Cyber security analyst jobs in Prunedale, CA - 110 jobs
All
Cyber Security Analyst
Security Engineer
Information Security Analyst
Senior Security Analyst
Senior Security Engineer
Defense Analyst
Information Security Engineer
Senior Cyber Security Analyst
Cyber Security Engineer
Senior Cloud Visibility & Security PM
Gigamon 4.8
Cyber security analyst job in Santa Clara, CA
A leading technology firm is seeking a Senior Product Manager to drive strategy and execution for cloud visibility and security solutions. This role involves collaborating cross-functionally with engineering, sales, and marketing teams. The ideal candidate should have a master's degree with an MBA preferred, along with over 10 years of experience in product management within cloud technologies. The role offers a competitive salary ranging from $192,000 to $240,000 and various employee benefits including health insurance and 401(k) matching.
#J-18808-Ljbffr
$192k-240k yearly 3d ago
Looking for a job?
Let Zippia find it for you.
Senior Cloud Security Engineer - Product Security
IBM 4.7
Cyber security analyst job in San Jose, CA
A leading software solutions company is seeking a Senior Product Security Engineer to enhance their product security function. In this role, you will collaborate closely with R&D teams to ensure security is integrated into the cloud offerings, including multi-cloud environments. Responsibilities include monitoring vulnerabilities, executing security assessments, and contributing to secure software architecture. Candidates should have extensive experience in security practices, particularly in cloud environments. This position offers a hybrid work arrangement within the United States.
#J-18808-Ljbffr
$101k-136k yearly est. 3d ago
Senior Security Engineer
OSI Engineering 4.6
Cyber security analyst job in Mountain View, CA
A globally leading consumer device company headquartered in Mountain View, CA is looking for a Senior Offensive Security Engineer to proactively identify, exploit, and help eliminate security weaknesses across our web platforms and AI/ML systems. In this role, you will think like an attacker, operate with engineering rigor, and work closely with product, platform, and AI teams to raise the security bar across the organization. You will lead complex penetration tests, design novel attack techniques for web and modern AI-powered applications, and influence secure-by-design architecture at scale.
Responsibilities:
• Conduct offensive security assessments on large-scale web applications, REST APIs, and cloud-backed services.
• Identify and validate vulnerabilities including injection flaws, access control
issues, authentication/authorization weaknesses, SSRF, deserialization, and logic
bugs.
• Evaluate LLM-based systems and AI agents for prompt injection, data exfiltration, model abuse and jailbreaks
• Design and execute red team-style engagements simulating real-world adversaries.
• Develop custom exploitation tools, PoCs, and fuzzers for web and AI attack surfaces.
• Identify systemic security weaknesses and collaborate with engineering teams to drive long-term mitigations.
• Review architectures and designs for new products with an attacker mindset.
• Produce clear, actionable security reports and present findings to technical and executive stakeholders.
Minimum Qualifications:
• Master's degree in Computer Science, Computer Engineering, Information Security, or a closely related technical field.
• Doctorate (PhD) in a relevant field is a plus but not required.
• 5+ years of experience in offensive security, penetration testing, or red teaming.
• Deep expertise in web application security.
• Strong understanding of API security.
• Hands-on experience testing AI/ML or LLM-based systems, or strong motivation with demonstrated research in this area.
• Proficiency in at least one scripting or programming language (Python, Go, JavaScript, or similar).
• Strong knowledge of common exploitation techniques and attacker tooling.
Preferred Qualifications:
• Prior work on adversarial ML, red-teaming AI systems, or secure LLM pipeline
design.
• Experience with cloud security (AWS, GCP, Azure) and containerized environments.
• Background in security research, published CVEs, CTF experience, blog posts, or conference talks.
• OSCP, OSEP, OSWE, CRTO, or similar.
What We Look For:
• An attacker-first mindset with strong engineering discipline.
• Ability to go beyond scanners and find novel, high-impact vulnerabilities.
• Clear communicator who can translate complex exploits into actionable fixes.
• Curiosity about emerging threats, especially in AI security.
• Ownership mentality and comfort operating in ambiguous problem spaces.
Type: Contract
Duration: 12 months with extension
Work Location: Mountain View, CA (on site)
Pay Range: $ 85.00 - $ 100.00 (DOE)
$85-100 hourly 3d ago
Information Security Analyst
Supermicro 4.7
Cyber security analyst job in San Jose, CA
Supermicro is a Top Tier provider of advanced server, storage, and networking solutions for Data Center, Cloud Computing, Enterprise IT, Hadoop/ Big Data, Hyperscale, HPC and IoT/Embedded customers worldwide. We are the #5 fastest growing company among the Silicon Valley Top 50 technology firms. Our unprecedented global expansion has provided us with the opportunity to offer a large number of new positions to the technology community. We seek talented, passionate, and committed engineers, technologists, and business leaders to join us.
Job Summary:
Supermicro is looking for an experienced and knowledgeable Information SecurityAnalyst to join our information security team. As a gatekeeper that keeps track to the high-volume data over the cyberspace for the company, the securityanalyst must possess knowledge of every aspect of information security, with its main focus on analyzing the security measures of a company and determine how effective they are, and assess risks and provide recommendations for remediation. The securityanalyst must work with business administrators as well as IT professionals in communicating flaws in security systems, and recommend changes that will improve every aspect of company security. This position will be based in our headquarters located in San Jose, CA.
Essential Duties and Responsibilities:
The responsibilities will include, but not limited to:
Design, implement and enforce information security policy including asset management and system hardening.
Insuring all networks have adequate security to prevent unauthorized access.
Develop reports to share with administrators about the efficiency of security policies and recommend any changes.
Organize and conduct training for all employees regarding company security and information safeguarding.
Ensure that all security systems are current with any software or hardware changes in the company.
Perform penetration tests and security scanning on hosts and networks.
Follow up on security mitigations.
Qualifications:
Basic Qualifications:
Bachelor's degree in Computer Science, Management Information Systems or equivalent experiences.
Experience with system and network administration and able to perform networking penetration tests using software tools.
Preferred Qualifications:
Master's degree in Computer Science or Management Information Systems.
2-4+ years of hands-on experience in information security environment, with prior experiences in high-tech corporate environment.
Solid understanding in security framework and best practices.
Strong analytical, troubleshooting and problem-solving skills.
Excellent communication skills in both verbal and written.
Certifications in the following is highly preferred - GIAC, CISSP, SSCP, etc.
Salary Range
$90,000 - $100,000
The salary offered will depend on several factors, including your location, level, education, training, specific skills, years of experience, and comparison to other employees already in this role. In addition to a comprehensive benefits package, candidates may be eligible for other forms of compensation, such as participation in bonus and equity award programs.
EEO Statement
Supermicro is an Equal Opportunity Employer and embraces diversity in our employee population. It is the policy of Supermicro to provide equal opportunity to all qualified applicants and employees without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, protected veteran status or special disabled veteran, marital status, pregnancy, genetic information, or any other legally protected status.
$90k-100k yearly 4d ago
Cyber Security
Forhyre
Cyber security analyst job in Sunnyvale, CA
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information
Develop and implement security policies and controls to support the CyberSecurity framework
Manage the existing cybersecurity training program across global, multilingual business
Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
Continuous improvement in the areas of Information Security technologies, techniques and processes
Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
Ability to interpret penetration test results and describe issues and fixes to non-security expert
Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP)
8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
Vulnerability Assessment testing and/or Penetration Testing (preferred)
Robotic Process Automation/Intelligent Automation (preferred)
Business case development supporting security technology solutions (preferred)
Additional certifications demonstrating cybersecurity/technical mastery (preferred)
$88k-125k yearly est. 25d ago
Senior Cyber Security Analyst
Bayside 4.5
Cyber security analyst job in Santa Clara, CA
reports to the CyberSecurity Manager and is responsible for reviewing and analyzing threat feeds in order to assist in optimizing currently deployed tools/procedures/processes throughout the organization. Analyst must analyze escalated security incidents from linear departments to validate, understand,
and create lessons learned to help strengthen the posture of the organization.
Analyst must also be able to advise on IT initiatives, IT business projects,
and IT engineering in regards to security industry best practice. The analyst
must also have a firm understanding of penetration testing and vulnerability
assessments. A strong networking background and security certifications are
preferred.
