Post job

Cyber security analyst jobs in Garden Grove, CA

- 193 jobs
All
Cyber Security Analyst
Security System Engineer
Information Security Analyst
Senior Security Analyst
Securities Analyst
Security Engineer
Information Security Engineer
Defense Analyst
Senior Cyber Security Analyst
  • Acquisition Security Analyst

    Mantech 4.5company rating

    Cyber security analyst job in Los Angeles, CA

    MANTECH seeks a motivated, career and customer-oriented Acquisition Security Analyst II to join our team in El Segundo, CA. The Acquisition Security Analyst II will assist the Government Program Manager with the development and implementation of comprehensive program protection methodologies to protect advanced technology programs throughout the system's lifecycle. Responsibilities include but are not limited to: In-depth lifecycle program analysis to identify critical program information (CPI), Critical System Resources (CSR), and their associated vulnerabilities. Assist with the identification and implementation of countermeasures. Develop and implement a risk management-based program protection plan and strategy. Provide security recommendations to the PM, GSSO, and cognizant security authorities as to the Air Force acquisition and sustainment process. Maintain a working relationship with the PM, Contracting Officer and contractor security officers to ensure a standardized and correct format/process is utilized for all DD Form 254 efforts throughout the acquisition and sustainment lifecycle, in coordination with Program Security Officers. Conduct analysis of foreign intelligence threats against programs involving customer's critical research, sensitive technologies or CPI. Prepare and produce analytical products from numerous resources, to include various databases, to ensure a real-time, tailored product is provided. Write, review, and/or edit Security Classification Guides (SCG), Exposure Contingency Plans (ECP), Managed Access Plans (MAP), Security Operating Procedures (SOPs), System Test Plans (STP) Provide technical analysis and OPSEC support to SMC or AFSPC Special programs and other associated operations, missions, and organizational elements involved in developing system requirements to associated systems RDT&E. Minimum Qualifications: Bachelor's degree in a related area; an additional 4 years of related experience might be considered for a degree. 10+ years of related experience with acquisition programs 6+ years of experience with SCI programs. Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents. Must have extensive knowledge of the DD Form 254 and how it is incorporated in the Air Force acquisition process. Willingness to travel within the scope of the Program's Area of Responsibility (AOR) (note- could be extensive, and will include both air and ground transportation) Preferred Qualifications: 4+ years of experience with SAR program acquisitions desired. Working knowledge of Microsoft Office (Word, PowerPoint, and Excel) Possess a high degree of originality, creativity, initiative requiring minimal supervision. Have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners. Security Clearance: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Program Information Willingness to submit to a polygraph. Physical Requirements: Must be able to remain in a stationary position 50%. Needs to occasionally move about inside the office to access file cabinets, office machinery, etc. Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer. Frequently communicates with co-workers, management and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
    $67k-89k yearly est. 2d ago
  • Cyber Security Analyst

    Insight Global

    Cyber security analyst job in Irvine, CA

    Required Skills & Experience: Bachelor's degree in a related field preferred but not required. 5+ years of experience in a SOC or similar security environment. Expertise with SIEM, EDR, CSPM tools; strong skills in SQL/KQL/Cypher for data analysis. Proven ability to lead complex investigations and coordinate across technical and business stakeholders. Solid understanding of cybersecurity frameworks (MITRE ATT&CK, NIST CSF, NIST SP800-61r3). Experience with log aggregation technologies and SIEM tuning processes. Job Description: A large financial services customer based in Irvine, CA is seeking a Cyber Security Operations Analyst, focused on Incident Response. This individual will lead Incident Response, and act as a technical expert within the SOC. This team protects the organization from cyber threats. This role requires strong analytical skills, leadership in high-severity incidents, and deep knowledge of security tools and frameworks. Pay: 50-65/hr
    $81k-114k yearly est. 5d ago
  • IT Security and Network Engineer

    JM Eagle 4.6company rating

    Cyber security analyst job in Los Angeles, CA

    IT Security & Network Engineer - JM Eagle Los Angeles, CA | Onsite 4 Days / Remote Fridays | $150,000 - $170,000 + Comprehensive Benefits About Us JM Eagle is the world's largest manufacturer of plastic pipe, providing the infrastructure that keeps communities connected across North America. Behind every operation is a secure, stable IT environment supporting 1,000+ users across 20+ locations. We're strengthening that foundation - and seeking a hands-on IT Security & Network Engineer who can own our daily security operations and help modernize our network and cybersecurity posture. This is a high-impact, individual contributor role for a senior engineer who thrives in both the strategic and technical trenches. The Opportunity This role is ideal for a seasoned IT security professional who wants broad ownership without stepping into management. You'll work closely with the Director of IT Operations and outsourced partners to secure our enterprise, harden our infrastructure, and enhance our cybersecurity frameworks. Your time will be split approximately: 60% Cybersecurity: tools, monitoring, vulnerability management, incident response 40% Network Engineering: SD-WAN, firewalls, VPN, wireless, connectivity across 20+ sites You will be the technical driver behind our security improvement roadmap. What You'll Do Cybersecurity Operations Own day-to-day cybersecurity operations, including monitoring, threat response, and risk mitigation. Manage security tools and platforms: endpoint protection, SIEM, MFA, SSO, VPN, firewalls, and vulnerability management tools. Perform recurring vulnerability scans and penetration-testing coordination; track and validate remediation. Monitor security alerts using Fortinet, Darktrace, CrowdStrike, Nessus, Microsoft Defender, etc. Lead internal security awareness initiatives and social engineering simulations. Maintain documentation for configurations, policies, and security processes. Network Engineering Support secure network architecture across 20+ locations. Oversee SD-WAN, firewall policies, VPN configuration, internet filtering, and remote-access security. Support wireless infrastructure, site connectivity, and network performance monitoring. Partner with third-party providers to ensure uptime, reliability, and strong security posture. Governance & Collaboration Work with IT leadership to strengthen cybersecurity governance and reporting. Contribute to incident response planning, tabletop exercises, and monthly security briefings. Evaluate threats and emerging technologies; propose continuous improvements. What You Bring Bachelor's degree in Computer Science, Information Systems, or equivalent experience. 8+ years of experience in IT security and network engineering supporting 1,000+ users across distributed sites. 4+ years of hands-on experience with enterprise security tools and platforms. Deep experience with the Microsoft ecosystem: Azure, M365, Active Directory / Entra ID, SCCM / Intune. Strong working knowledge of: MFA, SSO, VPN Endpoint protection SIEM solutions Network segmentation, encryption, hardening Monitor and respond to security alerts using tools like Fortinet, Darktrace, CrowdStrike, Nessus, and Microsoft Defender. Familiarity with SD-WAN architectures, wireless networking, and network monitoring tools. Understanding of ITIL, ITSM, NIST frameworks; CISSP or similar preferred but not required. Excellent communication skills with the ability to work across teams. Comfort managing outsourced security and network service providers. A highly proactive, self-starting approach - someone who solves problems end-to-end. Why JM Eagle Directly influence and modernize the cybersecurity posture of the world's largest pipe manufacturer. Join an enterprise undergoing major IT transformation with full executive backing. Work with a Microsoft-centric environment supporting 1,000+ users and 20+ distributed locations. Competitive salary: $150K-$170K + bonus + excellent benefits. 4 days onsite in Los Angeles; remote Fridays. Work Environment Primarily a professional headquarters environment. Occasional travel to manufacturing and distribution facilities may be required. Some exposure to plant or outdoor areas during site visits.
    $150k-170k yearly 5d ago
  • Security Analyst

