Cyber security analyst jobs in Menifee, CA - 78 jobs
All
Cyber Security Analyst
Senior Security Engineer
Information Systems Security Officer
Information Security Analyst
Security System Engineer
Senior Security Analyst
Securities Analyst
Information Security Engineer
Senior Information Security Analyst
Security Engineer
Information Security Engineer III
Capital Group International Inc. 4.4
Cyber security analyst job in Irvine, CA
“I can be myself at work.”
You are more than a job title. We want you to feel comfortable doing great work and bringing your best, authentic self to everything you do. We value your talents, traditions, and uniqueness-and we're committed to fostering a strong sense of belonging in a respectful workplace.
We intentionally seek diverse perspectives, experiences, and backgrounds, investing in a culture designed to celebrate differences. We believe that belonging leads to better outcomes and a stronger community of associates united by our mission. At Capital, we live our core values every day: Integrity, Client Focus, Diverse Perspectives, Long-Term Thinking, and Community.
“I can influence my income.”
You want to feel recognized at work. Your performance will be reviewed annually, and your compensation will be designed to motivate and reward the value that you provide. You'll receive a competitive salary, bonuses and benefits. Your company-funded retirement contribution will factor in salary and variable pay, including bonuses.
“I can lead a full life.”
You bring unique goals and interests to your job and your life. Whether you're raising a family, you're passionate about where you volunteer, or you want to explore different career paths, we'll give you the resources that can set you up for success.
Enjoy generous time-away and health benefits from day one, with the opportunity for flexible work options
Receive 2-for-1 matching gifts for your charitable contributions and the opportunity to secure annual grants for the organizations you love
Access on-demand professional development resources that allow you to hone existing skills and learn new ones
“I can succeed as a Security Engineer III”
As an Information Security Engineer III, you bring mid-level cybersecurity expertise and the ability to handle complex security engineering tasks with minimal supervision. You collaborate across teams to strengthen the organization's security posture and play a critical role in designing, implementing, and maintaining secure systems across both on‑premises and cloud environments.
You naturally embed security into IT projects, proactively identify vulnerabilities, and automate controls to reduce risk. Your strong technical foundation in infrastructure, cloud, and application security allows you to partner effectively with development, DevOps, and IT operations teams to ensure security is built into every stage of the software development lifecycle. You also contribute to incident response efforts and mentor junior engineers, driving continuous improvement in security engineering practices.
“I am the person Capital Group is looking for.”
You own and drive small to medium security projects or work‑streams that enhance the organization's defenses.
You conduct advanced threat modeling and in‑depth risk assessments for complex systems to uncover vulnerabilities and drive implementation of secure design patterns or automated controls to mitigate these risks.
You ensure that configurations align with security policies and that new systems are built with secure defaults.
You work with software engineers and system owners to prioritize and remediate complex, multi‑service vulnerabilities and misconfigurations.
You drive strategic security planning and governance by developing and refining security policies, standards, and reference architectures that incorporate industry best practices and address emerging threats.
You collaborate with senior leadership and cross‑functional teams to ensure security initiatives and roadmaps align with business objectives and compliance requirements.
You work closely with cross‑functional teams - including DevOps, IT operations, software development, and product management - to embed security into every stage of system development and deployment.
You translate security findings into actionable tasks for others and follow up to ensure these are implemented.
You provide technical leadership through activities such as code reviews, design consultations, and hands‑on training sessions, guiding team members in solving complex security challenges and promoting best practices.
You collaborate with senior leadership and cross‑functional teams to ensure security initiatives and roadmaps align with business objectives and compliance requirements.
You perform additional responsibilities as assigned.
Required Skills:
You have a Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent work experience).
You have a minimum of 3-5 years of experience in core security principles across multiple domains, including identity and access management, cryptography, and network security protocols (e.g., TLS, SSH), as well as secure coding fundamentals.
You have hands‑on experience applying security frameworks like NIST SP 800‑53 and CIS Benchmarks to harden systems and ensure compliance with best practices, as well as evaluating system configurations against these standards.
You are proficient in scripting and automation (e.g., Python, PowerShell, or Terraform) to streamline security operations. This includes creating scripts or using IaC for automated patch management, secure‑default environment buildouts, and continuous compliance checks. Experience integrating security tools into CI/CD pipelines is a strong plus.
You have demonstrated experience in performing security analysis and solving complex problems.
You have excellent teamwork skills, with the ability to work cross‑functionally and communicate effectively.
You can mentor junior team members or interns by sharing knowledge and best practices.
You have professional certifications that demonstrate security knowledge, such as CompTIA CySA+, GSEC, AWS Solutions Architect - Associate, or Azure Security Engineer Associate a plus.
“I can apply in less than 4 minutes.”
You've reviewed this job posting and you're ready to start the candidate journey with us. Apply now to move to the next step in our recruiting process. If this role isn't what you're looking for, check out our other opportunities and join our talent community.
“I can learn more about Capital Group.”
At Capital Group, the success of the people who invest with us depends on the people in whom we invest. That's why we offer a culture, compensation and opportunities that empower our associates to build successful and prosperous careers. Through nine decades, our goal has been to improve people's lives through successful investing. We know that our history is a testament to the strength of the people we hire. More than 9,000 associates in 30+ offices around the world help our clients and each other grow and thrive every day. Find us on LinkedIn, Instagram, YouTube and Glassdoor.
Southern California Base Salary Range: $141,648-$226,637San Antonio Base Salary Range: $116,447-$186,315New York Base Salary Range: $150,155-$240,248
In addition to a highly competitive base salary, per plan guidelines, restrictions and vesting requirements, you also will be eligible for an individual annual performance bonus, plus Capital's annual profitability bonus plus a retirement plan where Capital contributes 15% of your eligible earnings.
You can learn more about our compensation and benefits
here
.
* Temporary positions in the United States are excluded from the above mentioned compensation and benefit plans.
We are an equal opportunity employer, which means we comply with all federal, state and local laws that prohibit discrimination when making all decisions about employment. As equal opportunity employers, our policies prohibit unlawful discrimination on the basis of race, religion, color, national origin, ancestry, sex (including gender and gender identity), pregnancy, childbirth and related medical conditions, age, physical or mental disability, medical condition, genetic information, marital status, sexual orientation, citizenship status, AIDS/HIV status, political activities or affiliations, military or veteran status, status as a victim of domestic violence, assault or stalking or any other characteristic protected by federal, state or local law.
$150.2k-240.2k yearly Auto-Apply 10d ago
Looking for a job?
Let Zippia find it for you.
Application Security Engineer
Alignment Healthcare 4.7
Cyber security analyst job in Orange, CA
Alignment Health is breaking the mold in conventional health care, committed to serving seniors and those who need it most: the chronically ill and frail. It takes an entire team of passionate and caring people, united in our mission to put the senior first. We have built a team of talented and experienced people who are passionate about transforming the lives of the seniors we serve. In this fast-growing company, you will find ample room for growth and innovation alongside the Alignment Health community. Working at Alignment Health provides an opportunity to do work that really matters, not only changing lives but saving them. Together.
This position is responsible for identifying, analyzing, and helping with remediate security vulnerabilities within our applications. This role requires a strong understanding of application security principles, hands-on experience with various security testing methodologies, and excellent communication skills to collaborate effectively with development teams and other stakeholders.
Job Responsibilities:
Conduct static application security testing (SAST), dynamic application security testing (DAST), and interactive application security testing (IAST) on a continuous basis.
Identify, triage, and validate security vulnerabilities using both automated tools and manual review.
Work closely with software development and DevOps teams to provide clear, actionable guidance on how to fix vulnerabilities and implement secure coding practices.
Help integrate security controls and checks into the software development lifecycle (SDLC) and CI/CD pipelines.
Drive and support application security reviews and threat modeling.
Manage and configure a suite of application security tools, ensuring their effective use and reporting.
Stay up-to-date with the latest security threats, trends, and technologies, and conduct research on new vulnerabilities and attack vectors.
Contribute to the creation and maintenance of application security policies, standards, and procedures to guide development teams and ensure compliance.
Develop and deliver security awareness and secure coding training to engineering teams.
Support and lead third-party penetration testing.
Job Requirements:
Experience:
Required:
5-7+ years of progressive experience in information security, with a strong focus on application security testing and vulnerability management.
Proven track record of working directly with developers and engineering teams to identify and remediate security vulnerabilities in a fast-paced environment.
Experience in a large-scale enterprise environment with complex application portfolios.
Preferred:
Experience in healthcare or another highly regulated field.
Education:
Required:
Bachelor's degree or equivalent work experience in Computer Science, Information Security, or a related technical discipline.
Preferred:
Relevant professional certifications such as Offensive Security Certified Professional (OSCP), GIAC Web Application Penetration Tester (GWAPT), or Certified Secure Software Lifecycle Professional (CSSLP) are highly desirable.
ISC2 Certified Information Systems Security Professional (CISSP)
Specialized Skills:
Required:
Experience with general threat hunting techniques and tools.
Experience with one or more programming languages (i.e., C#, Scala, Python).
Essential Physical Functions:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. While performing the duties of this job, the employee is regularly required to talk or hear. The employee regularly is required to stand, walk, sit, use hand to finger, handle or feel objects, tools, or controls; and reach with hands and arms.
2. The employee frequently lifts and/or moves up to 10 pounds. Specific vision abilities required by this job include close vision and the ability to adjust focus.
Pay Range: $113,332.00 - $169,999.00
Pay range may be based on a number of factors including market location, education, responsibilities, experience, etc.
