Post job

Cyber security analyst jobs in Oceanside, CA

- 108 jobs
All
Cyber Security Analyst
Information Systems Security Officer
Senior Security Engineer
Information Security Analyst
Security System Engineer
Senior Security Analyst
Cyber Security Engineer
Securities Analyst
Network Security Analyst
Senior Cyber Security Analyst
Cyber Security Specialist
  • Cyber Security Analyst

    Orange County Dept. of Education 4.1company rating

    Cyber security analyst job in Costa Mesa, CA

    The Orange County Department of Education (OCDE) serves some of Orange County's most vulnerable student populations and provides support and mandated fiscal oversight to 28 school districts serving more than 600 schools and approximately 475,000 students. In addition to providing direct instruction to students through its own alternative and special education programs, OCDE administers an array of programs and services that are critical to the operations of local school districts and community colleges, facilitating professional development, legal guidance, payroll, career and technical education support, high-speed internet access, Local Control and Accountability Plan assistance and approval, resources for families, and student enrichment. OCDE's vision is that "Orange County students will lead the nation in college and career readiness and success." Department staff are working to achieve this goal in collaboration with educators at all levels of student development, from early childhood through higher education, and in partnership with families, businesses and community organizations. See attachment on original job posting Education and Experience: Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: • Bachelor's degree or equivalent from an accredited college or university with major course work in information security, or a related field. • One to two years of experience in information security technology, specifically with penetration testing, intrusion detection, incident response, or digital forensics; or an equivalent combination of training and experience. There are supplemental questions in the application. Please note that the EdJoin system will time-out after a 20-minute period of perceived inactivity. To assist you in the preparation of your application, the supplemental questions are listed here. Your responses should be thoughtful and thorough, and within the limit of 5,000 characters or less. We recommend that you prepare your responses in advance of beginning the application. 1. Explain a cybersecurity framework or methodology you know and how you have applied it in a previous role or project. 2. Describe your approach to investigating and assessing cybersecurity events and incidents. How do you prioritize incidents, and what criteria do you use to determine severity and impact? 3. Why are you passionate about pursuing a career in cybersecurity, and how do you stay current with the latest trends and developments in the field? Notice to Applicants: If you require accommodations in the application process, please inform us. Education and Experience: Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: • Bachelor's degree or equivalent from an accredited college or university with major course work in information security, or a related field. • One to two years of experience in information security technology, specifically with penetration testing, intrusion detection, incident response, or digital forensics; or an equivalent combination of training and experience. There are supplemental questions in the application. Please note that the EdJoin system will time-out after a 20-minute period of perceived inactivity. To assist you in the preparation of your application, the supplemental questions are listed here. Your responses should be thoughtful and thorough, and within the limit of 5,000 characters or less. We recommend that you prepare your responses in advance of beginning the application. 1. Explain a cybersecurity framework or methodology you know and how you have applied it in a previous role or project. 2. Describe your approach to investigating and assessing cybersecurity events and incidents. How do you prioritize incidents, and what criteria do you use to determine severity and impact? 3. Why are you passionate about pursuing a career in cybersecurity, and how do you stay current with the latest trends and developments in the field? Notice to Applicants: If you require accommodations in the application process, please inform us. Comments and Other Information Resumes will not be accepted in lieu of the completed online application. Before receiving authorization to work in this position, the individual selected will be required to provide a current negative TB authorization, within the last 60 days, and submit fingerprints for the purpose of conducting a confidential background investigation and record check. The tests are arranged and paid for by OCDE. The Immigration Reform and Control Act of 1986 requires employers to verify the employability of all new employees. Before the Department will finalize an offer of employment, the candidate selected will be required to show original documents which establish both the individual's identity and employment authorization. The candidate must also sign a statement under penalty of perjury regarding his/her employability. We reserve the right to reopen, readvertise, or delay filling this position. AA/EOE/ADA
    $69k-102k yearly est. 57d ago
  • Cyber security Operations Analyst

    Military, Veterans and Diverse Job Seekers

    Cyber security analyst job in San Diego, CA

    Duties and Responsibilities Maintain and operate cybersecurity technology and and provide expertise in area of focus (e.g. Risk Assessments, Controls Engineering or Incident Response). Collaborates with the business to understand their needs in order to tailor security offerings unique to their environment. Uses working knowledge of IT system functionality, architecture and capabilities to effectively diagnose and troubleshoot issues with some assistance. Conducts competitive analyses on (in-use and alternative) cyber technologies and documents recommendations for our environment. Provides awareness and guidance within Sempra Infrastructure community on secure business processes, architecture design, and technical controls. Maintains awareness of evolving cybersecurity threats and best practices for mitigation. Develops procedures and guidelines for implementing information security systems and practices. Develops and aggregates metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies. Performs other duties as assigned (no more than 5% of duties). Education Bachelor's degree in Computer Science or other science or technology major or equivalent experience required. Experience Minimum of 2-5 years of direct experience within the information security field required. In-depth experience in at least one cybersecurity discipline required. Experience with projects of moderately sized security related initiatives to successful completion required. Demonstrated experience in vendor selection, testing, implementation, and operations of a broad array of security technologies required. Knowledge, Skills and Abilities Familiarization with Endpoint protection software such as Trellix and Microsoft Defender. Familiarization in deploying vulnerability management agents. Experience deploying logging agents and configurations. Knowledge of firewalls and security zone. Experience working in an Operation Technology (OT), ICS / SCADA environment. Experience with SCADA network protocols. Experience with OT network monitoring tools (such as but not limited to: Dragos, Cybervision, CyberX). Ability to take initiative and work independently when needed. Ability to maintain, upgrade and recommend operational cybersecurity tools. Ability to work with Cybersecurity OT Engineering to make recommendations for new tools and capabilities. Ability to work effectively on multiple projects within a team structure and excellent written and oral communication skills. Licenses and Certifications Certified Information Systems Security Professional (CISSP) certification, Global Information Security Professional (GISP) certification, Global Information Assurance Certification (GIAC), Certified Information Systems Auditor (CISA), or Certified Internal Auditor (CIA) certificate preferred. Targeted professional cybersecurity certifications (i.e. forensics and incident response) preferred. Other Qualifications Bilingual in English/Spanish preferred.
    $80k-112k yearly est. 60d+ ago
  • Cyber Security Analyst (MSSP/SOC)