    Robert Half 4.5company rating

    Cyber security analyst job in Los Angeles, CA

    We are seeking an Information Security Analyst to support enterprise security operations with a focus on vendor risk management, security control integration, and infrastructure security. This role is responsible for conducting security assessments, coordinating the implementation of core security services (including SSO, logging, IAM, and data protection), and supporting compliance activities aligned with frameworks such as NIST and ISO 27001. The ideal candidate has experience in cybersecurity risk management, cloud environments (AWS/Azure), and collaborating with technical teams to ensure the effective delivery of security controls. At least 2+ years of experience in the following: Security & Compliance Frameworks NIST CSF ISO 27001 CIS Controls ITIL SOC 2 PCI DSS FedRAMP GDPR / CCPA Vendor Risk & GRC Tools OneTrust SIG (Standardized Information Gathering) Other GRC/TPRM platforms Identity, SSO & Access Management SSO (PingFederate, SAML) Active Directory Azure AD AWS IAM
    $74k-112k yearly est. 3d ago
  • Staff Blockchain Security Engineer

    Blizzard Entertainment 4.6company rating

    Cyber security analyst job in Irvine, CA

    About the Company: Blizzard Entertainment, a global leader in interactive entertainment, has been shaping the world of video games since its founding. Renowned for iconic franchises like World of Warcraft , Overwatch , and Diablo , Blizzard is dedicated to creating immersive, innovative, and high-quality gaming experiences that captivate millions of players worldwide. Our mission is to inspire and connect players through engaging gameplay, compelling storytelling, and vibrant online communities. As we continue to expand our reach in the gaming industry, we remain committed to pushing the boundaries of creativity, technology, and entertainment. The Role: Staff Blockchain Security Engineer Blizzard's Application Security (AppSec) team is entrusted with safeguarding the company and its players from software vulnerabilities and security threats. As a Staff Blockchain Security Engineer within AppSec, you will specialize in securing blockchain-based game features, in-game economies, and Web3 integrations. You'll collaborate closely with game development and engineering teams to provide guidance, perform security assessments, and implement best practices throughout the blockchain software lifecycle. This role requires in-person collaboration two days per week at our Irvine, California headquarters. Key Responsibilities: Conduct comprehensive security reviews of blockchain integrations, smart contracts, in-game economy systems, and Web3 features for vulnerabilities and architectural flaws Advise game development teams on secure blockchain practices and remediation strategies Establish and maintain secure development processes within the blockchain software lifecycle Develop, maintain, and improve blockchain-specific security tooling (e.g., fuzzers, static analysis frameworks) Collaborate with legal, compliance, and risk teams to evaluate security, operational, and regulatory risks of blockchain implementations Minimum Qualifications: 8+ years in application security, Web3 security, or related disciplines Proven experience auditing smart contracts, blockchain protocols, or Web3 applications Expertise in design reviews, threat modeling, secure code review, or penetration testing with a hacker mindset Strong knowledge of application security principles and common vulnerabilities (e.g., SSRF, race conditions, privilege escalation) Experience with secure key management, wallet systems, or cryptography Familiarity with blockchain security tools such as Slither, Echidna, or similar Scripting or programming experience in Python, C++, JavaScript, or other relevant languages Ability to balance business goals with security priorities and communicate risks clearly to cross-functional teams Preferred Qualifications: Experience in formal verification of smart contracts Background in blockchain-enabled gaming, DeFi platforms, or NFT ecosystems Contributions to blockchain security communities, bug bounty programs, or published research Experience defining and executing long-term blockchain security strategies alongside engineering leadership Why Blizzard? Competitive base salary and discretionary annual bonus Equity opportunities and long-term incentives Comprehensive health, dental, and vision plans 401(k) with company match Paid parental leave and flexible time off A hybrid work model that balances collaboration with flexibility Salary Range: $170,000 - $250,000. This excludes discretionary bonuses or equity grants, which are determined based on experience, skills, and market standards. Blizzard Entertainment is committed to building diverse teams that reflect the communities we serve. We are an equal opportunity employer and do not discriminate based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or veteran status. If you require accommodation, please reach out to our People Team.
    $170k-250k yearly 1d ago
  • Application Security Engineer

    Skechers 4.0company rating

    Cyber security analyst job in Manhattan Beach, CA

    WHO WE ARE: Headquartered in Southern California, Skechers-the Comfort Technology Company -has spent over 30 years helping men, women, and kids everywhere look and feel good. Comfort innovation is at the core of everything we do, driving the development of stylish, high-quality products at a great value. From our diverse footwear collections to our expanding range of apparel and accessories, Skechers is a complete lifestyle brand. ABOUT THE ROLE: Skechers is seeking a passionate Application Security Engineer to join our team and serve as a security champion who bridges the gap between development and security operations. This role is critical to strengthening our security posture by embedding security practices throughout the software development lifecycle and fostering a security-first culture across our development teams. The ideal candidate will be a hands-on security professional who thrives on collaboration, enjoys mentoring developers, and has the technical expertise to identify vulnerabilities while providing practical remediation guidance. You will play a pivotal role in scaling our application security program and ensuring our applications are secure by design. WHAT YOU'LL DO: Successfully integrate security practices into development workflows, resulting in measurable reduction of security vulnerabilities in production applications Conduct thorough security-focused code reviews that identify critical vulnerabilities while providing actionable feedback to development teams Establish and implement efficient processes for triaging, prioritizing, and tracking remediation of security findings with clear SLAs and accountability measures Enhance developer engagement through proactive security awareness initiatives, building trusted relationships that enable developers to implement secure coding practices throughout the development process. Assist with management and optimization of SAST, DAST, OSS, WAF, and other application security tools to maximize coverage and minimize false positives Provide analysis and support as needed during security incidents to contribute to faster resolution times WHAT YOU'LL BRING: Proficiency with application security tools including SAST, DAST, dependency scanning, and WAF technologies Strong understanding of common web application vulnerabilities (OWASP Top 10) and secure coding practices Experience with at least one programming language (Java, Python, JavaScript, C#, or similar) Knowledge of API security, authentication mechanisms, and authorization frameworks Familiarity with DevSecOps practices and CI/CD pipeline integration REQUIREMENTS: 3-5 years of hands-on application security experience with demonstrated expertise in secure code review Retail or e-commerce experience a plus The pay range for this position is $110,000-$155,000/yr USD.
    $110k-155k yearly 1d ago
  • Cyber Security

    Forhyre

    Cyber security analyst job in Los Angeles, CA

    Job Description Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients. Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. Responsibilities: Engineer, implement and monitor security measures for the protection of computer systems, networks and information Develop and implement security policies and controls to support the Cyber Security framework Manage the existing cyber security training program across global, multilingual business Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity Continuous improvement in the areas of Information Security technologies, techniques and processes Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard Ability to interpret penetration test results and describe issues and fixes to non-security expert Responsible for leading an accurate & comprehensive status reporting to the executive steering committee Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap Skills & Experience Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree. Certified Information Systems Security Professional (CISSP) 8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology. Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment. Vulnerability Assessment testing and/or Penetration Testing (preferred) Robotic Process Automation/Intelligent Automation (preferred) Business case development supporting security technology solutions (preferred) Additional certifications demonstrating cybersecurity/technical mastery (preferred)
    $82k-116k yearly est. 23d ago
  • Principal/ Sr. Principal Industrial Security Analyst (level 3/4)

