Post job

Cyber security analyst jobs in Hanford, CA

- 830 jobs
All
Cyber Security Analyst
Securities Analyst
Security Architect
Senior Security Engineer
Network Security Consultant
Security Engineer
Information Systems Security Officer
Cyber Security Engineer
Information Security Engineer
Network Security Analyst
  • Cyber Security Architect / Engineer - Infrastructure and Applications

    Request Technology

    Cyber security analyst job in San Francisco, CA

    NO SPONSORSHIP - NO OPT Cybersecurity Engineer / Architect BILL RATE: Open - C2C or W2 DURATION: 1 YEAR OR LONGER The manager is looking for someone out of a large enterprise environment and is a true architect with engineering skills. Highly technical and applications and infrastructure focused is key platform applications storage network virtualization cloud azure and mobile security The Cyber Security Engineer will be responsible for the planning, development and implementation of enterprise information security solutions (such as authentication and authorization, public key infrastructure, data loss prevention, and security event information management) to address the current and emerging security needs of the business. This role requires the solution of complex enterprise-scale information security problems. The role will design and develop new technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Skills/Experience: Contributes to a team that ensures the security of enterprise data and systems by developing enterprise information security solutions. Creates and updates a view of IT assets, related attack surfaces, and threat actors to illustrate the flow of data and associated security threats. Researches, designs, and develops new enterprise technologies, architectures, and security products that will support security requirements for the enterprise and its customers, business partners, and vendors. Serves as a security expert in one or more of application development, database design, network, and/or platform (operating system) efforts, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices. Analyzes business impact and exposure based on emerging security threats, vulnerabilities, and risks and contributes to the development and maintenance of information security architecture. Engages with security specialists and other functional area architects to ensure adequate enterprise security solutions are in place to sufficiently mitigate identified risks, and to meet business objectives and regulatory requirements. Serves as a cybersecurity subject matter expert, assessing the business impact of cybersecurity risks to the enterprise and identifying options and recommendations for mitigating those risks. Serves as an expert in one or more of platform, application, storage, network, virtualization, cloud and mobile security best practices. Mandatory Technical Skills: Experience with healthcare data systems or claims management platforms Strong knowledge of network security protocols, best practices, and perimeter security tools Strong knowledge of identity and access management controls, including SAML and OAUTH/OIDC based authentication, Active Directory, and role mapping Understanding of common security control solutions for event logging, remote access, endpoint management, and mobile device management Understanding of common data protection technologies such as cryptography, tokenization, and hashing Additional Technical Skills: Understanding of Azure native security services and best practices Strong knowledge of threat modelling and risk assessment technologies or frameworks
    $103k-146k yearly est. 4d ago
  • Security Analyst (Oracle Cloud ERP)

    Acumenz Consulting

    Cyber security analyst job in Watsonville, CA

    This role will be part of a growing team responsible for maintaining and supporting the security functionalities of the Oracle Fusion Cloud ERP/EPM/OTM applications. The Oracle Fusion Security Analyst is responsible for supporting all security related issues in Oracle Fusion Cloud ERP, EPM & OTM application. This role will also require strong knowledge on supporting user access, auditing, and custom role security design. In addition, this role may have to support managing the Oracle application environments with supporting refreshes, outages, system monitoring, configurations, and patching. We are looking for a candidate with an in-depth understanding of Security and RMD in Oracle Fusion Cloud, experience in ERP implementations, and a team player and leader that is reliable, enthusiastic, committed, creative, and customer focused. This role also requires strong collaboration skills to focus on a diverse palette of technical and operational work in a continuously evolving environment. Key Job Responsibilities: Effectively support Oracle Cloud ERP, EPM, and OTM SaaS user access and auditing Support user security and roles within Oracle Fusion Cloud, OTM, EPM and guide users as needed to provide proper access to proper functionality. Import users and access using oracle standard functionalities Understand and has experience in Oracle ERP, EPM, OTM security fundamentals and role base access Manage auditing for users and access for ERP, EPM and OTM ensuring access violations are to a minimum in Oracle RMC. Support all issues related to auditing and security for Oracle Fusion Cloud applications (ERP, EPM & OTM) Partner with Security, Network, Development and Product Teams to identify issues, driving issue resolution. Migrate technical SaaS and PaaS objects such as OIC, BIP, BICC, and ESS jobs Follow up on service requests in MOS as needed to complete issues resolution Complete Service Now tickets as required to support users as needed under agreed
    $88k-130k yearly est. 1d ago
  • Oracle Security Analyst

    Walkwater Technologies

    Cyber security analyst job in Watsonville, CA

    ROLE: Oracle Security Analyst Duration: 6 months extendable Job Details: This role will be part of a growing team responsible for maintaining and supporting the security functionalities of the Oracle Fusion Cloud ERP/EPM/OTM applications. The Oracle Fusion Security Analyst is responsible for supporting all security related issues in Oracle Fusion Cloud ERP, EPM & OTM application. This role will also require strong knowledge on supporting user access, auditing, and custom role security design. In addition, this role may have to support managing the Oracle application environments with supporting refreshes, outages, system monitoring, configurations, and patching. We are looking for a candidate with an in-depth understanding of Security and RMD in Oracle Fusion Cloud, experience in ERP implementations. Key Responsibilities: Effectively support Oracle Cloud ERP, EPM, and OTM SaaS user access and auditing Support user security and roles within Oracle Fusion Cloud, OTM, EPM and guide users as needed to provide proper access to proper functionality. Import users and access using oracle standard functionalities Understand and has experience in Oracle ERP, EPM, OTM security fundamentals and role base access Manage auditing for users and access for ERP, EPM and OTM ensuring access violations are to a minimum in Oracle RMC. Support all issues related to auditing and security for Oracle Fusion Cloud applications (ERP, EPM & OTM) Partner with Security, Network, Development and Product Teams to identify issues, driving issue resolution. Migrate technical SaaS and PaaS objects such as OIC, BIP, BICC, and ESS jobs Follow up on service requests in MOS as needed to complete issues resolution Complete Service Now tickets as required to support users as needed under agreed
    $88k-130k yearly est. 3d ago
  • Cybersecurity risk security analyst

    Sigmaways Inc.

