Cyber security Operations Analyst
Cyber security analyst job in San Diego, CA
Duties and Responsibilities
Maintain and operate cybersecurity technology and and provide expertise in area of focus (e.g. Risk Assessments, Controls Engineering or Incident Response).
Collaborates with the business to understand their needs in order to tailor security offerings unique to their environment.
Uses working knowledge of IT system functionality, architecture and capabilities to effectively diagnose and troubleshoot issues with some assistance.
Conducts competitive analyses on (in-use and alternative) cyber technologies and documents recommendations for our environment.
Provides awareness and guidance within Sempra Infrastructure community on secure business processes, architecture design, and technical controls.
Maintains awareness of evolving cybersecurity threats and best practices for mitigation.
Develops procedures and guidelines for implementing information security systems and practices.
Develops and aggregates metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
Performs other duties as assigned (no more than 5% of duties).
Education
Bachelor's degree in Computer Science or other science or technology major or equivalent experience required.
Experience
Minimum of 2-5 years of direct experience within the information security field required.
In-depth experience in at least one cybersecurity discipline required.
Experience with projects of moderately sized security related initiatives to successful completion required.
Demonstrated experience in vendor selection, testing, implementation, and operations of a broad array of security technologies required.
Knowledge, Skills and Abilities
Familiarization with Endpoint protection software such as Trellix and Microsoft Defender.
Familiarization in deploying vulnerability management agents.
Experience deploying logging agents and configurations.
Knowledge of firewalls and security zone.
Experience working in an Operation Technology (OT), ICS / SCADA environment.
Experience with SCADA network protocols.
Experience with OT network monitoring tools (such as but not limited to: Dragos, Cybervision, CyberX).
Ability to take initiative and work independently when needed.
Ability to maintain, upgrade and recommend operational cybersecurity tools.
Ability to work with Cybersecurity OT Engineering to make recommendations for new tools and capabilities.
Ability to work effectively on multiple projects within a team structure and excellent written and oral communication skills.
Licenses and Certifications
Certified Information Systems Security Professional (CISSP) certification, Global Information Security Professional (GISP) certification, Global Information Assurance Certification (GIAC), Certified Information Systems Auditor (CISA), or Certified Internal Auditor (CIA) certificate preferred.
Targeted professional cybersecurity certifications (i.e. forensics and incident response) preferred.
Other Qualifications
Bilingual in English/Spanish preferred.
Cyber Security Analyst (MSSP/SOC)
Cyber security analyst job in San Diego, CA
Hey there, Rockstar! 🚀 We are looking for you!
At Agile IT, we help organizations thrive by making technology simple, secure, and strategic. As a trusted Microsoft partner and CMMC Registered Practitioner Organization (RPO), we specialize in guiding businesses through the complexities of cloud adoption, cybersecurity, and compliance, so they can focus on achieving their mission without being slowed down by IT challenges.
We combine deep technical expertise with a people-first approach to deliver solutions that actually work in the real world. From CMMC compliance and security to cloud migration, collaboration, and ongoing managed services, Agile IT empowers organizations to modernize with confidence and agility.
Why Work at Agile IT?
Impactful Work: Everything you touch helps to keep our nation's secrets secure while also helping our client organizations thrive, making technology a true enabler instead of a roadblock.
Culture of Growth: We're a team of curious learners and problem-solvers, and we invest in developing your expertise through training, certifications, and hands-on experience.
Flexibility & Balance: With a remote-friendly environment and a people-first approach, you get the freedom to do your best work while living your best life.
Collaborative Team: At Agile IT, you're surrounded by passionate professionals who support one another and celebrate success together.
Forward-Thinking Mindset: We stay ahead of industry shifts so our team and our clients are always future-ready.
Joining Agile IT means being part of a company that isn't just adapting to the future of IT-it's shaping it.
Job Description
At Agile IT, supporting CMMC-compliant environments means we don't just fix problems-we prevent them.
As a Security Analyst at Agile IT, you'll play a critical role in safeguarding our clients. You'll monitor and analyze security events, investigate incidents, and collaborate with senior engineers and architects to deliver world-class managed security services. This is an excellent platform to sharpen your analytical and technical skills while protecting clients in today's ever-changing threat landscape. This position is designed to nurture your career growth, providing a pathway into the dynamic and evolving field of cybersecurity operations and defense.
What you do: (major responsibilities)
Monitor and analyze security events across client environments.
Investigate alerts, perform triage, and escalate incidents when needed.
Conduct threat analysis and provide actionable recommendations to reduce risk.
Assist in incident response activities, including root cause analysis and reporting.
Tune and improve detection rules and security use cases to enhance visibility.