Alignment Health is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, age, protected veteran status, gender identity, or sexual orientation.
*DISCLAIMER: Please beware of recruitment phishing scams affecting Alignment Health and other employers where individuals receive fraudulent employment-related offers in exchange for money or other sensitive personal information. Please be advised that Alignment Health and its subsidiaries will never ask you for a credit card, send you a check, or ask you for any type of payment as part of consideration for employment with our company. If you feel that you have been the victim of a scam such as this, please report the incident to the Federal Trade Commission at ******************************* If you would like to verify the legitimacy of an email sent by or on behalf of Alignment Health's talent acquisition team, please email ******************.
$113.3k-170k yearly Auto-Apply 60d+ ago
Software Security Analyst
TP-Link Systems 3.9
Cyber security analyst job in Irvine, CA
About Us:
Headquartered in the United States, TP-Link Systems Inc. is a global provider of reliable networking devices and smart home products, consistently ranked as the world's top provider of Wi-Fi devices. The company is committed to delivering innovative products that enhance people's lives through faster, more reliable connectivity. With a commitment to excellence, TP-Link Systems serves customers in over 170 countries and continues to grow its global footprint.
We believe technology changes the world for the better! At TP-Link Systems Inc, we are committed to crafting dependable, high-performance products to connect users worldwide with the wonders of technology.
Embracing professionalism, innovation, excellence, and simplicity, we aim to assist our clients in achieving remarkable global performance and enable consumers to enjoy a seamless, effortless lifestyle.
Overview:
We are seeking many highly skilled and experienced Software SecurityAnalyst (aka Source Code Auditor) to join our cybersecurity team. In this role, you will be responsible for reviewing and analyzing source code to identify potential security vulnerabilities, ensure compliance with coding standards, and enhance the overall security posture of our applications. You will work closely with development teams, security professionals, and stakeholders to provide actionable insights and recommendations for improving code quality and security.
Key Responsibilities
Conduct thorough audits of source code to identify vulnerabilities, security weaknesses, and coding inefficiencies.
Review and analyze code across a variety of programming languages and frameworks, including but not limited to Python, Java, C++, JavaScript, Swift and Kotlin.
Develop and maintain code auditing standards, processes, and tools to ensure consistent and high-quality reviews.
Collaborate with development teams to provide feedback and guidance on secure coding practices and remediation strategies.
Prepare detailed audit reports that outline findings, risks, and recommendations for improving code security and quality.
Stay up to date with the latest security threats, coding standards, and best practices to continuously improve audit processes.
Mentor junior auditors and provide guidance on auditing techniques, tools, and best practices.
Work with cross-functional teams to integrate security practices into the software development lifecycle (SDLC).
Assist in developing and conducting security training and awareness programs for development teams.
Requirements
Qualifications:
Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent experience.
5+ years of experience in source code auditing, software development, or application security.
Strong understanding of secure coding principles, software vulnerabilities, and common attack vectors (e.g., SQL injection, cross-site scripting, buffer overflow).
Proficiency in multiple programming languages and familiarity with a variety of development frameworks and environments.
Experience with automated code review tools (e.g., SonarQube, Coverity, Checkmarx, Veracode) and manual code review techniques.
Excellent analytical and problem-solving skills with a keen eye for detail.
Strong communication skills, with the ability to explain complex technical concepts to non-technical stakeholders.
Relevant certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or Certified Information Systems Security Professional (CISSP) are a plus.
Benefits
Salary range: $100,000-$140,000
Free snacks and drinks, and provided lunch on Fridays
Fully paid medical, dental, and vision insurance (partial coverage for dependents)
Contributions to 401k funds
Bi-annual reviews, and annual pay increases
Health and wellness benefits, including free gym membership
Quarterly team-building events
At TP-Link Systems Inc., we are continually searching for ambitious individuals who are passionate about their work. We believe that diversity fuels innovation, collaboration, and drives our entrepreneurial spirit. As a global company, we highly value diverse perspectives and are committed to cultivating an environment where all voices are heard, respected, and valued. We are dedicated to providing equal employment opportunities to all employees and applicants, and we prohibit discrimination and harassment of any kind based on race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Beyond compliance, we strive to create a supportive and growth-oriented workplace for everyone. If you share our passion and connection to this mission, we welcome you to apply and join us in building a vibrant and inclusive team at TP-Link Systems Inc.
Please, no third-party agency inquiries, and we are unable to offer visa sponsorships at this time.
$100k-140k yearly Auto-Apply 45d ago
Information Systems Security Officer
Mantech International Corporation 4.5
Cyber security analyst job in Camp Pendleton South, CA
General information Requisition # R64222 Posting Date 11/14/2025 Security Clearance Required TS/SCI Remote Type Onsite Time Type Full time Description & Requirements Shape the future of defense with MANTECH! Join a team dedicated to safeguarding our nation through advanced tech and innovative solutions. Since 1968, we've been a trusted partner to the Department of Defense, delivering cutting-edge projects that make a real impact. Dive into exciting opportunities in Cybersecurity, IT, Data Analytics and more. Propel your career forward and be part of something extraordinary. Your journey starts now-protect and innovate with MANTECH!
MANTECH seeks a motivated, career and customer-oriented Information Systems Security Officer with strengths in Information Systems Security to join our team at Marine Corps Base Camp Pendleton California.
This position will assist Marine Corps Warfighting Laboratory (MCWL) prepare for and maintain the IT infrastructure, IT capabilities and Audio-Visual capabilities to support emerging ICD 705 Sensitive Compartmentalized Information Facilities (SCIFs) and Special Access Control Facilities (SAPFs) through planning, activation and operations.
Responsibilities include but are not limited to:
* Experience in network design, network monitoring, systems development, and knowledge of Information Assurance (IA) policies, directives, and best practices across DoD and Marine Corps.
* Knowledge and experience with organizations within the Marine Corps responsible for facilitating network approvals and connections.
* Work with various Marine Corps, Navy, Joint, and other services to coordinate installs supporting Initial Operating Capability (IOC) and Final Operating Capability (FOC).
* Ability to communicate and provide effective staff coordination across government, Marine Corps, and contractor organizations.
* Support the facility Site Security Manager (SSM)/Special Security Representative (SSR) and Information Systems Security Manager (ISSM) to oversee the secure installations and operations of systems across multiple security domains and in accordance with policies, directives, and best practices.
* Establishes and satisfies complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports Marine Corps and other customers at the highest levels in the development and implementation of doctrine and policies.
Minimum Qualifications:
* Bachelor's degree and at least 10 years' experience planning and/or operating IT infrastructure within ICD 705 facilities.
* Experience with network security aspects of installations and operations.
Preferred Qualifications:
* Experience with MS Word, MS Power Point
Clearance Requirements:
* Candidate must have a current/active Top Secret clearance with the ability to obtain and maintain a TS/SCI clearance prior to starting this position.
Physical Requirements:
* Ability to maintain construction security oversight in outdoor environment; walk (with personal protective equipment) to inspect and document delivery of components and assembly/construction of structure.
The projected compensation range for this position is $114,600.00-$190,200.00. There are differentiating factors that can impact a final salary/hourly rate, including, but not limited to, Contract Wage Determination, relevant work experience, skills and competencies that align to the specified role, geographic location (For Remote Opportunities), education and certifications as well as Federal Government Contract Labor categories. In addition, MANTECH invests in its employees beyond just compensation. MANTECH's benefits offerings include, dependent upon position, Health Insurance, Life Insurance, Paid Time Off, Holiday Pay, short-term and long-term Disability, Retirement and Savings, Learning and Development opportunities, wellness programs as well as other optional benefit elections.
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
$114.6k-190.2k yearly Auto-Apply 9d ago
Senior Security Engineer, GenSec
Goodleap 4.6
Cyber security analyst job in Irvine, CA
About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America.
Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information.
The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services.
Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response.
Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed.
While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities
Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes.
Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements.
Support or develop components of the security analytics platform.
Contribute to investigations, threat hunting, and incident response activities in a supporting role.
Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns.
Support the security operations team with the vulnerability management lifecycle for products and services under your purview.
Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities.
Required Skills, Knowledge & Abilities
Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences.
Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization.
Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments.
Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus).
Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble.
Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc.
Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases.
Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault.
Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed.
Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas.
Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments.
Experience engaging with vendors in design partnerships.
Experience overseeing vulnerability and threat management at the platform and application levels.
Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement.
Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution.
Additional Information Regarding Job Duties and s:
Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law.
If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today!
We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
$114k-145k yearly est. Auto-Apply 60d+ ago
Information Security Engineer
Lenderlive Network 4.4
Cyber security analyst job in Temecula, CA
It's fun to work in a company where people truly BELIEVE in what they're doing!
We're committed to bringing passion and customer focus to the business.
The Information Security Engineer is responsible for contributing to the corporate Information Security program by assisting in the identification, recommendation and implementation of industry leading application security tools and techniques. The incumbent will also maintain and update application security processes and procedures and train team members on any relevant updates.
This position is remote, but local to the Temecula, CA office.