Qualifications
Demonstrate a comprehensive understanding of security processes for installation, management, monitoring and response of enterprise networks
In depth experience with Information System Security (ISS), PKI, firewalls, intrusion detection/protection and related vulnerability assessment tools for network periphery and internal network/service discovery and topology mapping
Experience working with a Security Operation Center
Experience in full life cycle information technology solution implementation from conceptualization, requirements, design and specification through development (coding), integration testing and commissioning
Demonstrate the ability to communicate clearly, to both technical and non-technical audiences, risks, threats, and vulnerabilities identified during assessments
Demonstrated understanding of TCP/IP networking
Must have strong incident handling experience including knowledge of common probing and attack methods, network/service discovery, system auditing, viruses, and worms
Security testing of Enterprise networks through ethical hacking
Experience responding to incidents in a 24/7 environment
Experience working in a fast paced industry dealing with sensitive data
Demonstrate strong understanding of Windows, networking, telephony and wireless security skills
$114k-153k yearly est. 1d ago
Cyber Defense Analyst
Integral Federal
Cyber security analyst job in Monterey, CA
The Cyber Defense Analyst is responsible for using data collected from various cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events within their environments for the Defense Language Institute Foreign Language Center (DLIFLC) Academic Network Labor Contract to administer, maintain, secure, and accredit the DLIFLC Academic Network which provides the IT environment for 100% of the DLIFLC teaching and instructing for all students, staff, faculty, and guests in a learning environment at the unclassified level.
Responsibilities
· The primary goal is to mitigate threats and enhance the organization's security posture.
Data Analysis: Utilize data from cyber defense tools to analyze and interpret security events.
· Threat Mitigation: Identify and respond to potential threats to mitigate risks.
· Incident Response: Participate in incident response activities to address security breaches.
· Continuous Monitoring: Maintain ongoing surveillance of network traffic and security alerts.
· Collaboration: Work with all teams to implement effective defense strategies and improve overall security measures.
Qualifications
Required:
· AA/AS from an accredited college or university or substitute with 3+ years experience with any one of the following IAT Level II (CySA+, Security+, CND, or SSCP) Certification and CE/OS Certification.
· Relevant Skills: Microsoft Defender for Endpoint, ACAS, Palo Alto Networks, GitLab, BurpSuite, MacOS, iPadOS, Windows, and RedHat Enterprise Linux.
· Secret Clearance
Salary Range: $115,000 - $122,000
The above salary range represents a general guideline. Integral Federal considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.
Depending on the position, employees may be eligible for overtime, shift differential, and/or discretionary bonuses in addition to base pay.
Company Overview
Integral partners with federal defense, intelligence, and civilian leaders to tackle their most important challenges and deliver positive outcomes. Since our founding in 1998, we have helped clients leverage existing and emerging technologies to transform their enterprises, empower growth, drive innovation, and build sustainable success. The forward-leaning solutions we deliver are tailored to each mission with a focus on keeping our nation safe and secure.
Integral is headquartered in McLean, VA and serves clients throughout the country.
We offer a comprehensive total rewards package including paid parental leave and immediate vesting in our 401(k). Give us a try and become part of a curated group of professionals at Integral Federal!
Our package also includes:
· Medical, Dental & Vision Insurance
· Flexible Spending Accounts
· Short-Term and Long-Term Disability Insurance
· Life Insurance
· Paid Time Off & Holidays
· Earned Bonuses & Awards
· Professional Training Reimbursement
· Paid Parking
· Employee Assistance Program
Equal Opportunity Employer/Protected Veteran/Disability
$115k-122k yearly Auto-Apply 60d+ ago
INFORMATION SECURITY ANALYST
San Jose Evergreen Community College District 3.6
Cyber security analyst job in San Jose, CA
Opportunity Type CLASSIFIED EMPLOYMENT OPPORTUNITY Position Title INFORMATION SECURITYANALYST Posting Number S2549 Close/First Review Date 11/16/2025 Department ITSS (Information Technology Support Services) Work Location District Office Position Status Full Time Salary Range $141,330 - $172,437 Annual Salary (Range 150: Classified Salary Schedule Fiscal Year 2025-2026). Starting placement is generally at Step 1. Benefits Summary
In addition to the salary, this position qualifies for the choice of one of the District's excellent Health Benefits and Welfare plans, which the premium cost is 100% paid by the District for the employee and their eligible dependents, and one health plan costing an estimated $60,000 for the District for fiscal year 2025-2026. We offer two medical plans (Anthem Blue Cross [PPO] and Kaiser Permanente (HMO]); dental (Delta Dental PPO); vision (VSP Choice); life insurance for the employee (The Hartford); life insurance for eligible dependents (The Hartford); a long term disability/income protection plan (The Hartford); and an employee assistance plan (Anthem EAP).
In addition, the District contributes an additional 26.81% of the employee's salary towards an eligible employee's pension (CalPERS).
Employees may also elect to participate in optional plans including purchasing additional life insurance for themselves and their eligible dependent(s); enroll in a medical, transportation, and/or dependent care Flexible Spending Account(s) (with the $4 monthly administrative fee paid by the District); and set pre-taxed dollars aside to supplement their pension in a 403b (tax shelter annuity) and/or a 457 (deferred compensation) plan(s).
Classified employees also earn 10 to 22 days per year of vacation (based on years of service), and up to 12 sick leave days (pro-rated for less than full-time positions). There are currently 20 paid holidays.
Position Description
POSITION SUMMARY
The Information SecurityAnalyst reports to Executive Director of ITSS (Information Technology Support Services) at the District Office. The work schedule is 12 months per year; 40 hours per week; Monday - Friday; 8:00 a.m. - 5:00 p.m.
This position is represented by CSEA (California School Employees Association), Chapter 363.
POSITION PURPOSE
Reporting to Executive Director, ITSS or an assigned administrator, the Information SecurityAnalyst performs complex work related to the District's information security program including testing, analysis and evaluation of the integrity and confidentiality of enterprise systems, network, assets and communication technology throughout the District. The position monitors security systems and conducts periodic risk assessments to identify, troubleshoot, diagnose, resolve and report security problems and breaches; assists in coordinating and conducting investigations involving District technology resources, and assists with security awareness training.
DISTINGUISHING CHARACTERISTICS
This position focuses on threat and vulnerability management with exposure and support on all aspects of the cybersecurity practice. Incumbent in this position should have advanced knowledge on risk identification, protection and compliance, threat detection, incident response plan development and annual review, and recovery services to achieve business resilience.
KEY DUTIES AND RESPONSIBILITIES
1. Analyze, evaluate and implement security applications, policies, standards and procedures intended to prevent the unauthorized use, disclosure, modification, loss or destruction of data; work with the campus community and other staff to ensure the integrity and security of the information technology infrastructure.
2. Lead the development, testing and implementation of information security products and control techniques in all locations throughout the District.
3. Work with campus and district technology teams to ensure the security of all applications and assets.
4. Monitor and review security systems and logs. Identify, troubleshoot, diagnose, resolve, document and report security problems and incidents; help coordinate and conduct investigations of suspected breaches; respond to emergency information security situations.
5. Collaborate with application programming team and other IT staff to ensure production applications meet established security policies and standards.
6. Assist with training and education on information security and privacy awareness topics for District administrators, faculty and staff; assist in the development of appropriate security-incident notification procedures for District management.
7. Work with vendors to conduct vulnerability assessments to identify existing or potential electronic data and assets compromises and their sources; participate in investigative matters with appropriate law enforcement agencies.
8. Perform audits and periodic inspections of District information systems to ensure security measures are functioning and effectively utilized and recommend appropriate remedial measures to eliminate or mitigate future system compromises.
9. Review, evaluate, and recommend software products related to IT systems security, such as virus scanning and repair, encryption, firewalls, internet filtering and monitoring, intrusion detection, etc.
10. Monitor and maintain the District's security event information system (SEIM) and data loss prevention software.
11. Manage security systems and policies including but not limited to servers, firewalls, email security, and Microsoft 365 environment.
12. Recommend and implement security policies, protocols, practices and lead in creation of security training and guidance to staff.
13. Assist in the secure management and maintenance of the District's network authentication systems for wired and wireless network access.
14. Review security practices and controls of third-party service providers that handle District sensitive data, and review security controls and features of third-party software systems.
15. Ensure that maintenance, configuration, repair and patching of systems occurs on a scheduled and timely basis utilizing best practices in change management and consistent with policies and procedures.
16. Keep current with latest emerging security issues and threats through list servers, blogs, newsletters, conferences, user groups, and networking and collaboration with peers in other institutions.
17. Perform other duties reasonably related to the job classification.
EMPLOYMENT STANDARD
Knowledge of:
1. Compliance and industry cybersecurity standards frameworks such as NIST 800 and ISO standards.
2. Emerging technologies and the possible impact on existing information systems, instructional processes and business operations.
3. Incident response best practices and software license compliance laws.
4. Troubleshooting tools for computing hardware, servers and network equipment including but not limited to switches, routers, and firewalls.
5. Enterprise resource planning systems, Microsoft 365 and Active Directory and Azure Active Directory.
6. Principles of program design, coding, testing and implementation.
7. Advanced knowledge of desktop and server operating systems including Windows and Linux.
8. Disaster recovery and backup including business continuity planning.
9. Principles of training, support, and services to end-users.
10. General research techniques and data driven analytics.
11. Modern office administrative practices and use of tools including computers, websites and other applications related to this job.
