Cyber Security Analyst
Cyber security analyst job in Irvine, CA
Required Skills & Experience:
Bachelor's degree in a related field preferred but not required.
5+ years of experience in a SOC or similar security environment.
Expertise with SIEM, EDR, CSPM tools; strong skills in SQL/KQL/Cypher for data analysis.
Proven ability to lead complex investigations and coordinate across technical and business stakeholders.
Solid understanding of cybersecurity frameworks (MITRE ATT&CK, NIST CSF, NIST SP800-61r3).
Experience with log aggregation technologies and SIEM tuning processes.
Job Description:
A large financial services customer based in Irvine, CA is seeking a Cyber Security Operations Analyst, focused on Incident Response. This individual will lead Incident Response, and act as a technical expert within the SOC. This team protects the organization from cyber threats. This role requires strong analytical skills, leadership in high-severity incidents, and deep knowledge of security tools and frameworks.
Pay:
50-65/hr
IT Security and Network Engineer
Cyber security analyst job in Los Angeles, CA
IT Security & Network Engineer - JM Eagle
Los Angeles, CA | Onsite 4 Days / Remote Fridays | $150,000 - $170,000 + Comprehensive Benefits
About Us
JM Eagle is the world's largest manufacturer of plastic pipe, providing the infrastructure that keeps communities connected across North America. Behind every operation is a secure, stable IT environment supporting 1,000+ users across 20+ locations.
We're strengthening that foundation - and seeking a hands-on IT Security & Network Engineer who can own our daily security operations and help modernize our network and cybersecurity posture.
This is a high-impact, individual contributor role for a senior engineer who thrives in both the strategic and technical trenches.
The Opportunity
This role is ideal for a seasoned IT security professional who wants broad ownership without stepping into management. You'll work closely with the Director of IT Operations and outsourced partners to secure our enterprise, harden our infrastructure, and enhance our cybersecurity frameworks.
Your time will be split approximately:
60% Cybersecurity: tools, monitoring, vulnerability management, incident response
40% Network Engineering: SD-WAN, firewalls, VPN, wireless, connectivity across 20+ sites
You will be the technical driver behind our security improvement roadmap.
What You'll Do
Cybersecurity Operations
Own day-to-day cybersecurity operations, including monitoring, threat response, and risk mitigation.
Manage security tools and platforms: endpoint protection, SIEM, MFA, SSO, VPN, firewalls, and vulnerability management tools.
Perform recurring vulnerability scans and penetration-testing coordination; track and validate remediation.
Monitor security alerts using Fortinet, Darktrace, CrowdStrike, Nessus, Microsoft Defender, etc.
Lead internal security awareness initiatives and social engineering simulations.
Maintain documentation for configurations, policies, and security processes.
Network Engineering
Support secure network architecture across 20+ locations.
Oversee SD-WAN, firewall policies, VPN configuration, internet filtering, and remote-access security.
Support wireless infrastructure, site connectivity, and network performance monitoring.
Partner with third-party providers to ensure uptime, reliability, and strong security posture.
Governance & Collaboration
Work with IT leadership to strengthen cybersecurity governance and reporting.
Contribute to incident response planning, tabletop exercises, and monthly security briefings.
Evaluate threats and emerging technologies; propose continuous improvements.
What You Bring
Bachelor's degree in Computer Science, Information Systems, or equivalent experience.
8+ years of experience in IT security and network engineering supporting 1,000+ users across distributed sites.
4+ years of hands-on experience with enterprise security tools and platforms.
Deep experience with the Microsoft ecosystem: Azure, M365, Active Directory / Entra ID, SCCM / Intune.
Strong working knowledge of:
MFA, SSO, VPN
Endpoint protection
SIEM solutions
Network segmentation, encryption, hardening
Monitor and respond to security alerts using tools like Fortinet, Darktrace, CrowdStrike, Nessus, and Microsoft Defender.
Familiarity with SD-WAN architectures, wireless networking, and network monitoring tools.
Understanding of ITIL, ITSM, NIST frameworks; CISSP or similar preferred but not required.
Excellent communication skills with the ability to work across teams.
Comfort managing outsourced security and network service providers.
A highly proactive, self-starting approach - someone who solves problems end-to-end.
Why JM Eagle
Directly influence and modernize the cybersecurity posture of the world's largest pipe manufacturer.
Join an enterprise undergoing major IT transformation with full executive backing.
Work with a Microsoft-centric environment supporting 1,000+ users and 20+ distributed locations.
Competitive salary: $150K-$170K + bonus + excellent benefits.
4 days onsite in Los Angeles; remote Fridays.
Work Environment
Primarily a professional headquarters environment. Occasional travel to manufacturing and distribution facilities may be required. Some exposure to plant or outdoor areas during site visits.
Security Analyst
Cyber security analyst job in Los Angeles, CA
We are seeking an Information Security Analyst to support enterprise security operations with a focus on vendor risk management, security control integration, and infrastructure security. This role is responsible for conducting security assessments, coordinating the implementation of core security services (including SSO, logging, IAM, and data protection), and supporting compliance activities aligned with frameworks such as NIST and ISO 27001. The ideal candidate has experience in cybersecurity risk management, cloud environments (AWS/Azure), and collaborating with technical teams to ensure the effective delivery of security controls.
At least 2+ years of experience in the following:
Security & Compliance Frameworks
NIST CSF
ISO 27001
CIS Controls
ITIL
SOC 2
PCI DSS
FedRAMP
GDPR / CCPA
Vendor Risk & GRC Tools
OneTrust
SIG (Standardized Information Gathering)
Other GRC/TPRM platforms
Identity, SSO & Access Management
SSO (PingFederate, SAML)
Active Directory
Azure AD
AWS IAM
Sr. Security Engineer
Cyber security analyst job in Orange, CA
(Salary Range: $125,000 - $143,000 annually DOE)
Purpose of Position: This position is responsible for maintaining and improving the security of the organization's information systems, networks, and data. Key responsibilities include proactively identifying potential security risks, developing and implementing security measures to prevent data loss.
Essential Functions:
• Perform active threat hunting, looking for potential attacks rather than just passively waiting for attacks
• Perform red team/blue team exercises to test defenses and improve security operations.
• Assists with vulnerability assessments, using provided security tools to identify system vulnerabilities
• Design and implement security controls across cloud and on-premises environments
• Create and maintain security monitoring and alerting solutions
• Data Loss Prevention (DLP): Monitor DLP alerts, investigate incidents, and recommend actions to relevant teams to mitigate data breaches.
• Assists in the planning and deployment of the company's cloud information security strategies
• Manage Infrastructure and application security monitoring tools to detect and respond to security incidents in real-time
• Participate in the development and improvement of the company's SDLC processes, ensuring security practices are integrated into all stages of product development
• Responsible for evaluating, influencing, and recommending technology and product direction
• Stay informed on the latest cybersecurity trends, emerging threats, attack techniques, and zero-day vulnerabilities affecting Microsoft environments and other relevant technologies.
• On-site or remote regular attendance and punctuality are essential functions of the job.
• Perform other business tasks or functions as assigned.
Knowledge, Skills & Abilities Required:
• Experience with Microsoft Defender, Sentinel, Azure Security Center, and Microsoft 365 security solutions, helping to identify vulnerabilities, mitigate threats, and enhance security postures.
• Deep knowledge of Microsoft security solutions
o Microsoft Defender for Endpoint
o Microsoft Sentinel (SIEM/SOAR)
o Azure Security Center & Microsoft Purview Compliance Manager
o Microsoft Intune and Conditional Access Policies
• Strong understanding of security principles and best practices
• Strong knowledge and hands on experience with Data Loss Prevention
• Hands-on experience in threat hunting
• Certifications such as OSCP, OSWE, CISSP, CEH, GPEN, AZ-500 (Microsoft Azure Security Engineer), SC-200 (Microsoft Security Operations Analyst), or SC-300 (Microsoft Identity and Access Administrator) are a plus.
• Proficiency in Microsoft security technologies and tools such as Purview Information Protection, Defender for Cloud and Sentinel
• Experience with Managed Extended Detection and Response (MXDR)
• Proficient in Microsoft Office programs, including Word, Excel, PowerPoint, as well as Outlook.
• Adhere to all PHI (Protected Health Information) and HIPAA (Health Insurance Portability and Accountability Act) guidelines.
Educational Requirements:
• High School Diploma or equivalent required.
• Bachelor's degree in Computer Science, Cyber Security or equivalent experience required.
• Minimum of six (6) years of hands-on experience in IT with a focus on security.
Physical Requirements: Must be able to sit for extended periods and occasionally stand and walk. Must have adequate hearing for phone work. Vision requirements include close vision and the ability to adjust focus. Must be able to communicate effectively in English. Must be able to use a keyboard and other office equipment. Ability to lift up to 10 pounds occasionally.