Communicate findings clearly to both technical and non-technical stakeholders.
Stay up to date on emerging threats, vulnerabilities, and trends.
Qualifications
What sets you apart: (qualifications-knowledge, skills, and abilities)
2+ years of experience in a SOC/NOC or MSSP in cybersecurity; OR 5+ years of experience in cybersecurity operations role.
Familiarity with SIEM tools (Sentinel, Splunk, QRadar, etc.).
Strong understanding of networking, firewalls, IDS/IPS, and endpoint protection.
Knowledge of security frameworks such as MITRE ATT&CK, NIST, or CIS Controls.
Excellent problem-solving and communication skills.
A collaborative mindset with the ability to work across teams and with customers.
Nice to have skills: (preferred skills or skills that will be expected to learn)
Certifications such as SC-200, Network+, Security+, CySA+, CEH, CISSP, or equivalent.
Experience with Microsoft Security tools (Defender, Sentinel, Purview, Entra).
Exposure to cloud platforms (Microsoft Azure, AWS, Google Cloud).
Familiarity with compliance frameworks (CMMC, NIST 800-171, HIPAA, ISO 27001).
Additional Information
A writing sample will be requested from candidates who are chosen to move forward in the interview process.
THE FINE PRINT:
Compensation and Benefits
*Pay range is $62,400 to $83,200 per year.
Starting pay is generally lower to mid-range; based on experience.
This is a remote, full-time, non-exempt position.
Medical/Dental/Vision/STD/LTD
Remote mental and physical health networks
$200,000 basic life insurance
Voluntary life
401(k) with 3% employer contribution - no vesting period
Combined 18 days PTO increasing with tenure
9 paid holidays
And so much more
*Factors in determining the appropriate compensation for a role include experience, skills, knowledge, abilities, education, licensure and certifications, and other business and organizational needs. The Hiring Pay Scale referenced in the job posting is the budgeted salary or hourly range that Agile IT reasonably expects to pay for this position.
Background checks, pre-employment aptitude, and skills testing are a mandatory part of the recruitment process. All Agile IT employees are provided with laptops and home office equipment. Due to the contractual requirements of our work with government entities, all hires must be US Citizens.
We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. All your information will be kept confidential according to EEO guidelines.
Principal Industrial Security Analyst
Cyber security analyst job in San Diego, CA
RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: PolygraphTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Mission Systems is seeking a Principal Industrial Security Analyst to support multiple programs under our Communication Solutions business unit as it relates to all applicable classified federal, contractual, customer and company requirements. The responsibilities include, but are not limited to the following: supporting a fast-paced environment; create, maintain and leverage working relationships with internal and external customers. Develops, and administers security programs and procedures for classified or proprietary materials, documents, and equipment.
Experience in program security, with knowledge of implementing a multi-disciplined security program (access control, personnel security, physical security, OPSEC etc.). Studies and implements federal security regulations that apply to company operations. Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies. Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitor's access to restricted records and materials. Conducts security education classes and related briefings. Investigates security violations and prepares reports specifying preventive action to be taken. Working knowledge of DoD 5205.07 SAP Manuals volumes 1-4, ICD 705, ICDs, and/or NISPOM applicable sponsor procedures.
Basic Qualifications:
Current Active TS/SCI Poly clearance.
In-scope investigation (T5, T5R, SSBI, SBPR, PPR) completed within last 6 years or current enrollment in Continuous Evaluation (CE) program +CI Poly
Ability to meet enhanced security requirements and obtain/maintain SAP eligibility and access.
US Citizenship Required.
5+ Years of CPSO, CSSO, or relevant experience with Bachelors; or 3+ Years CPSO, CSSO, or relevant experience with Masters; an additional 4 years of applicable work experience may be substituted for Bachelor's Degree.
Preferred Qualifications:
CDSE Industrial Security Training - FSO for Possessing Facilities, Intro to SAP, SAP Compliance, SAP Mid-Level, etc.
Experience working in Classified Lab and Manufacturing environments is a PLUS
Industrial Security Professional Certifications - SPeD SFPC, NCMS ISP, etc.
Experience with customer high side networks to include CV2, CORE, CNET, JADE, ASCEND, SIC, etc.
OPSEC and Program Protection (P2) experience.
Classification review experience.
Experience completing compliance self-inspections and supporting formal customer compliance inspections.
Experience drafting and completing corrective action plans.
Self-starter with minimal supervision.
Excellent customer service and communication skills.
Ability to work independently and follow projects through to completion.
Ability to maintain flexibility to deal with changing priorities and deadlines.
Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint).