    Cyber security analyst job in Fremont, CA

    We are seeking a Cybersecurity Risk Analyst to support managing and mitigating security risks across processes, technologies, and cloud environments. The ideal candidate will combine technical expertise, business acumen, and cybersecurity experience to advise partners, assess risks, and drive improvements in secure operations. This role requires hands on experience with Kusto Query Language (KQL), cloud security, and risk assessment, as well as the ability to communicate effectively with stakeholders at all levels. Must be local to San Francisco or Los Angeles (LA) or Salt Lake City (SLC). Responsibilities: Support risk strategies by identifying and mitigating security risks in bank systems and processes. Apply and interpret security policies, provide guidance and input on policy enhancements. Advise business and technical partners on security controls, procedures, and best practices. Assess cloud and on-prem environments to identify risks and recommend control improvements. Conduct security control assessments, document findings, and develop actionable remediation plans. Evaluate third-party vendors to determine shared security responsibilities and associated risks. Communicate security risks and mitigation strategies effectively to technical teams and executives. Collaborate across teams to drive secure operations and deliver results in a fast-paced environment. Qualifications: Bachelor's degree in Cybersecurity, Information Security, Computer Science, or related technical discipline (or equivalent experience). 3+ years of experience in cybersecurity, information security, or technology risk management. Proficiency in Kusto Query Language (KQL) for data analysis, log correlation, and threat detection. In-depth understanding of security frameworks such as NIST, ISO 27001, or FedRAMP. Demonstrated experience assessing and improving security posture across Cloud (Azure, AWS) and on-premises environments. Proven ability to conduct security control assessments, identify risk exposures, and develop actionable remediation plans. Skilled at translating technical security concepts into clear, business-relevant insights for stakeholders and executives. Excellent communication, collaboration, and interpersonal skills, with a focus on building trusted partnerships across technical and business teams. Strong organizational and analytical skills, with the ability to manage multiple initiatives in a fast-paced, results-driven environment.
    $90k-134k yearly est. 4d ago
  • IT Security and Network Engineer

    JM Eagle 4.6company rating

    Cyber security analyst job in Los Angeles, CA

    IT Security & Network Engineer - JM Eagle Los Angeles, CA | Onsite 4 Days / Remote Fridays | $150,000 - $170,000 + Comprehensive Benefits About Us JM Eagle is the world's largest manufacturer of plastic pipe, providing the infrastructure that keeps communities connected across North America. Behind every operation is a secure, stable IT environment supporting 1,000+ users across 20+ locations. We're strengthening that foundation - and seeking a hands-on IT Security & Network Engineer who can own our daily security operations and help modernize our network and cybersecurity posture. This is a high-impact, individual contributor role for a senior engineer who thrives in both the strategic and technical trenches. The Opportunity This role is ideal for a seasoned IT security professional who wants broad ownership without stepping into management. You'll work closely with the Director of IT Operations and outsourced partners to secure our enterprise, harden our infrastructure, and enhance our cybersecurity frameworks. Your time will be split approximately: 60% Cybersecurity: tools, monitoring, vulnerability management, incident response 40% Network Engineering: SD-WAN, firewalls, VPN, wireless, connectivity across 20+ sites You will be the technical driver behind our security improvement roadmap. What You'll Do Cybersecurity Operations Own day-to-day cybersecurity operations, including monitoring, threat response, and risk mitigation. Manage security tools and platforms: endpoint protection, SIEM, MFA, SSO, VPN, firewalls, and vulnerability management tools. Perform recurring vulnerability scans and penetration-testing coordination; track and validate remediation. Monitor security alerts using Fortinet, Darktrace, CrowdStrike, Nessus, Microsoft Defender, etc. Lead internal security awareness initiatives and social engineering simulations. Maintain documentation for configurations, policies, and security processes. Network Engineering Support secure network architecture across 20+ locations. Oversee SD-WAN, firewall policies, VPN configuration, internet filtering, and remote-access security. Support wireless infrastructure, site connectivity, and network performance monitoring. Partner with third-party providers to ensure uptime, reliability, and strong security posture. Governance & Collaboration Work with IT leadership to strengthen cybersecurity governance and reporting. Contribute to incident response planning, tabletop exercises, and monthly security briefings. Evaluate threats and emerging technologies; propose continuous improvements. What You Bring Bachelor's degree in Computer Science, Information Systems, or equivalent experience. 8+ years of experience in IT security and network engineering supporting 1,000+ users across distributed sites. 4+ years of hands-on experience with enterprise security tools and platforms. Deep experience with the Microsoft ecosystem: Azure, M365, Active Directory / Entra ID, SCCM / Intune. Strong working knowledge of: MFA, SSO, VPN Endpoint protection SIEM solutions Network segmentation, encryption, hardening Monitor and respond to security alerts using tools like Fortinet, Darktrace, CrowdStrike, Nessus, and Microsoft Defender. Familiarity with SD-WAN architectures, wireless networking, and network monitoring tools. Understanding of ITIL, ITSM, NIST frameworks; CISSP or similar preferred but not required. Excellent communication skills with the ability to work across teams. Comfort managing outsourced security and network service providers. A highly proactive, self-starting approach - someone who solves problems end-to-end. Why JM Eagle Directly influence and modernize the cybersecurity posture of the world's largest pipe manufacturer. Join an enterprise undergoing major IT transformation with full executive backing. Work with a Microsoft-centric environment supporting 1,000+ users and 20+ distributed locations. Competitive salary: $150K-$170K + bonus + excellent benefits. 4 days onsite in Los Angeles; remote Fridays. Work Environment Primarily a professional headquarters environment. Occasional travel to manufacturing and distribution facilities may be required. Some exposure to plant or outdoor areas during site visits.
    $150k-170k yearly 2d ago
  • Sr Security Engineer