Application Security Engineer
Cyber security analyst job in Manhattan Beach, CA
WHO WE ARE:
Headquartered in Southern California, Skechers-the Comfort Technology Company -has spent over 30 years helping men, women, and kids everywhere look and feel good. Comfort innovation is at the core of everything we do, driving the development of stylish, high-quality products at a great value. From our diverse footwear collections to our expanding range of apparel and accessories, Skechers is a complete lifestyle brand.
ABOUT THE ROLE:
Skechers is seeking a passionate Application Security Engineer to join our team and serve as a security champion who bridges the gap between development and security operations. This role is critical to strengthening our security posture by embedding security practices throughout the software development lifecycle and fostering a security-first culture across our development teams.
The ideal candidate will be a hands-on security professional who thrives on collaboration, enjoys mentoring developers, and has the technical expertise to identify vulnerabilities while providing practical remediation guidance. You will play a pivotal role in scaling our application security program and ensuring our applications are secure by design.
WHAT YOU'LL DO:
Successfully integrate security practices into development workflows, resulting in measurable reduction of security vulnerabilities in production applications
Conduct thorough security-focused code reviews that identify critical vulnerabilities while providing actionable feedback to development teams
Establish and implement efficient processes for triaging, prioritizing, and tracking remediation of security findings with clear SLAs and accountability measures
Enhance developer engagement through proactive security awareness initiatives, building trusted relationships that enable developers to implement secure coding practices throughout the development process.
Assist with management and optimization of SAST, DAST, OSS, WAF, and other application security tools to maximize coverage and minimize false positives
Provide analysis and support as needed during security incidents to contribute to faster resolution times
WHAT YOU'LL BRING:
Proficiency with application security tools including SAST, DAST, dependency scanning, and WAF technologies
Strong understanding of common web application vulnerabilities (OWASP Top 10) and secure coding practices
Experience with at least one programming language (Java, Python, JavaScript, C#, or similar)
Knowledge of API security, authentication mechanisms, and authorization frameworks
Familiarity with DevSecOps practices and CI/CD pipeline integration
REQUIREMENTS:
3-5 years of hands-on application security experience with demonstrated expertise in secure code review
Retail or e-commerce experience a plus
The pay range for this position is $110,000-$155,000/yr USD.
Cyber Security
Cyber security analyst job in Los Angeles, CA
Job Description
Forhyre is seeking a talented individual that will be able to provide security architecture support and interface across the program as needed. This support includes, but is not limited to, cybersecurity solutions, providing technical strategy for solutions, guidance, policy, and implementations. The successful candidate for this position is a highly motivated individual, with a strong IT security background who excels integrating, operating, and deploying security technology and solutions and interacts well with both internal teams and clients.
Note: U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time.
Responsibilities:
Engineer, implement and monitor security measures for the protection of computer systems, networks and information
Develop and implement security policies and controls to support the Cyber Security framework
Manage the existing cyber security training program across global, multilingual business
Assists in ensuring global Information security program meets all industry regulations, standards, and compliance requirements
Drive adoption of infrastructure security best practices and work with Information Technology teams to ensure security standards are maintained
Implement technology to proactively scan Information Technology environment for security breaches and suspicious activity
Continuous improvement in the areas of Information Security technologies, techniques and processes
Develops and maintains an effective system for the distribution of regular key performance indicator reports and dashboard
Ability to interpret penetration test results and describe issues and fixes to non-security expert
Responsible for leading an accurate & comprehensive status reporting to the executive steering committee
Create and implement SOP/ process improvement initiatives to achieve outcomes that align or exceed the expectations of strategic roadmap
Skills & Experience
Bachelor's degree and 12+ years of experience; additional years of directly applicable experience may be accepted in lieu of a degree.
Certified Information Systems Security Professional (CISSP)
8+ years hands-on experience designing or implementing security solutions, including all related documentation and artifacts
Analytical ability, problem-solving skills, and ability to break down complex problems into actionable steps
Extensive experience in design and development of enterprise security architectures. Experience must include a wide range of work in creating diagrams and documentation with all components that comprise IT systems including network topology.
Strong knowledge and experience in secure enterprise architecture design, especially with regard to IAM, NDR, EDR, SIEM, AI/ML, and other cybersecurity tools and resultant applications
Experience selecting effective methods, techniques, and evaluation criteria to achieve desired outcomes
Previous experience developing architectures, strategies, strategic plans, roadmaps, and technical standards for the federal IT enterprise environment.
Vulnerability Assessment testing and/or Penetration Testing (preferred)
Robotic Process Automation/Intelligent Automation (preferred)
Business case development supporting security technology solutions (preferred)
Additional certifications demonstrating cybersecurity/technical mastery (preferred)
Cyber Security Analyst
Cyber security analyst job in Costa Mesa, CA
The Orange County Department of Education (OCDE) serves some of Orange County's most vulnerable student populations and provides support and mandated fiscal oversight to 28 school districts serving more than 600 schools and approximately 475,000 students. In addition to providing direct instruction to students through its own alternative and special education programs, OCDE administers an array of programs and services that are critical to the operations of local school districts and community colleges, facilitating professional development, legal guidance, payroll, career and technical education support, high-speed internet access, Local Control and Accountability Plan assistance and approval, resources for families, and student enrichment. OCDE's vision is that "Orange County students will lead the nation in college and career readiness and success." Department staff are working to achieve this goal in collaboration with educators at all levels of student development, from early childhood through higher education, and in partnership with families, businesses and community organizations.
See attachment on original job posting
Education and Experience: Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: • Bachelor's degree or equivalent from an accredited college or university with major course work in information security, or a related field. • One to two years of experience in information security technology, specifically with penetration testing, intrusion detection, incident response, or digital forensics; or an equivalent combination of training and experience.
There are supplemental questions in the application. Please note that the EdJoin system will time-out after a 20-minute period of perceived inactivity. To assist you in the preparation of your application, the supplemental questions are listed here. Your responses should be thoughtful and thorough, and within the limit of 5,000 characters or less. We recommend that you prepare your responses in advance of beginning the application. 1. Explain a cybersecurity framework or methodology you know and how you have applied it in a previous role or project. 2. Describe your approach to investigating and assessing cybersecurity events and incidents. How do you prioritize incidents, and what criteria do you use to determine severity and impact? 3. Why are you passionate about pursuing a career in cybersecurity, and how do you stay current with the latest trends and developments in the field? Notice to Applicants: If you require accommodations in the application process, please inform us.
Education and Experience: Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: • Bachelor's degree or equivalent from an accredited college or university with major course work in information security, or a related field. • One to two years of experience in information security technology, specifically with penetration testing, intrusion detection, incident response, or digital forensics; or an equivalent combination of training and experience.
There are supplemental questions in the application. Please note that the EdJoin system will time-out after a 20-minute period of perceived inactivity. To assist you in the preparation of your application, the supplemental questions are listed here. Your responses should be thoughtful and thorough, and within the limit of 5,000 characters or less. We recommend that you prepare your responses in advance of beginning the application. 1. Explain a cybersecurity framework or methodology you know and how you have applied it in a previous role or project. 2. Describe your approach to investigating and assessing cybersecurity events and incidents. How do you prioritize incidents, and what criteria do you use to determine severity and impact? 3. Why are you passionate about pursuing a career in cybersecurity, and how do you stay current with the latest trends and developments in the field? Notice to Applicants: If you require accommodations in the application process, please inform us.
Comments and Other Information
Resumes will not be accepted in lieu of the completed online application. Before receiving authorization to work in this position, the individual selected will be required to provide a current negative TB authorization, within the last 60 days, and submit fingerprints for the purpose of conducting a confidential background investigation and record check. The tests are arranged and paid for by OCDE. The Immigration Reform and Control Act of 1986 requires employers to verify the employability of all new employees. Before the Department will finalize an offer of employment, the candidate selected will be required to show original documents which establish both the individual's identity and employment authorization. The candidate must also sign a statement under penalty of perjury regarding his/her employability. We reserve the right to reopen, readvertise, or delay filling this position. AA/EOE/ADA
Principal/ Sr. Principal Industrial Security Analyst (level 3/4)
Cyber security analyst job in Los Angeles, CA
At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Put your skills to the test by pushing the boundaries of what's possible. From global defense to sustainment and modernization to mission readiness, your experience and ability will make it a reality. Our programs are built on equal parts of curiosity and collaboration. Our combined effort means our customers can connect and defend millions of people around the world. With Northrop Grumman, you'll have the opportunity to be an essential part of projects that will define your career, now and in the future.
Northrop Grumman Defense Systems is seeking an Principal or Sr. Principal Industrial Security Analyst (3/4) for our Northridge, CA location.