Primary Level Salary Range: $91,200.00 - $136,800.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplyCyber Security Engineer III
Cyber security analyst job in San Diego, CA
Location: San Diego CARequired Clearance: Secret Certifications: DoD 8570.01-M in accordance with (IAW) DFARS ************ Baseline Certification, minimum IAT Level III Required Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent to above disciplines Required Experience: Ten (10) years of full-time professional experience
Position Description:
PingWind is seeking the right fit to join a team of Cyber professionals as they support critical functions to provide Cyber Security for the Navy's network. You will ensure the highest level of cyber security by implementing STIGS, performing scans using tools such as ACAS, and tracking/patching/mitigating vulnerability findings. You will monitor and act upon situations involving Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS). Key goal is to ensure the warfighter can achieve their mission without the interference of adversaries and opportunistic hackers. Work is performed in support of Naval Surface Warfare Center (NSWC), DAHLGREN DIVISION in Virgina Beach as it conducts Research, Development, Test & Evaluation (RDT&E), analysis, systems engineering, integration, and certification of complex Department of Defense systems.
Primary Responsibilities:
Level III: Ten (10) years of full-time professional experience performing system hardening with demonstrated experience in the following areas:• Interrupting, implementing, tracking and reporting security measures such as STIGs and high impact vulnerability software patching• Monitoring firewalls and overall network for intrusion detection and prevention; acting on security events as they happen and reporting to senior leaders• Involvement in the Navy ATO process to ensure all security risks are removed, mitigated or avoided• Research and tackle security risks as they arise; understand the risk involved, recommend strategies to deal with them, and track/brief risks to leadership, keeping all stakeholders informed until an issue is resolved.
Required Qualifications:
• Secret• DoD 8570.01-M in accordance with (IAW) DFARS ************ Baseline Certification, minimum IAT Level III • Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent to above disciplines• Combined total of ten (10) years of full-time professional experience in the following skillsets/disciplines:• Littoral Combat Ship (LCS) Total Ship Computing Environment (TSCE) experience• Computer security, military system specifications, Security Management policy guidance and directives, DoD and cybersecurity policies;• Risk Management Framework (RMF) and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, IDS, IPS, Switch/Routers, Cross Domain Solutions (CDS), EMASS and Endpoint Security Solution (ESS);• Performing STIG implementation;• Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and• Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems
Desired Qualifications/Experience:
• DoD 8570.01-M CSSP certification• RMF experience
About PingWind
PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cybersecurity, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran-Owned Small Business (SDVOSB) with offices in Washington DC and Northern Virginia. ****************
Our benefits include:
• Paid Federal Holidays• Robust Health & Dental Insurance Options• 401k with matching• Paid vacation and sick leave• Continuing education assistance• Short Term / Long Term Disability & Life Insurance• Employee Assistance Program through Sun Life Financial EAP Guidance Resources
Veterans are encouraged to apply
PingWind, Inc. does not discriminate in employment opportunities, terms, and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law.
Auto-ApplyNetwork Security Analyst I
Cyber security analyst job in San Diego, CA
Select Cyber, an Information Security recruitment specialty firm, seeks to fill the following role for our client:
Network Security Analyst I
Be part of a cutting-edge Computer Incident Response Team, (CIRT) for a fortune 500 company. We are looking for individuals that want to learn a new field and grow with the company. Training provided.
The selected candidate will be a part of the Security Operations Center (SOC) and its mission to improve the information security of our customers using a Security Information and Event Management (SIEM) tool to detect and analyze IT security incidents.
Responsibilities:
Perform the following functions as individual assignments or as part of a team:
· Monitoring client networks for signs of adversarial activity.
· Respond to alerts from various monitoring systems and platforms providing indicators for enterprise defensive measures.
· Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs).
· Triage potentially malicious events to determine severity and criticality of the event.
· Follow procedures to analyze and escalate security incidents which vary from customer to customer.
Experience
· 1+ years technical experience in the Information Technology field.
· Experience with Intrusion Detection & Prevention Systems (IDS/IPS) or Firewalls & Log Analysis a plus.
· Technical degree, Associate or Bachelor's degree from an accredited institution in Computer Science or information technology field preferred.
· CompTIA Network+/Security+ certifications is a plus
Information Security Engineer III
Cyber security analyst job in San Diego, CA
Are you looking to make an impactful difference in your work, yourself, and your community? Why settle for just a job when you can land a career? At ICW Group, we are hiring team members who are ready to use their skills, curiosity, and drive to be part of our journey as we strive to transform the insurance carrier space. We're proud to be in business for over 50 years, and its change agents like yourself that will help us continue to deliver our mission to create the best insurance experience possible.