    Northrop Grumman 4.7company rating

    Cyber security analyst job in Los Angeles, CA

    At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history. Put your skills to the test by pushing the boundaries of what's possible. From global defense to sustainment and modernization to mission readiness, your experience and ability will make it a reality. Our programs are built on equal parts of curiosity and collaboration. Our combined effort means our customers can connect and defend millions of people around the world. With Northrop Grumman, you'll have the opportunity to be an essential part of projects that will define your career, now and in the future. Northrop Grumman Defense Systems is seeking an Principal or Sr. Principal Industrial Security Analyst (3/4) for our Northridge, CA location. **Roles and Responsibilities:** + Develops and administers physical security programs and procedures for classified or proprietary materials, documents, and equipment. Studies and implements federal security regulations that apply to company operations + Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies + Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials + Conducts security education classes and security audits + Ensures security compliance as a CSSO in accordance with DoDM 5205.07 + Responsible for offsite and subcontractor security standups and posture **ISA duties will include:** + CSSO for offsite and subcontractor sites associated with the program + Support a fast-paced, high-profile program; creating, maintaining, and leveraging working relationships with internal and external customers + Study and implement company and federal security policies, regulations, and procedures that apply to company operations + Obtain rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies + Manage program security compliance and operations across multiple functions, including security SCIF and/or SAPF administration, PHYSEC, COMSEC, PERSEC, OPSEC, Contract Security, Security Education, Investigations, Visitor Control, and Document Control Management + Develop and implement a security education and awareness program + Conduct internal security audits. Investigate security violations and prepare reports specifying preventive action to be taken + Ensure adherence to contractual guidance for classified programs and cleared facilities in accordance with the Security Statements of Work, DD Form 254, DoD Contract Security Classification Specifications guidance + Assist program managers and professional staff in interpreting, applying, and complying with program Security Classification Guides (SCG) + Provide personnel security (PERSEC) support to include but not limited to reviewing and processing required documentation in support of SCI and SAP nomination processes; maintain PERSEC databases; prepare and administer program indoctrination and debriefings; access, review, and submit clearance and access information using the appropriate government database and other information systems + Provide facility security administration, documentation, and support: implement Standard Operating Procedures (SOP); conduct SCI and SAP security program self-inspections + Provide security support for Sensitive Compartmented Information Facility (SCIF) and Special Access Program Facility (SAPF) build construction projects to include obtaining customer accreditation in accordance with SCI and SAP DoD Manuals, ICD, ICS Tech Spec, and other government requirements + Manage and maintain UL-2050 Compliant Intrusion Detection Systems (IDS) and automated Access Control Systems (ACS) + Other duties as assigned **Basic Qualifications:** **Principal Industrial Security Analyst (level 3)** + Must have a high school diploma or GED with at least 9 years of related experience; OR 5 year of experience with a bachelor's degree + Experience with any of the following: Government manuals (32 CFR Part 117, NISPOM, DODM 5205.07, etc.) + Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint) + Excellent customer service and communication skills + Must have an active Secret clearance + Ability to maintain flexibility to deal with changing priorities and deadlines. + Ability to work extended hours, in a fast paced, deadline driven environment, excellent communication skills speaking, writing skills and organized skills enabling effective communications + CSSO Experience + Ability to travel **Basic Qualifications:** **Sr. Principal Industrial Security Analyst (level 4)** + Must have a high school diploma or GED with at least 12 years of related experience; OR 8 year of experience with a bachelor's degree + Experience with any of the following: Government manuals (32 CFR Part 117, NISPOM, DODM 5205.07, etc.) + Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint) + Excellent customer service and communication skills + Must have an active Secret clearance + Ability to maintain flexibility to deal with changing priorities and deadlines. + Ability to work extended hours, in a fast paced, deadline driven environment, excellent communication skills speaking, writing skills and organized skills enabling effective communications + CSSO Experience + Ability to travel **Preferred Qualifications:** + Experience Leading Security Teams from Subcontractors and Offsite + Ability to work independently and follow projects through to completion. + Current Top-Secret clearance + Self-starter with minimal supervision + Security experience in a manufacturing environment + Supply Chain Security Experience Primary Level Salary Range: $94,200.00 - $141,200.00 Secondary Level Salary Range: $117,500.00 - $176,300.00 The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business. The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates. Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
    $117.5k-176.3k yearly 28d ago
  • Cyber Defense Forensics Analyst

    EY Studio+ Nederland

    Cyber security analyst job in Los Angeles, CA

    At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all. The exceptional EY experience. It's yours to build. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. Today's world is fuelled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust. Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value. The opportunity Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process. Your key responsibilities Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified Forensically analyze end user systems and servers found to have possible indicators of compromise Analysis of artifacts collected during a security incident/forensic analysis Identify security incidents through ‘Hunting' operations within a SIEM and other relevant tools Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions Provide consultation and assessment on perceived security threats Maintain, manage, improve and update security incident process and protocol documentation Regularly provide reporting and metrics on case work Resolution of security incidents by identifying root cause and solutions Analyze findings in investigative matters, and develop fact based reports Be on-call to deliver global incident response Skills and attributes for success Resolution of security incidents by identifying root cause and solutions Analyze findings in investigative matters, and develop fact-based reports Proven integrity and judgment within a professional environment Ability to appropriately balance work/personal priorities To qualify for the role you must have Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field 5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering; Understanding of security threats, vulnerabilities, and incident response; Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis; Be familiar with legalities surrounding electronic discovery and analysis; Experience with SIEM technologies (i.e. Splunk); Deep understanding of both Windows and Unix/Linux based operating systems; Ideally, you'll also have Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH Background in security incident response in Cloud-based environments, such as Azure Programming skills in PowerShell, Python and/or C/C++ Understanding of the best security practices for network architecture and server configuration What we look for Demonstrated integrity in a professional environment Ability to work independently Have a global mind-set for working with different cultures and backgrounds Knowledgeable in business industry standard security incident response process, procedures, and life cycle Excellent teaming skills Excellent social, communication, and writing skills What we offer you The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary range/s. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more. We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being. Are you ready to shape your future with confidence? Apply today. EY accepts applications for this position on an on-going basis. For those living in California, please click here for additional information. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities. EY | Building a better working world EY is building a better working world by creating new value for clients, people, society, and the planet, while building trust in capital markets. Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow. EY teams work across a full spectrum of services in assurance, consulting, tax, strategy, and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories. EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law. EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at **************************.
    $105.2k-186.4k yearly 60d+ ago
  • Sr. Cyber Security Operations Analyst

