Cyber security analyst jobs in San Bernardino, CA - 64 jobs
All
Cyber Security Analyst
Information Security Analyst
Senior Security Engineer
Security Engineer
Senior Security Analyst
Security System Engineer
Securities Analyst
Senior Information Security Analyst
Information Systems Security Officer
Information Security Engineer
Senior Information Security Engineer
Lead AI Security Engineer
Capital Group 4.4
Cyber security analyst job in Irvine, CA
"I can be myself at work."
You are more than a job title. We want you to feel comfortable doing great work and bringing your best, authentic self to everything you do. We value your talents, traditions, and uniqueness-and we're committed to fostering a strong sense of belonging in a respectful workplace.
We intentionally seek diverse perspectives, experiences, and backgrounds, investing in a culture designed to celebrate differences. We believe that belonging leads to better outcomes and a stronger community of associates united by our mission. At Capital, we live our core values every day: Integrity, Client Focus, Diverse Perspectives, Long-Term Thinking, and Community.
"I can influence my income."
You want to feel recognized at work. Your performance will be reviewed annually, and your compensation will be designed to motivate and reward the value that you provide. You'll receive a competitive salary, bonuses and benefits. Your company-funded retirement contribution will factor in salary and variable pay, including bonuses.
"I can lead a full life."
You bring unique goals and interests to your job and your life. Whether you're raising a family, you're passionate about where you volunteer, or you want to explore different career paths, we'll give you the resources that can set you up for success.
Enjoy generous time-away and health benefits from day one, with the opportunity for flexible work options
Receive 2-for-1 matching gifts for your charitable contributions and the opportunity to secure annual grants for the organizations you love
Access on-demand professional development resources that allow you to hone existing skills and learn new ones
"I can succeed as a Lead AI Security Engineer at Capital Group"
As aLeadAISecurity Engineer, you willbe responsible forsecuring Capital Group's enterprise AI Platforms.You willhelp enable Capital Group's AIstrategy bybuilding and/orprocuringsolutions toprotecta diverse set of enterprise AI platforms being built and deployed at Capital Group.You'llcollaborate with platformengineering, security engineering, and risk teams toensure their solutions support scalable, secureadoption of AI.
Additionally,you'llbe expected toprovidementoring,advising diverse teams across the organization, andpromoting AI Securityprinciples across Capital Group.
AISecurityProcurementManagements:You willprocureand/or build technical solutionsto reducethe riskof misconfiguration, exploitation, andother security issues formultipleenterprise AI platforms.
Embedding Security in the AIPlatform Ecosystem:Working closely withplatform teams tointegrate securityintoeverycomponentof the AI Platform.
Implementing Security Controls & "Guardrails" for GenAI:Designing, deploying, andoperatingtechnical controls to prevent misuse of AI systems.Guardrails designincludescontent filtering systems, usage policies, and safety checks that mitigate issues like prompt injection attacks, unauthorized data extraction, model bias or hallucinations, and other misuse of generative AIplatforms.
AI Runtime Security:Engineer continually tests and updatestothe guardrails, replacing weaker controls with more robust solutions as threats evolve.
AI Governance:You will work cross functionally with architecture and platform teams tomonitoralignment of solutions to AI Governance processes
Contribute to Standards and Policies:You will providethought leadership for Information Security policies and standards for AIin collaboration with technology risk
AI/Agent SME:Youwill provide AI/Agent subject matterexpertisefor AI Incidentsand Security Reviews, and helpdevelop incident response playbooks for AI-related security incidents
"I am the person Capital Group is looking for."
You have 8+yearsof experience in information security, application security, platform security, or penetration testing,DevSecOps, networksecurityand other security disciplines.
You have experience securing AI platforms, whetherinternal AIplatforms or offerings such as CoPilot Studio, Amazon Bedrock, and/or Azure AI Gateway
Proficient in Programming & ML Tool.Strong Python skillsrequired, with experience in AI/ML frameworks.Abilityto review and write ML code to implement security measures (e.g., model validation, adversarial testing) isdesired.
You have5+ years of relevant professional experience ordemonstrated anequivalent level ofexpertisein security engineering, such as cloud, API, or platform security.
You have3+ years of experience embedded identity, network, and encryption controls into enterprise platforms
Youcaneffectively partner and collaborate with stakeholder teams.
You have effective communication skills andthe abilityto outline security riskstoleadership.
You are familiar with cloud and API security vendors and managed services providers.
Preferred Qualifications:
You have knowledge and experience with technologies including Kubernetes, Containers, CI/CD, and Cloud Service Providers
You are familiar withfunctionand purpose of key AI platform components such as AI gateways (Kong, Databricks Mosaic AI Gateway, custom API orchestration), Model Orchestration (ExamplesLangChain,LlamaIndex, etc.)
You are familiar with key AI regulatory frameworks such as NIST AI RMF, MITRE ATLAS, GDPR, EU AI Act,etc
You have information Security certifications (CISSP, SANS GIAC, CISA, etc.)
"I can apply in less than 4 minutes."
You've reviewed this job posting and you're ready to start the candidate journey with us. Apply now to move to the next step in our recruiting process. If this role isn't what you're looking for, check out our other opportunities and join our talent community.
"I can learn more about Capital Group."
At Capital Group, the success of the people who invest with us depends on the people in whom we invest. That's why we offer a culture, compensation and opportunities that empower our associates to build successful and prosperous careers. Through nine decades, our goal has been to improve people's lives through successful investing. We know that our history is a testament to the strength of the people we hire. More than 9,000 associates in 30+ offices around the world help our clients and each other grow and thrive every day. Find us on LinkedIn, Instagram, YouTube and Glassdoor.
Southern California Base Salary Range: $179,273-$286,837San Antonio Base Salary Range: $147,378-$235,805New York Base Salary Range: $190,040-$304,064
In addition to a highly competitive base salary, per plan guidelines, restrictions and vesting requirements, you also will be eligible for an individual annual performance bonus, plus Capital's annual profitability bonus plus a retirement plan where Capital contributes 15% of your eligible earnings.
You can learn more about our compensation and benefits
here
.
* Temporary positions in the United States are excluded from the above mentioned compensation and benefit plans.
We are an equal opportunity employer, which means we comply with all federal, state and local laws that prohibit discrimination when making all decisions about employment. As equal opportunity employers, our policies prohibit unlawful discrimination on the basis of race, religion, color, national origin, ancestry, sex (including gender and gender identity), pregnancy, childbirth and related medical conditions, age, physical or mental disability, medical condition, genetic information, marital status, sexual orientation, citizenship status, AIDS/HIV status, political activities or affiliations, military or veteran status, status as a victim of domestic violence, assault or stalking or any other characteristic protected by federal, state or local law.
$190k-304.1k yearly 3d ago
Looking for a job?
Let Zippia find it for you.
Information Security Analyst
Cathay Bank-Headquarters 4.4
Cyber security analyst job in Rancho Cucamonga, CA
People Drive Our Success Are you enthusiastic, highly motivated, and have a strong work ethic? If yes, come join our team! At Cathay Bank - we strive to provide a caring culture that supports your aspirations and success. We believe people are our most valuable asset and we proudly foster growth and development empowering you to achieve your professional goals. We have thrived for 60 years and persevered through many economic cycles due to our team members' drive and optimism. Together we can make a difference in the financial future of our communities.
Apply today!
What our team members are saying:
Video Clip 1
Video Clip 2
Video Clip 3
Learn more about us at cathaybank.com
GENERAL SUMMARY
This position is responsible for ensuring that the Bank's Security operations and preventive controls are managed and maintained in accordance with established Information Security policies, standards and procedures, published regulations and industry best practices.
Primarily responsible for the constant review of vendor security controls in comparison with policies and industry frameworks, risk assessments, determination of control gaps and their remediation.
ESSENTIAL FUNCTIONS
Performs vendor security risk assessments to determine inherent risk on proposed projects and assesses vendor security controls to determine residual risk.
Evaluates the potential exposure to application security risks and threats based on industry security frameworks and recommends appropriate mitigation.
Assesses security practices including Information Security governance, Identity and access control, Incident monitoring and response, Vulnerability assessment and Penetration tests, Network Security and Endpoint Security, among others.
Acts as liaison with Third Party Risk Management, Information Technology and business department Relationship Managers related to vendor risk assessments.
Reports information security risks and follows-up remediations.
Remediates audit and regulatory findings and recommendations related to Information Security and Vendor Risk Management.