    Robert Half 4.5company rating

    Cyber security analyst job in San Francisco, CA

    Urgent hiring need for a Senior Security Engineer reporting to the CTO. This will join a fast-growing company in the entertainment technology industry. This role will lead their security strategy and implementation across infrastructure, endpoints, and internal systems. This is an onsite position (M-Thrs), Friday (remote) in San Francisco. The position offers up to 185k base plus profit sharing and discretionary bonus. They offer a rich benefits package including 2 weeks paid time off during closure the winter holiday! Duties but not limited to: Security Architecture & Policy: Design, implement, and enforce security policies and best practices across infrastructure, applications, and cloud environments (AWS, Google Workspace), while leading IAM strategy using Okta. Threat Detection & Response: Monitor systems for vulnerabilities and threats, manage incident response, and oversee tools like GuardDuty, Security Hub, SIEM platforms, AWS Inspector, and EDR solutions (CrowdStrike, SentinelOne). Engineering Collaboration & Tooling: Partner with engineering teams to embed secure development workflows, implement Zero Trust principles, and evaluate security tooling to support scalable, secure operations. Qualifications: Ideal candidates have experience in startup or fast paced environments. 5+ years of experience in security engineering, with strong hands-on expertise in AWS, Google Workspace, and Okta. Deep understanding of IAM, network security, encryption, and incident response. Familiarity with SIEM tools, vulnerability scanning, and scalable security design in fast-paced or startup environments. Bonus: Experience with compliance frameworks such as SOC 2, ISO 27001, or NIST.
    $145k-193k yearly est. 5d ago
  • Senior Security GRC Engineer

    Hill Physicians Medical Group

    Cyber security analyst job in San Ramon, CA

    At PriMed, your uniqueness is valued, celebrated, encouraged, supported, and embraced. Whatever your relationship with Hill Physicians, we welcome ALL that you are. We value and respect your race, ethnicity, gender identity, sexual orientation, age, religion, disabilities, experiences, perspectives, and other attributes. Our celebration of diversity and foundation of inclusion allows us to leverage our differences and capitalize on our similarities to better serve our communities. We do it because it's right! Job Description We are seeking a skilled Governance, Risk, and Compliance (GRC) Engineer to strengthen our security posture and ensure adherence to healthcare regulations. The GRC Engineer will play a vital role in designing, implementing, and maintaining risk management processes, compliance frameworks, and policies that align with healthcare regulations such as HIPAA and HITECH. The ideal candidate will have experience with tools like SAI360, CyberArk, and other compliance and security platforms. Job Responsibilities: Develop, implement, and maintain GRC policies, processes, and controls in alignment with industry best practices and regulatory requirements (e.g., HIPAA, HITECH, NIST, ISO 27001). Perform risk assessments and develop mitigation strategies for identified security risks. Administer and optimize SAI360 for governance, risk management, and compliance activities, including reporting and policy management. Collaborate with cross-functional teams to ensure new projects and systems are designed with security and compliance in mind. Monitor and report on compliance status, identifying gaps and proposing remediation strategies. Oversee third-party vendor risk assessments and ensure adherence to security requirements. Support internal and external audits by providing documentation, evidence, and responses to audit findings. Conduct security awareness training programs and promote a culture of compliance within the organization. Required Experience/Skills/Knowledge: 5+ years of experience in Governance, Risk, and Compliance roles or a related field. Strong knowledge of healthcare regulations, including HIPAA, HITECH, and other relevant standards. Proficiency in GRC tools such as SAI360 for compliance and risk management. Experience with privileged access management tools like CyberArk. Solid understanding of risk assessment methodologies and security frameworks, including NIST CSF, ISO 27001, or COBIT. Excellent communication and collaboration skills to engage with technical and non-technical stakeholders. Strong analytical and organizational skills with attention to detail. This role is critical in maintaining our organization's compliance with healthcare security standards and reducing risk exposure. Required Education: Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related field. Equivalent work experience may be considered in lieu of a degree.
    $131k-184k yearly est. 4d ago
  • Infrastructure & Security Engineer (Platform)

    Meanwhile

    Cyber security analyst job in San Francisco, CA

    In this role, you will drive the evolution of our infrastructure and security posture. You will have substantial ownership over our technology choices and implementation for deployment, observability, storage, and security. You will identify, triage, and implement incremental improvements in all of these domains, working closely with backend engineers and internal and external auditors to develop appropriately scoped interventions. You will work with engineers to ensure that security considerations are baked into software development from the outset. You should have a broad understanding of modern best practices around cloud architecture, data governance and infrastructure as code. You should approach questions of infrastructure and security risk with a sense of nuance and good judgment. You should be able to build consensus around your threat models such that the necessary consequences seem natural to other stakeholders. In this role, you will need to be fluent in Python and Terraform (at least to start). Company & Funding We're building the world's largest long-term insurer, using digital money and AI to serve billions of people profitably. We want anyone, anywhere, to be able to save for their future, protect their family, and build wealth across generations. We face a once-in-a-century opportunity to build a vertically integrated life (re)insurer. Our product offerings are globally unique, making it possible for us to scale our balance sheet, build modern systems from scratch, and then directly compete to win a market that is 3% of global GDP. We've raised over $140M to date. Sam Altman and Lachy Groom led our initial raise, and they've since been joined by leading investors in AI, insurance, and Bitcoin, including Northwestern Mutual, Apollo, Bain Capital, Pantera, Haun, Framework, Fulgur Ventures, MS&AD, Mouro, Stillmark, and Wences Casares. Our Bermuda operating subsidiary holds the the world's only license to issue life insurance denominated entirely in Bitcoin. It's also the only company in the world with audited financials stated in Bitcoin. (If you join us, you can expect to do a lot of things no one's ever done before.) Engineering at Meanwhile With the advent of ubiquitous AI tooling, the dynamic range in individual engineering effectiveness is only widening. At Meanwhile, we're planning for a world in which small, tight-knit engineering teams (supported by a small, tight-knit platform team) own entire lines of business, and are compensated accordingly. We're attacking a huge market with the leanest, most effective team in insurance. Where incumbents employ a thousand people, we think we can make it work with a hundred or a dozen. We're looking for hungry ICs (and former managers who see the writing on the wall) interested in pushing the boundaries of engineering productivity in a vertically integrated, regulated organization. We're growing quickly. You will fix million-dollar bugs. On the business side, we hire for deep domain expertise, ambition, and the creativity to figure out the previously impossible. Because our engineers work closely with people from the business, they need curiosity, flexibility, an appetite for (and the ability to digest) complex context, and strong communication skills. Our view is that ownership is taken, not given. You will be successful here if your work progressively builds others' trust in your ability to identify, attack, and solve larger and larger problems, including those that no one else has anticipated. We believe that "code wins arguments," that prototyping is often the best first step in a design process, and that the impact of velocity is non-linear. You are excited by putting up multiple meaningful changes, or writing thousands of lines of code, in a day (even though you know that deleting lines of code is more exciting than writing them, and that, occasionally, deep reflection is required in order to ship anything). You aren't fazed by building systems that don't work out - sometimes, you have to throw code away. Intellectual honesty is non-negotiable. You love to learn and to teach, to ask questions and to answer them, and to be transparent about your uncertainty. You are eager to learn, with the rest of the team, how to work with AI tools, including agents, in order to move faster and ship better, more complete versions of your ideas. You will experiment with new ways of working, with the expectation that some of them will be unsuccessful, and you will teach others what works. This is the most exciting time in decades to be a competent, technically ambitious engineer. We want to offer you the opportunity to see what's really possible and how much better you can get at your craft.
    $114k-163k yearly est. 4d ago
  • Senior Backend Engineer - Cloud Security