Essential Functions
Assist with the development, implementation, and administration of information security policies, standards, and procedures, adhering to industry best practices
Assist in integrating regulatory compliance requirements (e.g., PCI, GLBA) into the organizational security roadmap
Assist in ensuring that the corporate IT environment is secure and complies with all external audit requirements and federal standards
Coordinate with IT Operations to ensure endpoints and network devices conform to security standards, and that security devices and controls are working as designed
Assist in the identification, evaluation and implementation of industry leading application security tools and techniques
Plan, coordinate, and implement security measures to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of information
Perform risk assessments and execute system tests to ensure proper functioning of data processing activities and security measures
Identify potential security risks, and define and document remediation options or mitigating controls
Perform security incident investigations including: chain of custody, containment measures, root cause analysis, and identification of preventive measures
Define and assist in the management of an Incident Response Team that addresses potential or in-progress security events, establishing and adhering to escalation procedures and response times
Perform information systems evidence gathering, to support e-discovery requests and messaging searches
Perform security reviews on requests for new commercial software or material configuration changes to existing software
Perform periodic internal IT security audit functions on IT operational controls, to include system access controls, firewall rule reviews, etc.
Participate in on-call rotation
Perform related duties as requested
Essential Knowledge, Skills, & Abilities
Excellent written and verbal communication skills required
Solid presentation skills
Significant knowledge of security-oriented regulatory requirements and compliance
Excellent familiarity with IT security principles and practices including firewalling, hardening, data loss prevention, threat prevention, and identity management.
Ability to provide technical guidance to less experienced team members
Knowledge of the mortgage industry is helpful, but not required
Commitment and ability to cultivate a diverse and inclusive work environment.
Education
Bachelor's degree in computer science, Engineering, Information Systems Security or a related field is required.
Security class certifications strongly preferred
Azure certifications preferred
CISSP license preferred
Experience
5+ years of related IT experience required
2+ years in an Information Security engineering role
3+ years of experience in a regulated IT environment including some combination of SOX, HIPAA, GLBA, PCI preferred
Compensation and Benefits
Covius offers an extensive benefits package for all employees, including medical, dental, vision and 401(k)!
Compensation: $96,000 to $120,000 annually with a 10% AIP opportunity
Application Guidelines:
For best consideration, please submit your resume and application materials as soon as possible. Review of applications will begin immediately.
Working Conditions
Work is performed in a climate controlled indoor administrative office setting. The noise level in the work environment is usually quiet to moderate, depending upon the office or meeting location.
Physical Demands and Activities
While performing the duties of this job, the employee is frequently required to communicate. The employee frequently is required to remain stationary. The employee is frequently required to move about the office, operate a computer and other office machinery, such as calculator, copy machine, and computer printer; rarely position self to maintain files; rarely moves boxes weighing up to 10 lbs. Close and distance observation required with the ability to observe objects at close range in presence of glare or bright lighting (e.g., computer screen). Must possess the ability to communicate information and ideas so others will understand and have the ability to interact with external and internal stakeholders.
Covius is committed to equal opportunity in all employment practices to all qualified applicants and employees without regard to race, color, religion, gender, gender identity, age, national origin, pregnancy, disability, genetics, marital status, military or veteran status or any other protected category as established by local, state, and federal law. This policy applies to all aspects of the employment relationship including recruitment and hiring, placement, promotion, transfer, compensation, disciplinary action, layoff, leaves of absence, training, and termination. All such employment decisions will be made without unlawful discrimination based on any prohibited basis.
The essential functions, working conditions and physical demands described above are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this position.
Please note that all s are not intended to be all-inclusive. This job description is not designed to cover all activities, duties or responsibilities that are required of the employee for this job. Employees may be required to perform other duties at any time with or without notice to meet the ongoing needs of the organization.
If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us!
$96k-120k yearly Auto-Apply 60d+ ago
Sr. Information Security GRC Analyst
Loan Depot 4.7
Cyber security analyst job in Irvine, CA
Responsible for driving the development, implementation, communication, and maintenance of loan Depot's technology policies, standards and procedures that are aligned to industry standards and regulatory requirements. Ensures that loan Depot technology processes adheres to regulatory requirements, manages risks effectively, and establishes strong governance practices. Develops and implements controls, monitors compliance, and supports risk management activities.
Responsibilities:
* Leads the development and implementation of comprehensive cybersecurity and IT policies, standards, and guidelines.
* Continuously evaluates and updates cybersecurity and IT policies to ensure they remain current and effective.
* Ensures policies comply with relevant laws, regulations, and industry standards (e.g., NIST, FFIEC, GLBA, NYDFS, SOX and PCI-DSS).
* Collaborates with teams, working closely with IT, legal, compliance, and other departments, to gain a deep understanding of business needs to ensure cybersecurity policies align with business objectives.
* Transforms complex information and documentation into simple concepts that are easy to understand by the end-users.
* Offers specialized expertise and consultation to cross-functional teams to perform framework-oriented risk assessments, identify deficiencies, generate reports, and recommends prioritized, actionable solutions to mitigate risks and enhance loan Depot's overall security posture.
* Stays informed about the latest cybersecurity threats, trends, and best practices. Ensures accurate and up-to-date records of policy reviews, risk assessments, training activities, and incident responses.
* Benchmarks the organization's policies against industry standards and best practices.
* Develops and implements governance frameworks for cybersecurity policy management.
* Monitors key performance indicators, conducts gap analysis, risk assessments and implements frameworks, as needed. Tests and monitors effectiveness of controls.
* Establishes a feedback loop and analyzes metrics to continuously improve cybersecurity policies based on audit findings, incident reviews, and emerging threats.
* Actively leads and supports on internal and external audits and assessments of cybersecurity policies and practices. Accountable for ensuring identified audit and assessment findings and actions are tracked to closure.
* Maintains comprehensive documentation of all cybersecurity policies, procedures, and related activities. Communicates policy requirements and updates to all relevant stakeholders.
* Identifies opportunities for innovation and improvement in cybersecurity policy and practice. Proposes suitable mitigation strategies and verifies the effectiveness of remediation plans
Requirements:
* Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field preferred.
* Minimum of six (6) + years' experience working in Cybersecurity GRC, policy development, risk management, or a similar field.
* Experience with GRC tools (e.g., Archer, ServiceNow, OneTrust).
* Proficiency in using data analysis and reporting tools (e.g., Excel, Power BI).
* Relevant certifications such as CISM and/or CISA are highly desirable.
Why work for #teamloan Depot:
* Competitive compensation package based on experience, skillset and overall fit for #TeamloanDepot.
* Inclusive, diverse, and collaborative culture where people from all backgrounds can thrive
* Work with other passionate, purposeful, and customer-centric people
* Extensive internal growth and professional development opportunities including tuition reimbursement
* Comprehensive benefits package including Medical/Dental/Vision
* Wellness program to support both mental and physical health
* Generous paid time off for both exempt and non-exempt positions
About loan Depot:
loan Depot (NYSE: LDI) is a digital commerce company committed to serving its customers throughout the home ownership journey. Since its launch in 2010, loan Depot has revolutionized the mortgage industry with a digital-first approach that makes it easier, faster, and less stressful to purchase or refinance a home. Today, as the nation's second largest non-bank retail mortgage lender, loan Depot enables customers to achieve the American dream of homeownership through a broad suite of lending and real estate services that simplify one of life's most complex transactions. With headquarters in Southern California and offices nationwide, loan Depot is committed to serving the communities in which its team lives and works through a variety of local, regional, and national philanthropic efforts.
Base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay for this role is between $99,000 and $136,500. Your base pay will depend on multiple individualized factors, including your job-related knowledge/skills, qualifications, experience, and market location.
We are an equal opportunity employer and value diversity in our company. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
$99k-136.5k yearly Auto-Apply 22d ago
Systems Security Engineer II - P2 (Onsite)
RTX
Cyber security analyst job in Fullerton, CA
Country:
United States of America Onsite
U.S. Citizen, U.S. Person, or Immigration Status Requirements:
Security Clearance Type:
Secret - Current
Security Clearance Status:
Active and existing security clearance required on day 1
At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Raytheon is seeking a well-qualified Systems Security Engineer II (P2) to join our Systems Security Engineering (SSE) team in developing solutions to protect the Warfighter's technology advantage. Systems Security Engineering creates holistic security solutions leveraging CyberSecurity, Software Assurance and Supply Chain Risk Management to support Program Protection Implementation on embedded weapons systems. Join our highly visible team and perform technically challenging assignments, which will directly contribute to protecting our nation and our Warfighters. This is an onsite position at Raytheon in Fullerton, CA.
What You Will Do
Perform analysis on cybersecurity collected data and test results
Create patch artifacts such as patch media and information assurance posture reports; run regression tests on the system
Validate secure configuration of routers, switches, firewalls, servers, operating systems, applications, and other assets, using DoD approved scanning and assessment tools such as Nessus, STIG, Evaluate STIG, and/or RADIX.
Create and maintain Linux Bash and Python scripts
Qualifications You Must Have
Typically requires a Bachelor's degree in Science, Technology, Engineering or Mathematics (STEM) and 2 years of prior relevant experience
Active and transferable U.S. government issued Secret security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
Experience in System Security Engineering, computer technology reverse engineering, cybersecurity or embedded security
Qualifications We Prefer
Experience in the SSE implementation throughout the entire life cycle
Experience with Linux Bash and Python scripting
Experience contributing to a team environment for the purpose of developing creative solutions to technical problems
Cyber Certifications in accordance with DoDD 8570/DoDD 8140 such as CISSP, GSLC, CEH
Experience supporting the development of Risk Management Framework (RMF) documents and controls validation testing for Authority to Operate (ATO) accreditations
Candidate must exhibit an exceptional degree of ingenuity, creativity and resourcefulness
Excellent communication, technical writing, oral presentation and interpersonal skills
What We Offer
Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation
Relocation Eligible - Relocation assistance is available
As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote.