    Agile It

    Cyber security analyst job in San Diego, CA

    Hey there, Rockstar! 🚀 We are looking for you! At Agile IT, we help organizations thrive by making technology simple, secure, and strategic. As a trusted Microsoft partner and CMMC Registered Practitioner Organization (RPO), we specialize in guiding businesses through the complexities of cloud adoption, cybersecurity, and compliance, so they can focus on achieving their mission without being slowed down by IT challenges. We combine deep technical expertise with a people-first approach to deliver solutions that actually work in the real world. From CMMC compliance and security to cloud migration, collaboration, and ongoing managed services, Agile IT empowers organizations to modernize with confidence and agility. Why Work at Agile IT? Impactful Work: Everything you touch helps to keep our nation's secrets secure while also helping our client organizations thrive, making technology a true enabler instead of a roadblock. Culture of Growth: We're a team of curious learners and problem-solvers, and we invest in developing your expertise through training, certifications, and hands-on experience. Flexibility & Balance: With a remote-friendly environment and a people-first approach, you get the freedom to do your best work while living your best life. Collaborative Team: At Agile IT, you're surrounded by passionate professionals who support one another and celebrate success together. Forward-Thinking Mindset: We stay ahead of industry shifts so our team and our clients are always future-ready. Joining Agile IT means being part of a company that isn't just adapting to the future of IT-it's shaping it. Job Description At Agile IT, supporting CMMC-compliant environments means we don't just fix problems-we prevent them. As a Security Analyst at Agile IT, you'll play a critical role in safeguarding our clients. You'll monitor and analyze security events, investigate incidents, and collaborate with senior engineers and architects to deliver world-class managed security services. This is an excellent platform to sharpen your analytical and technical skills while protecting clients in today's ever-changing threat landscape. This position is designed to nurture your career growth, providing a pathway into the dynamic and evolving field of cybersecurity operations and defense. What you do: (major responsibilities) Monitor and analyze security events across client environments. Investigate alerts, perform triage, and escalate incidents when needed. Conduct threat analysis and provide actionable recommendations to reduce risk. Assist in incident response activities, including root cause analysis and reporting. Tune and improve detection rules and security use cases to enhance visibility. Communicate findings clearly to both technical and non-technical stakeholders. Stay up to date on emerging threats, vulnerabilities, and trends. Qualifications What sets you apart: (qualifications-knowledge, skills, and abilities) 2+ years of experience in a SOC/NOC or MSSP in cybersecurity; OR 5+ years of experience in cybersecurity operations role. Familiarity with SIEM tools (Sentinel, Splunk, QRadar, etc.). Strong understanding of networking, firewalls, IDS/IPS, and endpoint protection. Knowledge of security frameworks such as MITRE ATT&CK, NIST, or CIS Controls. Excellent problem-solving and communication skills. A collaborative mindset with the ability to work across teams and with customers. Nice to have skills: (preferred skills or skills that will be expected to learn) Certifications such as SC-200, Network+, Security+, CySA+, CEH, CISSP, or equivalent. Experience with Microsoft Security tools (Defender, Sentinel, Purview, Entra). Exposure to cloud platforms (Microsoft Azure, AWS, Google Cloud). Familiarity with compliance frameworks (CMMC, NIST 800-171, HIPAA, ISO 27001). Additional Information A writing sample will be requested from candidates who are chosen to move forward in the interview process. THE FINE PRINT: Compensation and Benefits *Pay range is $62,400 to $83,200 per year. Starting pay is generally lower to mid-range; based on experience. This is a remote, full-time, non-exempt position. Medical/Dental/Vision/STD/LTD Remote mental and physical health networks $200,000 basic life insurance Voluntary life 401(k) with 3% employer contribution - no vesting period Combined 18 days PTO increasing with tenure 9 paid holidays And so much more *Factors in determining the appropriate compensation for a role include experience, skills, knowledge, abilities, education, licensure and certifications, and other business and organizational needs. The Hiring Pay Scale referenced in the job posting is the budgeted salary or hourly range that Agile IT reasonably expects to pay for this position. Background checks, pre-employment aptitude, and skills testing are a mandatory part of the recruitment process. All Agile IT employees are provided with laptops and home office equipment. Due to the contractual requirements of our work with government entities, all hires must be US Citizens. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. All your information will be kept confidential according to EEO guidelines.
    $62.4k-83.2k yearly 60d+ ago
  • F-35 Information System Security Officer - (Mid-Career)

    Lockheed Martin 4.8company rating

    Cyber security analyst job in San Diego, CA

    What We're Doing: Lockheed Martin's, Rotary & Mission Systems (LM RMS), F-35 Cyber Security invites you to step up to one of today's most daunting challenges: the protection of exquisite government capabilities leading to warfighter supremacy against our peer and near peer adversaries. As a cybersecurity professional at Lockheed Martin, you'll safeguard the sensitive information and warfighting capabilities that our citizens and the world depend upon to protect U.S. and ally interests. Here, you'll work alongside other cybersecurity experts, related departments, and military members to support the military operational objectives by providing them with a safe and secure operating environment. In this fast-paced, real-world environment, you'll draw on all your education and experience as well as the resources of Lockheed Martin to keep these exquisite capabilities protected. The Work: This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned classified and/or unclassified F-35 systems at MCAS Miramar. Typical ISSO responsibilities include but are not limited to: Ensuring required cybersecurity controls are implemented and validated, to include continuous monitoring actions for assigned systems. Supporting the development and maintenance of cybersecurity related plans and procedures. Monitoring for non-compliance, anomalous activity (i.e., threats), and effectively reporting such activity and associated risks. Ensuring POA&Ms or remediation plans are in place for vulnerabilities identified during monitoring activity, audits, inspections, etc. and implementing, or overseeing, corrective actions. Creating, collecting and retaining data to meet reporting requirements. Monitoring and correlating data (i.e., events) from a variety of sources (e.g., Splunk, ELA, ePO, ACAS, etc.) to identify and mitigate threats, vulnerabilities and non-compliance. Investigating, analyzing and responding to cyber events, incidents and non-compliance, including trend analysis, creating detailed written reports and briefing the appropriate parties. Identifying, implementing and enforcing requirements for the proper handling and storage of Government data and electronic media. Conducting self-inspections and preparing for customer inspections. Interacting professionally during the enforcement of security policy and procedures. Assigned systems may vary in classification, capabilities and complexity. Mission requirements may require other than first-shift work and additional responsibilities as assigned. Who we are: Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. In support of our many customers, the amazing members of our team are responsible for providing all aspects of cybersecurity support in a complex environment. In a rapidly growing enterprise, this role offers the opportunity to grow and hone the unique skills and experiences required as a cybersecurity expert to create, design and build solutions to some of the world's hardest engineering problems. Why Join Us: Your Health, Your Wealth, Your Life With our employees as our top priority, we provide diverse career opportunities designed to propel development and boost agility. Our flexible schedules, competitive pay and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. At Lockheed Martin, we place an emphasis on empowering our employees by fostering innovation. We believe that by applying the highest standards of business ethics and visionary thinking, everything is within our reach - and yours as a Lockheed Martin employee. Lockheed Martin values your skills, training and education. Come and experience your future! Final Transferable Secret security clearance; last Periodic Reinvestigation must be within the last five (5) years or enrollment in Continuous Vetting program. Ability to obtain and maintain Special Access Program (SAP) access. Possess a valid certification that meets or exceeds DoD 8570.01-M IAT II requirements. Meets: CCNA-Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP Exceeds: CASP+ CE, CCNP Security, CISA, CISSP (or Assc), GCED, GCIH, CCSP Prior experience in a cyber workforce role, as categorized by the NICE or DoD workforce frameworks. Prior experience as an ISSO, ISSM or related DoD Cyber Workforce Role on one or more F-35 information systems. Prior experience ensuring compliance with applicable laws, regulations, guidance and policies as they relate to DoD cybersecurity and SAPs (e.g., DoDI 8510.01, JSIG, DoDM 5205.07, NIST SP 800 series). Prior experience with the system authorization process, associated artifacts and their requirements (e.g., SSP, SCTM, Security CONOPs, SOPs). Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics. The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration. * At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work. With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility. If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications. Other Important Information By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Ability to work remotely Onsite Full-time: The work associated with this position will be performed onsite at a designated Lockheed Martin facility. Work Schedule Information Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits. Security Clearance Information This position requires a government security clearance, you must be a US Citizen for consideration. Pay Rate: The annual base salary range for this position in California, Massachusetts, and New York (excluding most major metropolitan areas), Colorado, Hawaii, Illinois, Maryland, Minnesota, New Jersey, Vermont, Washington or Washington DC is $93,200 - $164,450. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. (Washington state applicants only) Non-represented full-time employees: accrue at least 10 hours per month of Paid Time Off (PTO) to be used for incidental absences and other reasons; receive at least 90 hours for holidays. Represented full time employees accrue 6.67 hours of Vacation per month; accrue up to 52 hours of sick leave annually; receive at least 96 hours for holidays. PTO, Vacation, sick leave, and holiday hours are prorated based on start date during the calendar year. This position is incentive plan eligible. Pay Rate: The annual base salary range for this position in most major metropolitan areas in California, Massachusetts, and New York is $107,300 - $185,840. For states not referenced above, the salary range for this position will reflect the candidate's final work location. Please note that the salary information is a general guideline only. Lockheed Martin considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer. Benefits offered: Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Flexible Spending Accounts, EAP, Education Assistance, Parental Leave, Paid time off, and Holidays. This position is incentive plan eligible.
    $107.3k-185.8k yearly 11d ago
  • Sr. Cyber Security Operations Analyst