Skills and Ability to:
1. Apply current NIST and ISO standards to current operations.
2. Respond to incidents and events in a timely manner.
3. Prepare clear and concise system documentation and reports.
4. Prioritize assigned tasks and projects.
5. Communicate complicated technical issues and the risks they pose to stakeholders and management.
6. Establish and maintain effective and cooperative working relationships with others.
7. Analyze situations accurately and adopt effective course of action.
8. Coordinate, develop, and implement projects.
9. Work with attention to detail and independently with minimum supervision.
Required Qualifications
EDUCATION AND EXPERIENCE
1. A Bachelor's degree from an accredited institution with major course work in computer information systems, computer science, business administration, or related field.
2. Two years of experience performing information security duties, which may include implementing, overseeing, and/or managing information security technologies, process, or programs, including identification, protection, detection, response, and recovery activities.
Certification:
1. Professional security or privacy certification, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or other similar credentials.
District's Diversity
* Demonstrated sensitivity, knowledge and understanding of the diverse academic, socioeconomic, gender identity, sexual orientation, cultural, disability, and ethnic background of groups historically underrepresented, and groups who may have experienced discrimination.
* Success integrating diversity as appropriate into the major duties outlined in the job description and in the duties listed in the District's hiring policy; or demonstrated equivalent transferable skills to do so.
Desired Qualifications
1. Bilingual abilities, desirable.
Foreign Degree
For positions that require a degree or coursework:
Degree(s) must have been awarded by a college or university accredited by an accrediting body recognized by the U.S. Council on Post-Secondary Accreditation and/or the U.S. Department of Education.
All degrees and credits earned outside of the United States must have a U.S. evaluation (course by course) of the transcripts and must be submitted with the application.
Degrees earned outside of the U.S. without a U.S. credential evaluation attached, will not be considered.
Working Environment
Physical Demands:
1. Must sit for long periods of time, use hands and fingers to operate an electronic keyboard, reach with hands and arms, and speak clearly and distinctly to ask questions and provide information, hear and understand voices over telephone and in person.
2. The physical demands described here are representative of those that must be met by an individual to successfully perform the essential functions of this job. Reasonable accommodation may be made to enable individuals with disabilities to perform the essential functions.
About San Jose/Evergreen Community College District
The District is represented by dedicated and talented employees who are passionate about providing our student population with the best educational experience possible. The District recognizes that cultural diversity in the academic environment promotes academic excellence; fosters cultural, racial and human understanding; provides positive roles models for all students, and creates an inclusive and supportive educational and work environment for its employees, students, and the community it serves.
As of Spring 2024, with enrollment of approximately 15,655 students per semester, and an extremely diverse student population (Hispanic/Latino 45.20%, Black/African-American 3.45%, Asian/Pacific Islander 31.70%, American Indian/Native American 0.36%, White/Caucasian 12.76%) attaining educational goals reflecting 56% - Transfer to a 4-Year College/ University, the District's emphasis on student success makes it a recognized educational leader in the State.
The District encourages a diverse pool of applicants to serve as colleagues to an existing diverse classified staff consisting of 43.9% Latinx, 25.3% Asian/Pacific Islander, 4.2% Black/African American, 0.3% American Indian/Native American, 17.9% White/Caucasian, and as well as encouraging applications from all qualified, outstanding applicants.
Important Information
EQUAL OPPORTUNITY EMPLOYER STATEMENT:
San José-Evergreen Community College District is an Equal Opportunity Employer committed to nondiscrimination on the basis of ethnic group identification, race, color, language, accent, immigration status, ancestry, national origin, age, gender, gender identity, religion, sexual orientation, transgender, marital status, veteran status, medical condition, and physical or mental disability consistent with applicable federal and state laws.
CONTACT:
Employment Services,
Human Resources, SJECCD
40 S. Market Street, San Jose, CA 95113
Phone: **************
Email: *******************************
Employment Website: ******************************
District Website: **************
APPLICATION PROCEDURES:
Interested applicants MUST SUBMIT ONLINE ALL of the following materials by the First Review Date/Closing Date as listed on the job announcement. Applications received after the First Review Date will only be forwarded to the hiring committee at their request.
1. A completed online San José-Evergreen Community College District APPLICATION.
2. A COVER LETTER (Stating how you feel you meet the qualifications as outline in the job announcement).
3. A current RESUME/CURRICULUM VITAE
4. TRANSCRIPT - (If Required) If a degree is listed as a requirement, transcripts (Not Diplomas) MUST INCLUDE confer or award date of stated degree. Unofficial transcripts will be accepted; however if the position is offered, official transcripts will be required prior to employment. If the transcripts or degrees are from outside of the United States, an official certification of equivalency to U.S. degrees by a certified U.S. credential review service (course by course of the transcripts) MUST also be submitted. (See below for a list of suggested services that provide foreign degree equivalency evaluation to U.S. degrees).
Note: Some positions may require additional documents and/or certificates, in addition to the items listed above. Please refer to the job announcement.
OTHER APPLICANT INFORMATION:
1. Only complete application materials will be considered. No exceptions.
2. Letters of Recommendation are NOT required and will not be forwarded to the hiring committee.
3. Upon hire the successful candidate must provide the required documents of identity and authorization to work and attest he/she is authorized to work in the United States.
4. Application materials become the property of the District and will not be returned or duplicated.
5. Travel expenses to attend the interview are the responsibility of the candidate.
6. Meeting the minimum qualifications does NOT assure an interview.
7. The District may re-advertise, delay, choose not to fill the position, or choose to fill more than one position.
Suggested services that provide foreign degree equivalency evaluation to U.S. degrees:
Academic Credentials Evaluation Institute, Inc.
Website: ***************************
Education Records Evaluation Services
Website: ************
International Education Research Foundation
Website: ********************
World Education Services
Website: ***********
$141.3k-172.4k yearly Easy Apply 60d+ ago
Sr. Security Portfolio TPM
Adobe 4.8
Cyber security analyst job in San Jose, CA
Our Company Changing the world through digital experiences is what Adobe's all about. We give everyone-from emerging artists to global brands-everything they need to design and deliver exceptional digital experiences! We're passionate about empowering people to create beautiful and powerful images, videos, and apps, and transform how companies interact with customers across every screen.
We're on a mission to hire the very best and are committed to creating exceptional employee experiences where everyone is respected and has access to equal opportunity. We realize that new ideas can come from everywhere in the organization, and we know the next big idea could be yours!
The Opportunity
The Adobe Security organization seeks a proactive force multiplier with experience skillfully leading multiple technical programs, running a healthy portfolio, working directly with leadership, and delighting stakeholders. Our ideal candidate has superb communication and relationship-building skills and a solid track record of driving business outcomes through managing large programs. In addition, familiarity with fundamentals in key security operations and related security compliance frameworks could help this candidate have an immediate impact. If you excel at navigating complexity with multiple internal customers, are a master planner who helps teams foresee challenges and risks and guides them through them, and are equipped with a diverse technical program management toolbox, we can't wait for you to join our Security PMO team!
What you'll Do
Partner directly with security leadership to build a portfolio of key programs. Lead and monitor the health and execution of several key initiatives with insights into status, risks, dependencies, roadblocks, and budget across the organization's program portfolio.
Ensure a healthy program portfolio in Adobe's Technology GRC (Governance, Risk, and Compliance) organization with a clearly defined roadmap.
Bring together cross-functional teams to deliver business outcomes for high-priority programs through clear planning, execution, partnership, and communication.
Make things easier for all collaborators of your program portfolio by driving simplicity, clarity, and efficiency in all aspects of your work.
Reduce program risk by proactively identifying, communicating, and removing roadblocks.
Build trust through visibility. Provide accurate and timely data-driven status reports for a broad audience and lead executive governance meetings.
Effectively handle program financials, including driving accurate budget forecasts.
What you need to succeed
Exceptional communication skills for effective engagement with both engineers and executives in meetings, presentations, and writing. Excel at building strong and trusted partner relationships.
7+ years as a program manager in the security domain with portfolio-level oversight experience. Demonstrate strong knowledge in the compliance field and have worked closely with the compliance teams on projects.
Experience leading programs involving AI systems and workflows (e.g., MCP servers, RAG capabilities, LLM integrations, or related AI infrastructure).
Established history of effectively managing programs from inception, prioritizing, and strategizing to implementation, reporting, and successful delivery of intricate projects with many significant internal customers.
Demonstrated Agile practice experience in software projects and familiarity with Jira (including query and dashboarding), O365 Suite, MS Teams, SharePoint, MS Project, Excel, and Miro or equivalent experience
Familiarity with compliance frameworks such as ISO 42001, SOC2, HIPAA, PCI DSS, ISO27001, ISO27017/18, ISO22301, and Geo-compliance programs.
Preferred Certifications: CISSP, CISM, PMP, or equivalent credentials demonstrating expertise in cybersecurity and program leadership.