    Droisys 4.3company rating

    Cyber security analyst job in Sunnyvale, CA

    About Company, Droisys is an innovation technology company focused on helping companies accelerate their digital initiatives from strategy and planning through execution. We leverage deep technical expertise, Agile methodologies, and data-driven intelligence to modernize systems of engagement and simplify human/tech interaction. Amazing things happen when we work in environments where everyone feels a true sense of belonging and when candidates have the requisite skills and opportunities to succeed. At Droisys, we invest in our talent and support career growth, and we are always on the lookout for amazing talent who can contribute to our growth by delivering top results for our clients. Join us to challenge yourself and accomplish work that matters. We're hiring Senior Backend Engineer - Cloud Security in Sunnyvale, CA What You Will Do Build containerized microservices and related components for a multi-tenant, distributed system that ingests and processes real-time cloud events, system telemetry, and network data across major cloud platforms. Your work will enable customers to detect risks and strengthen their cloud security posture. Mentor junior engineers, interns, and new graduates, helping them develop strong technical skills and become effective contributors. Write production-quality software primarily in Java using Spring Boot, and work extensively with Kafka, SQL, and other data interfaces. Work within a Kubernetes-based service infrastructure, while learning new technologies as needed. Take ownership of major features and subsystems through the entire development lifecycle-requirements, design, implementation, deployment, and customer adoption. Participate in operational responsibilities, gaining firsthand experience with real-world performance, reliability, and support scenarios-informing how you design and build better systems. Prioritize quality at every stage, performing thorough developer testing, functional validation, integration checks, and performance testing to ensure highly resilient systems. Collaborate closely with Product Management to review, refine, and finalize requirements. Develop a deep understanding of customer needs by engaging with peers, stakeholders, and real-world use cases. What You Bring Bachelor's degree in computer science or similar (Master's preferred). 5+ years of experience building scalable, distributed systems. Passion for software engineering, continuous learning, and working in a collaborative environment. Hands-on experience with AWS, Azure, or GCP, with strong familiarity at the API/programming level. Experience with networking and/or security concepts is a plus. Experience developing containerized services on Kubernetes is strongly desired. Strong programming experience in Java/Spring Boot or Golang. Experience building or using REST APIs. Knowledge of infrastructure-as-code tools such as CloudFormation, Terraform, or Ansible is a plus. Understanding of TCP/IP networking fundamentals. Experience developing in Unix/Linux environments. Droisys is an equal opportunity employer. We do not discriminate based on race, religion, color, national origin, gender, gender expression, sexual orientation, age, marital status, veteran status, disability status or any other characteristic protected by law. Droisys believes in diversity, inclusion, and belonging, and we are committed to fostering a diverse work environment
    $119k-160k yearly est. 3d ago
  • Sr. Security Engineer

    The Word & Brown Companies 4.8company rating

    Cyber security analyst job in Orange, CA

    (Salary Range: $125,000 - $143,000 annually DOE) Purpose of Position: This position is responsible for maintaining and improving the security of the organization's information systems, networks, and data. Key responsibilities include proactively identifying potential security risks, developing and implementing security measures to prevent data loss. Essential Functions: • Perform active threat hunting, looking for potential attacks rather than just passively waiting for attacks • Perform red team/blue team exercises to test defenses and improve security operations. • Assists with vulnerability assessments, using provided security tools to identify system vulnerabilities • Design and implement security controls across cloud and on-premises environments • Create and maintain security monitoring and alerting solutions • Data Loss Prevention (DLP): Monitor DLP alerts, investigate incidents, and recommend actions to relevant teams to mitigate data breaches. • Assists in the planning and deployment of the company's cloud information security strategies • Manage Infrastructure and application security monitoring tools to detect and respond to security incidents in real-time • Participate in the development and improvement of the company's SDLC processes, ensuring security practices are integrated into all stages of product development • Responsible for evaluating, influencing, and recommending technology and product direction • Stay informed on the latest cybersecurity trends, emerging threats, attack techniques, and zero-day vulnerabilities affecting Microsoft environments and other relevant technologies. • On-site or remote regular attendance and punctuality are essential functions of the job. • Perform other business tasks or functions as assigned. Knowledge, Skills & Abilities Required: • Experience with Microsoft Defender, Sentinel, Azure Security Center, and Microsoft 365 security solutions, helping to identify vulnerabilities, mitigate threats, and enhance security postures. • Deep knowledge of Microsoft security solutions o Microsoft Defender for Endpoint o Microsoft Sentinel (SIEM/SOAR) o Azure Security Center & Microsoft Purview Compliance Manager o Microsoft Intune and Conditional Access Policies • Strong understanding of security principles and best practices • Strong knowledge and hands on experience with Data Loss Prevention • Hands-on experience in threat hunting • Certifications such as OSCP, OSWE, CISSP, CEH, GPEN, AZ-500 (Microsoft Azure Security Engineer), SC-200 (Microsoft Security Operations Analyst), or SC-300 (Microsoft Identity and Access Administrator) are a plus. • Proficiency in Microsoft security technologies and tools such as Purview Information Protection, Defender for Cloud and Sentinel • Experience with Managed Extended Detection and Response (MXDR) • Proficient in Microsoft Office programs, including Word, Excel, PowerPoint, as well as Outlook. • Adhere to all PHI (Protected Health Information) and HIPAA (Health Insurance Portability and Accountability Act) guidelines. Educational Requirements: • High School Diploma or equivalent required. • Bachelor's degree in Computer Science, Cyber Security or equivalent experience required. • Minimum of six (6) years of hands-on experience in IT with a focus on security. Physical Requirements: Must be able to sit for extended periods and occasionally stand and walk. Must have adequate hearing for phone work. Vision requirements include close vision and the ability to adjust focus. Must be able to communicate effectively in English. Must be able to use a keyboard and other office equipment. Ability to lift up to 10 pounds occasionally.
    $125k-143k yearly 2d ago
  • Information Systems Security Officer (ISSO)