    Loandepot 4.7company rating

    Cyber security analyst job in Irvine, CA

    at loan Depot loan Depot's Security Operations team is at the forefront of cyber defense for the organization. We are seeking a Senior Security Analyst who will act as both a technical authority and front-line commander within our Security Operations Center. This is a strategic, high-impact role for a seasoned professional who can seamlessly integrate with our team on Day One, bringing the composure, knowledge, experience, and precision necessary to contain and eradicate cyber threats from our environment.Reporting directly to the Information Security Operations Manager, this position partners closely with our Level 1 MSSP, internal business units, and external incident response partners to ensure that every incident is managed with accountability, consistency, and efficiency. The ideal candidate is resourceful, quick-thinking, and deeply fluent with the leading security stacks and tools, capable of turning strands of data into decisive action and information. The Sr. Cyber SOC Analyst must be able to come into the Irvine, CA office 2-3 times per week. Responsibilities: Lead and execute end-to-end security incident response activities including detection and triage, containment, eradication, and recovery for incidents ranging from simple to complex. Serve as incident commander for high-severity security events, ensuring clear communication and timely resolution across stakeholders. Partner with Level 1 MSSP partners to validate escalations, refine detection logic, and ensure consistent handling workflows. Coordinate with external partners and internal teams to contain and mitigate threats while maintaining operational resilience. Detection, Analysis, & Threat Hunting Utilize industry standard and/or custom tools for telemetry to conduct deep-dive investigations and root cause analysis. Develop and optimize queries, analytic rules, and playbooks to enhance threat detection and automation, pushing incidents towards level 0 where possible. Conduct proactive threat hunts and adversary emulation exercises to identify emerging tactics, techniques, and procedures (TTPs) before they escalate into incidents. Leverage MITRE ATT&CK, NIST SP800-61r3, NIST CSF2, and other frameworks to ensure methodical and repeatable investigation practices. Operational Excellence & Leadership Document and refine incident response playbooks and runbooks to improve team consistency and speed. Produce detailed incident reports, post-incident reviews, and executive summaries with actionable insights. Mentor other analysts and emerging prospects, reinforcing our culture of accountability, consistency, and efficiency. Participate in weekly high-severity incident case reviews and contribute to the continuous improvement of SOC metrics and performance. Other duties as assigned. Requirements: Bachelor's Degree in a related field preferred, but not required. Minimum of five (5) + years' experience working in a security operations center or similar environment preferred. A demonstrated mastery of industry leading tools in SIEM, EDR, and CSPM. Expertise in querying, hunting, and correlating disparate data points across large telemetry datasets using SQL/KQL/Cypher. A demonstrated ability to lead complex investigations and coordinate across technical and business stakeholders. A solid understanding of cybersecurity frameworks such as MITRE ATT&CK, NIST CSF 2, NIST SP800-61r3. Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant narratives. Experience in log aggregation technologies and SIEM tuning processes. Experience in the Mortgage industry preferred. CISSP, GIAC Certified Incident Handler, or other related certifications preferred. Why work for #teamloan Depot: Competitive compensation based on skillset and relatable experience. Work with other passionate, purposeful, and customer-centric team members. Inclusive, diverse, and collaborative culture where people from all backgrounds can thrive. Extensive internal growth and professional development opportunities including tuition reimbursement. Comprehensive benefits package including Medical/Dental/Vision. Wellness program to support both mental and physical health. Discretionary Time Off (DTO) policy to support work-life balance in addition to Paid Voluntary Time Off. About loan Depot: loan Depot (NYSE: LDI) is a digital commerce company committed to serving its customers throughout the home ownership journey. Since its launch in 2010, loan Depot has revolutionized the mortgage industry with a digital-first approach that makes it easier, faster, and less stressful to purchase or refinance a home. Today, loan Depot enables customers to achieve the American dream of homeownership through a broad suite of lending and real estate services that simplify one of life's most complex transactions. With headquarters in Southern California and offices nationwide, loan Depot is committed to serving the communities in which its team lives and works through a variety of local, regional, and national philanthropic efforts. Base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay for this roles is between $99,000 and $136,000. Your base pay will depend on multiple individualized factors, including your job-related knowledge/skills, qualifications, experience, and market location. We are an equal opportunity employer and value diversity in our company. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
    $99k-136k yearly Auto-Apply 48d ago
  • Information Systems Security Officer

    Mantech International Corporation 4.5company rating

    Cyber security analyst job in Camp Pendleton South, CA

    General information Requisition # R64222 Posting Date 11/14/2025 Security Clearance Required TS/SCI Remote Type Onsite Time Type Full time Description & Requirements Shape the future of defense with MANTECH! Join a team dedicated to safeguarding our nation through advanced tech and innovative solutions. Since 1968, we've been a trusted partner to the Department of Defense, delivering cutting-edge projects that make a real impact. Dive into exciting opportunities in Cybersecurity, IT, Data Analytics and more. Propel your career forward and be part of something extraordinary. Your journey starts now-protect and innovate with MANTECH! MANTECH seeks a motivated, career and customer-oriented Information Systems Security Officer with strengths in Information Systems Security to join our team at Marine Corps Base Camp Pendleton California. This position will assist Marine Corps Warfighting Laboratory (MCWL) prepare for and maintain the IT infrastructure, IT capabilities and Audio-Visual capabilities to support emerging ICD 705 Sensitive Compartmentalized Information Facilities (SCIFs) and Special Access Control Facilities (SAPFs) through planning, activation and operations. Responsibilities include but are not limited to: * Experience in network design, network monitoring, systems development, and knowledge of Information Assurance (IA) policies, directives, and best practices across DoD and Marine Corps. * Knowledge and experience with organizations within the Marine Corps responsible for facilitating network approvals and connections. * Work with various Marine Corps, Navy, Joint, and other services to coordinate installs supporting Initial Operating Capability (IOC) and Final Operating Capability (FOC). * Ability to communicate and provide effective staff coordination across government, Marine Corps, and contractor organizations. * Support the facility Site Security Manager (SSM)/Special Security Representative (SSR) and Information Systems Security Manager (ISSM) to oversee the secure installations and operations of systems across multiple security domains and in accordance with policies, directives, and best practices. * Establishes and satisfies complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports Marine Corps and other customers at the highest levels in the development and implementation of doctrine and policies. Minimum Qualifications: * Bachelor's degree and at least 10 years' experience planning and/or operating IT infrastructure within ICD 705 facilities. * Experience with network security aspects of installations and operations. Preferred Qualifications: * Experience with MS Word, MS Power Point Clearance Requirements: * Candidate must have a current/active Top Secret clearance with the ability to obtain and maintain a TS/SCI clearance prior to starting this position. Physical Requirements: * Ability to maintain construction security oversight in outdoor environment; walk (with personal protective equipment) to inspect and document delivery of components and assembly/construction of structure. The projected compensation range for this position is $112,400.00-$186,500.00. There are differentiating factors that can impact a final salary/hourly rate, including, but not limited to, Contract Wage Determination, relevant work experience, skills and competencies that align to the specified role, geographic location (For Remote Opportunities), education and certifications as well as Federal Government Contract Labor categories. In addition, MANTECH invests in its employees beyond just compensation. MANTECH's benefits offerings include, dependent upon position, Health Insurance, Life Insurance, Paid Time Off, Holiday Pay, short-term and long-term Disability, Retirement and Savings, Learning and Development opportunities, wellness programs as well as other optional benefit elections. MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation. If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
    $112.4k-186.5k yearly Auto-Apply 33d ago
  • Network Security Analyst I

    Select Cyber

    Cyber security analyst job in San Diego, CA

    Select Cyber, an Information Security recruitment specialty firm, seeks to fill the following role for our client: Network Security Analyst I Be part of a cutting-edge Computer Incident Response Team, (CIRT) for a fortune 500 company. We are looking for individuals that want to learn a new field and grow with the company. Training provided. The selected candidate will be a part of the Security Operations Center (SOC) and its mission to improve the information security of our customers using a Security Information and Event Management (SIEM) tool to detect and analyze IT security incidents. Responsibilities: Perform the following functions as individual assignments or as part of a team: · Monitoring client networks for signs of adversarial activity. · Respond to alerts from various monitoring systems and platforms providing indicators for enterprise defensive measures. · Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs). · Triage potentially malicious events to determine severity and criticality of the event. · Follow procedures to analyze and escalate security incidents which vary from customer to customer. Experience · 1+ years technical experience in the Information Technology field. · Experience with Intrusion Detection & Prevention Systems (IDS/IPS) or Firewalls & Log Analysis a plus. · Technical degree, Associate or Bachelor's degree from an accredited institution in Computer Science or information technology field preferred. · CompTIA Network+/Security+ certifications is a plus
    $77k-105k yearly est. 60d+ ago
  • Cyber Security Engineer III