Our compensation reflects the cost of labor across several U.S. geographic markets, and we pay differently based on those defined markets. The U.S. pay range for this position is $124,300 -- $234,600 annually. Pay within this range varies by work location and may also depend on job-related knowledge, skills, and experience. Your recruiter can share more about the specific salary range for the job location during the hiring process. In California, the pay range for this position is $162,000 - $234,600 In New York, the pay range for this position is $162,000 - $234,600
At Adobe, for sales roles starting salaries are expressed as total target compensation (TTC = base + commission), and short-term incentives are in the form of sales commission plans. Non-sales roles starting salaries are expressed as base salary and short-term incentives are in the form of the Annual Incentive Plan (AIP).
In addition, certain roles may be eligible for long-term incentives in the form of a new hire equity award.
State-Specific Notices:
California:
Fair Chance Ordinances
Adobe will consider qualified applicants with arrest or conviction records for employment in accordance with state and local laws and “fair chance” ordinances.
Colorado:
Application Window Notice
If this role is open to hiring in Colorado (as listed on the job posting), the application window will remain open until at least the date and time stated above in Pacific Time, in compliance with Colorado pay transparency regulations. If this role does not have Colorado listed as a hiring location, no specific application window applies, and the posting may close at any time based on hiring needs.
Massachusetts:
Massachusetts Legal Notice
It is unlawful in Massachusetts to require or administer a lie detector test as a condition of employment or continued employment. An employer who violates this law shall be subject to criminal penalties and civil liability.
Adobe is proud to be an Equal Employment Opportunity employer. We do not discriminate based on gender, race or color, ethnicity or national origin, age, disability, religion, sexual orientation, gender identity or expression, veteran status, or any other applicable characteristics protected by law. Learn more.
Adobe aims to make Adobe.com accessible to any and all users. If you have a disability or special need that requires accommodation to navigate our website or complete the application process, email accommodations@adobe.com or call **************.
$162k-234.6k yearly Auto-Apply 31d ago
Information Security Engineer
Atomic MacHines 3.7
Cyber security analyst job in Santa Clara, CA
Atomic Machines is ushering in a new era of micromanufacturing with its Matter Compiler™ technology platform. This platform enables new classes of micromachines to be designed and built by providing manufacturing processes and a materials library that are inaccessible to semiconductor manufacturing methods. It unlocks MEMS manufacturing not only for device classes that could never be produced by semiconductor methods, but also for entirely new categories. Furthermore, this digital platform is fully programmable in the way 3D printing is digital-but whereas 3D printing produces parts of a single material using a single process, the Matter Compiler™ technology platform is a multi-process, multi-material system: bits and raw materials go in, and complete, functional micromachines come out. The Atomic Machines team has also created an exciting first device-made possible only through the Matter Compiler™ technology platform-that we will be unveiling to the world soon. Our offices are in Emeryville and Santa Clara, California. About The Role: This is a broad-responsibility, high-judgment technical leadership role managing the cybersecurity function and implementing the security and IT infrastructure of a rapidly growing startup company with engineering offices in Emeryville and Santa Clara. As a CyberSecurity Engineer, you will lead and oversee the design, implementation, and maintenance of robust security solutions within platform, data, engineering, and office environments. The ideal candidate will possess strong leadership skills, deep technical expertise, and a strategic mindset to safeguard the organization's digital assets. This is a full-time, onsite position in either our Emeryville or Santa Clara office, with a need to work from the other office occasionally. What You'll Do:
Build and manage cybersecurity at Atomic Machines.
Develop and implement a strategic vision for securing Atomic Machines' assets, including IP, financial records, personal data, and physical infrastructure, while designing scalable security architectures for both cloud-native and on-prem systems.
Conduct security risk assessments, threat modeling, and incident response, identifying vulnerabilities, implementing mitigations, and managing escalations as needed.
Lead IT risk and compliance initiatives, implementing cybersecurity best practices (e.g., ISO 27001, NIST), conducting internal audits, assessing vendor security certifications, and reviewing contractual security requirements.
Integrate security into CI/CD pipelines and Git-driven Infrastructure-as-Code (IaC) workflows to support secure software releases.
Manage security across networking and infrastructure across engineering teams, including physical access control, on-prem servers, cloud services, CI/CD pipelines, and embedded systems, ensuring scalability and reliability.
Develop and deliver formal and informal security training sessions to educate the engineering organization on best practices, risk mitigation strategies, and secure development principles.
Partner with and manage external agencies and vendors when additional security coverage and support are needed.
What You'll Need:
8+ years of experience in Information Security, including at least 3 years in a management role.
Experience managing all aspects of Information Security for a company, including CyberSecurity, risk assessment, and incident response (startup experience preferred).
Previous industry experience as a System Administrator, with hands-on knowledge of infrastructure management, user access controls, and system security best practices.
Expertise in cloud security for modern AWS architectures, including IAM, security monitoring, logging, security configuration, and Infrastructure-as-Code (IaC).
Proficiency in Infrastructure-as-Code (IaC) workflows (e.g., Terraform, Ansible, Git).
Ability to enable secure cloud environments for production software releases using AWS services (e.g., EC2, Redshift, S3) and hybrid security solutions (e.g., Tailscale, WireGuard).
Strong networking expertise across physical and virtual environments, including VLANs, firewalls, DNS, and secure access solutions.
Experience balancing infrastructure automation, security, scalability, and developer productivity.
Extensive hands-on experience with security tools and technologies, including SIEM, MDR, IDS/IPS, WAF, DLP, and vulnerability scanners.
High-level proficiency in SAML/SSO solutions and using hardware MFA keys.
Experience developing and presenting cybersecurity training programs for employees.
Knowledge of IT processes, risk, and control frameworks, including CoBIT, ISO 27001, NIST, ITIL, and PCI.
Familiarity with security regulatory requirements and standards (e.g., SOC 1/2/3, SANS Top 20, NIST 800-53).
Security certifications preferred (e.g., CISSP, CCSP, CISM, CSSP).
Ability to explain complex security issues to both technical and non-technical audiences.
Proven ability to work in fast-paced environments with minimal guidance.
Flexibility to work daily in the Emeryville office and commute to Santa Clara as needed.
BS in Computer Science, Cybersecurity, Information Security, or a related field preferred.
The compensation for this position also includes equity and benefits.
Salary Range
$175,000 - $235,000 USD
$175k-235k yearly Auto-Apply 35d ago
Cyber Security Engineer
Talentburst 4.0
Cyber security analyst job in San Jose, CA
** 9 time INC 500/5000, 9 time BBJ "Pacesetter ", 5 time SIA-fastest growing** ___________________________________________________________ Kashif Meraj | TalentBurst, Inc. Boston | San Francisco | Miami | Milwaukee | Toronto | New Delhi | Bangalore
Work: **************
575 Market Street, Suite 3025 | San Francisco, CA 94105 | *******************
Certified Minority Business Enterprise (MBE)
Job Description
Job Title: IT Security Engineer
Location: San Jose, CA 95110
Duration: 6 Months+
Responsibilities:
• Work with Client's Identity and Access Management team to administer and implement appropriate security controls and workflows.
• Work with various internal employees to help train and educate on good security practices and specifics about end-user security tools.
• Work with a team of Security Engineers to handle incoming requests, respond to issues, troubleshoot reported problems, and identify solutions.
• Work closely with the teams that provisions, customizes, monitors, manages and upgrades our enterprise password vault solution.
• Communicate with customers to address their security requirements and provide guidance.
Requirements:
• Experience with and understanding of enterprise password vault configurations and automations. Specific CyberArk experience is preferred
Additional Information
Please reach me for further query or drop your updated resume at ***********************************
$99k-136k yearly est. Easy Apply 60d+ ago
Information Security Analyst
Bickham Services Unlimited, LLC
Cyber security analyst job in Sunnyvale, CA
• Analyzes information security practices to ensure alignment with industry standards and guidelines. • Identifies, investigates, and resolves security breaches detected by security solutions. • Contributes to the creation and maintenance of security policies, standards,
guidelines, and procedures.
• Leads and delivers staff training on information security and breach prevention.