Headquartered in San Diego with regional offices located throughout the United States, ICW Group has been named for ten consecutive years as a Top 50 performing P&C organization offering the stability of a large, profitable and growing company combined with a focus on all things people. It's our team members who make us an employer of choice and the vibrant company we are today. We strive to make both our internal and external communities better everyday! Learn more about why you want to be here!
PURPOSE OF THE JOB
The purpose of this job is to design secure architectures and develop cybersecurity approaches and techniques to evaluate the security of a system or network. This position will assist with strategic initiatives for short and long-term plans to identify and reduce the attack surface across applications and systems. The position exists to monitor and defend ICW Group's technology against potential threats that jeopardize the financial growth and security goals of the Company.
ESSENTIAL DUTIES AND RESPONSIBILITIES
Monitors and protects information assets across hybrid environments.
Monitors data flows and access events across AWS, on-prem, and SaaS platforms using DLP, CASB, SIEM, and AWS-native tools such as Macie, GuardDuty, CloudTrail, and Security Hub.
Detects and investigates data breaches, insider threats, and exfiltration attempts; leads data-centric incident response through containment, analysis, and recovery.
Implements and enforces data classification, labeling, and tagging frameworks integrated with AWS S3, RDS, and enterprise file systems.
Designs and manages encryption and key management solutions using AWS KMS, CloudHSM, and on-premise HSMs to secure data at rest and in transit.
Collaborates with development and DevOps teams to embed data protection into CI/CD pipelines and application code, ensuring secure data handling throughout SDLC.
Conducts forensic reviews and produces actionable reports, metrics, and dashboards highlighting data risks and anomalies across hybrid systems.
Leads complex data protection initiatives and resolves data security risks.
Leads enterprise data security projects, including AWS DLP implementation, sensitive data discovery, structured/unstructured data protection, and automated alerting.
Defines and enforces data governance standards for both AWS and on-prem environments, aligning to ICW's data lifecycle management and retention requirements.
Partners with database, app dev, and analytics teams to integrate encryption, tokenization, and privacy-by-design principles into application workflows.
Designs and maintains role-based and attribute-based access controls (RBAC/ABAC) across AWS Identity and Access Management (IAM), Active Directory, and application layers.
Collaborates with Privacy, Legal, and Compliance to operationalize data protection impact assessments (DPIAs) and retention/deletion automation.
Produces executive and board-level reports detailing data protection maturity, compliance metrics, and emerging risk areas.
Serves as a technical escalation point for AWS data protection incidents, third-party integrations, and complex remediation efforts.
Serves as ICW's senior data security SME and technical advisor.
Provides expert consulting to architecture, engineering, and product teams on AWS-native security services and hybrid data protection models.
Advises leadership on emerging cloud data security trends and recommends architectures that balance scalability with compliance and risk reduction.
Conducts advanced data risk assessments, privacy impact analyses, and forensic reviews to guide remediation and control design.
Defines AWS-aligned compliance strategies supporting NIST CSF, NYDFS 500, GLBA, and state privacy laws.
Evaluates and integrates modern data security solutions such as SASE/CASB platforms, insider risk analytics, and automated data classification tools.
Mentors junior engineers and fosters a data-first security mindset across ICW's engineering organization.
Partners with project management and internal teams to mature hybrid data security.
Implements technical and process controls to continuously improve data protection maturity in AWS and on-prem applications.
Partners with cloud engineering and on-prem development teams to design secure data pipelines, storage, and access control mechanisms.
Contributes to automation and orchestration of data protection activities using AWS Lambda, EventBridge, and native integration APIs.
Leads knowledge sharing on emerging AWS capabilities while ensuring backward compatibility with existing on-prem data flows.
Coaches development and data engineering teams to identify and mitigate data leakage risks during application and infrastructure design.
SUPERVISORY RESPONSIBILITIES
This position has no supervisory responsibility but may mentor and train junior engineers.
EDUCATION AND EXPERIENCE
Bachelor's Degree from four-year college or university required with major or emphasis Engineering, Cybersecurity, Networking, or Computer Science related discipline.
Minimum 8 years of experience working in a security engineering related role designing secure networks, systems and application architectures or equivalent combination of education and experience required.
Minimum 3-5 years of experience in AWS Cloud Security services preferred. Direct experience using advanced technologies such as Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls, SIEM, Antivirus software, Network Packet Analyzers, content filtering, Malware analysis and forensics tools to detect intrusions.
Experience in cyber security role requiring knowledge of data analysis, risk assessment, risk mitigation, investigation methods, incident management concepts and practices, and policy and procedure development.
Experience with AWS Services such as AWS Identity & Access Management, AWS Organizations, AWS Security HuB, Guard Duty, CloudTrail, AWS CloudTrail.