    JT4 4.3company rating

    Cyber security analyst job in Port Hueneme, CA

    JT4 Point Mugu is seeking an Information Systems Security Specialist. This role is responsible for assessing, developing and implementing programs and controls set in place to help increase cybersecurity within our company. The Information Systems Security Specialist will be detail-oriented, have great problem-solving and analytical skills, and a passion for cybersecurity. JT4, LLC provides engineering and technical support to multiple western test ranges for the U.S. Air Force, Space Force, and Navy under the Joint Range Technical Services Contract, better known as J-Tech II. JT4 develops and maintains realistic, integrated test and training environments and prepares our nation's war-fighting aircraft, weapons systems, and aircrews for today's missions and tomorrow's global challenges. **An ideal candidate will have an active DoD secret clearance** **This position is located at Point Mugu and is not eligible for telework** Job Summary -- Essential Functions/Duties This position is the on-site technical specialist for monitoring information systems and maintaining the environment of operation to include developing and updating System Security Plans, managing and controlling changes to the systems, conducting audits, providing incident response, perpetration for vulnerability assessments, and assessing the security impact of security and non-security-relevant changes. Employee will be responsible to perform the following functions/duties: Provides incident handling in conjunction with the Facility Security Office (FSO) and Information Security Officer / Information Systems Security Manager (ISSO/ISSM) Assists in writing and maintaining computer security processes to meet Navy requirements of Risk Management Framework Monitors computer system use and audits logs Makes recommendations for future hardware / software implementations and related process improvements This position requires skills in team building and customer service Provides operational status as required Uses established policies and procedures and subject matter knowledge to complete complex assignments requiring originality and ingenuity performed under minimum supervision with considerable latitude for independent contribution Provides security training and awareness briefings Other duties as assigned. Requirements -- Education, Technical, and Work Experience Associates or higher degree in Computer/Information Technology, or equivalent academic/technical training/certification. Possess two to three years of experience in computer system security and/or related areas of expertise. Must be compliant to DoD 8570.01-M levels and possess or working toward Security+ certification with a CISSP desired. Should have experience with JSIG, NIST 800 and NISPOM, Chapter 8. In addition, an Information Systems Security Specialist must possess the following qualifications: Must possess and apply a broad knowledge of principles, practices and procedures in computer security and information systems and working experience with Microsoft Office, Access, and Visio Must possess experience supporting various system configurations such as Stand Alone, Local Area Networks, and Wide Area Networks Must possess excellent skills in verbal and written communications, planning, and organizing Ability to work under deadlines. Employee is expected to routinely cross fields in the completion of somewhat difficult and varied assignments. Government vehicle is used on an as-needed basis Ability to work in a field environment at remote locations with occasional overnight assignments Must qualify for and maintain a government security clearance Must possess a valid, state-issued driver's license.
    $79k-106k yearly est. 3d ago
  • Security Architect

    Technogen, Inc. 4.3company rating

    Cyber security analyst job in Santa Ana, CA

    1. Security, Compliance and Audit Readiness a. Enforce network security controls aligned with Criminal Justice Information Services (“CJIS”), National Institute of Standards and Technology (“NIST”), and department policy. b. Implement and maintain firewall rulesets, Network Access Control (“NAC”) solutions (e.g., Cisco Identity Service Engine (“ISE”)), and endpoint access policies. c. Support the cybersecurity team in incident detection, forensic analysis, and mitigation strategies. d. Provide documentation and evidence for security audits and compliance reviews. 2. Implementation, Operations and Support a. Serve as the hands-on engineer for network deployment, upgrades, and incident response. b. Configure and manage Cisco switches, routers, firewalls, WLCs, and wireless endpoints. c. Design and manage VPNs, QoS, ACLs, network monitoring, and logging systems (SolarWinds, NetFlow, SNMP). 3. SME Leadership and Staff Development a. Serve as the department's SME on enterprise security, guiding decisions across IT, public safety systems, and operations. b. Train, coach, and mentor internal IT staff, including junior and mid-level network technicians. c. Lead structured knowledge transfer sessions, hands-on training, and real-time coaching during support and implementation activities. d. Create SOPs, how-to guides, and step-by-step documentation tailored for ongoing use by internal staff. e. Support staff in preparation for certification paths (e.g., CCNA/CCNP) if desired. 4. Any other activities reasonably related to the foregoing, as assigned by OCSD.
    $120k-170k yearly est. 5d ago
  • Information Security Architect -- MAHDC5660809