The salary range for this role is 75,800 USD - 144,200 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
$96k-139k yearly est. Auto-Apply 3d ago
Systems Security Engineer II
Cambro Manufacturing 4.4
Cyber security analyst job in Huntington Beach, CA
The System Security Engineer Level II is required to be a highly skilled and hands-on security engineer, and will be responsible for helping to maintain and expand the infrastructure of the entire Cambro network, ensuring that they are protected from cyber threats and attacks, ensuring compliance, and responding to incidents. In this role, the responsibility is to manage, monitor, and maintain our Network IT infrastructure from CVEs, cyber threats, manage and implement device firmware and software updates. Also, the role is required to assist in projects and initiatives to support, upgrade, and maintain our technical environment to improve network security. The role requirement is to be proficient with cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. The role requires to have a multi-disciplined background including experience with Cybersecurity Operations, firewalls, IDS/IPS, switches, VLANs, routing protocols, IPsec, VPN tunnels, multi factor authentication and e-mail security. In addition, they must have a solid understanding of virtualized servers, Windows workstations and services. This role is required to have the network monitoring skills and technologies for detecting unusual activity, investigate security breaches and lead incidence response.
ESSENTIAL JOB FUNCTIONS
• Monitor network traffic for anomalies, investigate alerts and respond to security incidents.
• Conduct regular vulnerability scans, risk assessments, patch management and mitigation across network devices.
• Ensure adherence to cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR.
• Able to proactively scan servers and network devices for vulnerable ports and protocols and rogue devices.
• Manage our firewall environment with the ability to create route policies and apply cybersecurity recommendations
• Install and configure Network Equipment (Switches, Firewalls, and other networking hardware)
• Perform (Layer 2) switch administration and configuration on Cisco/Ruckus switches. Including configuring LAGs, interfaces, creating trunks, creating, and managing segmented VLANs.
• Possess a solid understanding of Windows Server services and roles including installation and configuration
• Create certificates for network devices and servers that have a web management capability
• A strong understanding of Windows Active Directory and can design, implement, and configure and troubleshoot Active Directory issues
• Create, Manage and Deploy Group Policy Objects (GPO's) to deploy applications and implement security including windows firewalls
• Effectively use PowerShell to automate and standardize administrative tasks
• Capable of installing a Linux VM and execute basic Linux commands and managing Linux appliances
• Manage our virtualized server environment managing, creating VM's and patching the VMware environment.
• Strong understanding of Virtual Switches, Port Groups (Distributed and Standard)
• Manage the Active Backup for Business on Synology and other advanced Synology administration features
• Maintain and monitor Backup solutions.
• Manage our users email accounts using the cloud service M365 from Microsoft
• Responsible for creating and maintaining server and network documentation to include tasks and procedures
• Proactively monitor our network using a variety of tools to help identify potential network and server issues
• Assist in patching our entire infrastructure when needed using a variety of tools
• Maintains strong technical abilities, knowledge of new and changing technologies
• Prepare for emergencies by creating and/or updating action plans
• Jumping into time-sensitive projects wherever needed
• Showing flexibility and a willingness to learn
• Maintain healthy communication with IT Staff, IT Customers and Vendors
• Actively participate in IT Infrastructure and Operations projects, managing, completing, communicating, and fully documenting assigned tasks and deliverables.
• Maintain reliable and consistent attendance, including being punctual, and dependable in order to meet the needs of the department and the organization.
• Execute each essential duty satisfactorily to perform job successfully.
• Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions.
• Performs effectively as a team member, able to work well with others, open to receiving and give feedback, and treats everyone with respect.
• Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects.
• Follow all department quality standards/criteria. Raise concerns and issues to immediate manager.
• Able to understand and demonstrate Cambro company culture, display company core values (Safety, Quality, Respect, and Service).
• Understands department's key performance indicators and contributes to achieve these goals both individually and as a team.
• Maintains reliable and consistent attendance, including being punctual, dependable, and flexible to potential schedule changes to meet the needs of the department and the organization.
• Executes each essential duty satisfactorily to perform job successfully.
• Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions.
• Performs effectively as a team member, able to work well with others, open to receive and give feedback, and treats everyone with respect.
• Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects.
• Follows all department quality standards/criteria. Raises concerns and issues to management.
• Understands department's key performance indicators (KPIs) and contributes to achieve these goals both individually and as a team.
• Other duties as needed or required.
ADDITIONAL RESPONSIBILITIES
• Ability to be on call 24 hours a day, 7 days a week for global operations, by periodically providing off-hours, evening, and weekend support to accommodate maintenance windows and issue resolution
• Occasional travel to various Cambro locations domestically and internationally as required (15%)
• May occasionally guide less experienced associates to help with technical projects
• Some travel may be required.
REQUIRED QUALIFICATIONS
The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
• Bachelor's degree (B.A.) from a four-year accredited college or university.
• 5-10 years of experience in IT security, network, administration, and support roles.
• Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form.
• Ability to adapt and adjust plans to meet changing needs.
• Proficient in Microsoft Office Suite
• Experience with Fortinet solutions, EDR, email security solutions
• Solid knowledge of cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR.
• Solid working knowledge of Layer 2 (VLANs, Inter-VLANs, VTP Domains, bridge groups, MVRP, ACL's) technologies and network segmentation.
• Strong knowledge of DNS records including reverse zones and maintaining DNS records
• Strong DHCP Knowledge to include DHCP Fail over and able to configure DCHP relay on Switches
• Solid understanding of routing protocols, static routes and ARP cache
• Proficient in creating and implementing certificates on layer 2 devices (Switches, Firewalls, Linux Appliances)
• Strong troubleshooting skills and possess the ability to find security and network issues in a timely manner
• Strong Windows administration skills including Active Directory/GPO's and security policies
• Solid working knowledge of Virtualization, such as VMware ESXi servers and vCenter 7.x
• Solid working knowledge of Veeam/Bacula/Exagrid backup software to manage backup and restore procedures
• Must be able to follow instructions and procedures and ask questions if something is unclear
• Excellent documentation skills including ability to create network drawings
• Self-motivated and energetic with the ability to manage time efficiently without supervision and to work effectively under pressure
• Strong customer service and communication skills
• Excellent organizational skills and strong sense of urgency
• Familiarity with various network types including LANs, WANs, SDWAN, WLANs, SANs, and VoIP networks
• Great accuracy and attention to detail
PREFERRED QUALIFICATIONS
• Experience in Business Continuity and disaster recovery is a plus
• Knowledge of Ruckus Access Points and Switches
• Knowledge of IBMi
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Sitting, walking, standing, bending at the neck, bending at the waist, squatting, climbing, kneeling, crawling, twisting at the neck and waist, repetitive use of hands, simple grasping, power grasping, fine manipulation, pushing and pulling, reaching above and below the shoulder, carrying/lifting up to 50 lbs.
Driving cars and other IT equipment
Working around equipment and machinery
Exposure to excessive noise
Exposure to dust, gas, fumes or chemicals
Working at heights
Use of special visual or auditory protective equipment
Walking on uneven ground
PPE Requirements
Safety glasses
Steel-toe slip-resistant shoes - When in production area
Hearing protection (e.g. ear plugs, ear muffs) - When in production area
Face covering (mask) in accordance with company policy.
Hardhat/bump camp
IT Application
COMPENSATION RANGE:
$97,000- $120,000
Salary may vary based on experience.
CAMBRO is proud to be an equal-opportunity workplace. All qualified applicants will receive consideration for employment without regard to and will not be discriminated against based upon race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic information, military or veteran status, or other characteristics protected by law.
$97k-120k yearly Auto-Apply 60d+ ago
Controls Security & Fire System Engineer III
Johnson Controls Holding Company, Inc. 4.4
Cyber security analyst job in Huntington Beach, CA
What you do
Be responsible for Pre Sales Support & End User Support for, but not limited to the design, configuration, and operation of complete building low voltage systems, including fire, security, and other low voltage control sub-systems (i.e. lighting, nurse call, data networks, etc.) to meet the intent of the project requirements.
Accountable to field teams for quality, timeliness and efficiency of designs.
Develops complex software programs, commissions and troubleshooting to ensure proper operations of the building control system.
Provides detailed information and submittals to communicate design and operation to customers, consultants, Johnson Controls field installation team and subcontractors.
How will you do it - Sales Support and End User Support
· Possible job walks with the Sales Team on the initial design phase
· Designs and configures are technically complex building control systems as defined by the contract documents.
· Creates flow diagrams, sequence of operations, bill of material, network layouts and electrical schematics as required.
· Develop and tests software programs necessary to operate the system per the project requirements' intent.
· Coordinates the creation of necessary drawings and equipment schedules for submittals and installation.
· Assists in the loading and commissioning of all system and network-level controllers as required.
· Assists in validation of complete system functionality and troubleshoots problems with subcontractors and other trades to ensure proper operation.
· Provides field change information to the project team for the creation of as-built drawings and software.
· Keeps management and JCI contractor or customer informed of job progress and issues.
· Assists in performing site-specific training for owner/operator on the total building control system.
· Participates in release meeting with the project field team.
· Performs value engineering to provide cost effective results while maintaining customer satisfaction.
· Adheres to safety standards.
· High degree of employee and subcontractor safety.
What we look for
Required Qualifications
· Minimum of seven years of experience, or an associate degree in a related technical field with seven years of relevant work experience required.
· Demonstrated knowledge of the construction, mechanical, electrical, or HVAC service industry.
· Demonstrated knowledge of mechanical drawings, electrical wiring diagrams, control theory, automatic temperature controls, building automation systems and other building subsystems.
· Demonstrated experience in the integration of low voltage building sub-systems using various industry protocols (i.e. LON, BACnet, etc.).