    Pingwind

    Cyber security analyst job in San Diego, CA

    Location: San Diego CARequired Clearance: Secret Certifications: DoD 8570.01-M in accordance with (IAW) DFARS ************ Baseline Certification, minimum IAT Level III Required Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent to above disciplines Required Experience: Ten (10) years of full-time professional experience Position Description: PingWind is seeking the right fit to join a team of Cyber professionals as they support critical functions to provide Cyber Security for the Navy's network. You will ensure the highest level of cyber security by implementing STIGS, performing scans using tools such as ACAS, and tracking/patching/mitigating vulnerability findings. You will monitor and act upon situations involving Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS). Key goal is to ensure the warfighter can achieve their mission without the interference of adversaries and opportunistic hackers. Work is performed in support of Naval Surface Warfare Center (NSWC), DAHLGREN DIVISION in Virgina Beach as it conducts Research, Development, Test & Evaluation (RDT&E), analysis, systems engineering, integration, and certification of complex Department of Defense systems. Primary Responsibilities: Level III: Ten (10) years of full-time professional experience performing system hardening with demonstrated experience in the following areas:• Interrupting, implementing, tracking and reporting security measures such as STIGs and high impact vulnerability software patching• Monitoring firewalls and overall network for intrusion detection and prevention; acting on security events as they happen and reporting to senior leaders• Involvement in the Navy ATO process to ensure all security risks are removed, mitigated or avoided• Research and tackle security risks as they arise; understand the risk involved, recommend strategies to deal with them, and track/brief risks to leadership, keeping all stakeholders informed until an issue is resolved. Required Qualifications: • Secret• DoD 8570.01-M in accordance with (IAW) DFARS ************ Baseline Certification, minimum IAT Level III • Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent to above disciplines• Combined total of ten (10) years of full-time professional experience in the following skillsets/disciplines:• Littoral Combat Ship (LCS) Total Ship Computing Environment (TSCE) experience• Computer security, military system specifications, Security Management policy guidance and directives, DoD and cybersecurity policies;• Risk Management Framework (RMF) and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, IDS, IPS, Switch/Routers, Cross Domain Solutions (CDS), EMASS and Endpoint Security Solution (ESS);• Performing STIG implementation;• Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and• Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Desired Qualifications/Experience: • DoD 8570.01-M CSSP certification• RMF experience About PingWind PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cybersecurity, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran-Owned Small Business (SDVOSB) with offices in Washington DC and Northern Virginia. **************** Our benefits include: • Paid Federal Holidays• Robust Health & Dental Insurance Options• 401k with matching• Paid vacation and sick leave• Continuing education assistance• Short Term / Long Term Disability & Life Insurance• Employee Assistance Program through Sun Life Financial EAP Guidance Resources Veterans are encouraged to apply PingWind, Inc. does not discriminate in employment opportunities, terms, and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law.
    $90k-126k yearly est. Auto-Apply 60d+ ago
  • Cyber Engineer

    Mount Indie

    Cyber security analyst job in San Diego, CA

    Job Description Mount Indie is seeking a Senior Cyber Engineer with knowledge and experience in Network Engineering and a network architecture background in supporting resilient networks. Candidates will be responsible for providing high-quality cybersecurity engineering. In this role, the Senior Cyber Engineer will be an integral team member supporting assured Command and Control capabilities for our DoD customer within the Navy Information Warfare Systems Command (NAVWAR) in San Diego, CA. Responsibilities: Prepare, implement, and ensure compliance with cybersecurity policy, to include Assessment and Authorization requirements. Plan, implement, upgrade, and/or monitor cybersecurity measures to improve cyber defense and maintain a cyber-resilient network. Assess cybersecurity vulnerabilities for risks and propose and implement remediation actions or risk mitigation strategies. Ensure appropriate security controls are in place that will safeguard digital files and electronic infrastructure. Respond to computer security breaches to re-establish protections and make required reports. Architect engineering change solutions to PMW-170 and PMW-160 systems. Document line-by-line changes as well as WAN-level design changes. Test and implement changes aboard ship and provide during-event support. Provide over-the-shoulder training to ship's force (pier-side and during events). Provide remote support to ship's force as required. Track and prepare SRPs/ECRs with PMW-160. Advise on policy and process interactions with PMWs. Perform a balanced mix of hands-on engineering and architecture / documentation / process work (approximately 50/50). Required Skills and Experience: Three (3) years of professional experience with cybersecurity engineering for mid-level and eight (8) or more years for senior level. Knowledge and experience in Network Engineering and network architecture background supporting Resilient Networks. Performing Cybersecurity risk assessments on deployed Navy systems, system functions and interconnection, to the degree sufficient to provide relevant Cybersecurity input. Providing recommended changes to the DoD and DON cybersecurity initiatives after evaluating the evolving changes and provide recommendations concerning priorities and identify policies affecting requirements criteria to support Navy cybersecurity goals and initiatives in order to develop and defend existing and future budgets, program plans, and policies. Tracking operational changes to the DoD and DON cybersecurity initiatives and provide implementation guidance and identify policies affecting cost, schedule and performance criteria to support Navy cybersecurity goals and initiatives in order to develop and defend existing and future budgets, program plans and policies. Enhancing the Cybersecurity strategy and governance to ensure that it is consistent with DoD and DON policies, standards, and architectures. Providing recommendations and assistance to the Government during engineering events and with certification related functions required by NAVWAR's Information Assurance Technical Authority (IATA) mission. Evaluating cybersecurity requirements implementation across the acquisition lifecycle to make recommendations on cybersecurity risks and mitigations in support of IPTs, both internal and external to NAVWAR. Identifying risks associated with the development of enterprise architectures to address system-of-system cybersecurity designs, maximizing common and inheritable security controls in support of a defense-in-depth strategy through the utilization of digital engineering methods. Tracking cybersecurity implementation across the acquisition lifecycle to make recommendations on cybersecurity risks and mitigations in support of IPTs, SETRs, Platform Technical Review Boards (PTRBs), Configuration Control Boards (CCBs), both internal and external to NAVWAR. Monitoring cybersecurity technical approaches to ensure consistency with the IA TA objectives. Experience with Symantec Endpoint Protection (SEP), Cybersecurity Strategy, System-Level Continuous Monitoring (SLCM) strategy, System Security Accreditation Plans, and System Design Specification (SDS). Very familiar with ADNS networking. Familiarity with Tactical Networks. Familiarity with broadcast communication systems and routing. Familiarity with engineering change processes in PEO C4I. Ability to prepare accurate, easy-to-understand engineering-level documentation for proposed changes. Education and Certification Requirements: Bachelor's degree in Cybersecurity, Computer, Electrical, or Electronics Engineering, or Mathematics with a concentration in computer science or equivalent. Information Assurance Management (IAM) or Information Assurance Technical (IAT) or Information Assurance System Architect and Engineer (IASAE) Level I (position-based) per DoD 8570.1M. Citizenship and Clearance requirement: US Citizenship required No Dual Citizenship Active TSSCI required Location: On-site San Diego NAVWAR Work aboard U.S. Navy and Coalition vessels as required (underway experience helpful but not required). Travel: Must be willing to travel as required. 30%
    $90k-126k yearly est. 6d ago
  • Sr. Security Compliance Analyst