What You Will Do:
• Staying current on information security trends, news and security standards,
especially those related to the healthcare industry
• Participating in the development of security standards and best practices for the
organization
• Participating in the evaluation, design and implementation of new information
security solutions to protect the organization's computer networks from cyber
attacks
• Assessing the efficacy of existing security measures and processes to ensure that
these measures and processes meet Health Insurance Portability and
Accountability Act (HIPAA) and Federal Information System Controls Audit Manual
(FISCAM) security standards and making recommendations for improvement
• Recommending security enhancements to management and senior ITS staff
• Analyzing software and systems requirements and providing objective advice on the
level of security risks and remediation options
• Monitoring computer networks for security issues in order to reduce the risk of
security incidents
• Leading investigation of security breaches and other cybersecurity incidents in
collaboration with the Information Security Manager and the infrastructure team
• Documenting security breaches and assessing the damage caused
• Collaborating with the infrastructure team to ensure security measures and
software to protect systems and information infrastructure, including firewalls and
data encryption programs, are up to date
• Conducting system vulnerability audits and assessments on a proactive basis and
collaborating with the infrastructure team to perform tests and uncover network
vulnerabilities
• Managing efforts with vendors on annual security audit, including pen testing
• Assisting with developing and documenting preventive measures to ensure system
security
• Staying informed of best practices and new developments in the field, analyzing
applicability, making related recommendations, and developing written
documentation of adopted practices
• Documenting computer security procedures, and tests
• Assisting with the development of policies, procedures, standards, and guidelines
related to information security
• Developing information, training materials and presentations to educate the
organization about information security management, data security, and prevention
of breaches
• Assisting staff with the installation and utilization of new security products and
procedures
• Conferring with staff regarding issues such as computer data access needs,
security violations, and programming changes
• Monitoring systems and providing frequent training to staff regarding how to detect
and avoid phishing attempts
• Reviewing any violations of security procedures and providing remedial training to
staff, as needed
• Performs other duties as assigned
You Will Be Successful If:
• In-depth knowledge of HIPAA and FISCAM security guidelines.
• Strong understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts.
• Proficiency with operating systems, virtualization, and security systems.
• High proficiency in Windows-based PC systems and Microsoft Office Suite.
• Working knowledge of penetration testing, patch management, and security
frameworks (NIST, ISO 27001, COBIT).
• Familiarity with project management principles and customer service practices.
• Awareness of emerging security technologies such as AI, IoT, and blockchain.
• Strong analytical, problem-solving, and decision-making skills.
• Clear and concise writing and communication skills, with ability to present
technical content to non-technical audiences.
• Experience creating training materials and leading staff training.
• Ability to manage multiple priorities, meet deadlines, and adapt to shifting needs.
• Leadership ability to facilitate meetings, resolve issues, and guide staff.
• Strong collaboration skills and diplomacy across teams and levels of the
organization.
• Willingness to respond to after-hours information security incidents.
What You Will Bring:
• Bachelor's degree in Information Technology, Cybersecurity, Computer Science, or a related field.
• 8 years of professional level information technology experience
• 3 years of experience performing information security functions in a health care environment (a Master?s degree may substitute for two years of the required
experience); or an equivalent combination of education and experience may be
qualifying
• Experience working in the health care industry
• Certification as a Certified Information Systems Security Professional (CISSP)
issued by the International Information System Security Certification Consortium
(ISC2), Certified Information Security Manager (CISM) issued by the Information
Systems Audit and Control Association (ISACA), and/or Certified Ethical Hacker
(CEH) issued by the Council of E-commerce Consultants (EC-Council), or
equivalent
$100k-148k yearly est. 37d ago
Staff Infrastructure Security Engineer
Linkedin 4.8
Cyber security analyst job in Sunnyvale, CA
LinkedIn is the world's largest professional network, built to create economic opportunity for every member of the global workforce. Our products help people make powerful connections, discover exciting opportunities, build necessary skills, and gain valuable insights every day. We're also committed to providing transformational opportunities for our own employees by investing in their growth. We aspire to create a culture that's built on trust, care, inclusion, and fun - where everyone can succeed.
Join us to transform the way the world works.
Job Description
At LinkedIn, our approach to flexible work is centered on trust and optimized for culture, connection, clarity, and the evolving needs of our business. The work location of this role is hybrid, meaning it will be performed both from home and from a LinkedIn office on select days, as determined by the business needs of the team.
This role will be hybrid in LinkedIn's Sunnyvale campus.
LinkedIn's members entrust us with their information every day and we take their security seriously. Our core value of putting our members first powers all the decisions we make, including how we manage and protect the data of our members and customers. We never stop working to ensure LinkedIn is secure. We follow industry standards and have developed our own best practices to stay ahead of the increasing number of threats facing all Internet services and infrastructure. LinkedIn is looking for a Staff Infrastructure Security Engineer to be an integral part of our Information Security organization.
LinkedIn's Platform Security team provides security architecture and design services throughout the organization as we scale our platform to support 1 billion+ members across the globe. Our vision is to appropriately secure all infrastructure and data systems that power the LinkedIn experience and the tooling that empowers engineers. In this role, you will help LinkedIn continue its journey of innovation, and keep us at the forefront of the world as an organization worthy of the trust people place in us.
We are a multi-functional team, composed of self-driven individuals that take the hypothetical and wrap it in real-world tradeoffs in why, what, and how. We secure production workflows, harden existing design patterns, and are a voice for security on cutting edge engineering initiatives.
As a Security Partner, you will own and be responsible for the security risk posture of a partner engineering organization, while striving to shift the security engagement to the left.
You will build and maintain deep relationships with the partner organization, and contribute to building a frictionless engagement model with the Security Organization.
Responsibilities:
You will partner with architects, engineers and software engineers across the organization; build threat models, design secure systems, perform security design assessments, paint the overall risk picture, and help find solutions for the risks and vulnerabilities you identify.
You will build necessary proof of concepts to ensure viability of security recommendations in the Li tech stack.
You will articulate and communicate risk decisions effectively and drive security initiatives within the partner organization.
You will influence technical architecture based on risk decisions derived from security assessments.
You will identify and coach Security "Champions" within your partner organization.
You will mentor team members to uplevel technical and interpersonal skills
Qualifications
Basic Qualifications
BA/BS Degree in Computer Science, Cybersecurity, Information Security, or related technical field, or equivalent technical experience.
4+ years of experience in information security principles; such as threat modeling, security architecture, secure system design, system and network security, big data security, authentication and security protocols, or cryptography
4+ years experience and in-depth knowledge of container security, data security, network security, CI/CD security, or control plane security.
3+ years experience with security in cloud environments and Linux deployments
3+ of experience in scripting languages such as Python
Preferred Qualifications
MS or PhD in Computer Science, Cybersecurity, Information Security, or related technical field
8+ years of experience in threat modeling, security architecture, secure system design, system and network security, big data security, authentication and security protocols, and cryptography
8+ years of experience in container security, data security, network security, CI/CD security, and control plane security.
Experience working in organizations securing massively scaled networks and systems
Ability to work across teams and communicate concisely and clearly to partners
You thrive in taking initiative and helping set direction when needed and adapt well to an ever evolving environment
Suggested Skills
Infrastructure Security
Container Security
Cloud Security
Technical Leadership
LinkedIn is committed to fair and equitable compensation practices.
The pay range for this role is $152,000 to $248,000. Actual compensation packages are based on several factors that are unique to each candidate, including but not limited to skill set, depth of experience, certifications, and specific work location. This may be different in other locations due to differences in the cost of labor.
The total compensation package for this position may also include annual performance bonus, stock, benefits and/or other applicable incentive compensation plans. For more information, visit **************************************
Additional Information
Equal Opportunity Statement
We seek candidates with a wide range of perspectives and backgrounds and we are proud to be an equal opportunity employer. LinkedIn considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
LinkedIn is committed to offering an inclusive and accessible experience for all job seekers, including individuals with disabilities. Our goal is to foster an inclusive and accessible workplace where everyone has the opportunity to be successful.
If you need a reasonable accommodation to search for a job opening, apply for a position, or participate in the interview process, connect with us at [email protected] and describe the specific accommodation requested for a disability-related limitation.
Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process. Examples of reasonable accommodations include but are not limited to:
Documents in alternate formats or read aloud to you
Having interviews in an accessible location
Being accompanied by a service dog
Having a sign language interpreter present for the interview
A request for an accommodation will be responded to within three business days. However, non-disability related requests, such as following up on an application, will not receive a response.
LinkedIn will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by LinkedIn, or (c) consistent with LinkedIn's legal duty to furnish information.
San Francisco Fair Chance Ordinance
Pursuant to the San Francisco Fair Chance Ordinance, LinkedIn will consider for employment qualified applicants with arrest and conviction records.
Pay Transparency Policy Statement
As a federal contractor, LinkedIn follows the Pay Transparency and non-discrimination provisions described at this link: ********************************
Global Data Privacy Notice for Job Candidates
Please follow this link to access the document that provides transparency around the way in which LinkedIn handles personal data of employees and job applicants: ********************************************
$152k-248k yearly 35d ago
Information Security Specialist 2
Nano 3.9
Cyber security analyst job in Milpitas, CA
Onto Innovation is a leader in process control, combining global scale with an expanded portfolio of leading-edge technologies that include: 3D metrology spanning the chip from nanometer-scale transistors to micron-level die-interconnects; macro defect inspection of wafers and packages; metal interconnect composition; factory analytics; and lithography for advanced semiconductor packaging. Our breadth of offerings across the entire semiconductor value chain helps our customers solve their most difficult yield, device performance, quality, and reliability issues. Onto Innovation strives to optimize customers' critical path of progress by making them smarter, faster and more efficient.