    Compunnel Inc. 4.4company rating

    Cyber security analyst job in San Francisco, CA

    Information Security Need Local to San Francisco, CA Onsite role Looking for independent folks. Top Skills: KQL - kusto query language - used by different Microsoft security tools like sentinel or defender SPL that Splunk uses General incident response actual incident tickets - resolve actual security incident tickets Requirements • Self-starter, able to readily explore and learn new areas and concepts. • Knowledge and experience normally acquired through, or equivalent to, the completion of a Computer Science or Computer Engineering Bachelor's degree with a minimum of 5 years of job-related experience. • Degrees in Computer Science or Engineering and/or relevant technically focused certifications in Cloud and/or enterprise security architecture such as GCAD or GDSA are advantageous Experience with • AWS commercial or government cloud • Experience securing critical workloads in a cloud environment. • Knowledge and experience with Databricks, Starburst, Collibra and Immuta is advantageous. Job Role Summary Lead and produce system threat models for integration of commercial components into a data lake platform. Help design secure cloud architectures. Propose effective security controls within the environment and identify and mitigate security vulnerabilities. Simplify complex security topics, lead discussion in technical and business teams, communicate risk accurately. Skills • Able to create AWS secure cloud architecture designs • Understand current security threats, techniques, and landscape • System threat modeling of applications and platforms • Able to identify and provide mitigation for security vulnerabilities within applications and application environments based on threat models. • Able to simplify complex security topics for consumption and critical decision making. • Clear and accurate communication • Able to lead/direct discussions with technical and business teams to achieve common goals. • Able to work well within a team and support team goals • Understand cyber security frameworks such as NIST 800-53 • Ability to work on a geographically distributed team across multiple time zones • Familiarity with SAFe a plus Responsibilities • Evolve and mature our models, templates, standards and procedures related to secure application development and secure application and cloud architecture. Ensure these artifacts are in alignment with FRS policy and standards. • Consult with our development teams to help them align with FRS policy and standards and meet the risk appetite of the customer. • Work with members of application development teams to review and create secure application and infrastructure designs and patterns. • Assist development teams by reviewing threat models related to applications and related systems. Analyze potential business impact and exposure leading to risk, based on emerging security threats, vulnerabilities, configurations, threat actor TTPs, etc. • Evaluate CICD pipeline design, and related development team processes and help to mature and secure creation, management and utilization of pipelines. • Assist in identification and integration of security focused tooling into development and operations processes. • Support secure application architecture within the Federal Reserve System by fostering constructive dialogue and seeking resolution when confronted with discordant views. • Solicit feedback and continuously improve your knowledge, skills and capabilities related to the position. • Assist with recruiting activities and administrative work.
    $116k-156k yearly est. 5d ago
  • Security Architect GCP

    Xoriant 4.4company rating

    Cyber security analyst job in Sunnyvale, CA

    Security Architect / Implementation Engineer Duration: 6 Months contract with possibility of extension We are seeking a highly skilled Security Architect / Security Implementation Engineer with expertise in designing, implementing, and integrating Google Cloud Security Command Center (SCC), Chronicle SIEM, and Cybereason XDR. The candidate will be responsible for architecting the end-to-end solution, implementing GCP native security controls, integrating third-party security tools, and producing detailed design and operational documentation. Key Responsibilities: Design and architect cloud-native security controls in GCP aligned with security and compliance frameworks (CIS, ISO 27001, NIST, etc.). Implement Google Security Command Center (SCC) for threat detection, vulnerability management, and risk insights. Architect and configure Chronicle SIEM for log ingestion, correlation, and advanced threat analytics. Integrate Cybereason XDR with SCC, Chronicle, and other security tools to establish end-to-end threat detection and response workflows. Define use cases, rules, policies, and security playbooks to automate detection and response. Document the solution architecture, design decisions, configuration standards, and integration workflows. Conduct knowledge transfer sessions with security operations and support teams. Collaborate with GCP Cloud Platform teams, SOC teams, and compliance teams to align solutions with enterprise policies. Required Skills & Experience: 8-12 years of overall IT security experience with at least 4-5 years in Google Cloud Security. Proven experience with Google Security Command Center (SCC), Chronicle SIEM, and XDR platforms (Cybereason preferred). Strong knowledge of GCP IAM, VPC Service Controls, Cloud Armor, DLP, Cloud Logging, Cloud Monitoring. Hands-on experience in integrating SIEM, XDR, and native GCP security tools. Experience with Terraform, Deployment Manager, or automation frameworks for security deployment. Strong documentation and presentation skills. Security certifications preferred: Google Professional Cloud Security Engineer, GCP Professional Architect, CISSP, CISM, CCSP.
    $115k-157k yearly est. 4d ago
  • Application Security Engineer

    Skechers 4.0company rating

    Cyber security analyst job in Manhattan Beach, CA

    WHO WE ARE: Headquartered in Southern California, Skechers-the Comfort Technology Company -has spent over 30 years helping men, women, and kids everywhere look and feel good. Comfort innovation is at the core of everything we do, driving the development of stylish, high-quality products at a great value. From our diverse footwear collections to our expanding range of apparel and accessories, Skechers is a complete lifestyle brand. ABOUT THE ROLE: Skechers is seeking a passionate Application Security Engineer to join our team and serve as a security champion who bridges the gap between development and security operations. This role is critical to strengthening our security posture by embedding security practices throughout the software development lifecycle and fostering a security-first culture across our development teams. The ideal candidate will be a hands-on security professional who thrives on collaboration, enjoys mentoring developers, and has the technical expertise to identify vulnerabilities while providing practical remediation guidance. You will play a pivotal role in scaling our application security program and ensuring our applications are secure by design. WHAT YOU'LL DO: Successfully integrate security practices into development workflows, resulting in measurable reduction of security vulnerabilities in production applications Conduct thorough security-focused code reviews that identify critical vulnerabilities while providing actionable feedback to development teams Establish and implement efficient processes for triaging, prioritizing, and tracking remediation of security findings with clear SLAs and accountability measures Enhance developer engagement through proactive security awareness initiatives, building trusted relationships that enable developers to implement secure coding practices throughout the development process. Assist with management and optimization of SAST, DAST, OSS, WAF, and other application security tools to maximize coverage and minimize false positives Provide analysis and support as needed during security incidents to contribute to faster resolution times WHAT YOU'LL BRING: Proficiency with application security tools including SAST, DAST, dependency scanning, and WAF technologies Strong understanding of common web application vulnerabilities (OWASP Top 10) and secure coding practices Experience with at least one programming language (Java, Python, JavaScript, C#, or similar) Knowledge of API security, authentication mechanisms, and authorization frameworks Familiarity with DevSecOps practices and CI/CD pipeline integration REQUIREMENTS: 3-5 years of hands-on application security experience with demonstrated expertise in secure code review Retail or e-commerce experience a plus The pay range for this position is $110,000-$155,000/yr USD.
    $110k-155k yearly 3d ago
  • Security Architect