· Ability to relate technical knowledge to a non-technical audience.
· Demonstrated advanced computer skills required, particularly computer-related drafting tools, such as Visio.
Preferred Qualifications
· Bachelor's degree in engineering with a minimum of five years of experience, or an associate degree in a related technical field with seven years of relevant work experience required.
· Understanding of IP networking for building automation systems.
· Understanding of Tridium/Niagara Framework
HIRING SALARY RANGE: $100K to $125K (Salary to be determined by the education, experience, knowledge, skills, and abilities of the applicant, internal equity, location and alignment with market data.) This role offers a competitive Bonus plan that will take into account individual, group, and corporate performance. This position includes a competitive benefits package. For details, please visit the About Us tab on the Johnson Controls Careers site at *****************************************
Johnson Controls International plc. is an equal employment opportunity and affirmative action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information, sexual orientation, gender identity, status as a qualified individual with a disability or any other characteristic protected by law. To view more information about your equal opportunity and non-discrimination rights as a candidate, visit EEO is the Law. If you are an individual with a disability and you require an accommodation during the application process, please visit here.
$100k-125k yearly Auto-Apply 60d+ ago
Information System Security Officer (ISSO)
Vets Hired
Cyber security analyst job in Camp Pendleton South, CA
This position supports information system security operations for complex C5ISR environments, ensuring systems comply with cybersecurity, authorization, and risk management requirements across their lifecycle. The role focuses on implementing and maintaining security controls, supporting authorization activities, and overseeing operational security practices.
Key Responsibilities
Determine and document system security control requirements
Implement and manage security controls within compliance and authorization tools
Conduct annual security control reviews through testing, examination, and interviews
Prepare, distribute, and maintain security plans, instructions, guidance, and SOPs for network and system operations
Review, approve, or deny System Authorization Access Requests (SAARs), verify training requirements, and maintain required records
Participate in removable media control and whitelisting programs
Monitor and assess the effectiveness of cybersecurity safeguards to ensure adequate protection
Support information security training and awareness initiatives
Participate in security risk assessments as part of the Security Assessment and Authorization process
Identify system-specific security requirements throughout all phases of the system lifecycle
Required Skills & Qualifications
Completion of a CNSSI 4014 (Information Systems Security Officer-qualified) course or equivalent
CompTIA Security+ certification
Experience with Marine Corps information security programs, authorization procedures, and coordination with higher headquarters
Active Secret security clearance
Preferred Qualifications
Certified Authorization Professional (CAP) certification
GIAC Security Leadership Certification (GSLC)
Completion of CID M09BNJ1 Cybersecurity Technician course
Completion of CID N23CUW1 Joint Cyber Analysis course
Bachelors degree in Information Technology, Cybersecurity, or a related field
Completion of CNSSI 4012 (Senior Systems Managers-qualified) course
Completion of CNSSI 4013 (System Administrators-qualified) course
Completion of CNSSI 4015 (Systems Certifiers-qualified) course
Completion of CNSSI 4016 (Risk Analysts-qualified) course
NDU Chief Information Security Officer (CISO) certificate
Working Place: Camp Pendleton, California, United States Company : 2026 Jan 29th Virtual Fair - Auria Space
$81k-113k yearly est. 15d ago
Information Security Analyst
Vesync
Cyber security analyst job in Tustin, CA
The Company: VeSync is a portfolio company with brands that cover different categories of health & wellness products. We wouldn't be surprised if you have one of our Levoit air purifiers in your living room or a COSORI air fryer whipping up healthy and delicious meals for you every night.
We're a young and energetic company, we've had tremendous success, and we are constantly growing our team. As we garner more industry attention - just check out our accomplishments and awards by CES Innovation, iF Design, IGA, and Red Dot - we also need driven and talented people to join our team.
That brings us to you, and what you'll be joining. Our teams are smart and diligent and take ownership of their work - they're confident in their work but know how to collaborate with open ears and a spirit of learning. If you're down-to-earth, approachable, and easy to strike up a conversation with, this may be a great fit for you.
Check out our brands:levoit.com | cosori.com | etekcity.com
The Opportunity:
The Information SecurityAnalyst is responsible for supporting the organization's security posture by implementing, monitoring, and maintaining security controls across systems, networks, and cloud environments. This role works closely with senior security team members to identify risks, respond to incidents, and ensure compliance with security standards and regulatory requirements.What you will do at VeSync:
Information Security Operations & Planning
Support the implementation and maintenance of information security controls to protect company data and assets across on-premise and cloud environments.
Assist in analyzing business processes, systems, and data flows to identify security gaps and improvement opportunities.
Apply industry best practices and frameworks such as the NIST Cybersecurity Framework (CSF) to support confidentiality, integrity, and availability of information assets.
Policy Support & Compliance
Assist in the development, implementation, and maintenance of information security policies, standards, and procedures.
Support compliance efforts with industry standards and regulations (e.g., ISO 27001, NIST, GDPR).
Help track evidence and controls using compliance and GRC tools such as OneTrust, Drata, or similar platforms.
Monitor regulatory and security trends and escalate relevant changes to senior team members.
System, Network, and Cloud Security
Monitor and help maintain security controls for systems, networks, and public cloud platforms (AWS, Azure, GCP).
Assist with configuration, monitoring, and tuning of cloud security services and tools.
Use security tools and dashboards (e.g., SIEM, security scorecards) to identify potential threats and vulnerabilities.
Support AWS security services and baseline configurations.
Security Monitoring & Incident Response
Monitor security alerts and events using SIEM and security monitoring tools.
Participate in incident response activities, including investigation, containment, remediation, and post-incident analysis.
Assist with blue team activities, tabletop exercises, and response drills to improve readiness.
Document incidents and lessons learned.
Identity & Access Management
Support user access reviews, permission audits, and access control processes.
Assist with identity management systems to ensure appropriate authentication and authorization controls.
Help identify and remediate excessive or inappropriate access.
Risk Assessment & Vulnerability Management
Participate in risk assessments and vulnerability identification efforts.
Assist with vulnerability scanning, tracking, and remediation coordination.
Support risk documentation and reporting aligned with frameworks such as NIST CSF.
Help track and report basic security metrics and KPIs.
Security Awareness & Documentation
Support the delivery of security awareness training and phishing simulations.
Assist in developing security documentation, including procedures, controls, detection rules, and response playbooks.
Maintain clear and accurate security documentation for audits and operational use.
What you bring to the role:
Bachelor's degree in Information Security, Computer Science, or a related field (or equivalent experience).
3-6 years of experience in information security or a related IT/security role.
Hands-on experience with security monitoring, incident response, vulnerability management, or risk assessment.
Familiarity with cloud environments (AWS, Azure, or GCP) and basic cloud security concepts.
Working knowledge of security frameworks and standards such as NIST CSF, ISO 27001, and CIS.
Understanding of network security fundamentals, including firewalls, IDS/IPS, endpoint protection, and logging.
Experience with SIEM or security monitoring tools such as Splunk, QRadar, Rapid7, or Wazuh.
Strong analytical, troubleshooting, and communication skills.
Preferred Qualifications
Experience supporting compliance or audit activities.
Familiarity with GRC or compliance automation tools (OneTrust, Drata, or similar).
Relevant security certifications such as Security+, CEH, GSEC, or progress toward CISSP/CISM.
Location:
This is an on-site, office-based role in Tustin, CA.
Salary:
Starting at $90K Annually
Perks and Benefits:
100% covered Medical/Dental/Vision insurance for employee AND spouse + dependents!
401K with 4% employer match (eligible after 90 days of employment) and immediate 100% vesting
Generous PTO policy + paid holidays
Life Insurance
Voluntary Life Insurance
Disability Insurance
Critical Illness Coverage
Accident Insurance
Healthcare FSA
Dependent Care FSA
Travel Assistance Program
Employee Assistance Program (EAP)
Fully stocked kitchen
$90k yearly Auto-Apply 15d ago
Information Systems Security Officer
CSA Global 4.3
Cyber security analyst job in Westminster, CA
Full-time Description
For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools, and proven processes to advance federal missions.
Client Solution Architects (CSA) is currently seeking an Information Systems Security Officer to support a program at Grafenwoehr, Germany.
Works with System Administrators (SA), Command Information System Security Manager (ISSM), other Information System Security Officers (ISSOs), multiple Branch Heads, multiple Program Managers (PMs) and a project strategist in support of the completion of a mixture of Certification and Accreditation (C&A) boundaries consolidated into overarching master boundaries in support of information assurance policy and regulations. In addition to C&A package development, the individual will be responsible for the day-to-day operations as an ISSO.
How Role will make an impact:
Develop and maintain an organizational or system-level cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures.
Provide support to the System Owner and the ISSM for maintaining the appropriate operational IA posture for a system, program, or enclave.
Provide support to the customer on all matters involving the security of their information systems.
Assist with the management of all security aspects of the information system and as assigned performs day-to-day security operations of the system.
Assist in the development of the system security policy and ensures compliance with that policy on a routine basis.
Prepare, validate, and maintain security documentation including, but not limited to: system security plan (SSP), risk assessment (RA), contingency plan (CP), privacy impact assessment (PIA), eAuthentication assessment, FIPS categorization.
Provide configuration management for security-relevant information system software, hardware, and firmware, controlling changes to the system and assessing the security impact of those changes.
Identify and mitigate security business and system risks.
Identify and manage POA&Ms through remediation as well as develop corrective action plans for each POA&M.
Maintain a repository for all organizational or system-level cybersecurity-related documentation such as RMF processes within eMASS or other automated process.
