risk management analysis and creates business continuity, contingency, and disaster recovery plans.
Leads the development, update, and execution of Business Continuity Plans for systems and data within Enterprise Data.
Develops and executes the testing processes utilized to validate the disaster recovery plans and to identify weaknesses and failure points in the plans.
Works on advanced, complex technical projects or business issues.
Other duties as assigned.
Minimum Qualifications
Associate degree in Computer Science, Computer Engineering, Technology, Information Systems or equivalent work experience.
Eight years of infrastructure or security architecture.
Experience in enterprise and security architecture.
Experience on day to day IT operation management.
Experience on Data Center environments.
License/Certifications: N/A
Preferred Qualifications
Formal training ITIL, COBIT, or Microsoft certification.
Project Management certification.
Knowledge, Skills & Abilities (KSA's)
Knowledge on consolidation of Active Directory environments on a medium to large company.
Strong technical knowledge across infrastructure and security services support.
Working understanding of Active Directory structure (e.g. GPOs).
Working understanding of Agile and RACU Frameworks.
Understand industry threats and the methods to apply appropriate controls.
Knowledge of PowerShell and other automation methods.
Understanding of server hardening.
Proficient with Microsoft Office, including skills with Outlook, Word and Excel.
Ability to lead and effectively communicate with technical and non-technical staff across multiple disciplines and levels of the organization.
Ability to identify complex problems, review information to develop and evaluate options then implement solutions.
Environmental/Working Conditions
N/A
Physical Requirements
Usual office environment with frequent sitting, walking, and standing, and occasional climbing, stooping, kneeling, crouching, crawling, and balancing. Frequent use of eye, hand, and finger coordination enabling the use of office machinery. Oral and auditory capacity enabling interpersonal communication as well as communication through automated devices such as the telephone.
Alibaba Cloud-Network Security SRE-Sunnyvale
Cyber security analyst job in Sunnyvale, CA
The pay range for this position at commencement of employment is expected to be between $104,400 and $171,000/year. However, base pay offered may vary depending on multiple individualized factors, including market location, job-related knowledge, skills, and experience. If hired, employee will be in an "at-will position" and the Company reserves the right to modify base salary (as well as any other discretionary payment or compensation program) at any time, including for reasons related to individual performance, Company or individual department/team performance, and market factors.
We are Alibaba Cloud's Network and Application Security R&D Team, specializing in the research, development, operations, and management of foundational network security and application security. Our core mandate revolves around advancing the capabilities of DDoS Protection, Web Application Firewall (WAF), and Cloud Firewall solutions. As a young, dynamic team with deep technical expertise and R&D excellence, we deliver robust network traffic security and application security services to users, committed to safeguarding their network infrastructure and application-layer security. Core Responsibilities: System Construction and Maintenance ●Deploy, monitor, and maintain cloud security product systems (including foundational services, operation platforms, consoles, and security components such as cloud firewalls, DDoS protection, and WAF), ensuring high availability and security. ● Participate in disaster recovery and circuit breaker drills for high-availability systems to enhance stability and risk resilience. Product Release and Management ● Lead the release of cloud security foundational services and core network security products, conduct independent operational testing, and ensure post-launch stability and performance. Operational Observability Management ●Configure and manage hardware/software monitoring systems (e.g., Prometheus) for 24/7 real-time monitoring and rapid response, ensuring timely issue detection and resolution. Automated Operations Development ● Design and develop automated operation and maintenance tools/platforms to improve efficiency, reduce manual intervention, and optimize system performance. Service Support and Troubleshooting ● Monitor system logs, independently troubleshoot application issues, propose solutions, and collaborate with R&D teams for fixes and validation. Capacity Planning and Budget Management ● Develop annual capacity plans and budgets based on product usage and scaling needs, ensuring rational resource allocation and utilization.
Cyber Palo Alto Networks Security Operations Senior Consultant
Cyber security analyst job in Fresno, CA
Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success.