CERTIFICATES, LICENSES, REGISTRATIONS
Certification in GSEC, CISSP, and/or Security+.
AWS Certified Security - Specialty, preferred
KNOWLEDGE AND SKILLS
Knowledge of risk assessment tools, technologies, and methodologies. Knowledge of disaster recovery, computer forensic tools, technologies, and methods.
Knowledge of enterprise security platforms.
Ability to communicate network security issues to peers and management. Ability to read and use the results of mobile code, malicious code, and anti-virus software.
Strong understanding of endpoint security solutions to include File Integrity Monitoring and Data Loss Prevention.
Demonstrated experience as a lead engineer in the design, implementation and support in an enterprise IT environment.
Ability to work with mathematical concepts such as probability and statistical inference.
Ability to apply principles of logical or scientific thinking to a wide range of intellectual and practical problems.
Ability to combine disparate skills and thinking to craft solutions and solve complex operational problems.
Ability to hypothesize on root cause of inefficiencies and then test out probable solutions against those hypotheses.
Ability to read, analyze, and interpret technical journals, financial reports, security analysis reports and other IT related documents.
Ability to respond to common inquiries or complaints from customers, regulatory agencies, or members of the business community.
Must be able to read, write and speak English effectively.
Ability to effectively communicate/present technical information to a non-technical audience.
Ability to cross train and share information with team members.
PHYSICAL REQUIREMENTS
Office environment - no specific or unusual physical or environmental demands and employees are regularly required to sit, walk, stand, talk, and hear. Employees are required to reach with hands and arms; stoop, kneel, crouch, or crawl. Employees must occasionally lift and/or move up to 30 pounds. Employees are required to have visual acuity and be capable of operating and viewing computers and other electronic devices for extended periods of time.
WORK ENVIRONMENT
This position operates in an office environment and requires the frequent use of a computer, telephone, copier, and other standard office equipment.
We are currently not offering employment sponsorship for this opportunity.
#LI-TM1
#LI-HYBRID
The current range for this position is
$121,624.81 - $217,710.99
This range is exclusive of fringe benefits and potential bonuses. If hired at ICW Group, your final base salary compensation will be determined by factors unique to each candidate, including experience, education and the location of the role and considers employees performing substantially similar work.
WHY JOIN ICW GROUP?
• Challenging work and the ability to make a difference
• You will have a voice and feel a sense of belonging
• We offer a competitive benefits package, with generous medical, dental, and vision plans as well as 401K retirement plans and company match
• Bonus potential for all positions
• Paid Time Off with an accrual rate of 5.23 hours per pay period (equal to 17 days per year)
• 11 paid holidays throughout the calendar year
• Want to continue learning? We'll support you 100%
ICW Group is committed to creating a diverse environment and is proud to be an Equal Opportunity Employer. ICW Group will not discriminate against an applicant or employee on the basis of race, color, religion, national origin, ancestry, sex/gender, age, physical or mental disability, military or veteran status, genetic information, sexual orientation, gender identity, gender expression, marital status, or any other characteristic protected by applicable federal, state or local law.
___________________
Job Category
IT
Auto-ApplyInformation Systems Security Officer
Cyber security analyst job in Camp Pendleton South, CA
General information Requisition # R64222 Posting Date 11/14/2025 Security Clearance Required TS/SCI Remote Type Onsite Time Type Full time Description & Requirements Shape the future of defense with MANTECH! Join a team dedicated to safeguarding our nation through advanced tech and innovative solutions. Since 1968, we've been a trusted partner to the Department of Defense, delivering cutting-edge projects that make a real impact. Dive into exciting opportunities in Cybersecurity, IT, Data Analytics and more. Propel your career forward and be part of something extraordinary. Your journey starts now-protect and innovate with MANTECH!
MANTECH seeks a motivated, career and customer-oriented Information Systems Security Officer with strengths in Information Systems Security to join our team at Marine Corps Base Camp Pendleton California.
This position will assist Marine Corps Warfighting Laboratory (MCWL) prepare for and maintain the IT infrastructure, IT capabilities and Audio-Visual capabilities to support emerging ICD 705 Sensitive Compartmentalized Information Facilities (SCIFs) and Special Access Control Facilities (SAPFs) through planning, activation and operations.
Responsibilities include but are not limited to:
* Experience in network design, network monitoring, systems development, and knowledge of Information Assurance (IA) policies, directives, and best practices across DoD and Marine Corps.
* Knowledge and experience with organizations within the Marine Corps responsible for facilitating network approvals and connections.
* Work with various Marine Corps, Navy, Joint, and other services to coordinate installs supporting Initial Operating Capability (IOC) and Final Operating Capability (FOC).