QUALIFICATIONS
Education:
College degree in Information Technology or Information Security or equivalent;
Security+, SSCP, CISSP, CISM or similar information security certifications preferred.
Experience:
Minimum two years of experience in Information Security Risk, Information Security Operations or Security Auditing.
Proven experience on third-party risk management and vendor security assessments.
Working knowledge of security practices such as Endpoint Security, Network Security, Security Operations and Security Governance required.
Experience working with Vendor Risk Management (VRM) applications preferred.
Skills/Ability:
Proven ability to initiate and manage projects.
Excellent communication and problem-solving skills.
Strong inter-personal communication and collaboration skills.
Self-starter, highly motivated, and able to work with general supervision.
OTHER DETAILS
$28.84 - $33.65 / hour
Pay determined based on job-related knowledge, skills, experience, and location.
This position may be eligible for a discretionary bonus.
Cathay Bank offers its full-time employees a competitive benefits package which is a significant part of their total compensation. It is our goal to provide employees with a comprehensive benefits package to fit their needs which includes, coverage for medical insurance, dental insurance, vision insurance, life insurance, long-term disability insurance, and flexible spending accounts (FSAs), health saving account (HSA) with company contributions, voluntary coverages, and 401(k).
Cathay Bank may collect personal information from potential job candidates and applicants. For more information on how we handle personal information and your applicable rights, please review our Privacy Policy.
Cathay Bank is an Equal Opportunity and Affirmative Action Employer. We welcome applications for employment from all qualified candidates, regardless of race, color, ethnicity, ancestry, citizenship, gender, national origin, religion, age, sex (including pregnancy and related medical conditions, childbirth and breastfeeding), reproductive health decision-making, sexual orientation, gender identity and expression, genetic information or characteristics, disability or medical condition, military status or status as a protected veteran, or any other status protected by applicable law.
Click here to view the "Know Your Rights: Workplace Discrimination is Illegal" Poster:
Poster- English
Poster- Spanish
Poster- Chinese Traditional
Poster- Chinese Simplified
Cathay Bank endeavors to make **************************** to any and all users. If you would like to contact us regarding the accessibility of our website or need assistance completing the application process, please contact, Mickey Hsu, FVP, Employee Relations Manager, at or . This contact information is for accommodation requests only and cannot be used to inquire about the status of applications.
$28.8-33.7 hourly 3d ago
Cyber Security
Krg Technology 4.0
Cyber security analyst job in Rosemead, CA
H i , This is Sujith from KRG Technologies ; We are looking CyberSecurity at Rose Mead, CA for the below mentioned . Kindly forward me your resume, rate and contact details for further process. I also request you to forward this opportunity to your friends or colleagues; so that we can help someone who may be in search of a job or looking for a change.
Job Title: CyberSecurity
Location:
Rose Mead, CA
Duration: CONTRACT(6-12months)
Job Description:
Must have 5-7 yrs of Cybersecurity experience.
Have some experience around Vulnerability assessment & Pen test remediation. Able to explain vulnerabilities and remediation.
Have some exposure to OWASP Top 10.
Have some exposure to SDLC, development.
Any experience in NERC-CIP would be great.
Experience around Code review would be added advantage.
Thanks & Regards
Qualifications
Cybersecurity experience with vulnerability and risk assessment
Additional Information
All your information will be kept confidential according to EEO guidelines.
$84k-113k yearly est. 9h ago
Sr. Information Security Engineer
Alignment Healthcare 4.7
Cyber security analyst job in Orange, CA
Sr. Information Security Engineer
External Description:
Alignment Healthcare is a data and technology driven healthcare company focused on partnering with health systems, health plans and provider groups to provide care delivery that is preventative, convenient, coordinated, and that results in improved clinical outcomes for seniors.
We are experiencing rapid growth (backed by top private equity firms), and our team is looking for the best and brightest individuals. We love our customers and understanding them better makes it possible to provide the best clinical outcomes and care experience.
Are you an Information Security Engineer with experience in automation, cloud technologies, and endpoint security? Would you like to work in an environment where your skills can be utilized effectively, and you have opportunities to make significant impact? If you are passionate about security and can reduce risk in practical ways that scale, we want to hear from you!
Major Responsibilities
Contributes to the daily operational aspects of the Information Security Team, primarily from a technical implementation perspective.
Assists with break/fix of tools and automation that are owned by the Information Security Team.
Works with internal and external customers on a variety of issues, from a simple security review of a mundane and routine ask, to a complex deep dive into a new feature implementation in O365, Azure, or AWS.
Balances operational work (approximately 70% of the day) to help meet team SLAs, and project work (approximately 30% of the day) to meet assigned team deliverables.
Contributes to the design, implementation, and documentation of new security tools.
Collaborates with other internal information technology teams (networking, cloud, traditional architecture, developers, and data scientists) to support internal and external systems.
Utilizes scripting and DevOps to provide automation and orchestration between:
information security tools, such as the SIEM (Logstash, FortiSIEM, IBM QRadar, etc.);
endpoint protection (Symantec, McAfee, Cylance, CrowdStrike Falcon, etc.);
vulnerability scanners (Rapid7, Nessus, etc.);
patch management (SCCM, Altiris, PDQ, etc.);
other applications;
OS' (Windows, MacOS, Linux, iOS, Android);
cloud platforms (AWS, Azure); and
IAM platforms (Active Directory, Okta, Auth0, PingIdentity, SAML, OIDC).
Clearly documents designed automation and system relationships.
Contributes and participates in the Information Security Team daily stand-ups and other meetings as necessary.
Participates in regular reporting, maintaining accountability and transparency within the Information Security Team.
Remains current on industry trends in cyber risk with industry standards (ISO 27001/2, NIST, CIS) and regulatory requirements (HIPAA, HITECH, HITRUST, etc.)
Technical knowledge of common information security tools and systems: DLP, MAM/MDM, Firewall/VPN, endpoint protection, PKI, RBAC, IAM, etc.
Demonstrated practical experience with one or more programming or scripting languages. (PowerShell, Python, C#, VB, VBA, Ruby, NodeJS, SQL, etc.) We're not picky, but you must be able to deliver practical automation!
Demonstrated practical experience with one or more of the major cloud providers (AWS, Azure, GCP).
Excellent oral and written communication skills, and an ability to present and discuss technical information in a way that establishes rapport and trust.
Detail orientated, with an ability and desire to build to 100%, but being ok with building to 90% as tasked.
An ability to be productive as an individual contributor with little supervision to meet agreed upon deliverables.
Preferred
Prior experience in the healthcare or a related HIPAA regulated industry.
A working knowledge of the NIST CSF and/or CIS Critical Security Controls (CSC).
A working knowledge of Git and GitHub.
Previous experience contributing to projects using agile tools (Jira, Azure DevOps, Pivotal) and processes (Scrum, Kanban).
One or more cloud security certifications.
Education
Bachelor's degree in Computer Science, Computer Engineering, or related technical discipline, and/or equivalent work experience.
3+ years' experience working in a technical, hands-on, information security role.
One or more current security related certifications (e.g., CISSP, SANS GIAC, etc.)
City: Orange
State: California
Location City: Orange
Schedule: Full Time
Location State: California
Community / Marketing Title: Sr. Information Security Engineer
Company Profile:
Alignment Healthcare was founded with a mission to revolutionize health care with a serving heart culture. Through its unique integrated care delivery models, deep physician partnerships and use of proprietary technologies, Alignment is committed to transforming health care one person at a time.
By becoming a part of the Alignment Healthcare team, you will provide members with the quality of care they truly need and deserve. We believe that great work comes from people who are inspired to be their best. We have built a team of talented and experienced people who are passionate about transforming the lives of the seniors we serve. In this fast-growing company, you will find ample room for growth and innovation alongside the Alignment community.
EEO Employer Verbiage:
On August 17, 2021, Alignment implemented a policy requiring all new hires to receive the COVID-19 vaccine. Proof of vaccination will be required as a condition of employment subject to applicable laws concerning exemptions/accommodations. This policy is part of Alignment's ongoing efforts to ensure the safety and well-being of our staff and community, and to support public health efforts. Alignment Healthcare, LLC is proud to practice Equal Employment Opportunity and Affirmative Action. We are looking for diversity in qualified candidates for employment: Minority/Female/Disable/Protected Veteran. If you require any reasonable accommodation under the Americans with Disabilities Act (ADA) in completing the online application, interviewing, completing any pre-employment testing or otherwise participating in the employee selection process, please contact ******************.