    Loandepot 4.7company rating

    Cyber security analyst job in Irvine, CA

    at loan Depot loan Depot's Security Operations team is at the forefront of cyber defense for the organization. We are seeking a Senior Security Analyst who will act as both a technical authority and front-line commander within our Security Operations Center. This is a strategic, high-impact role for a seasoned professional who can seamlessly integrate with our team on Day One, bringing the composure, knowledge, experience, and precision necessary to contain and eradicate cyber threats from our environment.Reporting directly to the Information Security Operations Manager, this position partners closely with our Level 1 MSSP, internal business units, and external incident response partners to ensure that every incident is managed with accountability, consistency, and efficiency. The ideal candidate is resourceful, quick-thinking, and deeply fluent with the leading security stacks and tools, capable of turning strands of data into decisive action and information. The Sr. Cyber SOC Analyst must be able to come into the Irvine, CA office 2-3 times per week. Responsibilities: Lead and execute end-to-end security incident response activities including detection and triage, containment, eradication, and recovery for incidents ranging from simple to complex. Serve as incident commander for high-severity security events, ensuring clear communication and timely resolution across stakeholders. Partner with Level 1 MSSP partners to validate escalations, refine detection logic, and ensure consistent handling workflows. Coordinate with external partners and internal teams to contain and mitigate threats while maintaining operational resilience. Detection, Analysis, & Threat Hunting Utilize industry standard and/or custom tools for telemetry to conduct deep-dive investigations and root cause analysis. Develop and optimize queries, analytic rules, and playbooks to enhance threat detection and automation, pushing incidents towards level 0 where possible. Conduct proactive threat hunts and adversary emulation exercises to identify emerging tactics, techniques, and procedures (TTPs) before they escalate into incidents. Leverage MITRE ATT&CK, NIST SP800-61r3, NIST CSF2, and other frameworks to ensure methodical and repeatable investigation practices. Operational Excellence & Leadership Document and refine incident response playbooks and runbooks to improve team consistency and speed. Produce detailed incident reports, post-incident reviews, and executive summaries with actionable insights. Mentor other analysts and emerging prospects, reinforcing our culture of accountability, consistency, and efficiency. Participate in weekly high-severity incident case reviews and contribute to the continuous improvement of SOC metrics and performance. Other duties as assigned. Requirements: Bachelor's Degree in a related field preferred, but not required. Minimum of five (5) + years' experience working in a security operations center or similar environment preferred. A demonstrated mastery of industry leading tools in SIEM, EDR, and CSPM. Expertise in querying, hunting, and correlating disparate data points across large telemetry datasets using SQL/KQL/Cypher. A demonstrated ability to lead complex investigations and coordinate across technical and business stakeholders. A solid understanding of cybersecurity frameworks such as MITRE ATT&CK, NIST CSF 2, NIST SP800-61r3. Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant narratives. Experience in log aggregation technologies and SIEM tuning processes. Experience in the Mortgage industry preferred. CISSP, GIAC Certified Incident Handler, or other related certifications preferred. Why work for #teamloan Depot: Competitive compensation based on skillset and relatable experience. Work with other passionate, purposeful, and customer-centric team members. Inclusive, diverse, and collaborative culture where people from all backgrounds can thrive. Extensive internal growth and professional development opportunities including tuition reimbursement. Comprehensive benefits package including Medical/Dental/Vision. Wellness program to support both mental and physical health. Discretionary Time Off (DTO) policy to support work-life balance in addition to Paid Voluntary Time Off. About loan Depot: loan Depot (NYSE: LDI) is a digital commerce company committed to serving its customers throughout the home ownership journey. Since its launch in 2010, loan Depot has revolutionized the mortgage industry with a digital-first approach that makes it easier, faster, and less stressful to purchase or refinance a home. Today, loan Depot enables customers to achieve the American dream of homeownership through a broad suite of lending and real estate services that simplify one of life's most complex transactions. With headquarters in Southern California and offices nationwide, loan Depot is committed to serving the communities in which its team lives and works through a variety of local, regional, and national philanthropic efforts. Base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay for this roles is between $99,000 and $136,000. Your base pay will depend on multiple individualized factors, including your job-related knowledge/skills, qualifications, experience, and market location. We are an equal opportunity employer and value diversity in our company. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
    $99k-136k yearly Auto-Apply 44d ago
  • Sr. Security Compliance Analyst

    TP-Link Corp 3.9company rating

    Cyber security analyst job in Irvine, CA

    Headquartered in the United States, TP-Link Systems Inc. is a leading global provider of networking devices and smart home products. Consistently ranked as the world's top provider of Wi-Fi devices, TP-Link is dedicated to delivering innovative solutions that improve people's lives by offering faster, more reliable connectivity. Serving customers in over 170 countries, we are committed to expanding our global footprint. At TP-Link Systems Inc., we believe that technology has the power to transform the world for the better. Our mission is to design reliable, high-performance products that connect users worldwide to the limitless possibilities of technology. We are driven by our core values of professionalism, innovation, excellence, and simplicity. Our goal is to help clients achieve outstanding global performance and to provide consumers with a seamless, effortless technology experience. TP-Link Systems Inc. is seeking a skilled and proactive Sr. Security Compliance Analyst who will be responsible for developing and overseeing TP-Link's enterprise security governance framework, ensuring compliance with regulatory requirements, industry standards, and internal policies. This individual will collaborate with cross-functional teams to embed security into business operations, manage risk, and enhance security resilience across TP-Link's enterprise ecosystem. Key Responsibilities: Security Governance & Policy Development * Develop, implement, and maintain security policies, standards, and guidelines aligned with industry best practices (e.g., NIST, ISO 27001, CIS). * Establish and lead a security governance framework to ensure consistent application of security controls across the enterprise. Risk Management & Compliance * Identify, assess, and mitigate security risks across TP-Link's global operations. * Ensure compliance with regulatory requirements such as GDPR, CCPA, NIST CSF, and other applicable cybersecurity frameworks. * Oversee security audits, risk assessments, and third-party security evaluations. * Partner with legal, IT, and business leaders to address security compliance gaps. Third-Party & Supply Chain Security * Develop and enforce security requirements for vendors, suppliers, and third-party partners. * Conduct security assessments of supply chain partners to identify and mitigate potential risks. Security Awareness & Training * Develop and lead security awareness programs to educate employees on cybersecurity risks and best practices. * Foster a security-first culture across all levels of the organization. * Provide guidance and training on security governance processes for internal stakeholders. Incident Response & Continuous Improvement * Support security incident response efforts by ensuring governance processes facilitate rapid detection and response. * Lead post-incident analysis to refine security policies and controls. * Monitor emerging threats, regulatory changes, and industry trends to evolve TP-Link's security governance strategies.
    $111k-150k yearly est. 1d ago
  • Systems Security Engineer II