* Ability to communicate and provide effective staff coordination across government, Marine Corps, and contractor organizations.
* Support the facility Site Security Manager (SSM)/Special Security Representative (SSR) and Information Systems Security Manager (ISSM) to oversee the secure installations and operations of systems across multiple security domains and in accordance with policies, directives, and best practices.
* Establishes and satisfies complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports Marine Corps and other customers at the highest levels in the development and implementation of doctrine and policies.
Minimum Qualifications:
* Bachelor's degree and at least 10 years' experience planning and/or operating IT infrastructure within ICD 705 facilities.
* Experience with network security aspects of installations and operations.
Preferred Qualifications:
* Experience with MS Word, MS Power Point
Clearance Requirements:
* Candidate must have a current/active Top Secret clearance with the ability to obtain and maintain a TS/SCI clearance prior to starting this position.
Physical Requirements:
* Ability to maintain construction security oversight in outdoor environment; walk (with personal protective equipment) to inspect and document delivery of components and assembly/construction of structure.
The projected compensation range for this position is $112,400.00-$186,500.00. There are differentiating factors that can impact a final salary/hourly rate, including, but not limited to, Contract Wage Determination, relevant work experience, skills and competencies that align to the specified role, geographic location (For Remote Opportunities), education and certifications as well as Federal Government Contract Labor categories. In addition, MANTECH invests in its employees beyond just compensation. MANTECH's benefits offerings include, dependent upon position, Health Insurance, Life Insurance, Paid Time Off, Holiday Pay, short-term and long-term Disability, Retirement and Savings, Learning and Development opportunities, wellness programs as well as other optional benefit elections.
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
Auto-ApplySecurity Cooperation Analyst
Cyber security analyst job in San Diego, CA
Job Details CA 8 - San Diego, CA Full Time 4 Year Degree $100000.00 - $120000.00 Salary/year Admin - ClericalDescription
is contingent upon contract award
Echelon Services LLC is a Native Hawaiian-owned 8(a) small business that delivers secure, mission-ready IT, cyber, data, and program support to the Department of Defense and federal partners. We value initiative, accountability, and teamwork, and we empower our people to make a measurable impact.
Position Summary
We are seeking a Security Cooperation Analyst who is a self-starter and highly proactive. You will help plan, coordinate, and track activities across Foreign Military Sales and Building Partner Capacity programs to support Combatant Commands, Service Components, and program offices. You will analyze case data, maintain accurate trackers and dashboards, prepare briefings and deliverables, and keep actions moving without being asked twice. This role partners closely with government leads and industry teammates in a fast-moving, mission-focused environment.
Key Responsibilities
• Maintain day-to-day visibility of security cooperation actions and milestones across the case lifecycle; track tasks, risks, and dependencies to keep efforts on schedule.
• Develop and maintain clear trackers, spreadsheets, and dashboards that show status, funding, and execution to leadership and working-level audiences.
• Draft, edit, and format program artifacts, briefs, information papers, meeting minutes, and standard operating procedures that are accurate and ready for delivery.
• Support planning and coordination for case development, Letters of Request and Letters of Offer and Acceptance, requisitions, and delivery status.
• Consolidate inputs from functional teams such as finance, logistics, cybersecurity, and engineering; resolve small issues directly and elevate blockers early.
• Prepare and run recurring meetings; publish agendas, capture decisions and action items, and follow through to closure.
• Research policy and process references and summarize the impact to the team in plain language.
• Uphold configuration control and version management for shared files and trackers.
• Foster strong relationships with government stakeholders, end users, and international partners through clear, timely communication.
• Protect sensitive information and follow all security and handling requirements.
Qualifications
Required Qualifications
• Active Secret clearance.
• Bachelor's degree in international relations, business, data analytics, public administration, or a related field.
• 1-3 years of experience supporting DoD programs, security cooperation, international programs, program analysis, or logistics.
• Strong Microsoft 365 and Excel skills, including creating pivot tables, lookups, and clear visual status reports (Power BI or SharePoint experience is a plus).
• Excellent written and verbal communication; able to turn rough inputs into polished, error-free products.
• Demonstrated self-starter with the ability to anticipate needs, take ownership, and move tasks to completion with minimal direction.
• Detail oriented with strong organization skills and the ability to manage multiple priorities in a dynamic environment.
Preferred Qualifications
• Familiarity with security cooperation processes and tools such as the SAMM, SCIP, DSAMS, and G-TSCMIS.
• Experience supporting NAVWAR or NIWC Pacific, or similar DoD program offices.
• Exposure to funding execution, obligation tracking, or basic earned value terms.