Job Summary & Responsibilities
The Desktop Technician's role is to provide a single point of contact for end-users to receive support and maintenance within the organization's desktop computing environment. This includes installing, diagnosing, repairing, maintaining, and upgrading all PC hardware and equipment to ensure optimal workstation performance. The person will also troubleshoot problem areas (in person, by telephone, or via e-mail) in a timely and accurate fashion and provide end-user assistance where required.
Perform on-site analysis, diagnosis, and resolution of complex desktop problems for end-users, and recommend and implement corrective solutions, including off-site repair for remote users as needed.
Install, configure, test, maintain, monitor, and troubleshoot end-user workstations and related hardware and software in order to deliver required desktop service levels.
Assess the need for and implement performance upgrades to computers, including the installation of CPUs, I/O and NIC cards, hard disks, hard drives, RAM, CD-ROMs, etc.
Collaborate with LAN technicians/network administrators to ensure efficient operation of the company's desktop computing environment.
Where required, administer and resolve issues with associated end-user workstation networking software products.
Receive and respond to incoming calls, e-mails and tickets regarding desktop problems.
Prepare tests and applications for monitoring desktop performance, then provide performance statistics and reports.
Maintain an inventory of computers and equipment
Accurately document instances of desktop equipment or component failure, repair, installation, and removal.
Qualifications
College diploma or university degree in the field of computer science and/or equivalent work experience.
Excellent technical knowledge of PC and desktop hardware.
Excellent technical knowledge of PC internal components.
Hands-on hardware troubleshooting experience.
Extensive equipment support experience.
Working technical knowledge of current protocols, operating systems, and standards.
Ability to operate tools, components, and peripheral accessories.
Able to read and understand technical manuals and procedural documentation.
Ability to conduct research into PC issues and products as required.
Effective interpersonal skills and relationship-building skills.
Strong written and oral communication skills.
Ability to present ideas in user-friendly language.
Analytical and problem-solving abilities, with keen attention to detail.
Self motivated and directed, with the ability to effectively prioritize and execute tasks in a high-pressure environment.
Experience working in a team-oriented, collaborative environment.
Strong customer-service orientation.
Why Join Onto Innovation?
At Onto Innovation, we believe your work should matter-and so should your well-being. That's why we offer competitive salaries and a comprehensive benefits package designed to support you and your family. From health, dental, and vision coverage to life and disability insurance, PTO, and a 401(k) with employer match, we've got you covered. You'll also enjoy access to our Employee Stock Purchase Program (ESPP), wellness initiatives, and cutting-edge tools-all within a collaborative, inclusive culture where your contributions are valued and recognized.
Compensation & Growth
• Base Salary Range:
$ - $, offered in good faith and based on experience, location, and qualifications.
Additional Rewards: Annual bonus opportunities and potential long-term incentives tied to both company and individual success.
Empowering Every Voice to Shape the Future:
Onto Innovation is committed to creating a workplace where every qualified candidate has an equal opportunity to succeed. We evaluate applicants based on skills, experience, and potential - without regard to race, color, religion, gender, sexual orientation, national origin, age, disability, veteran status, or any other characteristic protected by law. We believe diversity of thought and background drives innovation and strengthens our team.
Important Note on Export Compliance
For certain positions requiring access to technical data, U.S. export licensing review may be necessary for applicants who are not U.S. Citizens, Permanent Residents, or other protected persons under 8 U.S.C. 1324b(a)(3).
$97k-144k yearly est. Auto-Apply 12d ago
Information Security Specialist 2
Onto Innovation
Cyber security analyst job in Milpitas, CA
Onto Innovation is a leader in process control, combining global scale with an expanded portfolio of leading-edge technologies that include: 3D metrology spanning the chip from nanometer-scale transistors to micron-level die-interconnects; macro defect inspection of wafers and packages; metal interconnect composition; factory analytics; and lithography for advanced semiconductor packaging. Our breadth of offerings across the entire semiconductor value chain helps our customers solve their most difficult yield, device performance, quality, and reliability issues. Onto Innovation strives to optimize customers' critical path of progress by making them smarter, faster and more efficient.
Job Summary & Responsibilities
The Desktop Technician's role is to provide a single point of contact for end-users to receive support and maintenance within the organization's desktop computing environment. This includes installing, diagnosing, repairing, maintaining, and upgrading all PC hardware and equipment to ensure optimal workstation performance. The person will also troubleshoot problem areas (in person, by telephone, or via e-mail) in a timely and accurate fashion and provide end-user assistance where required.
* Perform on-site analysis, diagnosis, and resolution of complex desktop problems for end-users, and recommend and implement corrective solutions, including off-site repair for remote users as needed.
* Install, configure, test, maintain, monitor, and troubleshoot end-user workstations and related hardware and software in order to deliver required desktop service levels.
* Assess the need for and implement performance upgrades to computers, including the installation of CPUs, I/O and NIC cards, hard disks, hard drives, RAM, CD-ROMs, etc.
* Collaborate with LAN technicians/network administrators to ensure efficient operation of the company's desktop computing environment.
* Where required, administer and resolve issues with associated end-user workstation networking software products.
* Receive and respond to incoming calls, e-mails and tickets regarding desktop problems.
* Prepare tests and applications for monitoring desktop performance, then provide performance statistics and reports.
* Maintain an inventory of computers and equipment
* Accurately document instances of desktop equipment or component failure, repair, installation, and removal.
Qualifications
* College diploma or university degree in the field of computer science and/or equivalent work experience.
* Excellent technical knowledge of PC and desktop hardware.
* Excellent technical knowledge of PC internal components.
* Hands-on hardware troubleshooting experience.
* Extensive equipment support experience.
* Working technical knowledge of current protocols, operating systems, and standards.
* Ability to operate tools, components, and peripheral accessories.
* Able to read and understand technical manuals and procedural documentation.
* Ability to conduct research into PC issues and products as required.
* Effective interpersonal skills and relationship-building skills.
* Strong written and oral communication skills.
* Ability to present ideas in user-friendly language.
* Analytical and problem-solving abilities, with keen attention to detail.
* Self motivated and directed, with the ability to effectively prioritize and execute tasks in a high-pressure environment.
* Experience working in a team-oriented, collaborative environment.
* Strong customer-service orientation.
Why Join Onto Innovation?
At Onto Innovation, we believe your work should matter-and so should your well-being. That's why we offer competitive salaries and a comprehensive benefits package designed to support you and your family. From health, dental, and vision coverage to life and disability insurance, PTO, and a 401(k) with employer match, we've got you covered. You'll also enjoy access to our Employee Stock Purchase Program (ESPP), wellness initiatives, and cutting-edge tools-all within a collaborative, inclusive culture where your contributions are valued and recognized.
Compensation & Growth
* Base Salary Range:
$ - $, offered in good faith and based on experience, location, and qualifications.
* Additional Rewards: Annual bonus opportunities and potential long-term incentives tied to both company and individual success.
Empowering Every Voice to Shape the Future:
Onto Innovation is committed to creating a workplace where every qualified candidate has an equal opportunity to succeed. We evaluate applicants based on skills, experience, and potential - without regard to race, color, religion, gender, sexual orientation, national origin, age, disability, veteran status, or any other characteristic protected by law. We believe diversity of thought and background drives innovation and strengthens our team.
Important Note on Export Compliance
For certain positions requiring access to technical data, U.S. export licensing review may be necessary for applicants who are not U.S. Citizens, Permanent Residents, or other protected persons under 8 U.S.C. 1324b(a)(3).
$100k-148k yearly est. Auto-Apply 12d ago
Security Engineer, Application Security
Figure 4.5
Cyber security analyst job in San Jose, CA
Figure is an AI Robotics company developing a general purpose humanoid. Our humanoid robot, Figure 02, is designed for commercial tasks and the home. We are based in San Jose, CA and require 5 days/week in-office collaboration. It's time to build.
We are looking for a Security Engineer to join the Security & Privacy team at Figure, focusing on security of the robot as well as associated backend services. We are looking for excellent security engineers who have experience in breaking and building complex software systems, with experience in AI and embedded systems.
Responsibilities
Conduct security assessments of applications, embedded systems, back-end services, and business integrations, as well as build tooling for a secure development lifecycle
Design technical solutions to mitigate security weaknesses on the robot and our service stack. Work with teams across the company to implement them.
Build frameworks and systems to prevent classes of vulnerabilities
Hunt for vulnerabilities and insecure coding patterns on our product stack (backend services and robot internal systems)
Be a champion for security and user privacy
Requirements
Experience in several of the following application security domains: penetration testing, vulnerability research, security assessment, secure coding practices, security architecture & design, hardware security
Strong software engineering (not scripting or automation) skills in C/C++, Rust, Golang, Python or similar
Experience with securing embedded systems, including secure boot, secure identity, OTA, or others
Solid foundation in web security, mobile security, or cryptography
Ability to collaborate with internal and external stakeholders whilst prioritizing tasks and work independently under minimal supervision.