    Cambro Manufacturing 4.4company rating

    Cyber security analyst job in Huntington Beach, CA

    The System Security Engineer Level II is required to be a highly skilled and hands-on security engineer, and will be responsible for helping to maintain and expand the infrastructure of the entire Cambro network, ensuring that they are protected from cyber threats and attacks, ensuring compliance, and responding to incidents. In this role, the responsibility is to manage, monitor, and maintain our Network IT infrastructure from CVEs, cyber threats, manage and implement device firmware and software updates. Also, the role is required to assist in projects and initiatives to support, upgrade, and maintain our technical environment to improve network security. The role requirement is to be proficient with cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. The role requires to have a multi-disciplined background including experience with Cybersecurity Operations, firewalls, IDS/IPS, switches, VLANs, routing protocols, IPsec, VPN tunnels, multi factor authentication and e-mail security. In addition, they must have a solid understanding of virtualized servers, Windows workstations and services. This role is required to have the network monitoring skills and technologies for detecting unusual activity, investigate security breaches and lead incidence response. ESSENTIAL JOB FUNCTIONS • Monitor network traffic for anomalies, investigate alerts and respond to security incidents. • Conduct regular vulnerability scans, risk assessments, patch management and mitigation across network devices. • Ensure adherence to cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. • Able to proactively scan servers and network devices for vulnerable ports and protocols and rogue devices. • Manage our firewall environment with the ability to create route policies and apply cybersecurity recommendations • Install and configure Network Equipment (Switches, Firewalls, and other networking hardware) • Perform (Layer 2) switch administration and configuration on Cisco/Ruckus switches. Including configuring LAGs, interfaces, creating trunks, creating, and managing segmented VLANs. • Possess a solid understanding of Windows Server services and roles including installation and configuration • Create certificates for network devices and servers that have a web management capability • A strong understanding of Windows Active Directory and can design, implement, and configure and troubleshoot Active Directory issues • Create, Manage and Deploy Group Policy Objects (GPO's) to deploy applications and implement security including windows firewalls • Effectively use PowerShell to automate and standardize administrative tasks • Capable of installing a Linux VM and execute basic Linux commands and managing Linux appliances • Manage our virtualized server environment managing, creating VM's and patching the VMware environment. • Strong understanding of Virtual Switches, Port Groups (Distributed and Standard) • Manage the Active Backup for Business on Synology and other advanced Synology administration features • Maintain and monitor Backup solutions. • Manage our users email accounts using the cloud service M365 from Microsoft • Responsible for creating and maintaining server and network documentation to include tasks and procedures • Proactively monitor our network using a variety of tools to help identify potential network and server issues • Assist in patching our entire infrastructure when needed using a variety of tools • Maintains strong technical abilities, knowledge of new and changing technologies • Prepare for emergencies by creating and/or updating action plans • Jumping into time-sensitive projects wherever needed • Showing flexibility and a willingness to learn • Maintain healthy communication with IT Staff, IT Customers and Vendors • Actively participate in IT Infrastructure and Operations projects, managing, completing, communicating, and fully documenting assigned tasks and deliverables. • Maintain reliable and consistent attendance, including being punctual, and dependable in order to meet the needs of the department and the organization. • Execute each essential duty satisfactorily to perform job successfully. • Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions. • Performs effectively as a team member, able to work well with others, open to receiving and give feedback, and treats everyone with respect. • Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects. • Follow all department quality standards/criteria. Raise concerns and issues to immediate manager. • Able to understand and demonstrate Cambro company culture, display company core values (Safety, Quality, Respect, and Service). • Understands department's key performance indicators and contributes to achieve these goals both individually and as a team. • Maintains reliable and consistent attendance, including being punctual, dependable, and flexible to potential schedule changes to meet the needs of the department and the organization. • Executes each essential duty satisfactorily to perform job successfully. • Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions. • Performs effectively as a team member, able to work well with others, open to receive and give feedback, and treats everyone with respect. • Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects. • Follows all department quality standards/criteria. Raises concerns and issues to management. • Understands department's key performance indicators (KPIs) and contributes to achieve these goals both individually and as a team. • Other duties as needed or required. ADDITIONAL RESPONSIBILITIES • Ability to be on call 24 hours a day, 7 days a week for global operations, by periodically providing off-hours, evening, and weekend support to accommodate maintenance windows and issue resolution • Occasional travel to various Cambro locations domestically and internationally as required (15%) • May occasionally guide less experienced associates to help with technical projects • Some travel may be required. REQUIRED QUALIFICATIONS The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. • Bachelor's degree (B.A.) from a four-year accredited college or university. • 5-10 years of experience in IT security, network, administration, and support roles. • Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form. • Ability to adapt and adjust plans to meet changing needs. • Proficient in Microsoft Office Suite • Experience with Fortinet solutions, EDR, email security solutions • Solid knowledge of cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. • Solid working knowledge of Layer 2 (VLANs, Inter-VLANs, VTP Domains, bridge groups, MVRP, ACL's) technologies and network segmentation. • Strong knowledge of DNS records including reverse zones and maintaining DNS records • Strong DHCP Knowledge to include DHCP Fail over and able to configure DCHP relay on Switches • Solid understanding of routing protocols, static routes and ARP cache • Proficient in creating and implementing certificates on layer 2 devices (Switches, Firewalls, Linux Appliances) • Strong troubleshooting skills and possess the ability to find security and network issues in a timely manner • Strong Windows administration skills including Active Directory/GPO's and security policies • Solid working knowledge of Virtualization, such as VMware ESXi servers and vCenter 7.x • Solid working knowledge of Veeam/Bacula/Exagrid backup software to manage backup and restore procedures • Must be able to follow instructions and procedures and ask questions if something is unclear • Excellent documentation skills including ability to create network drawings • Self-motivated and energetic with the ability to manage time efficiently without supervision and to work effectively under pressure • Strong customer service and communication skills • Excellent organizational skills and strong sense of urgency • Familiarity with various network types including LANs, WANs, SDWAN, WLANs, SANs, and VoIP networks • Great accuracy and attention to detail PREFERRED QUALIFICATIONS • Experience in Business Continuity and disaster recovery is a plus • Knowledge of Ruckus Access Points and Switches • Knowledge of IBMi PHYSICAL DEMANDS The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Sitting, walking, standing, bending at the neck, bending at the waist, squatting, climbing, kneeling, crawling, twisting at the neck and waist, repetitive use of hands, simple grasping, power grasping, fine manipulation, pushing and pulling, reaching above and below the shoulder, carrying/lifting up to 50 lbs. Driving cars and other IT equipment Working around equipment and machinery Exposure to excessive noise Exposure to dust, gas, fumes or chemicals Working at heights Use of special visual or auditory protective equipment Walking on uneven ground PPE Requirements Safety glasses Steel-toe slip-resistant shoes - When in production area Hearing protection (e.g. ear plugs, ear muffs) - When in production area Face covering (mask) in accordance with company policy. Hardhat/bump camp IT Application COMPENSATION RANGE: $97,000- $120,000 Salary may vary based on experience. CAMBRO is proud to be an equal-opportunity workplace. All qualified applicants will receive consideration for employment without regard to and will not be discriminated against based upon race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic information, military or veteran status, or other characteristics protected by law.
    $97k-120k yearly Auto-Apply 30d ago
  • Controls Security & Fire System Engineer III

    Johnson Controls Holding Company, Inc. 4.4company rating

    Cyber security analyst job in Huntington Beach, CA

    What you do Be responsible for Pre Sales Support & End User Support for, but not limited to the design, configuration, and operation of complete building low voltage systems, including fire, security, and other low voltage control sub-systems (i.e. lighting, nurse call, data networks, etc.) to meet the intent of the project requirements. Accountable to field teams for quality, timeliness and efficiency of designs. Develops complex software programs, commissions and troubleshooting to ensure proper operations of the building control system. Provides detailed information and submittals to communicate design and operation to customers, consultants, Johnson Controls field installation team and subcontractors. How will you do it - Sales Support and End User Support · Possible job walks with the Sales Team on the initial design phase · Designs and configures are technically complex building control systems as defined by the contract documents. · Creates flow diagrams, sequence of operations, bill of material, network layouts and electrical schematics as required. · Develop and tests software programs necessary to operate the system per the project requirements' intent. · Coordinates the creation of necessary drawings and equipment schedules for submittals and installation. · Assists in the loading and commissioning of all system and network-level controllers as required. · Assists in validation of complete system functionality and troubleshoots problems with subcontractors and other trades to ensure proper operation. · Provides field change information to the project team for the creation of as-built drawings and software. · Keeps management and JCI contractor or customer informed of job progress and issues. · Assists in performing site-specific training for owner/operator on the total building control system. · Participates in release meeting with the project field team. · Performs value engineering to provide cost effective results while maintaining customer satisfaction. · Adheres to safety standards. · High degree of employee and subcontractor safety. What we look for Required Qualifications · Minimum of seven years of experience, or an associate degree in a related technical field with seven years of relevant work experience required. · Demonstrated knowledge of the construction, mechanical, electrical, or HVAC service industry. · Demonstrated knowledge of mechanical drawings, electrical wiring diagrams, control theory, automatic temperature controls, building automation systems and other building subsystems. · Demonstrated experience in the integration of low voltage building sub-systems using various industry protocols (i.e. LON, BACnet, etc.). · Ability to relate technical knowledge to a non-technical audience. · Demonstrated advanced computer skills required, particularly computer-related drafting tools, such as Visio. Preferred Qualifications · Bachelor's degree in engineering with a minimum of five years of experience, or an associate degree in a related technical field with seven years of relevant work experience required. · Understanding of IP networking for building automation systems. · Understanding of Tridium/Niagara Framework HIRING SALARY RANGE: $100K to $125K (Salary to be determined by the education, experience, knowledge, skills, and abilities of the applicant, internal equity, location and alignment with market data.) This role offers a competitive Bonus plan that will take into account individual, group, and corporate performance. This position includes a competitive benefits package. For details, please visit the About Us tab on the Johnson Controls Careers site at ***************************************** Johnson Controls International plc. is an equal employment opportunity and affirmative action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information, sexual orientation, gender identity, status as a qualified individual with a disability or any other characteristic protected by law. To view more information about your equal opportunity and non-discrimination rights as a candidate, visit EEO is the Law. If you are an individual with a disability and you require an accommodation during the application process, please visit here.
    $100k-125k yearly Auto-Apply 30d ago
  • Systems Security Engineer II - P2 (Onsite-Fullerton, CA)