**Roles and Responsibilities:**
+ Develops and administers physical security programs and procedures for classified or proprietary materials, documents, and equipment. Studies and implements federal security regulations that apply to company operations
+ Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies
+ Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials
+ Conducts security education classes and security audits
+ Ensures security compliance as a CSSO in accordance with DoDM 5205.07
+ Responsible for offsite and subcontractor security standups and posture
**ISA duties will include:**
+ CSSO for offsite and subcontractor sites associated with the program
+ Support a fast-paced, high-profile program; creating, maintaining, and leveraging working relationships with internal and external customers
+ Study and implement company and federal security policies, regulations, and procedures that apply to company operations
+ Obtain rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies
+ Manage program security compliance and operations across multiple functions, including security SCIF and/or SAPF administration, PHYSEC, COMSEC, PERSEC, OPSEC, Contract Security, Security Education, Investigations, Visitor Control, and Document Control Management
+ Develop and implement a security education and awareness program
+ Conduct internal security audits. Investigate security violations and prepare reports specifying preventive action to be taken
+ Ensure adherence to contractual guidance for classified programs and cleared facilities in accordance with the Security Statements of Work, DD Form 254, DoD Contract Security Classification Specifications guidance
+ Assist program managers and professional staff in interpreting, applying, and complying with program Security Classification Guides (SCG)
+ Provide personnel security (PERSEC) support to include but not limited to reviewing and processing required documentation in support of SCI and SAP nomination processes; maintain PERSEC databases; prepare and administer program indoctrination and debriefings; access, review, and submit clearance and access information using the appropriate government database and other information systems
+ Provide facility security administration, documentation, and support: implement Standard Operating Procedures (SOP); conduct SCI and SAP security program self-inspections
+ Provide security support for Sensitive Compartmented Information Facility (SCIF) and Special Access Program Facility (SAPF) build construction projects to include obtaining customer accreditation in accordance with SCI and SAP DoD Manuals, ICD, ICS Tech Spec, and other government requirements
+ Manage and maintain UL-2050 Compliant Intrusion Detection Systems (IDS) and automated Access Control Systems (ACS)
+ Other duties as assigned
**Basic Qualifications:**
**Principal Industrial Security Analyst (level 3)**
+ Must have a high school diploma or GED with at least 9 years of related experience; OR 5 year of experience with a bachelor's degree
+ Experience with any of the following: Government manuals (32 CFR Part 117, NISPOM, DODM 5205.07, etc.)
+ Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint)
+ Excellent customer service and communication skills
+ Must have an active Secret clearance
+ Ability to maintain flexibility to deal with changing priorities and deadlines.
+ Ability to work extended hours, in a fast paced, deadline driven environment, excellent communication skills speaking, writing skills and organized skills enabling effective communications
+ CSSO Experience
+ Ability to travel
**Basic Qualifications:**
**Sr. Principal Industrial Security Analyst (level 4)**
+ Must have a high school diploma or GED with at least 12 years of related experience; OR 8 year of experience with a bachelor's degree
+ Experience with any of the following: Government manuals (32 CFR Part 117, NISPOM, DODM 5205.07, etc.)
+ Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint)
+ Excellent customer service and communication skills
+ Must have an active Secret clearance
+ Ability to maintain flexibility to deal with changing priorities and deadlines.
+ Ability to work extended hours, in a fast paced, deadline driven environment, excellent communication skills speaking, writing skills and organized skills enabling effective communications
+ CSSO Experience
+ Ability to travel
**Preferred Qualifications:**
+ Experience Leading Security Teams from Subcontractors and Offsite
+ Ability to work independently and follow projects through to completion.
+ Current Top-Secret clearance
+ Self-starter with minimal supervision
+ Security experience in a manufacturing environment
+ Supply Chain Security Experience
Primary Level Salary Range: $94,200.00 - $141,200.00
Secondary Level Salary Range: $117,500.00 - $176,300.00
The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.
Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.
The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.
Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Cyber Defense Forensics Analyst
Cyber security analyst job in Los Angeles, CA
At EY, you'll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we're counting on your unique voice and perspective to help EY become even better. Join us and build an exceptional experience for yourself, and a better working world for all. The exceptional EY experience. It's yours to build. EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
Today's world is fuelled by vast amounts of information. Data is more valuable than ever before. Protecting data and information systems is central to doing business, and everyone in EY Information Security has a critical role to play. Join a global team of almost 950 people who collaborate to support the business of EY by protecting EY and client information assets! Our Information Security professionals enable EY to work securely and deliver secure products and services, as well as detect and quickly respond to security events as they happen. Together, the efforts of our dedicated team helps protect the EY brand and build client trust.
Within Information Security we blend risk strategy, digital identity, cyber defense, application security and technology solutions as we consider the entire security lifecycle. You will join a team of hardworking, security-focused individuals dedicated to supporting, protecting and enabling the business through innovative, secure solutions that provide speed to market and business value.
The opportunity
Cyber Triage and Forensics (CTF) Incident Analyst will work as a senior member of the technical team responsible for security incident response for EY. The candidate will work as an escalation point for suspect or confirmed security incidents. Responsibilities include performing digital forensic analysis, following security incident response standard methodologies, malware analysis, identify indicators of compromise, support remediation or coordinate remediation efforts of a security incident, and develop documentation to support the security incident response process.
Your key responsibilities
Investigate, coordinate, bring to resolution, and report on security incidents as they are brought up or identified
Forensically analyze end user systems and servers found to have possible indicators of compromise
Analysis of artifacts collected during a security incident/forensic analysis
Identify security incidents through ‘Hunting' operations within a SIEM and other relevant tools
Interface and connect with server owners, system custodians, and IT contacts to pursue security incident response activities, including: obtaining access to systems, digital artifact collection, and containment and/or remediation actions
Provide consultation and assessment on perceived security threats
Maintain, manage, improve and update security incident process and protocol documentation
Regularly provide reporting and metrics on case work
Resolution of security incidents by identifying root cause and solutions
Analyze findings in investigative matters, and develop fact based reports
Be on-call to deliver global incident response
Skills and attributes for success
Resolution of security incidents by identifying root cause and solutions
Analyze findings in investigative matters, and develop fact-based reports
Proven integrity and judgment within a professional environment
Ability to appropriately balance work/personal priorities
To qualify for the role you must have
Bachelors or Masters Degree in Computer Science, Information Systems, Engineering or a related field
5+ years experience in incident response, computer forensics analysis and/or malware reverse engineering;
Understanding of security threats, vulnerabilities, and incident response;
Understanding of electronic investigation, forensic tools, and methodologies, including: log correlation and analysis, forensically handling electronic data, knowledge of the computer security investigative processes, malware identification and analysis;
Be familiar with legalities surrounding electronic discovery and analysis;
Experience with SIEM technologies (i.e. Splunk);
Deep understanding of both Windows and Unix/Linux based operating systems;
Ideally, you'll also have
Hold or be willing to pursue related professional certifications such as GCFE, GCFA or GCIH
Background in security incident response in Cloud-based environments, such as Azure
Programming skills in PowerShell, Python and/or C/C++
Understanding of the best security practices for network architecture and server configuration
What we look for
Demonstrated integrity in a professional environment
Ability to work independently
Have a global mind-set for working with different cultures and backgrounds
Knowledgeable in business industry standard security incident response process, procedures, and life cycle
Excellent teaming skills
Excellent social, communication, and writing skills
What we offer you The compensation ranges below are provided in order to comply with United States pay transparency laws. Other geographies will follow their local salary guidelines, which may not be a direct conversion of published US salary range/s. At EY, we'll develop you with future-focused skills and equip you with world-class experiences. We'll empower you in a flexible environment, and fuel you and your extraordinary talents in a diverse and inclusive culture of globally connected teams. Learn more.
We offer a comprehensive compensation and benefits package where you'll be rewarded based on your performance and recognized for the value you bring to the business. The base salary range for this job in all geographic locations in the US is $87,700 to $164,000. The salary range for New York City Metro Area, Washington State and California (excluding Sacramento) is $105,200 to $186,400. Individual salaries within those ranges are determined through a wide variety of factors including but not limited to education, experience, knowledge, skills and geography. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Join us in our team-led and leader-enabled hybrid model. Our expectation is for most people in external, client serving roles to work together in person 40-60% of the time over the course of an engagement, project or year. Under our flexible vacation policy, you'll decide how much vacation time you need based on your own personal circumstances. You'll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
Are you ready to shape your future with confidence? Apply today.
EY accepts applications for this position on an on-going basis.
For those living in California, please click here for additional information.
EY focuses on high-ethical standards and integrity among its employees and expects all candidates to demonstrate these qualities.