$125k-156k yearly est. Easy Apply 60d+ ago
Sr. Security Compliance Analyst
TP-Link Systems 3.9
Cyber security analyst job in Irvine, CA
Headquartered in the United States, TP-Link Systems Inc. is a leading global provider of networking devices and smart home products. Consistently ranked as the world's top provider of Wi-Fi devices, TP-Link is dedicated to delivering innovative solutions that improve people's lives by offering faster, more reliable connectivity. Serving customers in over 170 countries, we are committed to expanding our global footprint.
At TP-Link Systems Inc., we believe that technology has the power to transform the world for the better. Our mission is to design reliable, high-performance products that connect users worldwide to the limitless possibilities of technology.
We are driven by our core values of professionalism, innovation, excellence, and simplicity. Our goal is to help clients achieve outstanding global performance and to provide consumers with a seamless, effortless technology experience.
TP-Link Systems Inc. is seeking a skilled and proactive Sr. Security Compliance Analyst who will be responsible for developing and overseeing TP-Link's enterprise security governance framework, ensuring compliance with regulatory requirements, industry standards, and internal policies. This individual will collaborate with cross-functional teams to embed security into business operations, manage risk, and enhance security resilience across TP-Link's enterprise ecosystem.
Key Responsibilities:
Security Governance & Policy Development
Develop, implement, and maintain security policies, standards, and guidelines aligned with industry best practices (e.g., NIST, ISO 27001, CIS).
Establish and lead a security governance framework to ensure consistent application of security controls across the enterprise.
Risk Management & Compliance
Identify, assess, and mitigate security risks across TP-Link's global operations.
Ensure compliance with regulatory requirements such as GDPR, CCPA, NIST CSF, and other applicable cybersecurity frameworks.
Oversee security audits, risk assessments, and third-party security evaluations.
Partner with legal, IT, and business leaders to address security compliance gaps.
Third-Party & Supply Chain Security
Develop and enforce security requirements for vendors, suppliers, and third-party partners.
Conduct security assessments of supply chain partners to identify and mitigate potential risks.
Security Awareness & Training
Develop and lead security awareness programs to educate employees on cybersecurity risks and best practices.
Foster a security-first culture across all levels of the organization.
Provide guidance and training on security governance processes for internal stakeholders.
Incident Response & Continuous Improvement
Support security incident response efforts by ensuring governance processes facilitate rapid detection and response.
Lead post-incident analysis to refine security policies and controls.
Monitor emerging threats, regulatory changes, and industry trends to evolve TP-Link's security governance strategies.
Requirements
Qualifications Education:
Bachelor's degree in Computer Science, Cybersecurity, Information Security, or a related field.
Experience:
5+ years of experience in security governance, risk management, or compliance in a global technology or networking company.
Proven track record in developing and implementing security governance frameworks for enterprise security.
Experience managing compliance with industry standards and regulations (ISO 27001, NIST CSF, SOC 2, GDPR, CCPA, etc.).
Hands-on experience with supply chain security, third-party risk management, and vendor security assessments.
Skills:
Deep understanding of security frameworks (ISO 27001, NIST, CIS, SOC 2) and regulatory requirements.
Strong expertise in risk management methodologies, security policy development, and compliance auditing.
Proficient in conducting security assessments, third-party risk evaluations, and internal security reviews.
Ability to communicate complex security concepts to business and technical stakeholders effectively.
Strong leadership skills with experience in cross-functional collaboration and executive reporting.
Benefits
Salary range: $100,000-$150,000
Free snacks and drinks, and provided lunch on Fridays
Fully paid medical, dental, and vision insurance (partial coverage for dependents)
Contributions to 401k funds
Bi-annual reviews, and annual pay increases
Health and wellness benefits, including free gym membership
Quarterly team-building events
At TP-Link Systems Inc., we are continually searching for ambitious individuals who are passionate about their work. We believe that diversity fuels innovation, collaboration, and drives our entrepreneurial spirit. As a global company, we highly value diverse perspectives and are committed to cultivating an environment where all voices are heard, respected, and valued. We are dedicated to providing equal employment opportunities to all employees and applicants, and we prohibit discrimination and harassment of any kind based on race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Beyond compliance, we strive to create a supportive and growth-oriented workplace for everyone. If you share our passion and connection to this mission, we welcome you to apply and join us in building a vibrant and inclusive team at TP-Link Systems Inc.
Please, no third-party agency inquiries, and we are unable to offer visa sponsorships at this time.
$100k-150k yearly Auto-Apply 60d+ ago
Senior Security Engineer
Goodleap 4.6
Cyber security analyst job in Irvine, CA
GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018.
GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America.
Position Summary
The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information.
The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services.
Your oversight will encompass:
* Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements.
* Build-time controls: Managing applications/products security controls and activities during development.
* Runtime controls: Overseeing security measures at runtime, from prevention to detection and response.
Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed.
While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering.
Essential Job Duties & Responsibilities
* Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes.
* Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements.
* Support or develop components of the security analytics platform.
* Contribute to investigations, threat hunting, and incident response activities in a supporting role.
* Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns.
* Support the security operations team with the vulnerability management lifecycle for products and services under your purview.
* Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities.
Required Skills, Knowledge & Abilities
* Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences.
* Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization.
* Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments.
* Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus).
* Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble.
* Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc.
* Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases.
* Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault.
* Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed.
* Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas.
* Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments.
* Experience engaging with vendors in design partnerships.
* Experience overseeing vulnerability and threat management at the platform and application levels.
* Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement.
* Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution.
$146,000 - $170,000 a year
In addition to the above salary, this role may be eligible for a bonus.
Additional Information Regarding Job Duties and s:
Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law.
If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today!
We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
$146k-170k yearly 60d+ ago
0_IT_Software Engineer - Information Security
Summithr
Cyber security analyst job in Pasadena, CA
Key Qualifications:
Bachelor's degree or equivalent experience
5-10+ years of experience as a security engineer in related domains
Experienced in Cloud IDAM solutions and able to provide Tier 2 and Tier 3 security operations support and incident handling.
Assists in the development, implementation, and tuning of secure management of user interfaces, workspaces, and dashboards.
Experience with auditing tools, intrusion detection/protection devices, security Benchmarks, Incident Response Handling, and NIST publications.
Ability to perform under pressure and handle change easily while meeting deadlines.
CISSP certification is preferred, with knowledge of operating systems, file systems, and memory on OS X, Linux, Windows, or iOS/Android.
Coding or scripting proficiency in one or more languages is preferred having practical experience with attacker tactics, techniques, and procedures.
Experience and knowledge across multiple security domains, but with expertise in detection engineering, digital forensics, incident response, threat intelligence, or malware analysis
Recent digital forensic experience including memory or live analysis of mac OS, Linux, Windows, or iOS/Android systems.
Experience as an incident responder responsible for running large scale incidents.
Demonstrated engagement in the security community through talks, papers, or code.
Experience with Kubernetes, threat modeling, STRIDE and writing secure Java code.
To see new and updated job postings and job postings similar to this, please follow us on LinkedIn: *****************************************
$100k-141k yearly est. 60d+ ago
Sr. Information Security GRC Analyst
Loan Depot 4.7
Cyber security analyst job in Irvine, CA
Responsible for driving the development, implementation, communication, and maintenance of loan Depot's technology policies, standards and procedures that are aligned to industry standards and regulatory requirements. Ensures that loan Depot technology processes adheres to regulatory requirements, manages risks effectively, and establishes strong governance practices. Develops and implements controls, monitors compliance, and supports risk management activities.
Responsibilities:
* Leads the development and implementation of comprehensive cybersecurity and IT policies, standards, and guidelines.
* Continuously evaluates and updates cybersecurity and IT policies to ensure they remain current and effective.
* Ensures policies comply with relevant laws, regulations, and industry standards (e.g., NIST, FFIEC, GLBA, NYDFS, SOX and PCI-DSS).
* Collaborates with teams, working closely with IT, legal, compliance, and other departments, to gain a deep understanding of business needs to ensure cybersecurity policies align with business objectives.
* Transforms complex information and documentation into simple concepts that are easy to understand by the end-users.
* Offers specialized expertise and consultation to cross-functional teams to perform framework-oriented risk assessments, identify deficiencies, generate reports, and recommends prioritized, actionable solutions to mitigate risks and enhance loan Depot's overall security posture.