    RTX Corporation

    Cyber security analyst job in Fullerton, CA

    **Country:** United States of America ** Onsite **U.S. Citizen, U.S. Person, or Immigration Status Requirements:** Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance **Security Clearance:** Secret - Current At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world. Raytheon is seeking a well-qualified **Systems Security Engineer II (P2)** to join our Systems Security Engineering (SSE) team in developing solutions to protect the Warfighter's technology advantage. Systems Security Engineering creates holistic security solutions leveraging Cyber Security, Software Assurance and Supply Chain Risk Management to support Program Protection Implementation on embedded weapons systems. Join our highly visible team and perform technically challenging assignments, which will directly contribute to protecting our nation and our Warfighters. This is an onsite position at Raytheon in Fullerton, CA. **What You Will Do** + Lead the patch team, ensuring on-time delivery of patches to our customer + Perform analysis on cybersecurity collected data and test results + Validate secure configuration of routers, switches, firewalls, servers, operating systems, applications, and other assets, using DoD approved scanning and assessment tools such as Nessus, STIG, Evaluate STIG, and/or RADIX + Create and maintain Linux Bash and Python scripts + Create patch artifacts such as patch media and information assurance posture reports **Qualifications You Must Have** + Typically requires a Bachelor's Degree in Science, Technology, Engineering or Mathematics (STEM) and 2 years of prior relevant experience + Active and transferable U.S. government issued DoD Secret security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance + Experience in System Security Engineering, computer technology reverse engineering, cybersecurity or embedded security **Qualifications We Prefer** + Experience with scrum planning and scrum tools such as Jira + Experience in the SSE implementation throughout the entire life cycle + Experience contributing to a team environment for the purpose of developing creative solutions to technical problems + Cyber Certifications in accordance with DoDD 8570/DoDD 8140 such as CISSP, GSLC, CEH + Experience supporting the development of Risk Management Framework (RMF) documents and controls validation testing for Authority to Operate (ATO) accreditations + Candidate must exhibit an exceptional degree of ingenuity, creativity and resourcefulness + Excellent communication, technical writing, oral presentation and interpersonal skills **What We Offer** + Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation + Relocation Eligible - Relocation assistance is available **_As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote._** The salary range for this role is 72,000 USD - 144,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills. Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement. Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance. This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply. RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window. _RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act._ **Privacy Policy and Terms:** Click on this link (******************************************************** to read the Policy and Terms Raytheon Technologies is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.
    $96k-139k yearly est. 42d ago
  • Information Security Analyst

    Allen Lund Company, Inc. 3.8company rating

    Cyber security analyst job in Glendale, CA

    We're seeking a highly skilled and experienced Information Security Analyst with a strong foundation in SIEM, Asset management, Network tools, and a comprehensive understanding of cybersecurity principles. The ideal candidate will be responsible for ensuring the security, integrity, and reliability of our endpoints and network infrastructure while proactively identifying and mitigating potential security risks and vulnerabilities.[1] Responsibilities: ● Network Security Management: Monitor network traffic for potential threats, intrusions, and vulnerabilities. ● Cybersecurity Strategy: Develop and execute comprehensive cybersecurity strategies aligned with industry best practices and compliance standards. Evaluate existing security measures and recommend enhancements to fortify the network infrastructure against evolving threats. ● Incident Response and Resolution: Lead incident response efforts, investigating and resolving security breaches, vulnerabilities, and incidents. Implement proactive measures to prevent future occurrences and maintain network continuity. ● Technical Expertise: Utilize expertise in SIEM, Asset Management, and Network tools to configure, troubleshoot, and optimize endpoints and network security devices and solutions. Collaborate with cross-functional teams to integrate security tools effectively. ● Risk Assessment and Compliance: Conduct regular risk assessments, pen-tests and security audits to identify vulnerabilities and compliance gaps. Implement corrective actions and security controls to ensure adherence to industry regulations and company policies. Lead our yearly SOC 2, Type 2 Audit. ● Documentation and Reporting: Maintain accurate documentation of our incidents, policies, and procedures. Generate detailed reports and present findings to stakeholders, outlining security posture, vulnerabilities, and recommended actions. ● Team Collaboration and Leadership: Work closely with the IT team, providing guidance, mentorship, and technical expertise. Collaborate on projects, initiatives, and security-related tasks to enhance the overall security posture of the organization. Requirements: ● Bachelor's degree in Computer Science, Information Technology, or related field (or equivalent work experience). ● Extensive experience (4+ years) as a Network Security Analyst. ● Professional certifications such as CISSP, or relevant industry certifications are desirable. ● Proficiency in configuring, managing, and troubleshooting SIEM, Asset Managers, and similar tools ● Deep understanding of cybersecurity principles, network protocols, and security technologies. If you are passionate about information security and are driven by the challenge of safeguarding critical infrastructures from cyber threats, we'd love to speak with you! update this with the title and responsibilities
    $87k-124k yearly est. Auto-Apply 2d ago
  • Linux System and Security Analyst