Maintain Defense Information Technology Portfolio Registry (DITPR) for client systems and software.
Ensure implementation of Information System (IS) security measures and procedures, including reporting incidents to the Command Information System Security Manger (ISSM) and appropriate reporting chains as well as coordinating system-level responses to unauthorized disclosures in accordance with DoDM 5200.01 Vol 3 for classified information or DoDM 5200.01 Vol 4 for CUI, respectively.
Implement and enforce all DoD IS and Platform Information Technology (PIT) system cybersecurity policies and procedures, as defined by cybersecurity-related documentation.
Ensure that all users have the requisite security clearances and access authorization, and are aware of their cybersecurity responsibilities for DoD IS and PIT systems under their purview before being granted access to those systems.
In coordination with the ISSM, initiate protective or corrective measures when a cybersecurity incident or vulnerability is discovered.
Establish a process for authorized users to report all cybersecurity-related events and potential threats and vulnerabilities to the ISSO.
Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals.
Ensures proper Configuration Management procedures are followed. Prior to implementation and contingent upon necessary approval with the ISSM.
Initiates requests for temporary and permanent exception, deviations, or waivers to IA requirements such as Plan of Action and Milestones (POA&Ms).
Ensures IA and IA-enabled software, hardware and firmware comply with appropriate security configuration guides.
Provide status updates of assigned duties to the appropriate agency heads as defined in their respective Service Level Agreement (SLA).
Respond to all applicable data calls, CTO's, FRAGO's, IAVA's ,etc within the requested timeframe.
Attend all Cybersecurity Workforce Meetings when requested.
Perform as needed system administration on JLCCTC or other simulations or interface systems as needed.
Perform as needed technical operations, setup and tear down of servers, systems and integration tools; maintaining RMF compliance; providing input to exercise design and technical planning products.
Support as needed other set-up, transition, and break down for all training and training support activities pertaining to this task order.
Participate in individual training, seminars, conferences, exercise/experiment planning events, site surveys, and exercise and training events and supports the planning and preparation processes and product development as needed.
Requirements
What you'll need to join our award-winning team:
Clearance: Must possess and maintain an active U.S. Top Secret/SCI security clearance with the ability to pass a CI/Polygraph exam
Education: A bachelor's degree plus 3 years of recent related experience OR an associate's degree plus 7 years of recent related experience OR a major certification plus 7 years of recent related experience OR 11 years of recent related experience.
DoD Approved 8570 Baseline Certification for a minimum of IAM Level II.
Five (5) years' experience within the past 10 years, in planning simulation exercise architectures, supervising implementation of communication systems, and integration of Army Mission Command Systems in support of distributed exercises.
Five (5) years' experience in information technology management
What Sets you apart:
A working knowledge of RMF and the security authorization processes and procedures.
Knowledge of NIST Special Publications and their counterparts, especially SP800- 37, SP800-53, ICD 503, and CNSS 1253.
Ability to communicate clearly and present information to the customer in a format they can understand.
Experience in several of the following areas: knowledge of current security tools, hardware and software security implementation; different communication protocols; and encryption techniques/tools.
Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
Must be able to prioritize tasks, deliver solutions on time and be a team player with the ability to work independently and proactively while being flexible and prioritizing competing priorities, often under time constraints.
Have strong analysis, oral and written communication, and change management skills with ability to plan, organize, prioritize, track, manage, and learn new skills.
It is preferred that a candidate have at least one year of experience under the DoD Information Assurance Certification and Accreditation Process (DIACAP) and/or Risk Management Framework (RMF) accreditation process and has a familiarity with Enterprise Mission Assurance Support Service (eMASS).
Technical familiarity with Windows 7 Enterprise/Windows 10 Professional, Windows Server 2012, and Red Hat Linux.
Experience with providing IA or IT support to a US Army client desirable, but not required.
Proficiency with using the Internet and with Microsoft Office products including e-mail, Word, Excel, Access and Project is required.
Outstanding work ethic and personal integrity.
Superior analytical and problem-solving skills.
Ability to document and update processes.
Ability to perform tasks under deadlines.
Ability to work with senior Government and Industry leaders.
Possess a very high degree of attention to detail.
Capable of working at a computer terminal for extended periods.
Ability to work 12-hour shifts, day or night, for consecutive days up to 4 weeks. • Outstanding interpersonal and written communication skills.
$78k-109k yearly est. 60d+ ago
Information Security Analyst
Cathay Bank 4.4
Cyber security analyst job in Rancho Cucamonga, CA
This position is responsible for ensuring that the Bank's Security operations and preventive controls are managed and maintained in accordance with established Information Security policies, standards and procedures, published regulations and industry best practices.
Primarily responsible for the constant review of vendor security controls in comparison with policies and industry frameworks, risk assessments, determination of control gaps and their remediation.
ESSENTIAL FUNCTIONS
Performs vendor security risk assessments to determine inherent risk on proposed projects and assesses vendor security controls to determine residual risk.
Evaluates the potential exposure to application security risks and threats based on industry security frameworks and recommends appropriate mitigation.
Assesses security practices including Information Security governance, Identity and access control, Incident monitoring and response, Vulnerability assessment and Penetration tests, Network Security and Endpoint Security, among others.
Acts as liaison with Third Party Risk Management, Information Technology and business department Relationship Managers related to vendor risk assessments.
Reports information security risks and follows-up remediations.
Remediates audit and regulatory findings and recommendations related to Information Security and Vendor Risk Management.
QUALIFICATIONS
Education:
College degree in Information Technology or Information Security or equivalent;
Security+, SSCP, CISSP, CISM or similar information security certifications preferred.
Experience:
Minimum two years of experience in Information Security Risk, Information Security Operations or Security Auditing.
Proven experience on third-party risk management and vendor security assessments.
Working knowledge of security practices such as Endpoint Security, Network Security, Security Operations and Security Governance required.
Experience working with Vendor Risk Management (VRM) applications preferred.
Skills/Ability:
Proven ability to initiate and manage projects.
Excellent communication and problem-solving skills.
Strong inter-personal communication and collaboration skills.
Self-starter, highly motivated, and able to work with general supervision.
OTHER DETAILS
$28.84 - $33.65 / hour
Pay determined based on job-related knowledge, skills, experience, and location.
This position may be eligible for a discretionary bonus.
$28.8-33.7 hourly 19d ago
Senior Security Compliance Analyst
TP-Link Systems Inc. 3.9
Cyber security analyst job in Irvine, CA
Job Description
Headquartered in the United States, TP-Link Systems Inc. is a leading global provider of networking devices and smart home products. Consistently ranked as the world's top provider of Wi-Fi devices, TP-Link is dedicated to delivering innovative solutions that improve people's lives by offering faster, more reliable connectivity. Serving customers in over 170 countries, we are committed to expanding our global footprint.
At TP-Link Systems Inc., we believe that technology has the power to transform the world for the better. Our mission is to design reliable, high-performance products that connect users worldwide to the limitless possibilities of technology.
We are driven by our core values of professionalism, innovation, excellence, and simplicity. Our goal is to help clients achieve outstanding global performance and to provide consumers with a seamless, effortless technology experience.
TP-Link Systems Inc. is seeking a skilled and proactive Senior Security Compliance Analyst who will be responsible for developing and overseeing TP-Link's enterprise security governance framework, ensuring compliance with regulatory requirements, industry standards, and internal policies. This individual will collaborate with cross-functional teams to embed security into business operations, manage risk, and enhance security resilience across TP-Link's enterprise ecosystem.
Key Responsibilities:
Security Governance & Policy Development
Develop, implement, and maintain security policies, standards, and guidelines aligned with industry best practices (e.g., NIST, ISO 27001, CIS).
Establish and lead a security governance framework to ensure consistent application of security controls across the enterprise.
Risk Management & Compliance
Identify, assess, and mitigate security risks across TP-Link's global operations.
Ensure compliance with regulatory requirements such as GDPR, CCPA, NIST CSF, and other applicable cybersecurity frameworks.
Oversee security audits, risk assessments, and third-party security evaluations.
Partner with legal, IT, and business leaders to address security compliance gaps.
Third-Party & Supply Chain Security
Develop and enforce security requirements for vendors, suppliers, and third-party partners.
Conduct security assessments of supply chain partners to identify and mitigate potential risks.
Security Awareness & Training
Develop and lead security awareness programs to educate employees on cybersecurity risks and best practices.
Foster a security-first culture across all levels of the organization.
Provide guidance and training on security governance processes for internal stakeholders.
Incident Response & Continuous Improvement
Support security incident response efforts by ensuring governance processes facilitate rapid detection and response.
Lead post-incident analysis to refine security policies and controls.
Monitor emerging threats, regulatory changes, and industry trends to evolve TP-Link's security governance strategies.
Requirements
Qualifications Education:
Bachelor's degree in Computer Science, Cybersecurity, Information Security, or a related field.
Experience:
5+ years of experience in security governance, risk management, or compliance in a global technology or networking company.
Proven track record in developing and implementing security governance frameworks for enterprise security.
Experience managing compliance with industry standards and regulations (ISO 27001, NIST CSF, SOC 2, GDPR, CCPA, etc.).
Hands-on experience with supply chain security, third-party risk management, and vendor security assessments.
Skills:
Deep understanding of security frameworks (ISO 27001, NIST, CIS, SOC 2) and regulatory requirements.
Strong expertise in risk management methodologies, security policy development, and compliance auditing.
Proficient in conducting security assessments, third-party risk evaluations, and internal security reviews.
Ability to communicate complex security concepts to business and technical stakeholders effectively.