    TP-Link Corp 3.9company rating

    Cyber security analyst job in Irvine, CA

    Headquartered in the United States, TP-Link Systems Inc. is a leading global provider of networking devices and smart home products. Consistently ranked as the world's top provider of Wi-Fi devices, TP-Link is dedicated to delivering innovative solutions that improve people's lives by offering faster, more reliable connectivity. Serving customers in over 170 countries, we are committed to expanding our global footprint. At TP-Link Systems Inc., we believe that technology has the power to transform the world for the better. Our mission is to design reliable, high-performance products that connect users worldwide to the limitless possibilities of technology. We are driven by our core values of professionalism, innovation, excellence, and simplicity. Our goal is to help clients achieve outstanding global performance and to provide consumers with a seamless, effortless technology experience. TP-Link Systems Inc. is seeking a skilled and proactive Sr. Security Compliance Analyst who will be responsible for developing and overseeing TP-Link's enterprise security governance framework, ensuring compliance with regulatory requirements, industry standards, and internal policies. This individual will collaborate with cross-functional teams to embed security into business operations, manage risk, and enhance security resilience across TP-Link's enterprise ecosystem. Key Responsibilities: Security Governance & Policy Development * Develop, implement, and maintain security policies, standards, and guidelines aligned with industry best practices (e.g., NIST, ISO 27001, CIS). * Establish and lead a security governance framework to ensure consistent application of security controls across the enterprise. Risk Management & Compliance * Identify, assess, and mitigate security risks across TP-Link's global operations. * Ensure compliance with regulatory requirements such as GDPR, CCPA, NIST CSF, and other applicable cybersecurity frameworks. * Oversee security audits, risk assessments, and third-party security evaluations. * Partner with legal, IT, and business leaders to address security compliance gaps. Third-Party & Supply Chain Security * Develop and enforce security requirements for vendors, suppliers, and third-party partners. * Conduct security assessments of supply chain partners to identify and mitigate potential risks. Security Awareness & Training * Develop and lead security awareness programs to educate employees on cybersecurity risks and best practices. * Foster a security-first culture across all levels of the organization. * Provide guidance and training on security governance processes for internal stakeholders. Incident Response & Continuous Improvement * Support security incident response efforts by ensuring governance processes facilitate rapid detection and response. * Lead post-incident analysis to refine security policies and controls. * Monitor emerging threats, regulatory changes, and industry trends to evolve TP-Link's security governance strategies.
    $111k-150k yearly est. 5d ago
  • Information Security Analyst - Journeyman - Secret Cleared

    Perrygo Consulting Group

    Cyber security analyst job in San Diego, CA

    Perrygo is a small, rapidly growing company; we are passionate about our employees as well as supporting our customers and their mission. We are excited for the opportunity to bring aboard highly motivated and energetic individuals to join our teams. Currently, we are seeking a Information Security Analyst - Secret Cleared. This role supports a Navy customer in San Diego, CA. Job Description and Responsibilities: Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses - Implement and monitor information security policies and procedures. - Conduct vulnerability scans and risk assessments. - Support RMF documentation and ATO renewals. - Respond to and document security incidents and audits. Basic Requirements: 6+ years of experience in information assurance or cybersecurity Preferred Skills and Experience: DoD 8570 IAT Level II certification (Security+ CE, CySA+, or equivalent). Familiarity with NIST, DISA STIGs, and DoD RMF compliance. Education Requirements: Bachelor's degree in Cybersecurity, Computer Science, or related field. Security Clearance: Secret(must be a US Citizen) Telework and Travel: On-Site. Contract: This position is pending a contract award. Perrygo Consulting Group, LLC is an Equal Opportunity Employer, for all individuals, including protected veterans and those with disabilities. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, disability, or veteran status. Perrygo Consulting Group, LLC participates in E-Verify. If being a part of a small, growing company while having the opportunity to work on exciting projects with challenging tasks excites you - then please apply today! Compensation Package - We offer an excellent compensation package with competitive salaries and meaningful benefits, including: Paid Time Off (PTO)/Sick Leave 11 Paid Holidays Flexible Work Schedules (offering a healthy work-life balance whenever possible) Employee Assistance Program (EAP) Medical, Dental, and Vision LTD/STD, AD&D, and Life-Employer Paid Supplemental Life and Accident options Health Savings Account (HSA) with employer contribution 401K Plan with employer Safe Harbor contribution Profit Sharing Plan
    $87k-127k yearly est. 10d ago
  • Senior Security Engineer

    Goodleap 4.6company rating

    Cyber security analyst job in Irvine, CA

    GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America. Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information. The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services. Your oversight will encompass: * Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. * Build-time controls: Managing applications/products security controls and activities during development. * Runtime controls: Overseeing security measures at runtime, from prevention to detection and response. Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed. While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities * Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes. * Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. * Support or develop components of the security analytics platform. * Contribute to investigations, threat hunting, and incident response activities in a supporting role. * Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns. * Support the security operations team with the vulnerability management lifecycle for products and services under your purview. * Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities. Required Skills, Knowledge & Abilities * Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences. * Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization. * Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments. * Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus). * Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble. * Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc. * Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases. * Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault. * Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed. * Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas. * Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments. * Experience engaging with vendors in design partnerships. * Experience overseeing vulnerability and threat management at the platform and application levels. * Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement. * Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution. $146,000 - $170,000 a year In addition to the above salary, this role may be eligible for a bonus. Additional Information Regarding Job Duties and s: Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law. If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today! We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI. We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
    $146k-170k yearly 60d+ ago
  • Information Systems Security Officer III (Government)

    Att

    Cyber security analyst job in San Diego, CA

    This position requires office presence of a minimum of 5 days per week and is only located at customer's site. No relocation is offered. AT&T Global Public Sector is a trusted provider of secure, IP enabled, cloud-based, network solutions and professional services to the Federal Government. We are dedicated to recruiting, developing and empowering a diverse, high-performing workforce that is passionate about what they do, committed to our shared values and dedicated to our customers' mission. AT&T will deliver systems engineering and technical support to the US Navy providing software, hardware, cybersecurity, installation, and logistical services in support of current and future programs. AT&T has an opening for an Information Systems Security Officer to support information assurance programs and ensure the security posture of mission critical systems. The ISSO will play a key role in supporting security authorization activities in alignment with program and government requirements. Job Duties/Responsibilities: Oversees and manages information security program implementation within the organization or other area of responsibility. Manages strategy, personnel, infrastructure, policy enforcement, emergency planning, security awareness, and/or other resources. Acquire and manage the necessary resources, including leadership support, financial resources, and key security personnel, to support information technology (IT) security goals, and reduce overall organizational risk. Required Clearance: TS/SCI or Secret clearance( #tsci) (#secret) Required Qualifications: Graduate Degree from accredited University or CNSSI 4012 or NDU CISO certificate or NDU CIO certificate or AQD GA8. or successful completion of military training course: NEC 2779 (CIN: A-531-0009) or 3372 or (EKMS Manager CIN W-3B-1500 ) or A-4C-1340 (KMI) (or DOD Service equivalent) for degree Greater than five (5)* years practical experience in a Cybersecurity, Engineering, T&E or A&A (formerly C&A) related field. Have worked with Information Assurance tools such as DISA Enterprise Mission Assurance Support Service (eMASS), Assured Compliance Assessment Solution (ACAS) and may be required to hold a Full Security Control Assessor qualification. Desired Qualifications: May be required to hold a Full Security Control Assessor qualification Our ISSO III's earn between $118,700 - $276,600. Not to mention all the other amazing rewards that working at AT&T offers. Individual starting salary within this range may depend on geography, experience, expertise, and education/training. Joining our team comes with amazing perks and benefits: Medical/Dental/Vision coverage 401(k) plan Tuition reimbursement program Paid Time Off and Holidays (based on date of hire, at least 23 days of vacation each year and 9 company-designated holidays) Paid Parental Leave Paid Caregiver Leave Additional sick leave beyond what state and local law require may be available but is unprotected Adoption Reimbursement Disability Benefits (short term and long term) Life and Accidental Death Insurance Supplemental benefit programs: critical illness/accident hospital indemnity/group legal Employee Assistance Programs (EAP) Extensive employee wellness programs Employee discounts up to 50% off on eligible AT&T mobility plans and accessories, AT&T internet (and fiber where available) and AT&T phone Candidates with arrest or convictions records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers, , the Los Angeles Fair Chance Initiative for Hiring Ordinance, and the California Fair Chance Act. Relevant Material Job Duties for which Criminal History may have a direct adverse, and negative relationship potentially resulting in the withdrawal of the Conditional Offer of Employment Contact with Customers/Candidates/Clients Safety Sensitivity (Vehicle/Tool/Machine Operation - if applicable) Handling/Proximity to Sensitive Information Weekly Hours: 40 Time Type: Regular Location: San Diego, California It is the policy of AT&T to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations for qualified individuals with disabilities. AT&T is a fair chance employer and does not initiate a background check until an offer is made.
    $80k-112k yearly est. Auto-Apply 59d ago
  • Cybersecurity Lead/Information Systems Security Officer (ISSO)