BS in Computer Science, Engineering, Information Systems, or equivalent years of experience in a related technical field
3+ years of experience in the field of application security or related security role
Passion for learning and helping others
Excellent verbal and written communication skills, with high attention to detail
The US base salary range for this full-time position is between $150,000 - $350,000 annually.
The pay offered for this position may vary based on several individual factors, including job-related knowledge, skills, and experience. The total compensation package may also include additional components/benefits depending on the specific role. This information will be shared if an employment offer is extended.
$150k-350k yearly Auto-Apply 59d ago
Cyber Defense Analyst
Integral Federal
Cyber security analyst job in Monterey, CA
The Cyber Defense Analyst is responsible for using data collected from various cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events within their environments for the Defense Language Institute Foreign Language Center (DLIFLC) Academic Network Labor Contract to administer, maintain, secure, and accredit the DLIFLC Academic Network which provides the IT environment for 100% of the DLIFLC teaching and instructing for all students, staff, faculty, and guests in a learning environment at the unclassified level.
Responsibilities
· The primary goal is to mitigate threats and enhance the organization's security posture.
Data Analysis: Utilize data from cyber defense tools to analyze and interpret security events.
· Threat Mitigation: Identify and respond to potential threats to mitigate risks.
· Incident Response: Participate in incident response activities to address security breaches.
· Continuous Monitoring: Maintain ongoing surveillance of network traffic and security alerts.
· Collaboration: Work with all teams to implement effective defense strategies and improve overall security measures.
Qualifications
Required:
· AA/AS from an accredited college or university or substitute with 3+ years experience with any one of the following IAT Level II (CySA+, Security+, CND, or SSCP) Certification and CE/OS Certification.
· Relevant Skills: Microsoft Defender for Endpoint, ACAS, Palo Alto Networks, GitLab, BurpSuite, MacOS, iPadOS, Windows, and RedHat Enterprise Linux.
· Secret Clearance
Salary Range: $115,000 - $122,000
The above salary range represents a general guideline. Integral Federal considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.
Depending on the position, employees may be eligible for overtime, shift differential, and/or discretionary bonuses in addition to base pay.
Company Overview
Integral partners with federal defense, intelligence, and civilian leaders to tackle their most important challenges and deliver positive outcomes. Since our founding in 1998, we have helped clients leverage existing and emerging technologies to transform their enterprises, empower growth, drive innovation, and build sustainable success. The forward-leaning solutions we deliver are tailored to each mission with a focus on keeping our nation safe and secure.
Integral is headquartered in McLean, VA and serves clients throughout the country.
We offer a comprehensive total rewards package including paid parental leave and immediate vesting in our 401(k). Give us a try and become part of a curated group of professionals at Integral Federal!
Our package also includes:
· Medical, Dental & Vision Insurance
· Flexible Spending Accounts
· Short-Term and Long-Term Disability Insurance
· Life Insurance
· Paid Time Off & Holidays
· Earned Bonuses & Awards
· Professional Training Reimbursement
· Paid Parking
· Employee Assistance Program
Equal Opportunity Employer/Protected Veteran/Disability
$115k-122k yearly Auto-Apply 60d+ ago
Information Security Engineer
Atomic MacHines 3.7
Cyber security analyst job in Santa Clara, CA
Atomic Machines is ushering in a new era of micromanufacturing with its Matter Compiler technology platform. This platform enables new classes of micromachines to be designed and built by providing manufacturing processes and a materials library that are inaccessible to semiconductor manufacturing methods. It unlocks MEMS manufacturing not only for device classes that could never be produced by semiconductor methods, but also for entirely new categories. Furthermore, this digital platform is fully programmable in the way 3D printing is digital-but whereas 3D printing produces parts of a single material using a single process, the Matter Compiler technology platform is a multi-process, multi-material system: bits and raw materials go in, and complete, functional micromachines come out. The Atomic Machines team has also created an exciting first device-made possible only through the Matter Compiler technology platform-that we will be unveiling to the world soon.
Our offices are in Emeryville and Santa Clara, California.
About The Role:
This is a broad-responsibility, high-judgment technical leadership role managing the cybersecurity function and implementing the security and IT infrastructure of a rapidly growing startup company with engineering offices in Emeryville and Santa Clara. As a CyberSecurity Engineer, you will lead and oversee the design, implementation, and maintenance of robust security solutions within platform, data, engineering, and office environments. The ideal candidate will possess strong leadership skills, deep technical expertise, and a strategic mindset to safeguard the organization's digital assets. This is a full-time, onsite position in either our Emeryville or Santa Clara office, with a need to work from the other office occasionally.
What You'll Do:
* Build and manage cybersecurity at Atomic Machines.
* Develop and implement a strategic vision for securing Atomic Machines' assets, including IP, financial records, personal data, and physical infrastructure, while designing scalable security architectures for both cloud-native and on-prem systems.
* Conduct security risk assessments, threat modeling, and incident response, identifying vulnerabilities, implementing mitigations, and managing escalations as needed.
* Lead IT risk and compliance initiatives, implementing cybersecurity best practices (e.g., ISO 27001, NIST), conducting internal audits, assessing vendor security certifications, and reviewing contractual security requirements.
* Integrate security into CI/CD pipelines and Git-driven Infrastructure-as-Code (IaC) workflows to support secure software releases.
* Manage security across networking and infrastructure across engineering teams, including physical access control, on-prem servers, cloud services, CI/CD pipelines, and embedded systems, ensuring scalability and reliability.
* Develop and deliver formal and informal security training sessions to educate the engineering organization on best practices, risk mitigation strategies, and secure development principles.
* Partner with and manage external agencies and vendors when additional security coverage and support are needed.
What You'll Need:
* 8+ years of experience in Information Security, including at least 3 years in a management role.
* Experience managing all aspects of Information Security for a company, including CyberSecurity, risk assessment, and incident response (startup experience preferred).
* Previous industry experience as a System Administrator, with hands-on knowledge of infrastructure management, user access controls, and system security best practices.
* Expertise in cloud security for modern AWS architectures, including IAM, security monitoring, logging, security configuration, and Infrastructure-as-Code (IaC).
* Proficiency in Infrastructure-as-Code (IaC) workflows (e.g., Terraform, Ansible, Git).
* Ability to enable secure cloud environments for production software releases using AWS services (e.g., EC2, Redshift, S3) and hybrid security solutions (e.g., Tailscale, WireGuard).
* Strong networking expertise across physical and virtual environments, including VLANs, firewalls, DNS, and secure access solutions.
* Experience balancing infrastructure automation, security, scalability, and developer productivity.
* Extensive hands-on experience with security tools and technologies, including SIEM, MDR, IDS/IPS, WAF, DLP, and vulnerability scanners.
* High-level proficiency in SAML/SSO solutions and using hardware MFA keys.
* Experience developing and presenting cybersecurity training programs for employees.
* Knowledge of IT processes, risk, and control frameworks, including CoBIT, ISO 27001, NIST, ITIL, and PCI.
* Familiarity with security regulatory requirements and standards (e.g., SOC 1/2/3, SANS Top 20, NIST 800-53).
* Security certifications preferred (e.g., CISSP, CCSP, CISM, CSSP).
* Ability to explain complex security issues to both technical and non-technical audiences.
* Proven ability to work in fast-paced environments with minimal guidance.
* Flexibility to work daily in the Emeryville office and commute to Santa Clara as needed.
* BS in Computer Science, Cybersecurity, Information Security, or a related field preferred.
The compensation for this position also includes equity and benefits.
Salary Range
$175,000-$235,000 USD
$175k-235k yearly 36d ago
Information Security Analyst
Bickham Services Unlimited, LLC
Cyber security analyst job in Sunnyvale, CA
Analyzes information security practices to ensure alignment with industry standards and guidelines. Identifies, investigates, and resolves security breaches detected by security solutions. Contributes to the creation and maintenance of security policies, standards,
guidelines, and procedures.
Leads and delivers staff training on information security and breach prevention.
What You Will Do:
Staying current on information security trends, news and security standards,
especially those related to the healthcare industry
Participating in the development of security standards and best practices for the
organization
Participating in the evaluation, design and implementation of new information
security solutions to protect the organization's computer networks from cyber
attacks
Assessing the efficacy of existing security measures and processes to ensure that
these measures and processes meet Health Insurance Portability and
Accountability Act (HIPAA) and Federal Information System Controls Audit Manual
(FISCAM) security standards and making recommendations for improvement
Recommending security enhancements to management and senior ITS staff
Analyzing software and systems requirements and providing objective advice on the
level of security risks and remediation options
Monitoring computer networks for security issues in order to reduce the risk of
security incidents
Leading investigation of security breaches and other cybersecurity incidents in
collaboration with the Information Security Manager and the infrastructure team
Documenting security breaches and assessing the damage caused
Collaborating with the infrastructure team to ensure security measures and
software to protect systems and information infrastructure, including firewalls and
data encryption programs, are up to date
Conducting system vulnerability audits and assessments on a proactive basis and
collaborating with the infrastructure team to perform tests and uncover network
vulnerabilities
Managing efforts with vendors on annual security audit, including pen testing
Assisting with developing and documenting preventive measures to ensure system
security
Staying informed of best practices and new developments in the field, analyzing
applicability, making related recommendations, and developing written
documentation of adopted practices
Documenting computer security procedures, and tests
Assisting with the development of policies, procedures, standards, and guidelines
related to information security
Developing information, training materials and presentations to educate the
organization about information security management, data security, and prevention
of breaches
Assisting staff with the installation and utilization of new security products and
procedures
Conferring with staff regarding issues such as computer data access needs,
security violations, and programming changes
Monitoring systems and providing frequent training to staff regarding how to detect
and avoid phishing attempts
Reviewing any violations of security procedures and providing remedial training to
staff, as needed
Performs other duties as assigned
You Will Be Successful If:
In-depth knowledge of HIPAA and FISCAM security guidelines.