    Intelliswift-An LTTS Company

    Cyber security analyst job in Torrance, CA

    Cloud Security AI Security Container Security Cyber Risk Assessment Identity and Access Management (IAM) DevSecOps CISSP / CCSP / CISA / CCNP (Certifications) Daily Tasks Performed: • Security Design and Architecture: Knowledge of security design and architecture for organizational systems to meet defined cybersecurity needs; ability to embed security principles into the design goals while minimizing the risk from cyber security threats and vulnerabilities. • Cross-functional Collaboration: Knowledge of collaborative techniques and approaches; ability to promote a culture of continuous improvement and working together across functions to solve business problems and meet business goals. • Frameworks and Industry Standards: Knowledge of cybersecurity enterprise programs, policies, and standards to govern the organization's approach towards protecting their systems; Ability to align them with regulations, organization's context, operating environment, and cyber threats. • Communicating Complex Concepts: Knowledge of effective presentation tools and techniques to ensure clear understanding; ability to use summarization and simplification techniques to explain complex technical concepts in simple, clear language appropriate to the audience. • Domain Knowledge: Knowledge of a specific domain, its current trends, directions, and regulatory considerations; ability to apply domain-specific knowledge to relevant situations. • Technical Excellence: Knowledge of a given technology and various application methods; ability to develop and provide solutions to significant technical challenges • Cybersecurity Expertise: Knowledge of the processes, tools, and techniques in the cybersecurity domain; ability to deploy and monitor cybersecurity measures, while detecting, controlling, and preventing cybersecurity breaches. What this person will be working on: This is a Security architect role and will include Cloud Security, AI Security, endpoint security, Network security and other security domain areas as needed Position Success Criteria (Desired) - 'WANTS' Qualification: IS related bachelor's degree and/or equivalent work experience. 5+ years of IT business work experience Desired Certifications: CISSP, CCSP, CCNP, CISA, or equivalent are highly desirable • Problem Solving: Knowledge of approaches, tools, techniques for recognizing, anticipating, and resolving organizational, operational or process problems; ability to apply knowledge of problem solving appropriately to diverse situations. • Conceptual Thinking: Knowledge of thinking and reasoning at a conceptual level; ability to identify the critical ideas and interdependencies among system elements that impact performance. • Cloud Security: Knowledge of tools, technologies, and processes of cloud security; ability to minimize security risks to secure cloud computing services. • Container Security: Knowledge of containerization technologies, secure image practices, runtime security, secure networking, and incident response; ability to design, develop, and implement secure container environments, while assessing risks, leading audits, and advocating for best practices, enables effective protection of containerized environments. • AI Security: Designs secure architectures for Gen AI systems with a focus on threat modeling, data protection, and adversarial risk mitigation. Ensures secure deployment, access control, and compliance with AI governance and regulatory standards. Collaborates cross-functionally to embed security across the AI/ML lifecycle. Knowledge of tools, technologies related to AI development and security. • Cyber Risk Assessment and Mitigation: Knowledge of cyber risk assessment and mitigation strategies across the systems' life cycle; ability to assess risks timely and propose countermeasures. • Threat Analysis and Defense: Knowledge of characteristics, behaviors, capabilities, intent, and interactions of incoming cyber threats; ability to analyze the threats and develop defense and mitigation strategies to effectively combat such threats. • Identity and Access Management: Knowledge of security administration; ability to manage access to computers, infrastructure, networks, and applications. • DevSecOp: Knowledge of concept, principles, methodologies of DevSecOps; ability to utilize related tools and techniques to integrate security into DevOps processes.
    $117k-171k yearly est. 3d ago
  • Network Security Analyst I

    Select Cyber

    Cyber security analyst job in San Diego, CA

    Select Cyber, an Information Security recruitment specialty firm, seeks to fill the following role for our client: Network Security Analyst I Be part of a cutting-edge Computer Incident Response Team, (CIRT) for a fortune 500 company. We are looking for individuals that want to learn a new field and grow with the company. Training provided. The selected candidate will be a part of the Security Operations Center (SOC) and its mission to improve the information security of our customers using a Security Information and Event Management (SIEM) tool to detect and analyze IT security incidents. Responsibilities: Perform the following functions as individual assignments or as part of a team: · Monitoring client networks for signs of adversarial activity. · Respond to alerts from various monitoring systems and platforms providing indicators for enterprise defensive measures. · Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs). · Triage potentially malicious events to determine severity and criticality of the event. · Follow procedures to analyze and escalate security incidents which vary from customer to customer. Experience · 1+ years technical experience in the Information Technology field. · Experience with Intrusion Detection & Prevention Systems (IDS/IPS) or Firewalls & Log Analysis a plus. · Technical degree, Associate or Bachelor's degree from an accredited institution in Computer Science or information technology field preferred. · CompTIA Network+/Security+ certifications is a plus
    $77k-105k yearly est. 60d+ ago
  • Cyber Palo Alto Networks Security Operations Senior Consultant