    Data Intelligence 4.5company rating

    Cyber security analyst job in San Diego, CA

    Data Intelligence, LLC is seeking a highly experienced Cyber Security Lead / Information Systems Security Officer (ISSO) to support cybersecurity operations and compliance for Navy and Department of Defense (DoD) systems. This role requires deep expertise in Information Assurance (IA), cybersecurity compliance frameworks, and Navy-specific cybersecurity practices. The ideal candidate will have extensive experience working with Navy Cross Domain Solutions (NCDSO) and a strong technical background in military C4I/IT systems. Key Responsibilities: Serve as the Cyber Security Lead/ISSO for classified and unclassified Navy/DoD systems. Lead Risk Management Framework (RMF) efforts in accordance with DoD 8500 Series, NIST SP 800 Series, and other applicable cybersecurity policies and guidelines. Develop, review, and manage technical documentation including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plan of Action & Milestones (POA&Ms). Interface with the Navy Cross Domain Solutions Office (NCDSO) to support secure cross-domain solutions, including submission packages and coordination of approvals. Provide subject matter expertise in support of system security engineering, integration, and testing. Coordinate with system engineers, developers, and stakeholders to ensure security controls are effectively implemented. Monitor systems for compliance with DFARS Clause ************ and other DoD IA requirements. Assist in the preparation and review of technical instructions, engineering plans, and test-related documentation. Maintain up-to-date knowledge of emerging cybersecurity threats, tools, and regulatory requirements. Support system Certification and Accreditation (C&A) processes in accordance with NSA and DoD standards. Required Qualifications: Education: Master's degree from an accredited college or university in Computer Science, Information Systems Management, Cybersecurity, or a related field. Experience: Minimum of 10 years of Navy or DoD experience in Information Assurance and Cybersecurity. At least 5 years of recent experience (within the last 5 years) directly supporting Navy cybersecurity programs and RMF processes. Direct experience with the Navy Cross Domain Solutions Office (NCDSO) within the last five years. Demonstrated expertise in DoD cybersecurity requirements, including the DoD 8500 Series and NIST SP 800 Series. Experience with engineering documentation including technical instructions, engineering plans, and systems integration documents. Strong understanding of military C4I/IT systems, including Navy SATCOM (MILSATCOM and Commercial), Tactical Communications, and GPS systems. High familiarity with the NSA certification process for secure systems. Certifications: Compliant with DFARS Clause ************ for Information Assurance Contractor Training and Certification (e.g., CISSP, CISM, Security+, or equivalent). Security Clearance: Must hold an active Top Secret / SCI (TS/SCI) clearance. Preferred Skills: Strong leadership and communication skills with the ability to brief senior stakeholders. Ability to lead complex cybersecurity projects with minimal supervision. In-depth knowledge of secure system design and implementation in classified environments. Experience collaborating with cybersecurity authorities across Navy and DoD organizations. About Data Intelligence, LLC: Data Intelligence, LLC (DI) is a small business that provides Information Technology System Development (Agile, DevSecOps, Cloud Platform support) Cybersecurity (RMF, Security Engineering, Cross Domain Solutions), Tactical Data Link Standards Development and Testing, and Logistics/Warehousing services to U.S. federal clients both CONUS and OCONUS. DI consistently demonstrates exceptional customer service, maintains an employee-centric culture, and delivers hands-on technical expertise to help our clients achieve their mission. Since 2005, DI has successfully provided IT Systems Engineering, Software Development, Cybersecurity, and supporting solutions and services to customers that include the Department of Defense, Intelligence, and Federal Civilian clients. Current clients include the US Navy, Air Force, Army, Marine Corps, Coast Guard, National Geospatial-Intelligence Agency, Defense Logistics Agency, and The Department of Homeland Security. DI is headquartered in Marlton, New Jersey, with satellite offices in California, Maryland, Ohio, Pennsylvania, Virginia, and Washington, D.C. Why you should join us: Data Intelligence offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays. Data Intelligence is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
    $83k-111k yearly est. 60d+ ago
  • Information Security Analyst

    T3W Business Solutions, Inc.

    Cyber security analyst job in San Diego, CA

    Requirements Bachelor's degree in Cybersecurity, Computer Science, or related field. 3+ years of experience in information assurance or cybersecurity. DoD 8570 IAT Level II certification (Security+ CE, CySA+, or equivalent). Familiarity with NIST, DISA STIGs, and DoD RMF compliance. Must possess an active Secret Clearance - Required This contractor and subcontractor shall abide by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disability. Salary Description $88,000-$102,000
    $88k-102k yearly 37d ago
  • Systems Security Engineer II

    Cambro Manufacturing 4.4company rating

    Cyber security analyst job in Huntington Beach, CA

    The System Security Engineer Level II is required to be a highly skilled and hands-on security engineer, and will be responsible for helping to maintain and expand the infrastructure of the entire Cambro network, ensuring that they are protected from cyber threats and attacks, ensuring compliance, and responding to incidents. In this role, the responsibility is to manage, monitor, and maintain our Network IT infrastructure from CVEs, cyber threats, manage and implement device firmware and software updates. Also, the role is required to assist in projects and initiatives to support, upgrade, and maintain our technical environment to improve network security. The role requirement is to be proficient with cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. The role requires to have a multi-disciplined background including experience with Cybersecurity Operations, firewalls, IDS/IPS, switches, VLANs, routing protocols, IPsec, VPN tunnels, multi factor authentication and e-mail security. In addition, they must have a solid understanding of virtualized servers, Windows workstations and services. This role is required to have the network monitoring skills and technologies for detecting unusual activity, investigate security breaches and lead incidence response. ESSENTIAL JOB FUNCTIONS • Monitor network traffic for anomalies, investigate alerts and respond to security incidents. • Conduct regular vulnerability scans, risk assessments, patch management and mitigation across network devices. • Ensure adherence to cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. • Able to proactively scan servers and network devices for vulnerable ports and protocols and rogue devices. • Manage our firewall environment with the ability to create route policies and apply cybersecurity recommendations • Install and configure Network Equipment (Switches, Firewalls, and other networking hardware) • Perform (Layer 2) switch administration and configuration on Cisco/Ruckus switches. Including configuring LAGs, interfaces, creating trunks, creating, and managing segmented VLANs. • Possess a solid understanding of Windows Server services and roles including installation and configuration • Create certificates for network devices and servers that have a web management capability • A strong understanding of Windows Active Directory and can design, implement, and configure and troubleshoot Active Directory issues • Create, Manage and Deploy Group Policy Objects (GPO's) to deploy applications and implement security including windows firewalls • Effectively use PowerShell to automate and standardize administrative tasks • Capable of installing a Linux VM and execute basic Linux commands and managing Linux appliances • Manage our virtualized server environment managing, creating VM's and patching the VMware environment. • Strong understanding of Virtual Switches, Port Groups (Distributed and Standard) • Manage the Active Backup for Business on Synology and other advanced Synology administration features • Maintain and monitor Backup solutions. • Manage our users email accounts using the cloud service M365 from Microsoft • Responsible for creating and maintaining server and network documentation to include tasks and procedures • Proactively monitor our network using a variety of tools to help identify potential network and server issues • Assist in patching our entire infrastructure when needed using a variety of tools • Maintains strong technical abilities, knowledge of new and changing technologies • Prepare for emergencies by creating and/or updating action plans • Jumping into time-sensitive projects wherever needed • Showing flexibility and a willingness to learn • Maintain healthy communication with IT Staff, IT Customers and Vendors • Actively participate in IT Infrastructure and Operations projects, managing, completing, communicating, and fully documenting assigned tasks and deliverables. • Maintain reliable and consistent attendance, including being punctual, and dependable in order to meet the needs of the department and the organization. • Execute each essential duty satisfactorily to perform job successfully. • Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions. • Performs effectively as a team member, able to work well with others, open to receiving and give feedback, and treats everyone with respect. • Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects. • Follow all department quality standards/criteria. Raise concerns and issues to immediate manager. • Able to understand and demonstrate Cambro company culture, display company core values (Safety, Quality, Respect, and Service). • Understands department's key performance indicators and contributes to achieve these goals both individually and as a team. • Maintains reliable and consistent attendance, including being punctual, dependable, and flexible to potential schedule changes to meet the needs of the department and the organization. • Executes each essential duty satisfactorily to perform job successfully. • Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions. • Performs effectively as a team member, able to work well with others, open to receive and give feedback, and treats everyone with respect. • Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects. • Follows all department quality standards/criteria. Raises concerns and issues to management. • Understands department's key performance indicators (KPIs) and contributes to achieve these goals both individually and as a team. • Other duties as needed or required. ADDITIONAL RESPONSIBILITIES • Ability to be on call 24 hours a day, 7 days a week for global operations, by periodically providing off-hours, evening, and weekend support to accommodate maintenance windows and issue resolution • Occasional travel to various Cambro locations domestically and internationally as required (15%) • May occasionally guide less experienced associates to help with technical projects • Some travel may be required. REQUIRED QUALIFICATIONS The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. • Bachelor's degree (B.A.) from a four-year accredited college or university. • 5-10 years of experience in IT security, network, administration, and support roles. • Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form. • Ability to adapt and adjust plans to meet changing needs. • Proficient in Microsoft Office Suite • Experience with Fortinet solutions, EDR, email security solutions • Solid knowledge of cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. • Solid working knowledge of Layer 2 (VLANs, Inter-VLANs, VTP Domains, bridge groups, MVRP, ACL's) technologies and network segmentation. • Strong knowledge of DNS records including reverse zones and maintaining DNS records • Strong DHCP Knowledge to include DHCP Fail over and able to configure DCHP relay on Switches • Solid understanding of routing protocols, static routes and ARP cache • Proficient in creating and implementing certificates on layer 2 devices (Switches, Firewalls, Linux Appliances) • Strong troubleshooting skills and possess the ability to find security and network issues in a timely manner • Strong Windows administration skills including Active Directory/GPO's and security policies • Solid working knowledge of Virtualization, such as VMware ESXi servers and vCenter 7.x • Solid working knowledge of Veeam/Bacula/Exagrid backup software to manage backup and restore procedures • Must be able to follow instructions and procedures and ask questions if something is unclear • Excellent documentation skills including ability to create network drawings • Self-motivated and energetic with the ability to manage time efficiently without supervision and to work effectively under pressure • Strong customer service and communication skills • Excellent organizational skills and strong sense of urgency • Familiarity with various network types including LANs, WANs, SDWAN, WLANs, SANs, and VoIP networks • Great accuracy and attention to detail PREFERRED QUALIFICATIONS • Experience in Business Continuity and disaster recovery is a plus • Knowledge of Ruckus Access Points and Switches • Knowledge of IBMi PHYSICAL DEMANDS The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Sitting, walking, standing, bending at the neck, bending at the waist, squatting, climbing, kneeling, crawling, twisting at the neck and waist, repetitive use of hands, simple grasping, power grasping, fine manipulation, pushing and pulling, reaching above and below the shoulder, carrying/lifting up to 50 lbs. Driving cars and other IT equipment Working around equipment and machinery Exposure to excessive noise Exposure to dust, gas, fumes or chemicals Working at heights Use of special visual or auditory protective equipment Walking on uneven ground PPE Requirements Safety glasses Steel-toe slip-resistant shoes - When in production area Hearing protection (e.g. ear plugs, ear muffs) - When in production area Face covering (mask) in accordance with company policy. Hardhat/bump camp IT Application COMPENSATION RANGE: $97,000- $120,000 Salary may vary based on experience. CAMBRO is proud to be an equal-opportunity workplace. All qualified applicants will receive consideration for employment without regard to and will not be discriminated against based upon race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic information, military or veteran status, or other characteristics protected by law.
    $97k-120k yearly Auto-Apply 34d ago
  • Controls Security & Fire System Engineer III