Recruiting for this role ends on 12/31/25
The team
Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions.
Work You'll Do
+ Lead the design and deployment of Next-Generation SOC platforms, like Cortex XSIAM, including advanced detection rules and SOAR playbooks, and SIEM ingestion.
+ Integrate diverse log and telemetry sources, ensuring data quality and normalization.
+ Develop and optimize automated response workflows for incident containment and remediation.
+ Advise clients on advanced use cases, threat detection, and automation strategies.
+ Collaborate with cross-functional teams for solution enhancements and threat intelligence integration.
+ Present technical findings and recommendations to stakeholders.
Required Qualifications
+ BA/BS degree in a technical field (e.g., Computer Science, Cyber Security)
+ 4-6 years of progressively responsible experience in cloud, network, or identity security domains, demonstrating increasing levels of responsibility, technical depth, and leadership over time
+ 3-4 years of experience with Security Operations tools and platforms including Cortex XSIAM, Cortex XDR, Splunk, or similar SIEM technologies
+ 3-4 years of Security Operations Center experience demonstrating expertise in detection engineering, automation and playbook development, or SOC maturity methodologies
+ 3-4 years of experience with one or more cloud service providers (AWS, GCP, Azure) and native security tools
+ 3-4 years of experience with management of log sources, data normalization, ingestion and manipulation of data
+ 3-4 years of experience working with detection and response platforms (EDR) like Microsoft Defender, Cortex XDR, CrowdStrike
+ 3-4 years of experience with governance, risk, or compliance initiatives involving common frameworks
+ Certifications including Palo Alto Networks' PCNSE or Certified Cybersecurity Associate or equivalent and/or similar cybersecurity certifications
+ Ability to travel up to 50%, on average, based on the work you perform and the clients and industries/sectors you serve.
+ Limited immigration sponsorship may be available
Preferred Qualifications
+ Experience with Palo Alto Networks' platform of solutions including, but not limited to, next-generation firewalls, Cortex & Prisma Cloud, and Prisma Access, XDR, etc.
+ Strong understanding of vendor competitive analysis within Security Operations (e.g., competitive differences between competing SIEM solutions)
+ Proficiency with advanced scripting, playbook development within a SIEM, SOAR or Security platform
+ Basic proficiency with network routing protocols (e.g., BGP, ECMP) and network architecture concepts (e.g., network segmentation), in support of on-premise and secure cloud infrastructure use cases
+ Ability to communicate and advise on solution design based on client use-cases, requirements, or other success criteria
+ Previous consulting or "Big 4" experience
+ Relevant advanced cybersecurity or related network engineering certifications (e.g., CISSP, CEH, CCSP)
Information for applicants with a need for accommodation: ************************************************************************************************************
The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500 - $188,900.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
Cyber Security Engineer
Cyber security analyst job in San Francisco, CA
About the Company
Atomus' mission is to provide world class cybersecurity for the world's most critical organizations. We build security compliance software delivered as managed services sold directly, with relevant professional services and support. Examples of our commercial customers include hypersonic aircraft companies, satellite and space mission systems companies, AI and software companies, among many other companies serving primarily the aerospace and defense industry. At Atomus we are hardworking, we move fast, and we put our customers first.
About the Role
As a Cybersecurity Engineer will work closely with customers to help them implement and fully leverage Atomus' cybersecurity products, maintain compliance with NIST 800-171 and CMMC cybersecurity standards, and solve technical challenges. Our customers depend on Atomus to manage and secure their Windows, MacOS, Ubuntu, iOS, Android devices, and Firewalls while ensuring compliance. We aim to provide the best possible support when they have questions. Our team's main goal is to simplify our customers' lives, for compliance and security. You will serve as the voice of the customer by sharing their feedback and insights with our product team and reporting any issues to our software engineers. We take pride in delivering amazing experiences for our customers.