* Stays informed about the latest cybersecurity threats, trends, and best practices. Ensures accurate and up-to-date records of policy reviews, risk assessments, training activities, and incident responses.
* Benchmarks the organization's policies against industry standards and best practices.
* Develops and implements governance frameworks for cybersecurity policy management.
* Monitors key performance indicators, conducts gap analysis, risk assessments and implements frameworks, as needed. Tests and monitors effectiveness of controls.
* Establishes a feedback loop and analyzes metrics to continuously improve cybersecurity policies based on audit findings, incident reviews, and emerging threats.
* Actively leads and supports on internal and external audits and assessments of cybersecurity policies and practices. Accountable for ensuring identified audit and assessment findings and actions are tracked to closure.
* Maintains comprehensive documentation of all cybersecurity policies, procedures, and related activities. Communicates policy requirements and updates to all relevant stakeholders.
* Identifies opportunities for innovation and improvement in cybersecurity policy and practice. Proposes suitable mitigation strategies and verifies the effectiveness of remediation plans
Requirements:
* Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field preferred.
* Minimum of six (6) + years' experience working in Cybersecurity GRC, policy development, risk management, or a similar field.
* Experience with GRC tools (e.g., Archer, ServiceNow, OneTrust).
* Proficiency in using data analysis and reporting tools (e.g., Excel, Power BI).
* Relevant certifications such as CISM and/or CISA are highly desirable.
Why work for #teamloan Depot:
* Competitive compensation package based on experience, skillset and overall fit for #TeamloanDepot.
* Inclusive, diverse, and collaborative culture where people from all backgrounds can thrive
* Work with other passionate, purposeful, and customer-centric people
* Extensive internal growth and professional development opportunities including tuition reimbursement
* Comprehensive benefits package including Medical/Dental/Vision
* Wellness program to support both mental and physical health
* Generous paid time off for both exempt and non-exempt positions
About loan Depot:
loan Depot (NYSE: LDI) is a digital commerce company committed to serving its customers throughout the home ownership journey. Since its launch in 2010, loan Depot has revolutionized the mortgage industry with a digital-first approach that makes it easier, faster, and less stressful to purchase or refinance a home. Today, as the nation's second largest non-bank retail mortgage lender, loan Depot enables customers to achieve the American dream of homeownership through a broad suite of lending and real estate services that simplify one of life's most complex transactions. With headquarters in Southern California and offices nationwide, loan Depot is committed to serving the communities in which its team lives and works through a variety of local, regional, and national philanthropic efforts.
Base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay for this role is between $99,000 and $136,500. Your base pay will depend on multiple individualized factors, including your job-related knowledge/skills, qualifications, experience, and market location.
We are an equal opportunity employer and value diversity in our company. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
$99k-136.5k yearly Auto-Apply 9d ago
Systems Security Engineer II - P2 (Onsite-Fullerton, CA)
RTX
Cyber security analyst job in Fullerton, CA
Country:
United States of America Onsite
U.S. Citizen, U.S. Person, or Immigration Status Requirements:
Active and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
Security Clearance:
Secret - Current
At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Raytheon is seeking a well-qualified Systems Security Engineer II (P2) to join our Systems Security Engineering (SSE) team in developing solutions to protect the Warfighter's technology advantage. Systems Security Engineering creates holistic security solutions leveraging CyberSecurity, Software Assurance and Supply Chain Risk Management to support Program Protection Implementation on embedded weapons systems. Join our highly visible team and perform technically challenging assignments, which will directly contribute to protecting our nation and our Warfighters. This is an onsite position at Raytheon in Fullerton, CA.
What You Will Do
Lead the patch team, ensuring on-time delivery of patches to our customer
Perform analysis on cybersecurity collected data and test results
Validate secure configuration of routers, switches, firewalls, servers, operating systems, applications, and other assets, using DoD approved scanning and assessment tools such as Nessus, STIG, Evaluate STIG, and/or RADIX
Create and maintain Linux Bash and Python scripts
Create patch artifacts such as patch media and information assurance posture reports
Qualifications You Must Have
Typically requires a Bachelor's Degree in Science, Technology, Engineering or Mathematics (STEM) and 2 years of prior relevant experience
Active and transferable U.S. government issued DoD Secret security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
Experience in System Security Engineering, computer technology reverse engineering, cybersecurity or embedded security
Qualifications We Prefer
Experience with scrum planning and scrum tools such as Jira
Experience in the SSE implementation throughout the entire life cycle
Experience contributing to a team environment for the purpose of developing creative solutions to technical problems
Cyber Certifications in accordance with DoDD 8570/DoDD 8140 such as CISSP, GSLC, CEH
Experience supporting the development of Risk Management Framework (RMF) documents and controls validation testing for Authority to Operate (ATO) accreditations
Candidate must exhibit an exceptional degree of ingenuity, creativity and resourcefulness
Excellent communication, technical writing, oral presentation and interpersonal skills
What We Offer
Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation
Relocation Eligible - Relocation assistance is available
As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote.
The salary range for this role is 72,000 USD - 144,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
$96k-139k yearly est. Auto-Apply 1d ago
Systems Security Engineer II - P2 (Onsite-Fullerton, CA)
RTX Corporation
Cyber security analyst job in Fullerton, CA
**Country:** United States of America ** Onsite **U.S. Citizen, U.S. Person, or Immigration Status Requirements:** Active and transferable U.S. government issued security clearance is required prior to start date.
U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
**Security Clearance:**
Secret - Current
At Raytheon, the foundation of everything we do is rooted in our values and a higher calling - to help our nation and allies defend freedoms and deter aggression. We bring the strength of more than 100 years of experience and renowned engineering expertise to meet the needs of today's mission and stay ahead of tomorrow's threat. Our team solves tough, meaningful problems that create a safer, more secure world.
Raytheon is seeking a well-qualified **Systems Security Engineer II (P2)** to join our Systems Security Engineering (SSE) team in developing solutions to protect the Warfighter's technology advantage. Systems Security Engineering creates holistic security solutions leveraging CyberSecurity, Software Assurance and Supply Chain Risk Management to support Program Protection Implementation on embedded weapons systems. Join our highly visible team and perform technically challenging assignments, which will directly contribute to protecting our nation and our Warfighters. This is an onsite position at Raytheon in Fullerton, CA.
**What You Will Do**
+ Lead the patch team, ensuring on-time delivery of patches to our customer
+ Perform analysis on cybersecurity collected data and test results
+ Validate secure configuration of routers, switches, firewalls, servers, operating systems, applications, and other assets, using DoD approved scanning and assessment tools such as Nessus, STIG, Evaluate STIG, and/or RADIX
+ Create and maintain Linux Bash and Python scripts
+ Create patch artifacts such as patch media and information assurance posture reports
**Qualifications You Must Have**
+ Typically requires a Bachelor's Degree in Science, Technology, Engineering or Mathematics (STEM) and 2 years of prior relevant experience
+ Active and transferable U.S. government issued DoD Secret security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance
+ Experience in System Security Engineering, computer technology reverse engineering, cybersecurity or embedded security
**Qualifications We Prefer**
+ Experience with scrum planning and scrum tools such as Jira
+ Experience in the SSE implementation throughout the entire life cycle
+ Experience contributing to a team environment for the purpose of developing creative solutions to technical problems
+ Cyber Certifications in accordance with DoDD 8570/DoDD 8140 such as CISSP, GSLC, CEH
+ Experience supporting the development of Risk Management Framework (RMF) documents and controls validation testing for Authority to Operate (ATO) accreditations
+ Candidate must exhibit an exceptional degree of ingenuity, creativity and resourcefulness
+ Excellent communication, technical writing, oral presentation and interpersonal skills
**What We Offer**
+ Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation
+ Relocation Eligible - Relocation assistance is available
**_As part of our commitment to maintaining a secure hiring process, candidates may be asked to attend select steps of the interview process in-person at one of our office locations, regardless of whether the role is designated as on-site, hybrid or remote._**
The salary range for this role is 72,000 USD - 144,000 USD. The salary range provided is a good faith estimate representative of all experience levels.
RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.
Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.
Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.
This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.
RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
_RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act._
**Privacy Policy and Terms:**
Click on this link (******************************************************** to read the Policy and Terms
Raytheon Technologies is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.