Strong leadership skills with experience in cross-functional collaboration and executive reporting.
Benefits
Salary range: $100,000-$150,000
Free snacks and drinks, and provided lunch on Fridays
Fully paid medical, dental, and vision insurance (partial coverage for dependents)
Contributions to 401k funds
Bi-annual reviews, and annual pay increases
Health and wellness benefits, including free gym membership
Quarterly team-building events
At TP-Link Systems Inc., we are continually searching for ambitious individuals who are passionate about their work. We believe that diversity fuels innovation, collaboration, and drives our entrepreneurial spirit. As a global company, we highly value diverse perspectives and are committed to cultivating an environment where all voices are heard, respected, and valued. We are dedicated to providing equal employment opportunities to all employees and applicants, and we prohibit discrimination and harassment of any kind based on race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Beyond compliance, we strive to create a supportive and growth-oriented workplace for everyone. If you share our passion and connection to this mission, we welcome you to apply and join us in building a vibrant and inclusive team at TP-Link Systems Inc.
Please, no third-party agency inquiries, and we are unable to offer visa sponsorships at this time.
$100k-150k yearly 22d ago
Senior Security Engineer, Security Operations
Goodleap 4.6
Cyber security analyst job in Irvine, CA
About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America.
Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap to design, build, implement, and operate security and fraud monitoring, detection, and response capabilities. Your Oversight Will Encompass
Security & Fraud Monitoring, Detection, and Response: Identification of potential misuse and abuse cases, determining corresponding events associated with manifestation of such scenarios, design of identification and detection solutions -e.g., correlated/iterative event searches across log sources ranging from infrastructure to applications/SaaS platforms, testing, implementation, monitoring, and fine-tuning of these solutions, etc.
Toolset design and operations: Design and build the monitoring, detection, and response platform, from tool selection and integration - e.g., SIEM, SOAR, agentic SOC, EDR, to daily operations/management
Incident Response: Play a leading role in the definition, refinement, and execution of incident response activities.
Overall Security Operations: Management and operation of security platforms/solutions outside monitoring, detection, and response platform.
Support Embedded Product Security Team: Design, build, and implement monitoring and detection solutions for GoodLeap products and services.
Essential Job Duties & Responsibilities
Lead, participate in, and contribute to security and fraud monitoring, detection, and response activities, inclusive of investigations, threat hunting,etc. Create playbooks for specific incident response scenarios.
Identify potential misuse and abuse cases in enterprise systems, propose solutions to detect these scenarios, and identify and implement monitoring and detection solutions for such scenarios.
Support or develop components of the security analytics platform.
Support embedded (product) security team.
Support general security operations team with vulnerability management, tools management, and more.
Required Skills, Knowledge & Abilities
Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences.
Expertise in security event management, monitoring, threat hunting, incident response, playbook creation, orchestration/automations, etc.
Experience with threat modeling methodologies.
Expertise with EDR solutions/platforms, such as CrowdStrike, S1, Palo Alto Cortex EDR, etc.
Experience with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus).
Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. · Experience designing, configuring, and implementing security and fraud monitoring for core enterprise systems, e.g., ERP, HCM, Salesforce, etc.
Experience working with and creating solutions based AI and ML toolsets - e.g., creation of AI skills, agents, MCP clients, vibe coding.
Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases.
Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault.
Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed.
Prior experience interfacing and supporting teams outside of security - e.g., internal product teams and other cross-functional areas.
Proficiency in writing automation scripts in multiple languages and integrating with REST/GraphQL APIs to orchestrate workflows between security tooling and third-party cloud/SaaS platforms, automating detection, response, and operational processes. · Experience engaging with vendors in design partnerships.
Experience overseeing vulnerability and threat management at the platform and application levels.
Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement.
Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution
Additional Information Regarding Job Duties and s:
Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law.
If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today!
We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
$114k-145k yearly est. Auto-Apply 10d ago
Sr. Information Security GRC Analyst
Loandepot 4.7
Cyber security analyst job in Irvine, CA
at loan Depot
Responsible for driving the development, implementation, communication, and maintenance of loan Depot's technology policies, standards and procedures that are aligned to industry standards and regulatory requirements. Ensures that loan Depot technology processes adheres to regulatory requirements, manages risks effectively, and establishes strong governance practices. Develops and implements controls, monitors compliance, and supports risk management activities.
Responsibilities:
Leads the development and implementation of comprehensive cybersecurity and IT policies, standards, and guidelines.
Continuously evaluates and updates cybersecurity and IT policies to ensure they remain current and effective.
Ensures policies comply with relevant laws, regulations, and industry standards (e.g., NIST, FFIEC, GLBA, NYDFS, SOX and PCI-DSS).
Collaborates with teams, working closely with IT, legal, compliance, and other departments, to gain a deep understanding of business needs to ensure cybersecurity policies align with business objectives.
Transforms complex information and documentation into simple concepts that are easy to understand by the end-users.
Offers specialized expertise and consultation to cross-functional teams to perform framework-oriented risk assessments, identify deficiencies, generate reports, and recommends prioritized, actionable solutions to mitigate risks and enhance loan Depot's overall security posture.
Stays informed about the latest cybersecurity threats, trends, and best practices. Ensures accurate and up-to-date records of policy reviews, risk assessments, training activities, and incident responses.
Benchmarks the organization's policies against industry standards and best practices.
Develops and implements governance frameworks for cybersecurity policy management.
Monitors key performance indicators, conducts gap analysis, risk assessments and implements frameworks, as needed. Tests and monitors effectiveness of controls.
Establishes a feedback loop and analyzes metrics to continuously improve cybersecurity policies based on audit findings, incident reviews, and emerging threats.
Actively leads and supports on internal and external audits and assessments of cybersecurity policies and practices. Accountable for ensuring identified audit and assessment findings and actions are tracked to closure.
Maintains comprehensive documentation of all cybersecurity policies, procedures, and related activities. Communicates policy requirements and updates to all relevant stakeholders.
Identifies opportunities for innovation and improvement in cybersecurity policy and practice. Proposes suitable mitigation strategies and verifies the effectiveness of remediation plans
Requirements:
Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field preferred.
Minimum of six (6) + years' experience working in Cybersecurity GRC, policy development, risk management, or a similar field.
Experience with GRC tools (e.g., Archer, ServiceNow, OneTrust).
Proficiency in using data analysis and reporting tools (e.g., Excel, Power BI).
Relevant certifications such as CISM and/or CISA are highly desirable.
Why work for #teamloan Depot:
Competitive compensation package based on experience, skillset and overall fit for #TeamloanDepot.
Inclusive, diverse, and collaborative culture where people from all backgrounds can thrive
Work with other passionate, purposeful, and customer-centric people
Extensive internal growth and professional development opportunities including tuition reimbursement
Comprehensive benefits package including Medical/Dental/Vision
Wellness program to support both mental and physical health
Generous paid time off for both exempt and non-exempt positions
About loan Depot:
loan Depot (NYSE: LDI) is a digital commerce company committed to serving its customers throughout the home ownership journey. Since its launch in 2010, loan Depot has revolutionized the mortgage industry with a digital-first approach that makes it easier, faster, and less stressful to purchase or refinance a home. Today, as the nation's second largest non-bank retail mortgage lender, loan Depot enables customers to achieve the American dream of homeownership through a broad suite of lending and real estate services that simplify one of life's most complex transactions. With headquarters in Southern California and offices nationwide, loan Depot is committed to serving the communities in which its team lives and works through a variety of local, regional, and national philanthropic efforts. Base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay for this role is between $99,000 and $136,500. Your base pay will depend on multiple individualized factors, including your job-related knowledge/skills, qualifications, experience, and market location. We are an equal opportunity employer and value diversity in our company. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
$99k-136.5k yearly Auto-Apply 60d+ ago
Information Security Analyst
Vesync
Cyber security analyst job in Tustin, CA
Job DescriptionThe Company: VeSync is a portfolio company with brands that cover different categories of health & wellness products. We wouldn't be surprised if you have one of our Levoit air purifiers in your living room or a COSORI air fryer whipping up healthy and delicious meals for you every night.
We're a young and energetic company, we've had tremendous success, and we are constantly growing our team. As we garner more industry attention - just check out our accomplishments and awards by CES Innovation, iF Design, IGA, and Red Dot - we also need driven and talented people to join our team.
That brings us to you, and what you'll be joining. Our teams are smart and diligent and take ownership of their work - they're confident in their work but know how to collaborate with open ears and a spirit of learning. If you're down-to-earth, approachable, and easy to strike up a conversation with, this may be a great fit for you.
Check out our brands:levoit.com \u007C cosori.com \u007C etekcity.com
The Opportunity:
The Information SecurityAnalyst is responsible for supporting the organization's security posture by implementing, monitoring, and maintaining security controls across systems, networks, and cloud environments. This role works closely with senior security team members to identify risks, respond to incidents, and ensure compliance with security standards and regulatory requirements.What you will do at VeSync:
Information Security Operations & Planning
Support the implementation and maintenance of information security controls to protect company data and assets across on-premise and cloud environments.
Assist in analyzing business processes, systems, and data flows to identify security gaps and improvement opportunities.
Apply industry best practices and frameworks such as the NIST Cybersecurity Framework (CSF) to support confidentiality, integrity, and availability of information assets.
Policy Support & Compliance
Assist in the development, implementation, and maintenance of information security policies, standards, and procedures.
Support compliance efforts with industry standards and regulations (e.g., ISO 27001, NIST, GDPR).
Help track evidence and controls using compliance and GRC tools such as OneTrust, Drata, or similar platforms.