Strong understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts.
Proficiency with operating systems, virtualization, and security systems.
High proficiency in Windows-based PC systems and Microsoft Office Suite.
Working knowledge of penetration testing, patch management, and security
frameworks (NIST, ISO 27001, COBIT).
Familiarity with project management principles and customer service practices.
Awareness of emerging security technologies such as AI, IoT, and blockchain.
Strong analytical, problem-solving, and decision-making skills.
Clear and concise writing and communication skills, with ability to present
technical content to non-technical audiences.
Experience creating training materials and leading staff training.
Ability to manage multiple priorities, meet deadlines, and adapt to shifting needs.
Leadership ability to facilitate meetings, resolve issues, and guide staff.
Strong collaboration skills and diplomacy across teams and levels of the
organization.
Willingness to respond to after-hours information security incidents.
What You Will Bring:
Bachelor's degree in Information Technology, Cybersecurity, Computer Science, or a related field.
8 years of professional level information technology experience
3 years of experience performing information security functions in a health care environment (a Master?s degree may substitute for two years of the required
experience); or an equivalent combination of education and experience may be
qualifying
Experience working in the health care industry
Certification as a Certified Information Systems Security Professional (CISSP)
issued by the International Information System Security Certification Consortium
(ISC2), Certified Information Security Manager (CISM) issued by the Information
Systems Audit and Control Association (ISACA), and/or Certified Ethical Hacker
(CEH) issued by the Council of E-commerce Consultants (EC-Council), or
equivalent
$100k-148k yearly est. 9d ago
Staff Enterprise Security Engineer - Third Party Security
Linkedin 4.8
Cyber security analyst job in Sunnyvale, CA
LinkedIn is the world's largest professional network, built to create economic opportunity for every member of the global workforce. Our products help people make powerful connections, discover exciting opportunities, build necessary skills, and gain valuable insights every day. We're also committed to providing transformational opportunities for our own employees by investing in their growth. We aspire to create a culture that's built on trust, care, inclusion, and fun - where everyone can succeed.
Join us to transform the way the world works.
Job Description
At LinkedIn, our approach to flexible work is centered on trust and optimized for culture, connection, clarity, and the evolving needs of our business. The work location of this role is hybrid, meaning it will be performed both from home and from a LinkedIn office on select days, as determined by the business needs of the team.
This role will be hybrid in LinkedIn's Sunnyvale campus.
Qualifications
About the team
LinkedIn's members entrust us with their information every day and we take their security seriously. Our core value of putting our members first powers all the decisions we make, including how we manage and protect the data of our members and customers. We never stop working to ensure LinkedIn is secure. We follow industry standards and have developed our own best practices to stay ahead of the increasing number of threats facing all Internet services and infrastructure. LinkedIn is looking for a Staff Security Engineer to be an integral part of our Information Security organization.
LinkedIn's Third-Party Security team provides security architecture and design services across the organization as we scale our platform to support 700M+ members worldwide. Our vision is to appropriately secure all third-party solutions and services that power the LinkedIn experience and the tooling that enables our engineers. We partner closely with stakeholders across the business to make it easy and efficient for LinkedIn teams to onboard third parties securely, while maintaining the high standards of trust our members expect. We are looking for an engineer who can help LinkedIn continue its journey of innovation and keep us at the forefront as an organization worthy of the trust people place in us.
As a third party security engineer, you will own the security risk posture of partner engineering organizations, supplier integrations, and enterprise third-party solutions. You will focus on shifting security engagement to the left, ensuring that third-party technologies, integrations, and enterprise platforms are secure, compliant, and resilient. You will build and maintain strong relationships with partner teams while driving a frictionless engagement model with the Security organization.
Responsibilities
Partner with architects, engineers, and site reliability engineers; you will build threat models, design secure systems, and perform security design assessments that highlight risks and actionable mitigations.
Lead third-party and supplier security reviews; you will evaluate high-risk integrations (APIs, SaaS, AI/ML platforms, enterprise third-party solutions, and cloud services) for architecture, data handling, and compliance alignment.
Develop proof-of-concepts (POCs); you will validate security recommendations in the company's tech stack and ensure practicality of adoption.
Assess new and existing SaaS applications and deployments for vulnerabilities and design flaws, and prioritize remediation efforts based on risk.
Communicate risk decisions effectively; you will influence both technical architecture and business decisions.
Drive security initiatives; you will ensure risks within partner organizations and enterprise third-party platforms are tracked, managed, and remediated.
Build security champions; you will identify and coach Security “Champions” within partner teams to scale security knowledge and accountability.
Mentor and develop team members; you will help strengthen both technical expertise and interpersonal influence skills.
Additional Information
Basic Qualifications
BA/BS Degree in Computer Science, cybersecurity, Information Technology, or related technical discipline, or related practical experience.
4+ years experience in information security principles such as threat modeling, third party security, security architecture, secure system design, system and network security, big data security, authentication and security protocols, or cryptography
4+ years experience and in-depth knowledge of enterprise security tools
Experience with security in cloud environments
Preferred Qualifications
MS in Computer Science or equivalent
7+ years of experience in threat modeling, third party security, security architecture, secure system design, system and network security, big data security, authentication and security protocols, and cryptography
7+ years of experience in data security, network security, CI/CD security, and control plane security
4+ years of experience in linux deployments
4+ years of experience with scripting languages such as python
Experience working in organizations securing massively scaled networks and systems
Ability to work across teams and communicate concisely and clearly to partners
You thrive in taking initiative and helping set direction when needed and adapt well to an ever evolving environment
Suggest Skills
Security Architecture
Thread Modeling
Third Party Security
Technical Leadership
You will Benefit from our Culture
We strongly believe in the well-being of our employees and their families. That is why we offer generous health and wellness programs and time away for employees of all levels. LinkedIn is committed to fair and equitable compensation practices. The pay range for this role is $152,000 - $248,000. Actual compensation packages are based on a wide array of factors unique to each candidate, including but not limited to skill set, years & depth of experience, certifications and specific office location. This may differ in other locations due to cost of labor considerations. The total compensation package for this position may also include annual performance bonus, stock, benefits and/or other applicable incentive compensation plans. For additional information, visit: **************************************
Equal Opportunity Statement
We seek candidates with a wide range of perspectives and backgrounds and we are proud to be an equal opportunity employer. LinkedIn considers qualified applicants without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, marital status, pregnancy, sex, gender expression or identity, sexual orientation, citizenship, or any other legally protected class.
LinkedIn is committed to offering an inclusive and accessible experience for all job seekers, including individuals with disabilities. Our goal is to foster an inclusive and accessible workplace where everyone has the opportunity to be successful.
If you need a reasonable accommodation to search for a job opening, apply for a position, or participate in the interview process, connect with us at [email protected] and describe the specific accommodation requested for a disability-related limitation.
Reasonable accommodations are modifications or adjustments to the application or hiring process that would enable you to fully participate in that process. Examples of reasonable accommodations include but are not limited to:
Documents in alternate formats or read aloud to you
Having interviews in an accessible location
Being accompanied by a service dog
Having a sign language interpreter present for the interview
A request for an accommodation will be responded to within three business days. However, non-disability related requests, such as following up on an application, will not receive a response.
LinkedIn will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by LinkedIn, or (c) consistent with LinkedIn's legal duty to furnish information.
San Francisco Fair Chance Ordinance
Pursuant to the San Francisco Fair Chance Ordinance, LinkedIn will consider for employment qualified applicants with arrest and conviction records.
Pay Transparency Policy Statement
As a federal contractor, LinkedIn follows the Pay Transparency and non-discrimination provisions described at this link: ********************************
Global Data Privacy Notice for Job Candidates
Please follow this link to access the document that provides transparency around the way in which LinkedIn handles personal data of employees and job applicants: ********************************************
How much does a cyber security analyst earn in Prunedale, CA?
The average cyber security analyst in Prunedale, CA earns between $75,000 and $146,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in Prunedale, CA