$96k-139k yearly est. 60d+ ago
Information Systems Security Officer
CSA Global 4.3
Cyber security analyst job in Westminster, CA
Full-time Description
For nearly 50 years, CSA has delivered integrated technology and operational support services to meet the defense and federal sector's most complex enterprise needs. Working from operations centers and shipyards to training sites and program offices, CSA deploys experienced teams, innovative tools, and proven processes to advance federal missions.
Client Solution Architects (CSA) is currently seeking an Information Systems Security Officer to support a program at Grafenwoehr, Germany.
Works with System Administrators (SA), Command Information System Security Manager (ISSM), other Information System Security Officers (ISSOs), multiple Branch Heads, multiple Program Managers (PMs) and a project strategist in support of the completion of a mixture of Certification and Accreditation (C&A) boundaries consolidated into overarching master boundaries in support of information assurance policy and regulations. In addition to C&A package development, the individual will be responsible for the day-to-day operations as an ISSO.
How Role will make an impact:
Develop and maintain an organizational or system-level cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures.
Provide support to the System Owner and the ISSM for maintaining the appropriate operational IA posture for a system, program, or enclave.
Provide support to the customer on all matters involving the security of their information systems.
Assist with the management of all security aspects of the information system and as assigned performs day-to-day security operations of the system.
Assist in the development of the system security policy and ensures compliance with that policy on a routine basis.
Prepare, validate, and maintain security documentation including, but not limited to: system security plan (SSP), risk assessment (RA), contingency plan (CP), privacy impact assessment (PIA), eAuthentication assessment, FIPS categorization.
Provide configuration management for security-relevant information system software, hardware, and firmware, controlling changes to the system and assessing the security impact of those changes.
Identify and mitigate security business and system risks.
Identify and manage POA&Ms through remediation as well as develop corrective action plans for each POA&M.
Maintain a repository for all organizational or system-level cybersecurity-related documentation such as RMF processes within eMASS or other automated process.
Maintain Defense Information Technology Portfolio Registry (DITPR) for client systems and software.
Ensure implementation of Information System (IS) security measures and procedures, including reporting incidents to the Command Information System Security Manger (ISSM) and appropriate reporting chains as well as coordinating system-level responses to unauthorized disclosures in accordance with DoDM 5200.01 Vol 3 for classified information or DoDM 5200.01 Vol 4 for CUI, respectively.
Implement and enforce all DoD IS and Platform Information Technology (PIT) system cybersecurity policies and procedures, as defined by cybersecurity-related documentation.
Ensure that all users have the requisite security clearances and access authorization, and are aware of their cybersecurity responsibilities for DoD IS and PIT systems under their purview before being granted access to those systems.
In coordination with the ISSM, initiate protective or corrective measures when a cybersecurity incident or vulnerability is discovered.
Establish a process for authorized users to report all cybersecurity-related events and potential threats and vulnerabilities to the ISSO.
Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals.
Ensures proper Configuration Management procedures are followed. Prior to implementation and contingent upon necessary approval with the ISSM.
Initiates requests for temporary and permanent exception, deviations, or waivers to IA requirements such as Plan of Action and Milestones (POA&Ms).
Ensures IA and IA-enabled software, hardware and firmware comply with appropriate security configuration guides.
Provide status updates of assigned duties to the appropriate agency heads as defined in their respective Service Level Agreement (SLA).
Respond to all applicable data calls, CTO's, FRAGO's, IAVA's ,etc within the requested timeframe.
Attend all Cybersecurity Workforce Meetings when requested.
Perform as needed system administration on JLCCTC or other simulations or interface systems as needed.
Perform as needed technical operations, setup and tear down of servers, systems and integration tools; maintaining RMF compliance; providing input to exercise design and technical planning products.
Support as needed other set-up, transition, and break down for all training and training support activities pertaining to this task order.
Participate in individual training, seminars, conferences, exercise/experiment planning events, site surveys, and exercise and training events and supports the planning and preparation processes and product development as needed.
Requirements
What you'll need to join our award-winning team:
Clearance: Must possess and maintain an active U.S. Top Secret/SCI security clearance with the ability to pass a CI/Polygraph exam
Education: A bachelor's degree plus 3 years of recent related experience OR an associate's degree plus 7 years of recent related experience OR a major certification plus 7 years of recent related experience OR 11 years of recent related experience.
DoD Approved 8570 Baseline Certification for a minimum of IAM Level II.
Five (5) years' experience within the past 10 years, in planning simulation exercise architectures, supervising implementation of communication systems, and integration of Army Mission Command Systems in support of distributed exercises.
Five (5) years' experience in information technology management
What Sets you apart:
A working knowledge of RMF and the security authorization processes and procedures.
Knowledge of NIST Special Publications and their counterparts, especially SP800- 37, SP800-53, ICD 503, and CNSS 1253.
Ability to communicate clearly and present information to the customer in a format they can understand.
Experience in several of the following areas: knowledge of current security tools, hardware and software security implementation; different communication protocols; and encryption techniques/tools.
Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services.
Must be able to prioritize tasks, deliver solutions on time and be a team player with the ability to work independently and proactively while being flexible and prioritizing competing priorities, often under time constraints.
Have strong analysis, oral and written communication, and change management skills with ability to plan, organize, prioritize, track, manage, and learn new skills.
It is preferred that a candidate have at least one year of experience under the DoD Information Assurance Certification and Accreditation Process (DIACAP) and/or Risk Management Framework (RMF) accreditation process and has a familiarity with Enterprise Mission Assurance Support Service (eMASS).
Technical familiarity with Windows 7 Enterprise/Windows 10 Professional, Windows Server 2012, and Red Hat Linux.
Experience with providing IA or IT support to a US Army client desirable, but not required.
Proficiency with using the Internet and with Microsoft Office products including e-mail, Word, Excel, Access and Project is required.
Outstanding work ethic and personal integrity.
Superior analytical and problem-solving skills.
Ability to document and update processes.
Ability to perform tasks under deadlines.
Ability to work with senior Government and Industry leaders.
Possess a very high degree of attention to detail.
Capable of working at a computer terminal for extended periods.
Ability to work 12-hour shifts, day or night, for consecutive days up to 4 weeks. • Outstanding interpersonal and written communication skills.
$78k-109k yearly est. 60d+ ago
Information Security Analyst
Vesync
Cyber security analyst job in Tustin, CA
Job DescriptionThe Company: VeSync is a portfolio company with brands that cover different categories of health & wellness products. We wouldn't be surprised if you have one of our Levoit air purifiers in your living room or a COSORI air fryer whipping up healthy and delicious meals for you every night.
We're a young and energetic company, we've had tremendous success, and we are constantly growing our team. As we garner more industry attention - just check out our accomplishments and awards by CES Innovation, iF Design, IGA, and Red Dot - we also need driven and talented people to join our team.
That brings us to you, and what you'll be joining. Our teams are smart and diligent and take ownership of their work - they're confident in their work but know how to collaborate with open ears and a spirit of learning. If you're down-to-earth, approachable, and easy to strike up a conversation with, this may be a great fit for you.
Check out our brands:levoit.com \u007C cosori.com \u007C etekcity.com
The Opportunity:
The Information SecurityAnalyst is responsible for supporting the organization's security posture by implementing, monitoring, and maintaining security controls across systems, networks, and cloud environments. This role works closely with senior security team members to identify risks, respond to incidents, and ensure compliance with security standards and regulatory requirements.What you will do at VeSync:
Information Security Operations & Planning
Support the implementation and maintenance of information security controls to protect company data and assets across on-premise and cloud environments.
Assist in analyzing business processes, systems, and data flows to identify security gaps and improvement opportunities.
Apply industry best practices and frameworks such as the NIST Cybersecurity Framework (CSF) to support confidentiality, integrity, and availability of information assets.
Policy Support & Compliance
Assist in the development, implementation, and maintenance of information security policies, standards, and procedures.
Support compliance efforts with industry standards and regulations (e.g., ISO 27001, NIST, GDPR).
Help track evidence and controls using compliance and GRC tools such as OneTrust, Drata, or similar platforms.
Monitor regulatory and security trends and escalate relevant changes to senior team members.
System, Network, and Cloud Security
Monitor and help maintain security controls for systems, networks, and public cloud platforms (AWS, Azure, GCP).
Assist with configuration, monitoring, and tuning of cloud security services and tools.
Use security tools and dashboards (e.g., SIEM, security scorecards) to identify potential threats and vulnerabilities.
Support AWS security services and baseline configurations.
Security Monitoring & Incident Response
Monitor security alerts and events using SIEM and security monitoring tools.