EY | Building a better working world
EY is building a better working world by creating new value for clients, people, society, and the planet, while building trust in capital markets.
Enabled by data, AI and advanced technology, EY teams help clients shape the future with confidence and develop answers for the most pressing issues of today and tomorrow.
EY teams work across a full spectrum of services in assurance, consulting, tax, strategy, and transactions. Fueled by sector insights, a globally connected, multi-disciplinary network and diverse ecosystem partners, EY teams can provide services in more than 150 countries and territories.
EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, pregnancy, genetic information, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to qualified individuals with disabilities including veterans with disabilities. If you have a disability and either need assistance applying online or need to request an accommodation during any part of the application process, please call 1-800-EY-HELP3, select Option 2 for candidate related inquiries, then select Option 1 for candidate queries and finally select Option 2 for candidates with an inquiry which will route you to EY's Talent Shared Services Team (TSS) or email the TSS at **************************.
Sr. Cyber Security Operations Analyst
Cyber security analyst job in Irvine, CA
at loan Depot
loan Depot's Security Operations team is at the forefront of cyber defense for the organization. We are seeking a Senior Security Analyst who will act as both a technical authority and front-line commander within our Security Operations Center. This is a strategic, high-impact role for a seasoned professional who can seamlessly integrate with our team on Day One, bringing the composure, knowledge, experience, and precision necessary to contain and eradicate cyber threats from our environment.Reporting directly to the Information Security Operations Manager, this position partners closely with our Level 1 MSSP, internal business units, and external incident response partners to ensure that every incident is managed with accountability, consistency, and efficiency. The ideal candidate is resourceful, quick-thinking, and deeply fluent with the leading security stacks and tools, capable of turning strands of data into decisive action and information. The Sr. Cyber SOC Analyst must be able to come into the Irvine, CA office 2-3 times per week.
Responsibilities:
Lead and execute end-to-end security incident response activities including detection and triage, containment, eradication, and recovery for incidents ranging from simple to complex.
Serve as incident commander for high-severity security events, ensuring clear communication and timely resolution across stakeholders.
Partner with Level 1 MSSP partners to validate escalations, refine detection logic, and ensure consistent handling workflows.
Coordinate with external partners and internal teams to contain and mitigate threats while maintaining operational resilience.
Detection, Analysis, & Threat Hunting
Utilize industry standard and/or custom tools for telemetry to conduct deep-dive investigations and root cause analysis.
Develop and optimize queries, analytic rules, and playbooks to enhance threat detection and automation, pushing incidents towards level 0 where possible.
Conduct proactive threat hunts and adversary emulation exercises to identify emerging tactics, techniques, and procedures (TTPs) before they escalate into incidents.
Leverage MITRE ATT&CK, NIST SP800-61r3, NIST CSF2, and other frameworks to ensure methodical and repeatable investigation practices.
Operational Excellence & Leadership
Document and refine incident response playbooks and runbooks to improve team consistency and speed.
Produce detailed incident reports, post-incident reviews, and executive summaries with actionable insights.
Mentor other analysts and emerging prospects, reinforcing our culture of accountability, consistency, and efficiency.
Participate in weekly high-severity incident case reviews and contribute to the continuous improvement of SOC metrics and performance.
Other duties as assigned.
Requirements:
Bachelor's Degree in a related field preferred, but not required.
Minimum of five (5) + years' experience working in a security operations center or similar environment preferred.
A demonstrated mastery of industry leading tools in SIEM, EDR, and CSPM.
Expertise in querying, hunting, and correlating disparate data points across large telemetry datasets using SQL/KQL/Cypher.
A demonstrated ability to lead complex investigations and coordinate across technical and business stakeholders.
A solid understanding of cybersecurity frameworks such as MITRE ATT&CK, NIST CSF 2, NIST SP800-61r3.
Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant narratives.
Experience in log aggregation technologies and SIEM tuning processes.
Experience in the Mortgage industry preferred.
CISSP, GIAC Certified Incident Handler, or other related certifications preferred.
Why work for #teamloan Depot:
Competitive compensation based on skillset and relatable experience.
Work with other passionate, purposeful, and customer-centric team members.
Inclusive, diverse, and collaborative culture where people from all backgrounds can thrive.
Extensive internal growth and professional development opportunities including tuition reimbursement.
Comprehensive benefits package including Medical/Dental/Vision.
Wellness program to support both mental and physical health.
Discretionary Time Off (DTO) policy to support work-life balance in addition to Paid Voluntary Time Off.
About loan Depot:
loan Depot (NYSE: LDI) is a digital commerce company committed to serving its customers throughout the home ownership journey. Since its launch in 2010, loan Depot has revolutionized the mortgage industry with a digital-first approach that makes it easier, faster, and less stressful to purchase or refinance a home. Today, loan Depot enables customers to achieve the American dream of homeownership through a broad suite of lending and real estate services that simplify one of life's most complex transactions. With headquarters in Southern California and offices nationwide, loan Depot is committed to serving the communities in which its team lives and works through a variety of local, regional, and national philanthropic efforts. Base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay for this roles is between $99,000 and $136,000. Your base pay will depend on multiple individualized factors, including your job-related knowledge/skills, qualifications, experience, and market location. We are an equal opportunity employer and value diversity in our company. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Auto-ApplyCyber Security Engineer
Cyber security analyst job in Hawthorne, CA
CHAOS Inc. is a global technology company delivering next-generation capabilities to the defense and critical industrial sectors. Founded in 2022 by a seasoned leadership team, CHAOS has quickly become the place where world-class multi-disciplinary engineers come to build mission-critical technologies. CHAOS has a mission-focused culture, dedicated to solving the toughest technical challenges. It unique agile engineering approach enables rapid prototyping, while deep partnerships with defense and industry ensure real-world solutions.
Role Overview:
As a Cybersecurity Engineer at our vibrant Los Angeles headquarters, you will serve as the primary point of contact for all Cybersecurity needs. In this hands-on role, you'll ensure a challenging balance of Cybersecurity and Enablement across the enterprise. You will be one of the first SOC/IR-focused hires and help build our internal SOC and capabilities from the ground up. You'll work closely with the IT team and contribute to company-wide IT initiatives, infrastructure upgrades, and process improvements, providing security inputs and advising best practice, in a dynamic, fast-paced workplace.
Responsibilities:
Help build and manage the SOC/IR Team and their platforms and processes.
Co-own implementation of multiple enterprise Cybersecurity programs.
Assist with security architecture reviews, roll outs, enhancements and initiatives.
Research and implement security automations and partner with IT and other teams to implement into processes, procedures and baselines.
Design, document and implement security solutions for cloud-based systems, including IAM, network security, data protection, DevSecOps, and compliance.
Utilize cloud security best practices, including encryption, authentication, authorization, and audit capabilities.
Maintain technical proficiency and certifications relevant to security solutions and architectures.
Work full-time onsite out of our office in Los Angeles (Hawthorne), California.
Minimum Requirements:
Bachelor's degree or equivalent experience in business, computer science, or management information systems.
5+ years of experience in technology-driven security solutions within defense or related industries.
Deep Experience with EDR, Firewall, SIEM, and other common Cybersecurity solutions.
Experience in IT security risk assessments and industry frameworks (NIST 800 series, CMMC, CIS Controls, etc).
Strong knowledge of Identity and Access Management (IAM), cryptography, key management, access controls, and security protocols (e.g., Multi-factor, SAML, OAuth, etc).
Expertise in Azure/AWS Infrastructure services and cloud security best practices.
Strong analytical, system design, and communication skills.
Self-motivated, proactive problem solver with the ability to prioritize tasks in a fast-paced, high-pressure environment.
Preferred Requirements:
Experience either as a SOC Analyst or SOC Engineer
Experience with scripting, automations and integration of multiple platforms and data sources.
Eligible to obtain and maintain an active U.S. Secret/Top Secret security clearance.
Why CHAOS?
Health Benefits: Your medical, dental and vision benefits will be 100% paid for by the company
Additional benefits: life, FSA, HSA, 401k (+ Company match), and more
Our Perks: free daily lunch, ‘No meeting Fridays', unlimited PTO, casual dress code
Compensation Components: competitive base salaries, generous pre-IPO stock option grants, relocation assistance + (coming soon!) annual bonuses
Company Size: 150 employees and counting!
More About Us: We're building the next generation of aerospace, defense and critical industry technologies with a seasoned team of mission-focused individuals. We were founded in June 2022 and our goal is to become the platform where world-class engineers come to solve critical, real-world problems. We use agile engineering approaches which enable rapid prototyping, deep partnerships with the defense industry ensuring real-world application, and our newly-invented Coherence platform (through which we've made a fundamental breakthrough) improves sensor performance and decision-making in real-time. As of April 2025 we have raised $490M (including a $275M Series C at a $2B valuation) from some of the most prominent VC funds and investors including Accel, NEA, 8VC, and Valar. With a managing team that includes Epirus' founding members (responsible for building a $1.5B company from scratch) + key drivers from Palantir (instrumental in Palantir's growth to $1B in revenue), we are well-positioned to become one of the fastest growing companies to date!