    Deloitte 4.7company rating

    Cyber security analyst job in Fresno, CA

    Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, we enable our clients to operate with resilience, grow with confidence, and proactively manage to secure success. Recruiting for this role ends on 12/31/25 The team Our Cyber Defense & Resilience offering assists clients in defending against advanced threats by transforming security operations, monitoring technology, data analytics, and threat intelligence. Helps manage and protect dynamic attack surfaces and provides rapid crisis and cyber incident response, ensuring clients can be ready for, respond to, and recover from business disruptions. Work You'll Do + Lead the design and deployment of Next-Generation SOC platforms, like Cortex XSIAM, including advanced detection rules and SOAR playbooks, and SIEM ingestion. + Integrate diverse log and telemetry sources, ensuring data quality and normalization. + Develop and optimize automated response workflows for incident containment and remediation. + Advise clients on advanced use cases, threat detection, and automation strategies. + Collaborate with cross-functional teams for solution enhancements and threat intelligence integration. + Present technical findings and recommendations to stakeholders. Required Qualifications + BA/BS degree in a technical field (e.g., Computer Science, Cyber Security) + 4-6 years of progressively responsible experience in cloud, network, or identity security domains, demonstrating increasing levels of responsibility, technical depth, and leadership over time + 3-4 years of experience with Security Operations tools and platforms including Cortex XSIAM, Cortex XDR, Splunk, or similar SIEM technologies + 3-4 years of Security Operations Center experience demonstrating expertise in detection engineering, automation and playbook development, or SOC maturity methodologies + 3-4 years of experience with one or more cloud service providers (AWS, GCP, Azure) and native security tools + 3-4 years of experience with management of log sources, data normalization, ingestion and manipulation of data + 3-4 years of experience working with detection and response platforms (EDR) like Microsoft Defender, Cortex XDR, CrowdStrike + 3-4 years of experience with governance, risk, or compliance initiatives involving common frameworks + Certifications including Palo Alto Networks' PCNSE or Certified Cybersecurity Associate or equivalent and/or similar cybersecurity certifications + Ability to travel up to 50%, on average, based on the work you perform and the clients and industries/sectors you serve. + Limited immigration sponsorship may be available Preferred Qualifications + Experience with Palo Alto Networks' platform of solutions including, but not limited to, next-generation firewalls, Cortex & Prisma Cloud, and Prisma Access, XDR, etc. + Strong understanding of vendor competitive analysis within Security Operations (e.g., competitive differences between competing SIEM solutions) + Proficiency with advanced scripting, playbook development within a SIEM, SOAR or Security platform + Basic proficiency with network routing protocols (e.g., BGP, ECMP) and network architecture concepts (e.g., network segmentation), in support of on-premise and secure cloud infrastructure use cases + Ability to communicate and advise on solution design based on client use-cases, requirements, or other success criteria + Previous consulting or "Big 4" experience + Relevant advanced cybersecurity or related network engineering certifications (e.g., CISSP, CEH, CCSP) Information for applicants with a need for accommodation: ************************************************************************************************************ The wage range for this role takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $102,500 - $188,900. You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
    $102.5k-188.9k yearly 60d+ ago
  • Cybersecurity risk security analyst

    Sigmaways Inc.

    Cyber security analyst job in Sonoma, CA

    We are seeking a Cybersecurity Risk Analyst to support managing and mitigating security risks across processes, technologies, and cloud environments. The ideal candidate will combine technical expertise, business acumen, and cybersecurity experience to advise partners, assess risks, and drive improvements in secure operations. This role requires hands on experience with Kusto Query Language (KQL), cloud security, and risk assessment, as well as the ability to communicate effectively with stakeholders at all levels. Must be local to San Francisco or Los Angeles (LA) or Salt Lake City (SLC). Responsibilities: Support risk strategies by identifying and mitigating security risks in bank systems and processes. Apply and interpret security policies, provide guidance and input on policy enhancements. Advise business and technical partners on security controls, procedures, and best practices. Assess cloud and on-prem environments to identify risks and recommend control improvements. Conduct security control assessments, document findings, and develop actionable remediation plans. Evaluate third-party vendors to determine shared security responsibilities and associated risks. Communicate security risks and mitigation strategies effectively to technical teams and executives. Collaborate across teams to drive secure operations and deliver results in a fast-paced environment. Qualifications: Bachelor's degree in Cybersecurity, Information Security, Computer Science, or related technical discipline (or equivalent experience). 3+ years of experience in cybersecurity, information security, or technology risk management. Proficiency in Kusto Query Language (KQL) for data analysis, log correlation, and threat detection. In-depth understanding of security frameworks such as NIST, ISO 27001, or FedRAMP. Demonstrated experience assessing and improving security posture across Cloud (Azure, AWS) and on-premises environments. Proven ability to conduct security control assessments, identify risk exposures, and develop actionable remediation plans. Skilled at translating technical security concepts into clear, business-relevant insights for stakeholders and executives. Excellent communication, collaboration, and interpersonal skills, with a focus on building trusted partnerships across technical and business teams. Strong organizational and analytical skills, with the ability to manage multiple initiatives in a fast-paced, results-driven environment.
    $91k-136k yearly est. 4d ago
  • Security Analyst

    Robert Half 4.5company rating

    Cyber security analyst job in Los Angeles, CA

    We are seeking an Information Security Analyst to support enterprise security operations with a focus on vendor risk management, security control integration, and infrastructure security. This role is responsible for conducting security assessments, coordinating the implementation of core security services (including SSO, logging, IAM, and data protection), and supporting compliance activities aligned with frameworks such as NIST and ISO 27001. The ideal candidate has experience in cybersecurity risk management, cloud environments (AWS/Azure), and collaborating with technical teams to ensure the effective delivery of security controls. At least 2+ years of experience in the following: Security & Compliance Frameworks NIST CSF ISO 27001 CIS Controls ITIL SOC 2 PCI DSS FedRAMP GDPR / CCPA Vendor Risk & GRC Tools OneTrust SIG (Standardized Information Gathering) Other GRC/TPRM platforms Identity, SSO & Access Management SSO (PingFederate, SAML) Active Directory Azure AD AWS IAM
    $74k-112k yearly est. 5d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Hanford, CA?

The average cyber security analyst in Hanford, CA earns between $73,000 and $143,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Hanford, CA

$102,000
Job type you want
Full Time
Part Time
Internship
Temporary