Participate in incident response activities, including investigation, containment, remediation, and post-incident analysis.
Assist with blue team activities, tabletop exercises, and response drills to improve readiness.
Document incidents and lessons learned.
Identity & Access Management
Support user access reviews, permission audits, and access control processes.
Assist with identity management systems to ensure appropriate authentication and authorization controls.
Help identify and remediate excessive or inappropriate access.
Risk Assessment & Vulnerability Management
Participate in risk assessments and vulnerability identification efforts.
Assist with vulnerability scanning, tracking, and remediation coordination.
Support risk documentation and reporting aligned with frameworks such as NIST CSF.
Help track and report basic security metrics and KPIs.
Security Awareness & Documentation
Support the delivery of security awareness training and phishing simulations.
Assist in developing security documentation, including procedures, controls, detection rules, and response playbooks.
Maintain clear and accurate security documentation for audits and operational use.
What you bring to the role:
Bachelor's degree in Information Security, Computer Science, or a related field (or equivalent experience).
3-6 years of experience in information security or a related IT/security role.
Hands-on experience with security monitoring, incident response, vulnerability management, or risk assessment.
Familiarity with cloud environments (AWS, Azure, or GCP) and basic cloud security concepts.
Working knowledge of security frameworks and standards such as NIST CSF, ISO 27001, and CIS.
Understanding of network security fundamentals, including firewalls, IDS/IPS, endpoint protection, and logging.
Experience with SIEM or security monitoring tools such as Splunk, QRadar, Rapid7, or Wazuh.
Strong analytical, troubleshooting, and communication skills.
Preferred Qualifications
Experience supporting compliance or audit activities.
Familiarity with GRC or compliance automation tools (OneTrust, Drata, or similar).
Relevant security certifications such as Security+, CEH, GSEC, or progress toward CISSP/CISM.
Location:
This is an on-site, office-based role in Tustin, CA.
Salary:
Starting at $90K Annually
Perks and Benefits:
100% covered Medical/Dental/Vision insurance for employee AND spouse + dependents!
401K with 4% employer match (eligible after 90 days of employment) and immediate 100% vesting
Generous PTO policy + paid holidays
Life Insurance
Voluntary Life Insurance
Disability Insurance
Critical Illness Coverage
Accident Insurance
Healthcare FSA
Dependent Care FSA
Travel Assistance Program
Employee Assistance Program (EAP)
Fully stocked kitchen
$90k yearly 2d ago
Application Security Engineer
Alignment Healthcare 4.7
Cyber security analyst job in Orange, CA
Alignment Health is breaking the mold in conventional health care, committed to serving seniors and those who need it most: the chronically ill and frail. It takes an entire team of passionate and caring people, united in our mission to put the senior first. We have built a team of talented and experienced people who are passionate about transforming the lives of the seniors we serve. In this fast-growing company, you will find ample room for growth and innovation alongside the Alignment Health community. Working at Alignment Health provides an opportunity to do work that really matters, not only changing lives but saving them. Together.
This position is responsible for identifying, analyzing, and helping with remediate security vulnerabilities within our applications. This role requires a strong understanding of application security principles, hands-on experience with various security testing methodologies, and excellent communication skills to collaborate effectively with development teams and other stakeholders.
Job Responsibilities:
Conduct static application security testing (SAST), dynamic application security testing (DAST), and interactive application security testing (IAST) on a continuous basis.
Identify, triage, and validate security vulnerabilities using both automated tools and manual review.
Work closely with software development and DevOps teams to provide clear, actionable guidance on how to fix vulnerabilities and implement secure coding practices.
Help integrate security controls and checks into the software development lifecycle (SDLC) and CI/CD pipelines.
Drive and support application security reviews and threat modeling.
Manage and configure a suite of application security tools, ensuring their effective use and reporting.
Stay up-to-date with the latest security threats, trends, and technologies, and conduct research on new vulnerabilities and attack vectors.
Contribute to the creation and maintenance of application security policies, standards, and procedures to guide development teams and ensure compliance.
Develop and deliver security awareness and secure coding training to engineering teams.
Support and lead third-party penetration testing.
Job Requirements:
Experience:
Required:
5-7+ years of progressive experience in information security, with a strong focus on application security testing and vulnerability management.
Proven track record of working directly with developers and engineering teams to identify and remediate security vulnerabilities in a fast-paced environment.
Experience in a large-scale enterprise environment with complex application portfolios.
Preferred:
Experience in healthcare or another highly regulated field.
Education:
Required:
Bachelor's degree or equivalent work experience in Computer Science, Information Security, or a related technical discipline.
Preferred:
Relevant professional certifications such as Offensive Security Certified Professional (OSCP), GIAC Web Application Penetration Tester (GWAPT), or Certified Secure Software Lifecycle Professional (CSSLP) are highly desirable.
ISC2 Certified Information Systems Security Professional (CISSP)
Specialized Skills:
Required:
Experience with general threat hunting techniques and tools.
Experience with one or more programming languages (i.e., C#, Scala, Python).
Essential Physical Functions:
The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
1. While performing the duties of this job, the employee is regularly required to talk or hear. The employee regularly is required to stand, walk, sit, use hand to finger, handle or feel objects, tools, or controls; and reach with hands and arms.
2. The employee frequently lifts and/or moves up to 10 pounds. Specific vision abilities required by this job include close vision and the ability to adjust focus.
Pay Range: $113,332.00 - $169,999.00
Pay range may be based on a number of factors including market location, education, responsibilities, experience, etc.
Alignment Health is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, age, protected veteran status, gender identity, or sexual orientation.
*DISCLAIMER: Please beware of recruitment phishing scams affecting Alignment Health and other employers where individuals receive fraudulent employment-related offers in exchange for money or other sensitive personal information. Please be advised that Alignment Health and its subsidiaries will never ask you for a credit card, send you a check, or ask you for any type of payment as part of consideration for employment with our company. If you feel that you have been the victim of a scam such as this, please report the incident to the Federal Trade Commission at ******************************* If you would like to verify the legitimacy of an email sent by or on behalf of Alignment Health's talent acquisition team, please email ******************.
$113.3k-170k yearly Auto-Apply 60d+ ago
Sr. Security Compliance Analyst
TP-Link Systems Inc. 3.9
Cyber security analyst job in Irvine, CA
Job Description
Headquartered in the United States, TP-Link Systems Inc. is a leading global provider of networking devices and smart home products. Consistently ranked as the world's top provider of Wi-Fi devices, TP-Link is dedicated to delivering innovative solutions that improve people's lives by offering faster, more reliable connectivity. Serving customers in over 170 countries, we are committed to expanding our global footprint.
At TP-Link Systems Inc., we believe that technology has the power to transform the world for the better. Our mission is to design reliable, high-performance products that connect users worldwide to the limitless possibilities of technology.
We are driven by our core values of professionalism, innovation, excellence, and simplicity. Our goal is to help clients achieve outstanding global performance and to provide consumers with a seamless, effortless technology experience.
TP-Link Systems Inc. is seeking a skilled and proactive Sr. Security Compliance Analyst who will be responsible for developing and overseeing TP-Link's enterprise security governance framework, ensuring compliance with regulatory requirements, industry standards, and internal policies. This individual will collaborate with cross-functional teams to embed security into business operations, manage risk, and enhance security resilience across TP-Link's enterprise ecosystem.
Key Responsibilities:
Security Governance & Policy Development
Develop, implement, and maintain security policies, standards, and guidelines aligned with industry best practices (e.g., NIST, ISO 27001, CIS).
Establish and lead a security governance framework to ensure consistent application of security controls across the enterprise.
Risk Management & Compliance
Identify, assess, and mitigate security risks across TP-Link's global operations.
Ensure compliance with regulatory requirements such as GDPR, CCPA, NIST CSF, and other applicable cybersecurity frameworks.
Oversee security audits, risk assessments, and third-party security evaluations.
Partner with legal, IT, and business leaders to address security compliance gaps.
Third-Party & Supply Chain Security
Develop and enforce security requirements for vendors, suppliers, and third-party partners.
Conduct security assessments of supply chain partners to identify and mitigate potential risks.
Security Awareness & Training
Develop and lead security awareness programs to educate employees on cybersecurity risks and best practices.
Foster a security-first culture across all levels of the organization.
Provide guidance and training on security governance processes for internal stakeholders.