    Silvus Technologies

    Cyber security analyst job in Los Angeles, CA

    **THE COMPANY** **Silvus Technologies** is dedicated to one mission: connecting those who keep us safe. We do so by delivering the most advanced Mobile Ad-hoc Network (MANET) radios powered by our custom and ever-evolving Mobile-Networked MIMO waveform. Together, our radios and waveform provide the vital communications for mission critical applications in the harshest environments from underground tunnels to high altitude balloons. Silvus StreamCaster radios are being rapidly adopted by customers all over the world ranging from the U.S Departments of Defense, to International, Federal, State and Local Law Enforcement agencies, all the way to the Super Bowl, Grammys and industry-leading drone, robot, and other unmanned systems manufacturers. _Wouldn't you like to join an incredibly talented group of people, doing very challenging work, with the prime directive of "_ Keeping Our Heroes Connected (************************************** P0GLc) _"?_ Silvus' rapid growth is fueled by a focus on research and innovation and a team of the most passionate, skilled, and creative thinking individuals. _If you are looking for a challenging experience, you owe it to yourself to learn how Silvus can provide a rewarding opportunity that creates a pathway to a fulfilling career._ **THE OPPORTUNITY** Silvus is seeking a **Linux System and Security Analys** **t** to analyze, troubleshoot, automate, and conduct CyberSecurity activities based on Cybersecurity Maturity Model Certification (CMMC) and maintain the company's IT infrastructure. The position will exercise full ownership and decision-making authority over the resolution of end-user technical challenges, including hardware failures and software anomalies. This position's primary duty is to perform high-level systems analysis, security architecture, and risk assessment in support of organizational objectives. This includes exercising discretion and independent judgment on matters of significance to company-wide IT security and compliance. This position requires a DCSA clearance to be obtained within 12 months of employment. This position is fully onsite, Monday through Friday at Silvus Technologies' HQ in the heart of vibrant **West Los Angeles.** The following is a list of at least some of the current essential job functions of the position. Management may assign or reassign duties and responsibilities at any time at its discretion. **ROLE AND RESPONSIBILITIES** + Act as the primary technical advisor for diagnosing and resolving complex infrastructure issues, with autonomy to escalate or implement system-level changes to maintain Production department continuity. + Responsible for evaluating risks, designing secure systems in compliance with Cybersecurity Maturity Model Certification (CMMC) standards, and making strategic recommendations. + Provide Linux and Windows system desktop and server support, as well as network administration for the entire company based on the NIST CyberSecurity Framework. + For individuals with Security Clearance, apply Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) to secure and maintain IT infrastructure, providing the necessary documentation and technical support required for continuous Authorization to Operate (ATO). + Responsible for Automated Deployment and monitoring of computer systems. + Oversee the planning and implementation of hardware lifecycle management for Windows and Linus-based servers and VMs. + Support vulnerability and patch management processes, ensuring all Linux vulnerabilities are remediated in accordance with NIST CyberSecurity Framework. + Support Engineering and R&D teams to ensure strict IT compliance with the CMMC framework, specifically with security controls. This role is critical in protecting Controlled Unclassified Information (CUI) and maintaining our accredited environment. + Develop and maintain documentation related to the company's IT infrastructure and support processes. + Oversee the governance and accuracy of the company's hardware and software asset inventory, ensuring appropriate lifecycle management and compliance with security and audit requirements. + May occasionally require on-call coverage overnight, on weekends, and on holidays. + Perform other related duties of which the above are representative. **REQUIRED QUALIFICATIONS** + Bachelor's degree or equivalent in an IT-related field. + 3 years of Linux-related work experience. + Experience with installing, troubleshooting, and/or maintaining Linux-based software and hardware installations. + Fluency in Linux CLI, TCP/IP, LAN/VLAN Networking, Patch Management, and Backup. + Highly proficient in Google Suite and MS Office (Excel, Word, PowerPoint). + Strong interpersonal skills with a positive and enthusiastic attitude. + Demonstrated ability to operate as a team member, supporting departmental decisions, policies, and procedures with a positive and communicative attitude with company colleagues. + **Must be a U.S. Citizen** due to clients under U.S. government contracts. + **Must be able to obtain DCSA clearance within 12 months of employment.** + **All employment is contingent upon the successful clearance of a background check.** **PREFERRED KNOWLEDGE, SKILLS AND ABILITIES** + Prior experience in a fast-paced office environment is a plus. **WORKING CONDITIONS & PHYSICAL REQUIREMENTS** + Office environment. + Occasional exposure to heat, cold, and allergens while performing tests or demonstrations in the field. + While performing the duties of this job, the employee is required to do the following: + Perform bending and reaching movements to place items on lower and higher shelves. + Kneeling or squatting to access lower shelves. + Must be able to lift up to 50 lbs. + Walking/Moving in the labs. **COMPENSATION** _The pay range is NOT a guarantee. It is based on market research and peer data, and will vary depending on the candidate's experience and qualifications._ CA Pay Range $80,000-$90,000 USD **NOTE - As a U.S. Federal Contractor, Silvus Technologies requires that ALL candidates being considered for employment for any position (regardless of level) MUST be a U.S. Person (permanent resident or citizen). Stricter U.S. Citizen ONLY requirements are needed for some Engineering or R&D roles. This generally does NOT apply to International positions; only job postings for positions located in the U.S. Exceptions will be included in the Required Qualifications section of the posted position.** **_All Employment is contingent upon the successful clearance of a background check._** Silvus is proud to be an equal-opportunity employer, and we value diversity. We do not discriminate on the basis of race, color, age, religion or belief, ancestry, national origin, sex (including pregnancy), sexual orientation, gender identity and/or expression, marital, civil union or domestic partnership status, physical or mental disability, protected veteran status, genetic information, political affiliation, or any other factor protected by applicable federal, state, or local laws. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive benefits and privileges of employment. Please contact us to request accommodation. _*Silvus does not accept unsolicited resumes from individual recruiters or third-party recruiting agencies in response to job postings. No fee will be paid to third parties who submit unsolicited candidates directly to Silvus Technologies._
    $80k-90k yearly 14d ago
  • Cybersecurity System Security Engineer I

    P-11 Security

    Cyber security analyst job in El Segundo, CA

    Full-time Description The System Security Engineer's primary function is working within Special Access Programs (SAPs) supporting SMC and AFSPC acquisition programs. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities to meet NIST Cybersecurity requirements for system assessment & authorization. Performance shall include: Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration with existing SAP network infrastructures Support a team of System Security Engineers and Certification and Accreditation Analysts responsible for ensuring the customers national and international security interests are protected as support equipment are designed and tested Support customer and SAP community IA working groups, participate in SSE IPT reviews Provides expert level consultation and technical services on all aspects of Information Security Review SSE related designs and provides security compliance recommendations Develop and provide IA risk management recommendations to the customer Provide SSE support for Mission and Training systems design and development Assist with development and maintenance of the Program Protection Plan & Cybersecurity Strategy Assist with site activation activities and design reviews Represent the Government Program Manager in various SSE related working groups, advisory groups, and advisory council meetings Requirements Experience: 6 years' total experience, including minimum 2 years' experience within SCI or SAR environment. Minimum 1 year of SAP relevant experience highly desired. Education: Bachelor's degree in a related discipline or equivalent additional experience (4 years) Certifications: Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 and Information Assurance Manager Level 1 within 6 months of the date of hire Security Clearance: Current Top Secret Clearance with SCI Eligibility Eligibility for access to Special Access Program Information Willingness to submit to a Counterintelligence polygraph Other Requirements: Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents Familiarity with Risk Management Framework (RMF) and Joint SAP Implementation Guide (JSIG) processes for system accreditation, along with legacy (DITSCAP, DIACAP) processes Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners Working knowledge of Microsoft Office (Word, PowerPoint, and Excel) Possess a high degree of originality, creativity, initiative requiring minimal supervision Willingness to travel within the organizational Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
    $97k-140k yearly est. 60d+ ago
  • Information Security Analyst

    Cathay General Bancorp 4.4company rating

    Cyber security analyst job in Rancho Cucamonga, CA

    This position is responsible for ensuring that the Bank's Security operations and preventive controls are managed and maintained in accordance with established Information Security policies, standards and procedures, published regulations and industry best practices. Primarily responsible for the constant review of vendor security controls in comparison with policies and industry frameworks, risk assessments, determination of control gaps and their remediation. ESSENTIAL FUNCTIONS Performs vendor security risk assessments to determine inherent risk on proposed projects and assesses vendor security controls to determine residual risk. Evaluates the potential exposure to application security risks and threats based on industry security frameworks and recommends appropriate mitigation. Assesses security practices including Information Security governance, Identity and access control, Incident monitoring and response, Vulnerability assessment and Penetration tests, Network Security and Endpoint Security, among others. Acts as liaison with Third Party Risk Management, Information Technology and business department Relationship Managers related to vendor risk assessments. Reports information security risks and follows-up remediations. Remediates audit and regulatory findings and recommendations related to Information Security and Vendor Risk Management. QUALIFICATIONS Education: College degree in Information Technology or Information Security or equivalent; Security+, SSCP, CISSP, CISM or similar information security certifications preferred. Experience: Minimum two years of experience in Information Security Risk, Information Security Operations or Security Auditing. Proven experience on third-party risk management and vendor security assessments. Working knowledge of security practices such as Endpoint Security, Network Security, Security Operations and Security Governance required. Experience working with Vendor Risk Management (VRM) applications preferred. Skills/Ability: Proven ability to initiate and manage projects. Excellent communication and problem-solving skills. Strong inter-personal communication and collaboration skills. Self-starter, highly motivated, and able to work with general supervision. OTHER DETAILS $28.84 - $33.65 / hour Pay determined based on job-related knowledge, skills, experience, and location. This position may be eligible for a discretionary bonus.
    $28.8-33.7 hourly 60d+ ago
  • Systems Security Engineer