    Johnson Controls Holding Company, Inc. 4.4company rating

    Cyber security analyst job in Huntington Beach, CA

    What you do Be responsible for Pre Sales Support & End User Support for, but not limited to the design, configuration, and operation of complete building low voltage systems, including fire, security, and other low voltage control sub-systems (i.e. lighting, nurse call, data networks, etc.) to meet the intent of the project requirements. Accountable to field teams for quality, timeliness and efficiency of designs. Develops complex software programs, commissions and troubleshooting to ensure proper operations of the building control system. Provides detailed information and submittals to communicate design and operation to customers, consultants, Johnson Controls field installation team and subcontractors. How will you do it - Sales Support and End User Support · Possible job walks with the Sales Team on the initial design phase · Designs and configures are technically complex building control systems as defined by the contract documents. · Creates flow diagrams, sequence of operations, bill of material, network layouts and electrical schematics as required. · Develop and tests software programs necessary to operate the system per the project requirements' intent. · Coordinates the creation of necessary drawings and equipment schedules for submittals and installation. · Assists in the loading and commissioning of all system and network-level controllers as required. · Assists in validation of complete system functionality and troubleshoots problems with subcontractors and other trades to ensure proper operation. · Provides field change information to the project team for the creation of as-built drawings and software. · Keeps management and JCI contractor or customer informed of job progress and issues. · Assists in performing site-specific training for owner/operator on the total building control system. · Participates in release meeting with the project field team. · Performs value engineering to provide cost effective results while maintaining customer satisfaction. · Adheres to safety standards. · High degree of employee and subcontractor safety. What we look for Required Qualifications · Minimum of seven years of experience, or an associate degree in a related technical field with seven years of relevant work experience required. · Demonstrated knowledge of the construction, mechanical, electrical, or HVAC service industry. · Demonstrated knowledge of mechanical drawings, electrical wiring diagrams, control theory, automatic temperature controls, building automation systems and other building subsystems. · Demonstrated experience in the integration of low voltage building sub-systems using various industry protocols (i.e. LON, BACnet, etc.). · Ability to relate technical knowledge to a non-technical audience. · Demonstrated advanced computer skills required, particularly computer-related drafting tools, such as Visio. Preferred Qualifications · Bachelor's degree in engineering with a minimum of five years of experience, or an associate degree in a related technical field with seven years of relevant work experience required. · Understanding of IP networking for building automation systems. · Understanding of Tridium/Niagara Framework HIRING SALARY RANGE: $100K to $125K (Salary to be determined by the education, experience, knowledge, skills, and abilities of the applicant, internal equity, location and alignment with market data.) This role offers a competitive Bonus plan that will take into account individual, group, and corporate performance. This position includes a competitive benefits package. For details, please visit the About Us tab on the Johnson Controls Careers site at ***************************************** Johnson Controls International plc. is an equal employment opportunity and affirmative action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information, sexual orientation, gender identity, status as a qualified individual with a disability or any other characteristic protected by law. To view more information about your equal opportunity and non-discrimination rights as a candidate, visit EEO is the Law. If you are an individual with a disability and you require an accommodation during the application process, please visit here.
    $100k-125k yearly Auto-Apply 34d ago
  • OT Cyber security Specialist

    Military, Veterans and Diverse Job Seekers

    Cyber security analyst job in San Diego, CA

    Key Responsibilities: Lead and/or assist technical and analytical Cyber security support activities for Facility Related Control Systems (FRCS), Operational Technology (OT) and Information Technology (IT) to develop, engineer and implement a cyber secure baseline. Assist the ISSM with initial engineering requirements to determine proper FIPS 199 system categorization and selection of security controls. Review and determine specific CNSS 1253 security controls applicable to the FRCS/OT/IT. Furthermore, define and determine cyber engineering requirements to meet the assigned CNSS 1253 controls throughout the entire lifecycle. Provide technical and analytical support while the FRCS/OT/IT system is being built or maintained. Implement security baseline measures such as STIGs, SRGs, OEM best build practices, etc. Perform accurate and measurable scanning of the FRCS/OT/IT systems and devices using tools such as ACAS. Design, develop and maintain required documentation to support the FRCS/OT throughout the lifecycle. Develop the FRCS/OT/IT self-assessment test plan and assist the ISSM in obtaining approval. Additionally, the ISSE will assist in the self-assessment as required by the ISSM. Assist the Validator as needed during the validation by providing necessary information, documentation, and onsite support. Assist the ISSM in mitigating and resolving vulnerabilities after completion of the validation. Provide life cycle support of the FRCS/OT/IT following approved USMC vulnerability management principles and procedures. Lead communications with Government stakeholders and provide advisory support. Basic Qualifications: Bachelor's degree in Computer Science, Information Assurance, Information Security System Engineering plus a minimum of six (6) years of directly related experience with a minimum of two (2) of these years functioning in an FRCS/OT/IT/RMF role with exposure to diverse IT architectures within the DoD, demonstrating progressive growth of skills. Certification: CompTIA Sec+ Ability to obtain a Government Common Access Card (CAC) Proven capability to independently initiate, track and manage tasks, with a high degree of detail, quality, and process orientated completion. Knowledge of DoDI 8510.01 policy and principles. Working knowledge of USMC Assessment & Authorization policies, practices, and toolsets. High level understanding of information security principles and risk assessment techniques associated to FRCS/OT/IT. Ability to use prior experience and knowledge to address new situations and incorporate new information; especially during interactions with clients. Willingness and ability to set priorities and deliver under tight deadlines in a heavy workload environment. Excellent communication skills, both written and verbal to clearly articulate ideas for senior leadership as well as technical staff consumption. Ability to work in teams, and establish and maintain cross-functional and working relationships. Proficient with Microsoft Office Suite of tools, including Word, Excel, and PowerPoint. Preferred Qualifications: Experience working with DoD programs a significant plus Experience with USMC systems and RMF process Experience with industrial control systems Certification(s): CISSP, CISM, CEH, GICSP
    $77k-109k yearly est. 60d+ ago
  • Sr. Security Compliance Analyst