• Experience building lightweight dashboards or automations with Power BI or Power Platform.
Compensation and Benefits
• Base salary range (California): $110,000 to $120,000 annually, based on experience, education, certifications, and work location.
• Comprehensive benefits including medical, dental, vision, 401(k) with company match, paid time off, paid holidays, and paid sick leave consistent with California law.
• Candidates outside California may see geographic differentials based on local market data.
Echelon Services is an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.
Security Analyst
Cyber security analyst job in San Diego, CA
Saronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms. Saronic is seeking a Security Analyst to monitor, investigate, and respond to security threats across hybrid environments. This role supports incident response, threat hunting, and continuous improvement of detection, response, and operational effectiveness.Responsibilities:
Monitor, triage, and investigate security alerts and incidents across hybrid environments.
Correlate and assess security, identity, and behavioral data to detect high-risk activity and support insider threat and external threat investigations.
Conduct proactive threat hunts leveraging current intelligence, MITRE ATT&CK techniques, and establishing baselines to identify undetected threats or weaknesses.
Contribute to operational runbooks, detection playbooks, and case documentation.
Participate in an on-call rotation responding to security events and supporting incident response investigations.
Collaborate with internal teams to enhance detection logic, improve workflows and automations.
Stay current with evolving threat landscape and maintain situational awareness across organizational assets and environments.
Required Qualifications:
3+ years of hands-on experience in a security operations center or part of a cybersecurity incident response team.
Proficient with SOC and incident response platforms, including SIEM, EDR, threat intelligence, and SOAR solutions, with experience in endpoint and network forensics, root-cause analysis, and incident reporting.
Demonstrated ability to use scripting and automation languages for data analysis and investigation, and familiarity with infrastructure-as-code frameworks used in production environments.
This role requires the ability to obtain and maintain a security clearance
Preferred Qualifications:
Familiarity with Department of Defense (DoD) or military industry events.
Industry recognized certifications (GCIH, GCIA, GNFA, GREM, CEH, etc.).
Physical Demands:
Prolonged periods of sitting at a desk and working on a computer.
Occasional standing and walking within the office.
Manual dexterity to operate a computer keyboard, mouse, and other office equipment.
Visual acuity to read screens, documents, and reports.
Occasional reaching, bending, or stooping to access file drawers, cabinets, or office supplies.
Lifting and carrying items up to 20 pounds occasionally (e.g., office supplies, packages).
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
Auto-ApplyInformation Security Analyst
Cyber security analyst job in San Diego, CA
Requirements
Bachelor's degree in Cybersecurity, Computer Science, or related field.
3+ years of experience in information assurance or cybersecurity.
DoD 8570 IAT Level II certification (Security+ CE, CySA+, or equivalent).
Familiarity with NIST, DISA STIGs, and DoD RMF compliance.
Must possess an active Secret Clearance - Required
This contractor and subcontractor shall abide by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disability.
Salary Description $88,000-$102,000
Staff Product Security Engineer (SSDL)
Cyber security analyst job in San Diego, CA
It all started in sunny San Diego, California in 2004 when a visionary engineer, Fred Luddy, saw the potential to transform how we work. Fast forward to today - ServiceNow stands as a global market leader, bringing innovative AI-enhanced technology to over 8,100 customers, including 85% of the Fortune 500 . Our intelligent cloud-based platform seamlessly connects people, systems, and processes to empower organizations to find smarter, faster, and better ways to work. But this is just the beginning of our journey. Join us as we pursue our purpose to make the world work better for everyone.
Job Description
**PLEASE NOTE**: This role requires a minimum of 2 days per week in our San Diego, CA ServiceNow Office. Please do not apply if you cannot meet this requirement. Thank you
The ServiceNow Security Organization (SSO):
The ServiceNow Security Organization (SSO) delivers world-class, innovative security solutions to reduce risk and protect the company and our customers. We enable our customers to migrate their most sensitive data and workloads to the cloud, accelerating our business so that we are the most trusted SaaS provider. We create an environment where our employees are proud to work and can make a positive impact
Team:
Product Security is Shifting Everywhere and holistically improving the maturity of the security program. The Secure Software Development Lifecycle (SSDL) team helps the organization measure and improve security activities. The team leads product threat modeling, helps to improve security behaviors, and manages a highly visible security champions program. The team is both highly technical and strategic.
Role:
As a Staff Product Security Engineer on the ServiceNow SSDL team, you will collaborate with developers and software architects on highly technical solutions and help the organization build secure and resilient software. You will be threat modeling software products and services to identify potential risk and participate in architectural reviews of products in development.