Salary Range: $130,000 - $170,000
The stated compensation range reflects only the targeted base compensation range and excludes additional earnings such as bonus, equity, and benefits. If your compensation requirements fall outside of the range, we still encourage you to apply. The salary range for this role is an estimate based on a range of compensation factors, inclusive of base salary only. Actual salary offer may vary based on (but not limited to) work experience, education and/or training, critical skills, and/or business considerations.
#LI-onsite
Auto-Apply0_IT_Cyber Security Engineer
Cyber security analyst job in Los Angeles, CA
Responsibilities
As a Cyber Security Engineer, you will have the opportunity to jump-start and lead the application security team as part of our engineering group. We are looking for highly skilled security experts who can handle the end to end ownership of our application security, which will include:
Researching vulnerabilities in our software, network topology, production servers and resources
Planning, implementing and monitoring our security measure to protect our data, systems, and networks
Engineering solutions that address those weaknesses and educating our teams for security awareness
Hardening our overall network and responding to all system and/or network breaches
Has strong leadership skills to help drive our security agenda and lead a team IF THIS SOUNDS LIKE YOU, CONTINUE READING BELOW.
Who you are:
You have at least 3 years of Security experience.
You have the ability to handle complex software system infrastructure tasks from requirements to production.
You have experience leading or building a team
End-to-end task ownership: This is a position that requires a leader someone who can confidently see a project through from beginning to end.
Independently tackling challenges: You don't need anyone to keep you on track.
You're organized and efficient.
Please submit if you possess:
Experience in cloud environments, and advanced technologies. AWS, puppet/ansible, containers, SQL and NoSQL DBs, Java, Python
Experience in Manual Penetration Testing (SQL Injection, XSS, exploit creation)
Automated penetration testing tools (e.g. Nessus, Kali Linux, Burp Suite, OWASP ZAP, Metasploit) Experience
Web Services Security Penetration Testing Experience
A great recommendation from your previous employer
A desire to and skills for mentoring junior engineers so they become an awesome engineer like you!
To see new and updated job postings and job postings similar to this, please follow us on LinkedIn: *****************************************
Information Systems Security Officer (ISSO)
Cyber security analyst job in Los Angeles, CA
Job DescriptionISSOEmployment Type: Full-Time, Experienced Department: Information Technology CGS is seeking an Information Systems Security Officer (ISSO) with DIACAP and/or RMF experience who has deep expertise in security assessment documentation to support Dept. of Commerce systems and efforts to achieve their Authorization to Operate (ATO). This position is located at the client site in the Herbert Hoover building in Washington, DC. The scope of this position includes full life-cycle Assessment and Authorization (A&A) management through all 6 Steps of the RMF process in support of the Government ISSM.In this role, you'll conduct security assessment, and information system security oversight activities in accordance with NIST 800.53 that support systems from the perspective RMF requirements.
CGS brings motivated, highly skilled, and creative people together to solve the government's most dynamic problems with cutting-edge technology. To carry out our mission, we are seeking candidates who are excited to contribute to government innovation, appreciate collaboration, and can anticipate the needs of others. Here at CGS, we offer an environment in which our employees feel supported, and we encourage professional growth through various learning opportunities.
Skills and attributes for success:- Review systems to identify potential security weaknesses and recommend improvements to amend vulnerabilities, implement changes, and document upgrades. - Maintain responsibility for managing cybersecurity risk from an organizational perspective. - Identify organizational risks, prioritize those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership.- Provide security guidance and IS validation using the National Institute of Standards and Technology (NIST) RMF, DoC, and local security policies.- Providing configuration management (CM) recommendations for information system security software, hardware, and firmware and coordinating changes and modifications with the ISSM, Security Control Assessor (SCA), and Authorizing Official (AO).- Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.- Support security authorization activities, including transitioning from the legacy Information Assurance Certification and Accreditation Process (DIACAP) to compliance with the DoC RMF.- Provide subject matter expertise for cyber security and trusted system technology. - Apply advanced technical knowledge and analysis of specialized functional areas in task requirements to develop solutions to complex problems.- Research, write, review, disposition feedback, and finalize recommendations regarding cyber security policy, assessment and authorization assessments (A&As), security test and evaluation reports, and security engineering practices and processes. - Conduct research and write risk assessment reports to include risk thresholds, evaluation, and scoring.- Support analysis of the findings and provide expert technical guidance for mitigation strategies, including implementation advice on the cyber security risk findings, and other complex problems.
Qualifications:- Bachelor's Degree.- A minimum of five (5) years experience as an Information Assurance (IA) Analyst, ISSE, ISSO, or similar role in ATO package development, including generating security documentation for requirements, security control assessment, STIG and IAVA compliance, Standard Operating Procedures, test results, etc.- eMASS experience.- Professional security certification such as: CCNA Security, CySA+, GICSP, GSEC, CompTIA Security+ CE, SSCP, or higher.- Strong desktop publishing skills using Microsoft Word and Excel.- Experience with industry writing styles such as grammar, sentence form, and structure.- Ability to multi-task in a deadline-oriented environment.
Ideally, you will also have:- CISSP, CASP, or a similar certificate is preferred.- Master's Degree in Cybersecurity or related field.- Strong initiative, detail orientation, organizational skills, and aptitude for analytical thinking.- Demonstrated ability to work well independently and as a part of a team.- Excellent work ethic and a high commitment to quality.
Our Commitment:Contact Government Services (CGS) strives to simplify and enhance government bureaucracy through the optimization of human, technical, and financial resources. We combine cutting-edge technology with world-class personnel to deliver customized solutions that fit our client's specific needs. We are committed to solving the most challenging and dynamic problems.
For the past seven years, we've been growing our government contracting portfolio, and along the way, we've created valuable partnerships by demonstrating a commitment to honesty, professionalism, and quality work.
Here at CGS we value honesty through hard work and self-awareness, professionalism in all we do, and to deliver the best quality to our consumers mending those relations for years to come.
We care about our employees. Therefore, we offer a comprehensive benefits package.Health, Dental, and VisionLife Insurance 401k Flexible Spending Account (Health, Dependent Care, and Commuter) Paid Time Off and Observance of State/Federal Holidays
Contact Government Services, LLC is an Equal Opportunity Employer. Applicants will be considered without regard to their race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Join our team and become part of government innovation!Explore additional job opportunities with CGS on our Job Board:**************************************** more information about CGS please visit: ************************** or contact:Email: *******************
#CJ
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
Easy ApplyInformation Security Analyst
Cyber security analyst job in Glendale, CA
We're seeking a highly skilled and experienced Information Security Analyst with a strong foundation in SIEM, Asset management, Network tools, and a comprehensive understanding of cybersecurity principles. The ideal candidate will be responsible for ensuring the security, integrity, and reliability of our endpoints and network infrastructure while proactively identifying and mitigating potential security risks and vulnerabilities.[1]
Responsibilities:
● Network Security Management: Monitor network traffic for potential threats, intrusions, and vulnerabilities.
● Cybersecurity Strategy: Develop and execute comprehensive cybersecurity strategies aligned with industry best practices and compliance standards. Evaluate existing security measures and recommend enhancements to fortify the network infrastructure against evolving threats.
● Incident Response and Resolution: Lead incident response efforts, investigating and resolving security breaches, vulnerabilities, and incidents. Implement proactive measures to prevent future occurrences and maintain network continuity.
● Technical Expertise: Utilize expertise in SIEM, Asset Management, and Network tools to configure, troubleshoot, and optimize endpoints and network security devices and solutions. Collaborate with cross-functional teams to integrate security tools effectively.
● Risk Assessment and Compliance: Conduct regular risk assessments, pen-tests and security audits to identify vulnerabilities and compliance gaps. Implement corrective actions and security controls to ensure adherence to industry regulations and company policies. Lead our yearly SOC 2, Type 2 Audit.
● Documentation and Reporting: Maintain accurate documentation of our incidents, policies, and procedures. Generate detailed reports and present findings to stakeholders, outlining security posture, vulnerabilities, and recommended actions.
● Team Collaboration and Leadership: Work closely with the IT team, providing guidance, mentorship, and technical expertise. Collaborate on projects, initiatives, and security-related tasks to enhance the overall security posture of the organization.
Requirements:
● Bachelor's degree in Computer Science, Information Technology, or related field (or equivalent work experience).
● Extensive experience (4+ years) as a Network Security Analyst.