Responsibilities
Manage and guide new customers through the onboarding process, ensuring proper setup, configuration, and alignment with their security programs and establishing baseline compliance requirements of NIST 800-171 and CMMC while performing technical tasks/project management required for onboardings.
Serve as the first point of contact for technical inquiries, providing debugging, troubleshooting, and solutions for technical IT/security issues related to the Atomus platform.
Work closely with internal teams (sales, product, engineering) along with partners/vendors for customer requirements to communicate customer feedback and advocate for customer needs in product development and rolling out 3rd party products.
Assist customers in managing and maintaining NIST 800-171 and CMMC compliance requirements, ensuring IT documentation is updated and maintained.
Required Skills
Experience in a customer-facing technical role, IT administrator, solutions engineer, Technical Customer Success, or TAM role preferably in cybersecurity or compliance.
Strong experience with cybersecurity frameworks and technologies (e.g., NIST, CMMC, firewalls, routers, encryption tools).
Intermediate networking knowledge of WAN and LAN connectivity, routers, firewalls, switches, security, etc.
Experience with Microsoft Intune, Active Directory, Windows, MacOS and ABM, as well as mobile platforms like Android and iOS.
Advanced understanding of Microsoft products (Exchange, SharePoint, Windows, Windows Server, Active Directory, etc.).
Familiarity with command-line tools (e.g., PowerShell, Terminal) for troubleshooting and deployment.
Strong troubleshooting skills, particularly related to network security, software issues, and IT environments.
Excellent verbal and written communication skills; ability to explain complex topics to both technical and non-technical audiences.
Applicants must have strong emotional intelligence to intuit and match customer sentiment for effective communication.
Preferred Skills
Prior experience with NIST 800-171, CMMC, or other compliance standards.
Ability to manage multiple customer accounts and onboarding projects simultaneously.
Familiarity with CRM platforms (HubSpot), and compliance documentation tools while managing SLAs which include customer satisfaction, initial response, and issue resolution times.
Cybersecurity risk security analyst
Cyber security analyst job in Fremont, CA
We are seeking a Cybersecurity Risk Analyst to support managing and mitigating security risks across processes, technologies, and cloud environments.
The ideal candidate will combine technical expertise, business acumen, and cybersecurity experience to advise partners, assess risks, and drive improvements in secure operations.
This role requires hands on experience with Kusto Query Language (KQL), cloud security, and risk assessment, as well as the ability to communicate effectively with stakeholders at all levels.
Must be local to San Francisco or Los Angeles (LA) or Salt Lake City (SLC).
Responsibilities:
Support risk strategies by identifying and mitigating security risks in bank systems and processes.
Apply and interpret security policies, provide guidance and input on policy enhancements.
Advise business and technical partners on security controls, procedures, and best practices.
Assess cloud and on-prem environments to identify risks and recommend control improvements.
Conduct security control assessments, document findings, and develop actionable remediation plans.
Evaluate third-party vendors to determine shared security responsibilities and associated risks.
Communicate security risks and mitigation strategies effectively to technical teams and executives.
Collaborate across teams to drive secure operations and deliver results in a fast-paced environment.
Qualifications:
Bachelor's degree in Cybersecurity, Information Security, Computer Science, or related technical discipline (or equivalent experience).
3+ years of experience in cybersecurity, information security, or technology risk management.
Proficiency in Kusto Query Language (KQL) for data analysis, log correlation, and threat detection.
In-depth understanding of security frameworks such as NIST, ISO 27001, or FedRAMP.
Demonstrated experience assessing and improving security posture across Cloud (Azure, AWS) and on-premises environments.
Proven ability to conduct security control assessments, identify risk exposures, and develop actionable remediation plans.
Skilled at translating technical security concepts into clear, business-relevant insights for stakeholders and executives.
Excellent communication, collaboration, and interpersonal skills, with a focus on building trusted partnerships across technical and business teams.
Strong organizational and analytical skills, with the ability to manage multiple initiatives in a fast-paced, results-driven environment.