Incident Response & Continuous Improvement
Support security incident response efforts by ensuring governance processes facilitate rapid detection and response.
Lead post-incident analysis to refine security policies and controls.
Monitor emerging threats, regulatory changes, and industry trends to evolve TP-Link's security governance strategies.
Requirements
Qualifications Education:
Bachelor's degree in Computer Science, Cybersecurity, Information Security, or a related field.
Experience:
5+ years of experience in security governance, risk management, or compliance in a global technology or networking company.
Proven track record in developing and implementing security governance frameworks for enterprise security.
Experience managing compliance with industry standards and regulations (ISO 27001, NIST CSF, SOC 2, GDPR, CCPA, etc.).
Hands-on experience with supply chain security, third-party risk management, and vendor security assessments.
Skills:
Deep understanding of security frameworks (ISO 27001, NIST, CIS, SOC 2) and regulatory requirements.
Strong expertise in risk management methodologies, security policy development, and compliance auditing.
Proficient in conducting security assessments, third-party risk evaluations, and internal security reviews.
Ability to communicate complex security concepts to business and technical stakeholders effectively.
Strong leadership skills with experience in cross-functional collaboration and executive reporting.
Benefits
Salary range: $100,000-$150,000
Free snacks and drinks, and provided lunch on Fridays
Fully paid medical, dental, and vision insurance (partial coverage for dependents)
Contributions to 401k funds
Bi-annual reviews, and annual pay increases
Health and wellness benefits, including free gym membership
Quarterly team-building events
At TP-Link Systems Inc., we are continually searching for ambitious individuals who are passionate about their work. We believe that diversity fuels innovation, collaboration, and drives our entrepreneurial spirit. As a global company, we highly value diverse perspectives and are committed to cultivating an environment where all voices are heard, respected, and valued. We are dedicated to providing equal employment opportunities to all employees and applicants, and we prohibit discrimination and harassment of any kind based on race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state, or local laws. Beyond compliance, we strive to create a supportive and growth-oriented workplace for everyone. If you share our passion and connection to this mission, we welcome you to apply and join us in building a vibrant and inclusive team at TP-Link Systems Inc.
Please, no third-party agency inquiries, and we are unable to offer visa sponsorships at this time.
$100k-150k yearly 9d ago
Sr. Information Security GRC Analyst
Loandepot 4.7
Cyber security analyst job in Irvine, CA
at loan Depot
Responsible for driving the development, implementation, communication, and maintenance of loan Depot's technology policies, standards and procedures that are aligned to industry standards and regulatory requirements. Ensures that loan Depot technology processes adheres to regulatory requirements, manages risks effectively, and establishes strong governance practices. Develops and implements controls, monitors compliance, and supports risk management activities.
Responsibilities:
Leads the development and implementation of comprehensive cybersecurity and IT policies, standards, and guidelines.
Continuously evaluates and updates cybersecurity and IT policies to ensure they remain current and effective.
Ensures policies comply with relevant laws, regulations, and industry standards (e.g., NIST, FFIEC, GLBA, NYDFS, SOX and PCI-DSS).
Collaborates with teams, working closely with IT, legal, compliance, and other departments, to gain a deep understanding of business needs to ensure cybersecurity policies align with business objectives.
Transforms complex information and documentation into simple concepts that are easy to understand by the end-users.
Offers specialized expertise and consultation to cross-functional teams to perform framework-oriented risk assessments, identify deficiencies, generate reports, and recommends prioritized, actionable solutions to mitigate risks and enhance loan Depot's overall security posture.
Stays informed about the latest cybersecurity threats, trends, and best practices. Ensures accurate and up-to-date records of policy reviews, risk assessments, training activities, and incident responses.
Benchmarks the organization's policies against industry standards and best practices.
Develops and implements governance frameworks for cybersecurity policy management.
Monitors key performance indicators, conducts gap analysis, risk assessments and implements frameworks, as needed. Tests and monitors effectiveness of controls.
Establishes a feedback loop and analyzes metrics to continuously improve cybersecurity policies based on audit findings, incident reviews, and emerging threats.
Actively leads and supports on internal and external audits and assessments of cybersecurity policies and practices. Accountable for ensuring identified audit and assessment findings and actions are tracked to closure.
Maintains comprehensive documentation of all cybersecurity policies, procedures, and related activities. Communicates policy requirements and updates to all relevant stakeholders.
Identifies opportunities for innovation and improvement in cybersecurity policy and practice. Proposes suitable mitigation strategies and verifies the effectiveness of remediation plans
Requirements:
Bachelor's Degree in Information Security, Computer Science, Information Technology, or a related field preferred.
Minimum of six (6) + years' experience working in Cybersecurity GRC, policy development, risk management, or a similar field.
Experience with GRC tools (e.g., Archer, ServiceNow, OneTrust).
Proficiency in using data analysis and reporting tools (e.g., Excel, Power BI).
Relevant certifications such as CISM and/or CISA are highly desirable.
Why work for #teamloan Depot:
Competitive compensation package based on experience, skillset and overall fit for #TeamloanDepot.
Inclusive, diverse, and collaborative culture where people from all backgrounds can thrive
Work with other passionate, purposeful, and customer-centric people
Extensive internal growth and professional development opportunities including tuition reimbursement
Comprehensive benefits package including Medical/Dental/Vision
Wellness program to support both mental and physical health
Generous paid time off for both exempt and non-exempt positions
About loan Depot:
loan Depot (NYSE: LDI) is a digital commerce company committed to serving its customers throughout the home ownership journey. Since its launch in 2010, loan Depot has revolutionized the mortgage industry with a digital-first approach that makes it easier, faster, and less stressful to purchase or refinance a home. Today, as the nation's second largest non-bank retail mortgage lender, loan Depot enables customers to achieve the American dream of homeownership through a broad suite of lending and real estate services that simplify one of life's most complex transactions. With headquarters in Southern California and offices nationwide, loan Depot is committed to serving the communities in which its team lives and works through a variety of local, regional, and national philanthropic efforts. Base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay for this role is between $99,000 and $136,500. Your base pay will depend on multiple individualized factors, including your job-related knowledge/skills, qualifications, experience, and market location. We are an equal opportunity employer and value diversity in our company. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
$99k-136.5k yearly Auto-Apply 60d+ ago
Senior Security Engineer
Goodleap 4.6
Cyber security analyst job in Irvine, CA
About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America.
Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information.
The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services.
Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response.
Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed.
While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities
Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes.
Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements.
Support or develop components of the security analytics platform.
Contribute to investigations, threat hunting, and incident response activities in a supporting role.
Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns.
Support the security operations team with the vulnerability management lifecycle for products and services under your purview.
Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities.
Required Skills, Knowledge & Abilities
Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences.
Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization.
Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments.
Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus).
Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble.
Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc.
Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases.
Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault.
Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed.
Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas.
Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments.
Experience engaging with vendors in design partnerships.
Experience overseeing vulnerability and threat management at the platform and application levels.
Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement.
Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution.
In addition to the above salary, this role may be eligible for a bonus. Additional Information Regarding Job Duties and s:
Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law.
If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today!
We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.
$114k-145k yearly est. 4d ago
Information Security Analyst
Vesync
Cyber security analyst job in Tustin, CA
The Company: VeSync is a portfolio company with brands that cover different categories of health & wellness products. We wouldn't be surprised if you have one of our Levoit air purifiers in your living room or a COSORI air fryer whipping up healthy and delicious meals for you every night.
We're a young and energetic company, we've had tremendous success, and we are constantly growing our team. As we garner more industry attention - just check out our accomplishments and awards by CES Innovation, iF Design, IGA, and Red Dot - we also need driven and talented people to join our team.
That brings us to you, and what you'll be joining. Our teams are smart and diligent and take ownership of their work - they're confident in their work but know how to collaborate with open ears and a spirit of learning. If you're down-to-earth, approachable, and easy to strike up a conversation with, this may be a great fit for you.
Check out our brands:levoit.com | cosori.com | etekcity.com
The Opportunity:
The Information SecurityAnalyst is responsible for supporting the organization's security posture by implementing, monitoring, and maintaining security controls across systems, networks, and cloud environments. This role works closely with senior security team members to identify risks, respond to incidents, and ensure compliance with security standards and regulatory requirements.What you will do at VeSync:
Information Security Operations & Planning
Support the implementation and maintenance of information security controls to protect company data and assets across on-premise and cloud environments.
Assist in analyzing business processes, systems, and data flows to identify security gaps and improvement opportunities.