    TP-Link Systems Inc. 3.9company rating

    Cyber security analyst job in Irvine, CA

    Job Description Headquartered in the United States, TP-Link Systems Inc. is a leading global provider of networking devices and smart home products. Consistently ranked as the world's top provider of Wi-Fi devices, TP-Link is dedicated to delivering innovative solutions that improve people's lives by offering faster, more reliable connectivity. Serving customers in over 170 countries, we are committed to expanding our global footprint. At TP-Link Systems Inc., we believe that technology has the power to transform the world for the better. Our mission is to design reliable, high-performance products that connect users worldwide to the limitless possibilities of technology. We are driven by our core values of professionalism, innovation, excellence, and simplicity. Our goal is to help clients achieve outstanding global performance and to provide consumers with a seamless, effortless technology experience. TP-Link Systems Inc. is seeking a skilled and proactive Sr. Security Compliance Analyst who will be responsible for developing and overseeing TP-Link's enterprise security governance framework, ensuring compliance with regulatory requirements, industry standards, and internal policies. This individual will collaborate with cross-functional teams to embed security into business operations, manage risk, and enhance security resilience across TP-Link's enterprise ecosystem. Key Responsibilities: Security Governance & Policy Development Develop, implement, and maintain security policies, standards, and guidelines aligned with industry best practices (e.g., NIST, ISO 27001, CIS). Establish and lead a security governance framework to ensure consistent application of security controls across the enterprise. Risk Management & Compliance Identify, assess, and mitigate security risks across TP-Link's global operations. Ensure compliance with regulatory requirements such as GDPR, CCPA, NIST CSF, and other applicable cybersecurity frameworks. Oversee security audits, risk assessments, and third-party security evaluations. Partner with legal, IT, and business leaders to address security compliance gaps. Third-Party & Supply Chain Security Develop and enforce security requirements for vendors, suppliers, and third-party partners. Conduct security assessments of supply chain partners to identify and mitigate potential risks. Security Awareness & Training Develop and lead security awareness programs to educate employees on cybersecurity risks and best practices. Foster a security-first culture across all levels of the organization. Provide guidance and training on security governance processes for internal stakeholders. Incident Response & Continuous Improvement Support security incident response efforts by ensuring governance processes facilitate rapid detection and response. Lead post-incident analysis to refine security policies and controls. Monitor emerging threats, regulatory changes, and industry trends to evolve TP-Link's security governance strategies. Requirements Qualifications Education: Bachelor's degree in Computer Science, Cybersecurity, Information Security, or a related field. Experience: 5+ years of experience in security governance, risk management, or compliance in a global technology or networking company. Proven track record in developing and implementing security governance frameworks for enterprise security. Experience managing compliance with industry standards and regulations (ISO 27001, NIST CSF, SOC 2, GDPR, CCPA, etc.). Hands-on experience with supply chain security, third-party risk management, and vendor security assessments. Skills: Deep understanding of security frameworks (ISO 27001, NIST, CIS, SOC 2) and regulatory requirements. Strong expertise in risk management methodologies, security policy development, and compliance auditing. Proficient in conducting security assessments, third-party risk evaluations, and internal security reviews. Ability to communicate complex security concepts to business and technical stakeholders effectively. Strong leadership skills with experience in cross-functional collaboration and executive reporting. Benefits Salary range: $100,000-$150,000 Free snacks and drinks, and provided lunch on Fridays Fully paid medical, dental, and vision insurance (partial coverage for dependents) Contributions to 401k funds Bi-annual reviews, and annual pay increases Health and wellness benefits, including free gym membership Quarterly team-building events At TP-Link Systems Inc., we are continually searching for ambitious individuals who are passionate about their work. We believe that diversity fuels innovation, collaboration, and drives our entrepreneurial spirit. As a global company, we highly value diverse perspectives and are committed to cultivating an environment where all voices are heard, respected, and valued. We are dedicated to providing equal employment opportunities to all employees and applicants, and we prohibit discrimination and harassment of any kind based on race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Beyond compliance, we strive to create a supportive and growth-oriented workplace for everyone. If you share our passion and connection to this mission, we welcome you to apply and join us in building a vibrant and inclusive team at TP-Link Systems Inc. Please, no third-party agency inquiries, and we are unable to offer visa sponsorships at this time.
    $100k-150k yearly 12d ago
  • Information Systems Security Officer

    Mantech 4.5company rating

    Cyber security analyst job in Camp Pendleton South, CA

    **MANTECH** seeks a motivated, career and customer-oriented **Information Systems Security Officer** with strengths in Information Systems Security to join our team at Marine Corps Base **Camp Pendleton California.** This position will assist Marine Corps Warfighting Laboratory (MCWL) prepare for and maintain the IT infrastructure, IT capabilities and Audio-Visual capabilities to support emerging ICD 705 Sensitive Compartmentalized Information Facilities (SCIFs) and Special Access Control Facilities (SAPFs) through planning, activation and operations. **Responsibilities include but are not limited to:** + Experience in network design, network monitoring, systems development, and knowledge of Information Assurance (IA) policies, directives, and best practices across DoD and Marine Corps. + Knowledge and experience with organizations within the Marine Corps responsible for facilitating network approvals and connections. + Work with various Marine Corps, Navy, Joint, and other services to coordinate installs supporting Initial Operating Capability (IOC) and Final Operating Capability (FOC). + Ability to communicate and provide effective staff coordination across government, Marine Corps, and contractor organizations. + Support the facility Site Security Manager (SSM)/Special Security Representative (SSR) and Information Systems Security Manager (ISSM) to oversee the secure installations and operations of systems across multiple security domains and in accordance with policies, directives, and best practices. + Establishes and satisfies complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports Marine Corps and other customers at the highest levels in the development and implementation of doctrine and policies. **Minimum Qualifications:** + Bachelor's degree and at least 10 years' experience planning and/or operating IT infrastructure within ICD 705 facilities. + Experience with network security aspects of installations and operations. **Preferred Qualifications:** + Experience with MS Word, MS Power Point **Clearance Requirements** **_:_** + Candidate must have a current/active Top Secret clearance with the ability to obtain and maintain a TS/SCI clearance prior to starting this position. **Physical Requirements:** + Ability to maintain construction security oversight in outdoor environment; walk (with personal protective equipment) to inspect and document delivery of components and assembly/construction of structure. MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation. If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
    $67k-94k yearly est. 37d ago

Learn more about cyber security analyst jobs

How much does a cyber security analyst earn in Oceanside, CA?

The average cyber security analyst in Oceanside, CA earns between $69,000 and $131,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.

Average cyber security analyst salary in Oceanside, CA

$95,000

What are the biggest employers of Cyber Security Analysts in Oceanside, CA?

The biggest employers of Cyber Security Analysts in Oceanside, CA are:
  1. Kellermeyer Bergensons Services
Job type you want
Full Time
Part Time
Internship
Temporary