● Professional certifications such as CISSP, or relevant industry certifications are desirable.
● Proficiency in configuring, managing, and troubleshooting SIEM, Asset Managers, and similar tools
● Deep understanding of cybersecurity principles, network protocols, and security technologies.
If you are passionate about information security and are driven by the challenge of safeguarding critical infrastructures from cyber threats, we'd love to speak with you!
update this with the title and responsibilities
Auto-ApplyLinux System and Security Analyst
Cyber security analyst job in Los Angeles, CA
THE COMPANY
Silvus Technologies is dedicated to one mission: connecting those who keep us safe. We do so by delivering the most advanced Mobile Ad-hoc Network (MANET) radios powered by our custom and ever-evolving Mobile-Networked MIMO waveform. Together, our radios and waveform provide the vital communications for mission critical applications in the harshest environments from underground tunnels to high altitude balloons.
Silvus StreamCaster radios are being rapidly adopted by customers all over the world ranging from the U.S Departments of Defense, to International, Federal, State and Local Law Enforcement agencies, all the way to the Super Bowl, Grammys and industry-leading drone, robot, and other unmanned systems manufacturers.
Wouldn't you like to join an incredibly talented group of people, doing very challenging work, with the prime directive of “
Keeping Our Heroes Connected
”?
Silvus' rapid growth is fueled by a focus on research and innovation and a team of the most passionate, skilled, and creative thinking individuals.
If you are looking for a challenging experience, you owe it to yourself to learn how Silvus can provide a rewarding opportunity that creates a pathway to a fulfilling career.
THE OPPORTUNITY
Silvus is seeking a Linux System and Security Analyst to analyze, troubleshoot, automate, and conduct CyberSecurity activities based on Cybersecurity Maturity Model Certification (CMMC) and maintain the company's IT infrastructure. The position will exercise full ownership and decision-making authority over the resolution of end-user technical challenges, including hardware failures and software anomalies. This position's primary duty is to perform high-level systems analysis, security architecture, and risk assessment in support of organizational objectives. This includes exercising discretion and independent judgment on matters of significance to company-wide IT security and compliance. This position requires a DCSA clearance to be obtained within 12 months of employment.
This position is fully onsite, Monday through Friday at Silvus Technologies' HQ in the heart of vibrant West Los Angeles.
The following is a list of at least some of the current essential job functions of the position. Management may assign or reassign duties and responsibilities at any time at its discretion.
ROLE AND RESPONSIBILITIES
Act as the primary technical advisor for diagnosing and resolving complex infrastructure issues, with autonomy to escalate or implement system-level changes to maintain Production department continuity.
Responsible for evaluating risks, designing secure systems in compliance with Cybersecurity Maturity Model Certification (CMMC) standards, and making strategic recommendations.
Provide Linux and Windows system desktop and server support, as well as network administration for the entire company based on the NIST CyberSecurity Framework.
For individuals with Security Clearance, apply Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) to secure and maintain IT infrastructure, providing the necessary documentation and technical support required for continuous Authorization to Operate (ATO).
Responsible for Automated Deployment and monitoring of computer systems.
Oversee the planning and implementation of hardware lifecycle management for Windows and Linus-based servers and VMs.
Support vulnerability and patch management processes, ensuring all Linux vulnerabilities are remediated in accordance with NIST CyberSecurity Framework.
Support Engineering and R&D teams to ensure strict IT compliance with the CMMC framework, specifically with security controls. This role is critical in protecting Controlled Unclassified Information (CUI) and maintaining our accredited environment.
Develop and maintain documentation related to the company's IT infrastructure and support processes.
Oversee the governance and accuracy of the company's hardware and software asset inventory, ensuring appropriate lifecycle management and compliance with security and audit requirements.
May occasionally require on-call coverage overnight, on weekends, and on holidays.
Perform other related duties of which the above are representative.
REQUIRED QUALIFICATIONS
Bachelor's degree or equivalent in an IT-related field.
3 years of Linux-related work experience.
Experience with installing, troubleshooting, and/or maintaining Linux-based software and hardware installations.
Fluency in Linux CLI, TCP/IP, LAN/VLAN Networking, Patch Management, and Backup.
Highly proficient in Google Suite and MS Office (Excel, Word, PowerPoint).
Strong interpersonal skills with a positive and enthusiastic attitude.
Demonstrated ability to operate as a team member, supporting departmental decisions, policies, and procedures with a positive and communicative attitude with company colleagues.
Must be a U.S. Citizen due to clients under U.S. government contracts.
Must be able to obtain DCSA clearance within 12 months of employment.
All employment is contingent upon the successful clearance of a background check.
PREFERRED KNOWLEDGE, SKILLS AND ABILITIES
Prior experience in a fast-paced office environment is a plus.
WORKING CONDITIONS & PHYSICAL REQUIREMENTS
Office environment.
Occasional exposure to heat, cold, and allergens while performing tests or demonstrations in the field.
While performing the duties of this job, the employee is required to do the following:
Perform bending and reaching movements to place items on lower and higher shelves.
Kneeling or squatting to access lower shelves.
Must be able to lift up to 50 lbs.
Walking/Moving in the labs.
COMPENSATION
The pay range is NOT a guarantee. It is based on market research and peer data, and will vary depending on the candidate's experience and qualifications.
CA Pay Range$80,000-$90,000 USD
NOTE - As a U.S. Federal Contractor, Silvus Technologies requires that ALL candidates being considered for employment for any position (regardless of level) MUST be a U.S. Person (permanent resident or citizen). Stricter U.S. Citizen ONLY requirements are needed for some Engineering or R&D roles. This generally does NOT apply to International positions; only job postings for positions located in the U.S. Exceptions will be included in the Required Qualifications section of the posted position.
All Employment is contingent upon the successful clearance of a background check.
Silvus is proud to be an equal-opportunity employer, and we value diversity. We do not discriminate on the basis of race, color, age, religion or belief, ancestry, national origin, sex (including pregnancy), sexual orientation, gender identity and/or expression, marital, civil union or domestic partnership status, physical or mental disability, protected veteran status, genetic information, political affiliation, or any other factor protected by applicable federal, state, or local laws.
We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive benefits and privileges of employment. Please contact us to request accommodation.
*Silvus does not accept unsolicited resumes from individual recruiters or third-party recruiting agencies in response to job postings. No fee will be paid to third parties who submit unsolicited candidates directly to Silvus Technologies.
Auto-ApplySystems Security Engineer II - P2 (Onsite-Fullerton, CA)
Cyber security analyst job in Fullerton, CA
Country: United States of America Onsite U.S. Citizen, U.S. Person, or Immigration Status Requirements: Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
Security Clearance:
Secret - Current
At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Raytheon is seeking a well-qualified Systems Security Engineer II (P2) to join our Systems Security Engineering (SSE) team in developing solutions to protect the Warfighter's technology advantage. Systems Security Engineering creates holistic security solutions leveraging Cyber Security, Software Assurance and Supply Chain Risk Management to support Program Protection Implementation on embedded weapons systems. Join our highly visible team and perform technically challenging assignments, which will directly contribute to protecting our nation and our Warfighters. This is an onsite position at Raytheon in Fullerton, CA.
What You Will Do
* Lead the patch team, ensuring on-time delivery of patches to our customer
* Perform analysis on cybersecurity collected data and test results
* Validate secure configuration of routers, switches, firewalls, servers, operating systems, applications, and other assets, using DoD approved scanning and assessment tools such as Nessus, STIG, Evaluate STIG, and/or RADIX
* Create and maintain Linux Bash and Python scripts
* Create patch artifacts such as patch media and information assurance posture reports
Qualifications You Must Have
* Typically requires a Bachelor's Degree in Science, Technology, Engineering or Mathematics (STEM) and 2 years of prior relevant experience
* Active and transferable U.S. government issued DoD Secret security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
* Experience in System Security Engineering, computer technology reverse engineering, cybersecurity or embedded security
Qualifications We Prefer
* Experience with scrum planning and scrum tools such as Jira
* Experience in the SSE implementation throughout the entire life cycle
* Experience contributing to a team environment for the purpose of developing creative solutions to technical problems
* Cyber Certifications in accordance with DoDD 8570/DoDD 8140 such as CISSP, GSLC, CEH
* Experience supporting the development of Risk Management Framework (RMF) documents and controls validation testing for Authority to Operate (ATO) accreditations
* Candidate must exhibit an exceptional degree of ingenuity, creativity and resourcefulness
* Excellent communication, technical writing, oral presentation and interpersonal skills
What We Offer
* Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation
* Relocation Eligible - Relocation assistance is available
As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote.
The salary range for this role is 72,000 USD - 144,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.
Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.
Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.
This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.
RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
Auto-ApplySystems Security Engineer II
Cyber security analyst job in Huntington Beach, CA
The System Security Engineer Level II is required to be a highly skilled and hands-on security engineer, and will be responsible for helping to maintain and expand the infrastructure of the entire Cambro network, ensuring that they are protected from cyber threats and attacks, ensuring compliance, and responding to incidents. In this role, the responsibility is to manage, monitor, and maintain our Network IT infrastructure from CVEs, cyber threats, manage and implement device firmware and software updates. Also, the role is required to assist in projects and initiatives to support, upgrade, and maintain our technical environment to improve network security. The role requirement is to be proficient with cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR. The role requires to have a multi-disciplined background including experience with Cybersecurity Operations, firewalls, IDS/IPS, switches, VLANs, routing protocols, IPsec, VPN tunnels, multi factor authentication and e-mail security. In addition, they must have a solid understanding of virtualized servers, Windows workstations and services. This role is required to have the network monitoring skills and technologies for detecting unusual activity, investigate security breaches and lead incidence response.
ESSENTIAL JOB FUNCTIONS
• Monitor network traffic for anomalies, investigate alerts and respond to security incidents.
• Conduct regular vulnerability scans, risk assessments, patch management and mitigation across network devices.
• Ensure adherence to cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR.
• Able to proactively scan servers and network devices for vulnerable ports and protocols and rogue devices.
• Manage our firewall environment with the ability to create route policies and apply cybersecurity recommendations
• Install and configure Network Equipment (Switches, Firewalls, and other networking hardware)
• Perform (Layer 2) switch administration and configuration on Cisco/Ruckus switches. Including configuring LAGs, interfaces, creating trunks, creating, and managing segmented VLANs.
• Possess a solid understanding of Windows Server services and roles including installation and configuration
• Create certificates for network devices and servers that have a web management capability
• A strong understanding of Windows Active Directory and can design, implement, and configure and troubleshoot Active Directory issues
• Create, Manage and Deploy Group Policy Objects (GPO's) to deploy applications and implement security including windows firewalls
• Effectively use PowerShell to automate and standardize administrative tasks
• Capable of installing a Linux VM and execute basic Linux commands and managing Linux appliances
• Manage our virtualized server environment managing, creating VM's and patching the VMware environment.
• Strong understanding of Virtual Switches, Port Groups (Distributed and Standard)
• Manage the Active Backup for Business on Synology and other advanced Synology administration features
• Maintain and monitor Backup solutions.
• Manage our users email accounts using the cloud service M365 from Microsoft
• Responsible for creating and maintaining server and network documentation to include tasks and procedures
• Proactively monitor our network using a variety of tools to help identify potential network and server issues
• Assist in patching our entire infrastructure when needed using a variety of tools
• Maintains strong technical abilities, knowledge of new and changing technologies
• Prepare for emergencies by creating and/or updating action plans
• Jumping into time-sensitive projects wherever needed
• Showing flexibility and a willingness to learn
• Maintain healthy communication with IT Staff, IT Customers and Vendors
• Actively participate in IT Infrastructure and Operations projects, managing, completing, communicating, and fully documenting assigned tasks and deliverables.
• Maintain reliable and consistent attendance, including being punctual, and dependable in order to meet the needs of the department and the organization.
• Execute each essential duty satisfactorily to perform job successfully.
• Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions.
• Performs effectively as a team member, able to work well with others, open to receiving and give feedback, and treats everyone with respect.
• Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects.
• Follow all department quality standards/criteria. Raise concerns and issues to immediate manager.
• Able to understand and demonstrate Cambro company culture, display company core values (Safety, Quality, Respect, and Service).
• Understands department's key performance indicators and contributes to achieve these goals both individually and as a team.
• Maintains reliable and consistent attendance, including being punctual, dependable, and flexible to potential schedule changes to meet the needs of the department and the organization.
• Executes each essential duty satisfactorily to perform job successfully.
• Follows all safety procedures required in work area, wears PPE as needed, attends all safety meetings, and reports safety issues regarding equipment or unsafe/hazardous conditions.
• Performs effectively as a team member, able to work well with others, open to receive and give feedback, and treats everyone with respect.
• Takes ownership of own work and behavior, accepts accountability for own actions, encourages solutions, and communicates status of work/projects.
• Follows all department quality standards/criteria. Raises concerns and issues to management.
• Understands department's key performance indicators (KPIs) and contributes to achieve these goals both individually and as a team.
• Other duties as needed or required.
ADDITIONAL RESPONSIBILITIES
• Ability to be on call 24 hours a day, 7 days a week for global operations, by periodically providing off-hours, evening, and weekend support to accommodate maintenance windows and issue resolution
• Occasional travel to various Cambro locations domestically and internationally as required (15%)
• May occasionally guide less experienced associates to help with technical projects
• Some travel may be required.
REQUIRED QUALIFICATIONS
The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
• Bachelor's degree (B.A.) from a four-year accredited college or university.
• 5-10 years of experience in IT security, network, administration, and support roles.
• Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form.
• Ability to adapt and adjust plans to meet changing needs.
• Proficient in Microsoft Office Suite
• Experience with Fortinet solutions, EDR, email security solutions
• Solid knowledge of cybersecurity frameworks including NIS, ISO27001/27002, CIS, HIPAA, CCPA/CPRA and GDPR.
• Solid working knowledge of Layer 2 (VLANs, Inter-VLANs, VTP Domains, bridge groups, MVRP, ACL's) technologies and network segmentation.
• Strong knowledge of DNS records including reverse zones and maintaining DNS records
• Strong DHCP Knowledge to include DHCP Fail over and able to configure DCHP relay on Switches
• Solid understanding of routing protocols, static routes and ARP cache
• Proficient in creating and implementing certificates on layer 2 devices (Switches, Firewalls, Linux Appliances)
• Strong troubleshooting skills and possess the ability to find security and network issues in a timely manner
• Strong Windows administration skills including Active Directory/GPO's and security policies
• Solid working knowledge of Virtualization, such as VMware ESXi servers and vCenter 7.x
• Solid working knowledge of Veeam/Bacula/Exagrid backup software to manage backup and restore procedures
• Must be able to follow instructions and procedures and ask questions if something is unclear
• Excellent documentation skills including ability to create network drawings
• Self-motivated and energetic with the ability to manage time efficiently without supervision and to work effectively under pressure
• Strong customer service and communication skills
• Excellent organizational skills and strong sense of urgency
• Familiarity with various network types including LANs, WANs, SDWAN, WLANs, SANs, and VoIP networks
• Great accuracy and attention to detail
PREFERRED QUALIFICATIONS
• Experience in Business Continuity and disaster recovery is a plus
• Knowledge of Ruckus Access Points and Switches
• Knowledge of IBMi
PHYSICAL DEMANDS
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Sitting, walking, standing, bending at the neck, bending at the waist, squatting, climbing, kneeling, crawling, twisting at the neck and waist, repetitive use of hands, simple grasping, power grasping, fine manipulation, pushing and pulling, reaching above and below the shoulder, carrying/lifting up to 50 lbs.
Driving cars and other IT equipment
Working around equipment and machinery
Exposure to excessive noise
Exposure to dust, gas, fumes or chemicals
Working at heights
Use of special visual or auditory protective equipment
Walking on uneven ground
PPE Requirements
Safety glasses
Steel-toe slip-resistant shoes - When in production area
Hearing protection (e.g. ear plugs, ear muffs) - When in production area
Face covering (mask) in accordance with company policy.
Hardhat/bump camp
IT Application
COMPENSATION RANGE:
$97,000- $120,000
Salary may vary based on experience.
CAMBRO is proud to be an equal-opportunity workplace. All qualified applicants will receive consideration for employment without regard to and will not be discriminated against based upon race, color, religion, national origin, gender, sexual orientation, gender identity, age, physical or mental disability, genetic information, military or veteran status, or other characteristics protected by law.
Auto-ApplyCybersecurity System Security Engineer I
Cyber security analyst job in El Segundo, CA
Job DescriptionDescription:
The System Security Engineer's primary function is working within Special Access Programs (SAPs) supporting SMC and AFSPC acquisition programs. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities to meet NIST Cybersecurity requirements for system assessment & authorization.
Performance shall include:
Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration with existing SAP network infrastructures
Support a team of System Security Engineers and Certification and Accreditation Analysts responsible for ensuring the customers national and international security interests are protected as support equipment are designed and tested
Support customer and SAP community IA working groups, participate in SSE IPT reviews
Provides expert level consultation and technical services on all aspects of Information Security
Review SSE related designs and provides security compliance recommendations
Develop and provide IA risk management recommendations to the customer
Provide SSE support for Mission and Training systems design and development
Assist with development and maintenance of the Program Protection Plan & Cybersecurity Strategy
Assist with site activation activities and design reviews
Represent the Government Program Manager in various SSE related working groups, advisory groups, and advisory council meetings
Requirements:
Experience:
6 years' total experience, including minimum 2 years' experience within SCI or SAR environment. Minimum 1 year of SAP relevant experience highly desired.