Apply industry best practices and frameworks such as the NIST Cybersecurity Framework (CSF) to support confidentiality, integrity, and availability of information assets.
Policy Support & Compliance
Assist in the development, implementation, and maintenance of information security policies, standards, and procedures.
Support compliance efforts with industry standards and regulations (e.g., ISO 27001, NIST, GDPR).
Help track evidence and controls using compliance and GRC tools such as OneTrust, Drata, or similar platforms.
Monitor regulatory and security trends and escalate relevant changes to senior team members.
System, Network, and Cloud Security
Monitor and help maintain security controls for systems, networks, and public cloud platforms (AWS, Azure, GCP).
Assist with configuration, monitoring, and tuning of cloud security services and tools.
Use security tools and dashboards (e.g., SIEM, security scorecards) to identify potential threats and vulnerabilities.
Support AWS security services and baseline configurations.
Security Monitoring & Incident Response
Monitor security alerts and events using SIEM and security monitoring tools.
Participate in incident response activities, including investigation, containment, remediation, and post-incident analysis.
Assist with blue team activities, tabletop exercises, and response drills to improve readiness.
Document incidents and lessons learned.
Identity & Access Management
Support user access reviews, permission audits, and access control processes.
Assist with identity management systems to ensure appropriate authentication and authorization controls.
Help identify and remediate excessive or inappropriate access.
Risk Assessment & Vulnerability Management
Participate in risk assessments and vulnerability identification efforts.
Assist with vulnerability scanning, tracking, and remediation coordination.
Support risk documentation and reporting aligned with frameworks such as NIST CSF.
Help track and report basic security metrics and KPIs.
Security Awareness & Documentation
Support the delivery of security awareness training and phishing simulations.
Assist in developing security documentation, including procedures, controls, detection rules, and response playbooks.
Maintain clear and accurate security documentation for audits and operational use.
What you bring to the role:
Bachelor's degree in Information Security, Computer Science, or a related field (or equivalent experience).
3-6 years of experience in information security or a related IT/security role.
Hands-on experience with security monitoring, incident response, vulnerability management, or risk assessment.
Familiarity with cloud environments (AWS, Azure, or GCP) and basic cloud security concepts.
Working knowledge of security frameworks and standards such as NIST CSF, ISO 27001, and CIS.
Understanding of network security fundamentals, including firewalls, IDS/IPS, endpoint protection, and logging.
Experience with SIEM or security monitoring tools such as Splunk, QRadar, Rapid7, or Wazuh.
Strong analytical, troubleshooting, and communication skills.
Preferred Qualifications
Experience supporting compliance or audit activities.
Familiarity with GRC or compliance automation tools (OneTrust, Drata, or similar).
Relevant security certifications such as Security+, CEH, GSEC, or progress toward CISSP/CISM.
Location:
This is an on-site, office-based role in Tustin, CA.
Salary:
Starting at $90K Annually
Perks and Benefits:
100% covered Medical/Dental/Vision insurance for employee AND spouse + dependents!
401K with 4% employer match (eligible after 90 days of employment) and immediate 100% vesting
Generous PTO policy + paid holidays
Life Insurance
Voluntary Life Insurance
Disability Insurance
Critical Illness Coverage
Accident Insurance
Healthcare FSA
Dependent Care FSA
Travel Assistance Program
Employee Assistance Program (EAP)
Fully stocked kitchen
$90k yearly Auto-Apply 2d ago
Information Security Analyst
Cathay Bank 4.4
Cyber security analyst job in Rancho Cucamonga, CA
This position is responsible for ensuring that the Bank's Security operations and preventive controls are managed and maintained in accordance with established Information Security policies, standards and procedures, published regulations and industry best practices.
Primarily responsible for the constant review of vendor security controls in comparison with policies and industry frameworks, risk assessments, determination of control gaps and their remediation.
ESSENTIAL FUNCTIONS
Performs vendor security risk assessments to determine inherent risk on proposed projects and assesses vendor security controls to determine residual risk.
Evaluates the potential exposure to application security risks and threats based on industry security frameworks and recommends appropriate mitigation.
Assesses security practices including Information Security governance, Identity and access control, Incident monitoring and response, Vulnerability assessment and Penetration tests, Network Security and Endpoint Security, among others.
Acts as liaison with Third Party Risk Management, Information Technology and business department Relationship Managers related to vendor risk assessments.
Reports information security risks and follows-up remediations.
Remediates audit and regulatory findings and recommendations related to Information Security and Vendor Risk Management.
QUALIFICATIONS
Education:
College degree in Information Technology or Information Security or equivalent;
Security+, SSCP, CISSP, CISM or similar information security certifications preferred.
Experience:
Minimum two years of experience in Information Security Risk, Information Security Operations or Security Auditing.
Proven experience on third-party risk management and vendor security assessments.
Working knowledge of security practices such as Endpoint Security, Network Security, Security Operations and Security Governance required.
Experience working with Vendor Risk Management (VRM) applications preferred.
Skills/Ability:
Proven ability to initiate and manage projects.
Excellent communication and problem-solving skills.
Strong inter-personal communication and collaboration skills.
Self-starter, highly motivated, and able to work with general supervision.
OTHER DETAILS
$28.84 - $33.65 / hour
Pay determined based on job-related knowledge, skills, experience, and location.
This position may be eligible for a discretionary bonus.
$28.8-33.7 hourly 6d ago
Senior Security Engineer
Goodleap 4.6
Cyber security analyst job in Irvine, CA
About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America.
Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information.
The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services.
Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response.
Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed.
While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities
Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes.
Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements.
Support or develop components of the security analytics platform.
Contribute to investigations, threat hunting, and incident response activities in a supporting role.
Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns.
Support the security operations team with the vulnerability management lifecycle for products and services under your purview.
Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities.
Required Skills, Knowledge & Abilities
Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences.
Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization.
Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments.
Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus).
Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble.
Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc.
Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases.
Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault.
Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed.
Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas.
Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments.
Experience engaging with vendors in design partnerships.
Experience overseeing vulnerability and threat management at the platform and application levels.
Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement.
Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution.
Additional Information Regarding Job Duties and s:
Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law.
If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today!
We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
$114k-145k yearly est. Auto-Apply 60d+ ago
Information Security Analyst
Cathay General Bancorp 4.4
Cyber security analyst job in Rancho Cucamonga, CA
This position is responsible for ensuring that the Bank's Security operations and preventive controls are managed and maintained in accordance with established Information Security policies, standards and procedures, published regulations and industry best practices.
Primarily responsible for the constant review of vendor security controls in comparison with policies and industry frameworks, risk assessments, determination of control gaps and their remediation.
ESSENTIAL FUNCTIONS
Performs vendor security risk assessments to determine inherent risk on proposed projects and assesses vendor security controls to determine residual risk.
Evaluates the potential exposure to application security risks and threats based on industry security frameworks and recommends appropriate mitigation.
Assesses security practices including Information Security governance, Identity and access control, Incident monitoring and response, Vulnerability assessment and Penetration tests, Network Security and Endpoint Security, among others.
Acts as liaison with Third Party Risk Management, Information Technology and business department Relationship Managers related to vendor risk assessments.
Reports information security risks and follows-up remediations.
Remediates audit and regulatory findings and recommendations related to Information Security and Vendor Risk Management.
QUALIFICATIONS
Education:
College degree in Information Technology or Information Security or equivalent;
Security+, SSCP, CISSP, CISM or similar information security certifications preferred.
Experience:
Minimum two years of experience in Information Security Risk, Information Security Operations or Security Auditing.
Proven experience on third-party risk management and vendor security assessments.
Working knowledge of security practices such as Endpoint Security, Network Security, Security Operations and Security Governance required.
Experience working with Vendor Risk Management (VRM) applications preferred.
Skills/Ability:
Proven ability to initiate and manage projects.
Excellent communication and problem-solving skills.
Strong inter-personal communication and collaboration skills.
Self-starter, highly motivated, and able to work with general supervision.
OTHER DETAILS
$28.84 - $33.65 / hour
Pay determined based on job-related knowledge, skills, experience, and location.
This position may be eligible for a discretionary bonus.
How much does a cyber security analyst earn in San Bernardino, CA?
The average cyber security analyst in San Bernardino, CA earns between $70,000 and $133,000 annually. This compares to the national average cyber security analyst range of $66,000 to $117,000.
Average cyber security analyst salary in San Bernardino, CA