Monitor regulatory and security trends and escalate relevant changes to senior team members.
System, Network, and Cloud Security
Monitor and help maintain security controls for systems, networks, and public cloud platforms (AWS, Azure, GCP).
Assist with configuration, monitoring, and tuning of cloud security services and tools.
Use security tools and dashboards (e.g., SIEM, security scorecards) to identify potential threats and vulnerabilities.
Support AWS security services and baseline configurations.
Security Monitoring & Incident Response
Monitor security alerts and events using SIEM and security monitoring tools.
Participate in incident response activities, including investigation, containment, remediation, and post-incident analysis.
Assist with blue team activities, tabletop exercises, and response drills to improve readiness.
Document incidents and lessons learned.
Identity & Access Management
Support user access reviews, permission audits, and access control processes.
Assist with identity management systems to ensure appropriate authentication and authorization controls.
Help identify and remediate excessive or inappropriate access.
Risk Assessment & Vulnerability Management
Participate in risk assessments and vulnerability identification efforts.
Assist with vulnerability scanning, tracking, and remediation coordination.
Support risk documentation and reporting aligned with frameworks such as NIST CSF.
Help track and report basic security metrics and KPIs.
Security Awareness & Documentation
Support the delivery of security awareness training and phishing simulations.
Assist in developing security documentation, including procedures, controls, detection rules, and response playbooks.
Maintain clear and accurate security documentation for audits and operational use.
What you bring to the role:
Bachelor's degree in Information Security, Computer Science, or a related field (or equivalent experience).
3-6 years of experience in information security or a related IT/security role.
Hands-on experience with security monitoring, incident response, vulnerability management, or risk assessment.
Familiarity with cloud environments (AWS, Azure, or GCP) and basic cloud security concepts.
Working knowledge of security frameworks and standards such as NIST CSF, ISO 27001, and CIS.
Understanding of network security fundamentals, including firewalls, IDS/IPS, endpoint protection, and logging.
Experience with SIEM or security monitoring tools such as Splunk, QRadar, Rapid7, or Wazuh.
Strong analytical, troubleshooting, and communication skills.
Preferred Qualifications
Experience supporting compliance or audit activities.
Familiarity with GRC or compliance automation tools (OneTrust, Drata, or similar).
Relevant security certifications such as Security+, CEH, GSEC, or progress toward CISSP/CISM.
Location:
This is an on-site, office-based role in Tustin, CA.
Salary:
Starting at $90K Annually
Perks and Benefits:
100% covered Medical/Dental/Vision insurance for employee AND spouse + dependents!
401K with 4% employer match (eligible after 90 days of employment) and immediate 100% vesting
Generous PTO policy + paid holidays
Life Insurance
Voluntary Life Insurance
Disability Insurance
Critical Illness Coverage
Accident Insurance
Healthcare FSA
Dependent Care FSA
Travel Assistance Program
Employee Assistance Program (EAP)
Fully stocked kitchen
$90k yearly 15d ago
Information Systems Security Officer
Mantech 4.5
Cyber security analyst job in Camp Pendleton South, CA
**MANTECH** seeks a motivated, career and customer-oriented **Information Systems Security Officer** with strengths in Information Systems Security to join our team at Marine Corps Base **Camp Pendleton California.** This position will assist Marine Corps Warfighting Laboratory (MCWL) prepare for and maintain the IT infrastructure, IT capabilities and Audio-Visual capabilities to support emerging ICD 705 Sensitive Compartmentalized Information Facilities (SCIFs) and Special Access Control Facilities (SAPFs) through planning, activation and operations.
**Responsibilities include but are not limited to:**
+ Experience in network design, network monitoring, systems development, and knowledge of Information Assurance (IA) policies, directives, and best practices across DoD and Marine Corps.
+ Knowledge and experience with organizations within the Marine Corps responsible for facilitating network approvals and connections.
+ Work with various Marine Corps, Navy, Joint, and other services to coordinate installs supporting Initial Operating Capability (IOC) and Final Operating Capability (FOC).
+ Ability to communicate and provide effective staff coordination across government, Marine Corps, and contractor organizations.
+ Support the facility Site Security Manager (SSM)/Special Security Representative (SSR) and Information Systems Security Manager (ISSM) to oversee the secure installations and operations of systems across multiple security domains and in accordance with policies, directives, and best practices.
+ Establishes and satisfies complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports Marine Corps and other customers at the highest levels in the development and implementation of doctrine and policies.
**Minimum Qualifications:**
+ Bachelor's degree and at least 10 years' experience planning and/or operating IT infrastructure within ICD 705 facilities.
+ Experience with network security aspects of installations and operations.
**Preferred Qualifications:**
+ Experience with MS Word, MS Power Point
**Clearance Requirements** **_:_**
+ Candidate must have a current/active Top Secret clearance with the ability to obtain and maintain a TS/SCI clearance prior to starting this position.
**Physical Requirements:**
+ Ability to maintain construction security oversight in outdoor environment; walk (with personal protective equipment) to inspect and document delivery of components and assembly/construction of structure.
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
$67k-94k yearly est. 60d+ ago
Senior Security Compliance Analyst
TP-Link Systems 3.9
Cyber security analyst job in Irvine, CA
Headquartered in the United States, TP-Link Systems Inc. is a leading global provider of networking devices and smart home products. Consistently ranked as the world's top provider of Wi-Fi devices, TP-Link is dedicated to delivering innovative solutions that improve people's lives by offering faster, more reliable connectivity. Serving customers in over 170 countries, we are committed to expanding our global footprint.
At TP-Link Systems Inc., we believe that technology has the power to transform the world for the better. Our mission is to design reliable, high-performance products that connect users worldwide to the limitless possibilities of technology.
We are driven by our core values of professionalism, innovation, excellence, and simplicity. Our goal is to help clients achieve outstanding global performance and to provide consumers with a seamless, effortless technology experience.
TP-Link Systems Inc. is seeking a skilled and proactive Senior Security Compliance Analyst who will be responsible for developing and overseeing TP-Link's enterprise security governance framework, ensuring compliance with regulatory requirements, industry standards, and internal policies. This individual will collaborate with cross-functional teams to embed security into business operations, manage risk, and enhance security resilience across TP-Link's enterprise ecosystem.
Key Responsibilities:
Security Governance & Policy Development
Develop, implement, and maintain security policies, standards, and guidelines aligned with industry best practices (e.g., NIST, ISO 27001, CIS).
Establish and lead a security governance framework to ensure consistent application of security controls across the enterprise.
Risk Management & Compliance
Identify, assess, and mitigate security risks across TP-Link's global operations.
Ensure compliance with regulatory requirements such as GDPR, CCPA, NIST CSF, and other applicable cybersecurity frameworks.
Oversee security audits, risk assessments, and third-party security evaluations.
Partner with legal, IT, and business leaders to address security compliance gaps.
Third-Party & Supply Chain Security
Develop and enforce security requirements for vendors, suppliers, and third-party partners.
Conduct security assessments of supply chain partners to identify and mitigate potential risks.
Security Awareness & Training
Develop and lead security awareness programs to educate employees on cybersecurity risks and best practices.
Foster a security-first culture across all levels of the organization.
Provide guidance and training on security governance processes for internal stakeholders.
Incident Response & Continuous Improvement
Support security incident response efforts by ensuring governance processes facilitate rapid detection and response.
Lead post-incident analysis to refine security policies and controls.
Monitor emerging threats, regulatory changes, and industry trends to evolve TP-Link's security governance strategies.
Requirements
Qualifications Education:
Bachelor's degree in Computer Science, Cybersecurity, Information Security, or a related field.
Experience:
5+ years of experience in security governance, risk management, or compliance in a global technology or networking company.
Proven track record in developing and implementing security governance frameworks for enterprise security.
Experience managing compliance with industry standards and regulations (ISO 27001, NIST CSF, SOC 2, GDPR, CCPA, etc.).
Hands-on experience with supply chain security, third-party risk management, and vendor security assessments.
Skills:
Deep understanding of security frameworks (ISO 27001, NIST, CIS, SOC 2) and regulatory requirements.
Strong expertise in risk management methodologies, security policy development, and compliance auditing.
Proficient in conducting security assessments, third-party risk evaluations, and internal security reviews.
Ability to communicate complex security concepts to business and technical stakeholders effectively.
Strong leadership skills with experience in cross-functional collaboration and executive reporting.
Benefits
Salary range: $100,000-$150,000
Free snacks and drinks, and provided lunch on Fridays
Fully paid medical, dental, and vision insurance (partial coverage for dependents)
Contributions to 401k funds
Bi-annual reviews, and annual pay increases
Health and wellness benefits, including free gym membership
Quarterly team-building events
At TP-Link Systems Inc., we are continually searching for ambitious individuals who are passionate about their work. We believe that diversity fuels innovation, collaboration, and drives our entrepreneurial spirit. As a global company, we highly value diverse perspectives and are committed to cultivating an environment where all voices are heard, respected, and valued. We are dedicated to providing equal employment opportunities to all employees and applicants, and we prohibit discrimination and harassment of any kind based on race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Beyond compliance, we strive to create a supportive and growth-oriented workplace for everyone. If you share our passion and connection to this mission, we welcome you to apply and join us in building a vibrant and inclusive team at TP-Link Systems Inc.
Please, no third-party agency inquiries, and we are unable to offer visa sponsorships at this time.
How much does a cyber security analyst earn in Menifee, CA?
The average cyber security analyst in Menifee, CA earns between $70,000 and $132,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Menifee, CA