Education:
Bachelor's degree in a related discipline or equivalent additional experience (4 years)
Certifications:
Must meet position and certification requirements outlined in DoD Directive 8570.01-M for Information Assurance Technician Level 2 and Information Assurance Manager Level 1 within 6 months of the date of hire
Security Clearance:
Current Top Secret Clearance with SCI Eligibility
Eligibility for access to Special Access Program Information
Willingness to submit to a Counterintelligence polygraph
Other Requirements:
Must be familiar with security policy/manuals and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents
Familiarity with Risk Management Framework (RMF) and Joint SAP Implementation Guide (JSIG) processes for system accreditation, along with legacy (DITSCAP, DIACAP) processes
Must have the ability to work in a dynamic environment and effectively interact with numerous DOD, military/civilian personnel and industry partners
Working knowledge of Microsoft Office (Word, PowerPoint, and Excel)
Possess a high degree of originality, creativity, initiative requiring minimal supervision
Willingness to travel within the organizational Area of Responsibility (AOR) (note - could be extensive, and will include both air and ground transportation)
Controls Security & Fire System Engineer III
Cyber security analyst job in Huntington Beach, CA
What you do
Be responsible for Pre Sales Support & End User Support for, but not limited to the design, configuration, and operation of complete building low voltage systems, including fire, security, and other low voltage control sub-systems (i.e. lighting, nurse call, data networks, etc.) to meet the intent of the project requirements.
Accountable to field teams for quality, timeliness and efficiency of designs.
Develops complex software programs, commissions and troubleshooting to ensure proper operations of the building control system.
Provides detailed information and submittals to communicate design and operation to customers, consultants, Johnson Controls field installation team and subcontractors.
How will you do it - Sales Support and End User Support
· Possible job walks with the Sales Team on the initial design phase
· Designs and configures are technically complex building control systems as defined by the contract documents.
· Creates flow diagrams, sequence of operations, bill of material, network layouts and electrical schematics as required.
· Develop and tests software programs necessary to operate the system per the project requirements' intent.
· Coordinates the creation of necessary drawings and equipment schedules for submittals and installation.
· Assists in the loading and commissioning of all system and network-level controllers as required.
· Assists in validation of complete system functionality and troubleshoots problems with subcontractors and other trades to ensure proper operation.
· Provides field change information to the project team for the creation of as-built drawings and software.
· Keeps management and JCI contractor or customer informed of job progress and issues.
· Assists in performing site-specific training for owner/operator on the total building control system.
· Participates in release meeting with the project field team.
· Performs value engineering to provide cost effective results while maintaining customer satisfaction.
· Adheres to safety standards.
· High degree of employee and subcontractor safety.
What we look for
Required Qualifications
· Minimum of seven years of experience, or an associate degree in a related technical field with seven years of relevant work experience required.
· Demonstrated knowledge of the construction, mechanical, electrical, or HVAC service industry.
· Demonstrated knowledge of mechanical drawings, electrical wiring diagrams, control theory, automatic temperature controls, building automation systems and other building subsystems.
· Demonstrated experience in the integration of low voltage building sub-systems using various industry protocols (i.e. LON, BACnet, etc.).
· Ability to relate technical knowledge to a non-technical audience.
· Demonstrated advanced computer skills required, particularly computer-related drafting tools, such as Visio.
Preferred Qualifications
· Bachelor's degree in engineering with a minimum of five years of experience, or an associate degree in a related technical field with seven years of relevant work experience required.
· Understanding of IP networking for building automation systems.
· Understanding of Tridium/Niagara Framework
HIRING SALARY RANGE: $100K to $125K (Salary to be determined by the education, experience, knowledge, skills, and abilities of the applicant, internal equity, location and alignment with market data.) This role offers a competitive Bonus plan that will take into account individual, group, and corporate performance. This position includes a competitive benefits package. For details, please visit the About Us tab on the Johnson Controls Careers site at *****************************************
Johnson Controls International plc. is an equal employment opportunity and affirmative action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information, sexual orientation, gender identity, status as a qualified individual with a disability or any other characteristic protected by law. To view more information about your equal opportunity and non-discrimination rights as a candidate, visit EEO is the Law. If you are an individual with a disability and you require an accommodation during the application process, please visit here.
Auto-ApplySystems Security Engineer
Cyber security analyst job in El Segundo, CA
**Be visionary** Teledyne Technologies Incorporated provides enabling technologies for industrial growth markets that require advanced technology and high reliability. These markets include aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, deepwater oil and gas exploration and production, medical imaging and pharmaceutical research.
We are looking for individuals who thrive on making an impact and want the excitement of being on a team that wins.
**Job Description**
Teledyne Controls is a global leader in delivering innovative avionics systems and data management solutions for both civil and military aircraft operators. Our cutting-edge technologies enable real-time access, analysis, and utilization of critical flight data, enhancing safety, efficiency, and operational performance across the aviation industry. Become part of a team that thrives on innovation and excellence in a dynamic, mission-driven environment.
**Join Our Team as a Systems Security Engineer!**
As an Entry-Level Avionics Security Engineer, you will play a key role in safeguarding next-generation avionics systems. This position combines hands-on testing, vulnerability analysis, and collaborative design support to ensure robust security across connected products. You'll work closely with engineering teams and customers to implement secure architectures, monitor emerging threats, and contribute to innovative solutions that meet stringent aerospace security standards.
If you're ready to take on the challenge of securing cutting-edge avionics products and thrive in a dynamic environment, we want to hear from you!
**Essential Duties and Responsibilities** include the following. Other duties may be assigned.
+ Collaborate with engineering teams, program management, and customers to define and communicate security requirements and updates.
+ Perform testing and validation of security features and controls to ensure compliance and effectiveness.
+ Contribute to security assessments, including risk analysis, threat modeling, and penetration testing activities.
+ Monitor and evaluate Common Vulnerabilities and Exposures (CVEs) for relevance to Teledyne products.
+ Execute test scenarios to assess product security resilience under various conditions.
+ Participate in trade studies and evaluations of security processes, tools, and technologies.
+ Support design teams in strengthening security architecture and implementing secure solutions for new and existing products.
+ Assist in customer-facing technical reviews, including preliminary and critical design presentations.
+ Stay informed on emerging security threats and trends to proactively enhance product security.
+ Contribute to the development and integration of security features for connected avionics systems.
+ Promote security awareness through education, communication, and best-practice initiatives.
**Qualifications**
+ Bachelor degree in engineering or other technical field and 0-2 years of experience (can include coursework, projects and internships).
+ Basic understanding of Security Architecture principles, including cryptography, authentication, network security, and public key infrastructure mechanisms to secure product, network, and system boundaries, as well as inter-system communications.
+ Familiarity with networking concepts, including design and troubleshooting.
+ Basic knowledge of system design concepts and application development.
+ Awareness of security implementations in cloud environments, such as AWS.
+ Understanding of the design, auditing, analysis, support, and troubleshooting of security systems.
+ Basic knowledge of embedded system security and Linux.
+ Experience with scripting using Python, Bash, or PowerShell is a plus.
+ Must be a U.S. Person (includes U.S. citizens, lawful permanent residents, refugees, and asylees)
**Salary Range:**
$58,100.00-$77,400.000
**Pay Transparency**
The anticipated salary range listed for this role is only an estimate. Actual compensation for successful candidates is carefully determined based on several factors including, but not limited to, location, education/training, work experience, key skills, and type of position.
Teledyne conducts background checks on qualified applicants who receive a conditional offer of employment in accordance with applicable laws, regulations and ordinances. Background checks may include, but are not limited to, education verification, employment history and verification, criminal convictions, Motor Vehicle Report (MVR & driving history), reference check, credit checks/credit history and drug testing. All qualified applicants with arrest or conviction records will be considered for employment in accordance with the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act.
Teledyne and all of our employees are committed to conducting business with the highest ethical standards. We require all employees to comply with all applicable laws, regulations, rules and regulatory orders. Our reputation for honesty, integrity and high ethics is as important to us as our reputation for making innovative sensing solutions.
Teledyne is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other characteristic or non-merit based factor made unlawful by federal, state, or local laws.
You may not realize it, but Teledyne enables many of the products and services you use every day **.**
Teledyne provides enabling technologies to sense, transmit and analyze information for industrial growth markets, including aerospace and defense, factory automation, air and water quality environmental monitoring, electronics design and development, oceanographic research, energy, medical imaging and pharmaceutical research.