    Teledyne 4.0company rating

    Cyber security analyst job in El Segundo, CA

    **Be visionary** Teledyne Technologies Incorporated provides enabling technologies for industrial growth markets that require advanced technology and high reliability. These markets include aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, deepwater oil and gas exploration and production, medical imaging and pharmaceutical research. We are looking for individuals who thrive on making an impact and want the excitement of being on a team that wins. **Job Description** Teledyne Controls is a global leader in delivering innovative avionics systems and data management solutions for both civil and military aircraft operators. Our cutting-edge technologies enable real-time access, analysis, and utilization of critical flight data, enhancing safety, efficiency, and operational performance across the aviation industry. Become part of a team that thrives on innovation and excellence in a dynamic, mission-driven environment. **Join Our Team as a Systems Security Engineer!** As an Entry-Level Avionics Security Engineer, you will play a key role in safeguarding next-generation avionics systems. This position combines hands-on testing, vulnerability analysis, and collaborative design support to ensure robust security across connected products. You'll work closely with engineering teams and customers to implement secure architectures, monitor emerging threats, and contribute to innovative solutions that meet stringent aerospace security standards. If you're ready to take on the challenge of securing cutting-edge avionics products and thrive in a dynamic environment, we want to hear from you! **Essential Duties and Responsibilities** include the following. Other duties may be assigned. + Collaborate with engineering teams, program management, and customers to define and communicate security requirements and updates. + Perform testing and validation of security features and controls to ensure compliance and effectiveness. + Contribute to security assessments, including risk analysis, threat modeling, and penetration testing activities. + Monitor and evaluate Common Vulnerabilities and Exposures (CVEs) for relevance to Teledyne products. + Execute test scenarios to assess product security resilience under various conditions. + Participate in trade studies and evaluations of security processes, tools, and technologies. + Support design teams in strengthening security architecture and implementing secure solutions for new and existing products. + Assist in customer-facing technical reviews, including preliminary and critical design presentations. + Stay informed on emerging security threats and trends to proactively enhance product security. + Contribute to the development and integration of security features for connected avionics systems. + Promote security awareness through education, communication, and best-practice initiatives. **Qualifications** + Bachelor degree in engineering or other technical field and 0-2 years of experience (can include coursework, projects and internships). + Basic understanding of Security Architecture principles, including cryptography, authentication, network security, and public key infrastructure mechanisms to secure product, network, and system boundaries, as well as inter-system communications. + Familiarity with networking concepts, including design and troubleshooting. + Basic knowledge of system design concepts and application development. + Awareness of security implementations in cloud environments, such as AWS. + Understanding of the design, auditing, analysis, support, and troubleshooting of security systems. + Basic knowledge of embedded system security and Linux. + Experience with scripting using Python, Bash, or PowerShell is a plus. + Must be a U.S. Person (includes U.S. citizens, lawful permanent residents, refugees, and asylees) **Salary Range:** $58,100.00-$77,400.000 **Pay Transparency** The anticipated salary range listed for this role is only an estimate. Actual compensation for successful candidates is carefully determined based on several factors including, but not limited to, location, education/training, work experience, key skills, and type of position. Teledyne conducts background checks on qualified applicants who receive a conditional offer of employment in accordance with applicable laws, regulations and ordinances. Background checks may include, but are not limited to, education verification, employment history and verification, criminal convictions, Motor Vehicle Report (MVR & driving history), reference check, credit checks/credit history and drug testing. All qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act. Teledyne and all of our employees are committed to conducting business with the highest ethical standards. We require all employees to comply with all applicable laws, regulations, rules and regulatory orders. Our reputation for honesty, integrity and high ethics is as important to us as our reputation for making innovative sensing solutions. Teledyne is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other characteristic or non-merit based factor made unlawful by federal, state, or local laws. You may not realize it, but Teledyne enables many of the products and services you use every day **.** Teledyne provides enabling technologies to sense, transmit and analyze information for industrial growth markets, including aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, energy, medical imaging and pharmaceutical research.
    $58.1k-77.4k yearly 7d ago
  • Information Security Analyst- INTL Brazil

    Insight Global

    Cyber security analyst job in Los Alamitos, CA

    The Information Security Analyst will be tasked with monitoring and identifying organizational security risks, detecting attack methods and sources, and preserving electronic evidence when required. This role requires expertise in analyzing, recommending, designing, implementing, and maintaining systems and processes that safeguard business and client data. Core responsibilities include conducting risk assessments, performing security analyses, and creating remediation strategies. The individual should be capable of working independently while contributing to security programs as part of the incident response team. Strong written communication skills are essential for preparing formal reports. Professional fluency in English and Portuguese is required. This is an onsite position in Brazil, five days per week, offered as a 6-12 month contract with potential for extension or conversion to a full-time role. Responsibilities but not limited to: - IT Security Administration: Focus on minimizing downtime and ensuring scalability by addressing security risks across systems and networks. - Application Security Alignment: Guarantee that security architecture, designs, plans, controls, and policies comply with IT standards and overall security requirements. - Documentation: Develop and maintain detailed records for all security systems and networks, updating documentation whenever changes occur. - Project Participation: Contribute to initiatives and projects centered on information security. - Program Support: Assist with implementing, maintaining, and monitoring the information security program, including gap analysis, risk assessments, third-party evaluations, procedure development, recurring processes, and incident response. - Solution Deployment: Handle integration, initial configuration, and upgrades of new and existing security solutions following industry best practices. - Operating Systems Expertise: Demonstrate advanced knowledge of Linux, Windows, and OS X environments. - Cloud Security: Apply experience in securing cloud infrastructures such as AWS and Azure. - Vulnerability Management: Lead efforts to identify and remediate security weaknesses in networks and systems, providing technical guidance and support. - Policy Development: Create, implement, and maintain internal procedures to safeguard data and manage incident response effectively. - Collaboration: Work with project teams and system architects to design secure systems and project plans that meet established security standards. - Threat Awareness: Stay informed on current and emerging security threats and design architectures to mitigate potential risks. We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to ********************.To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: **************************************************** Skills and Requirements · Knowledge with Security solutions: SIEM, IAM, PAM, EDR/XDR, CSAM, CASB, Proxies, ZTNA · Solid security understanding with Microsoft security controls (AD, Entra, O365, Intune MDM, etc) · Minimum 7+ years of experience in information technology security or equivalent combination of education and experience · Security+, CISSP, CISA or SANS GIAC certification · Understanding of application, network, operating system, and core infrastructure security concepts. · Knowledge on security monitoring tools such as UTM, IPS, IDS and other security appliances · Project management, organizational and prioritizing skills · Understanding of WAN, MPLS, and technologies such as VoIP beneficial · Working knowledge of common information technology management frameworks such as ISO/IEC 27001, ITIL, COBIT, and NIST
    $89k-131k yearly est. 7d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Garden Grove, CA?

The average cyber security analyst in Garden Grove, CA earns between $70,000 and $133,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Garden Grove, CA

$97,000
Job type you want
Full Time
Part Time
Internship
Temporary