A key part of this position is to ensure the continued success of a large and growing security champions program. You will help mentor security champions and assist them in secure software design. As a Staff Product Security Engineer, you will help security champions be successful.
What you get to do in this role:
Work on a wide range of technologies
Work on complex architectural and technical challenges
Participate in threat modeling activities
Mentor and collaborate with development teams to adopt secure coding practices
Work on strategic and highly visible security activities across the organization
Be an advocate for security and participate in a security champions program
Qualifications
To be successful in this role, we need someone who has:
Experience in leveraging or critically thinking about how to integrate AI into work processes, decision-making, or problem-solving. This may include using AI-powered tools, automating workflows, analyzing AI-driven insights, or exploring AI's potential impact on the function or industry.
2+ years of experience in software development
8+ years of experience in software security (AppSec)
2+ years of experience in threat modeling software applications and services
Proficient in threat modeling methodologies such as STRIDE or PASTA and their applied use in fast-moving, iterative development lifecycles
In-depth knowledge of common web application vulnerabilities (OWASP Top 10)
Developer-level proficiency in one or more languages - Python, Java, JavaScript, and Golang preferred
Working knowledge of Machine Learning and taxonomies such as BIML that categorize known attacks on machine learning models
In-depth knowledge of software design patterns and their security considerations
In-depth knowledge of authentication and authorization standards including OAuth, OIDC, SAML, JWT, and PASETO
Knowledge of symmetric and asymmetric cryptography, digital signatures, PKI, TLS, and cryptographic hash functions
Knowledge of cloud native technologies including containers, Kubernetes, and services provided by AWS, GCP, and Azure
Knowledge of static analysis (SAST), dynamic analysis (DAST), and software composition analysis (SCA) security tools
Knowledge of OWASP ASVS, SCVS, and related verification standards
Ability to work collaboratively in a highly distributed team
Ability to communicate technical concepts to business stakeholders
A passion for security
#SecurityJobs
For positions in this location, we offer a base pay of: $155,800 to $272,700 plus equity (when applicable), variable/incentive compensation and benefits. Sales positions generally offer a competitive On Target Earnings (OTE) incentive compensation structure. Please note that the base pay shown is a guideline, and individual total compensation will vary based on factors such as qualifications, skill level, competencies, and work location. We also offer health plans, including flexible spending accounts, a 401(k) Plan with company match, ESPP, matching donations, a flexible time away plan and family leave programs. Compensation is based on the geographic location in which the role is located and is subject to change based on work location.
Additional Information
Work Personas
We approach our distributed world of work with flexibility and trust. Work personas (flexible, remote, or required in office) are categories that are assigned to ServiceNow employees depending on the nature of their work and their assigned work location. Learn more here. To determine eligibility for a work persona, ServiceNow may confirm the distance between your primary residence and the closest ServiceNow office using a third-party service.
Equal Opportunity Employer
ServiceNow is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, national origin or nationality, ancestry, age, disability, gender identity or expression, marital status, veteran status, or any other category protected by law. In addition, all qualified applicants with arrest or conviction records will be considered for employment in accordance with legal requirements.
Accommodations
We strive to create an accessible and inclusive experience for all candidates. If you require a reasonable accommodation to complete any part of the application process, or are unable to use this online application and need an alternative method to apply, please contact [email protected] for assistance.
Export Control Regulations
For positions requiring access to controlled technology subject to export control regulations, including the U.S. Export Administration Regulations (EAR), ServiceNow may be required to obtain export control approval from government authorities for certain individuals. All employment is contingent upon ServiceNow obtaining any export license or other approval that may be required by relevant export control authorities.
From Fortune. ©2025 Fortune Media IP Limited. All rights reserved. Used under license.
Cybersecurity Lead/Information Systems Security Officer (ISSO)
Cyber security analyst job in San Diego, CA
Data Intelligence, LLC is seeking a highly experienced Cyber Security Lead / Information Systems Security Officer (ISSO) to support cybersecurity operations and compliance for Navy and Department of Defense (DoD) systems. This role requires deep expertise in Information Assurance (IA), cybersecurity compliance frameworks, and Navy-specific cybersecurity practices. The ideal candidate will have extensive experience working with Navy Cross Domain Solutions (NCDSO) and a strong technical background in military C4I/IT systems.
Key Responsibilities:
Serve as the Cyber Security Lead/ISSO for classified and unclassified Navy/DoD systems.
Lead Risk Management Framework (RMF) efforts in accordance with DoD 8500 Series, NIST SP 800 Series, and other applicable cybersecurity policies and guidelines.
Develop, review, and manage technical documentation including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plan of Action & Milestones (POA&Ms).
Interface with the Navy Cross Domain Solutions Office (NCDSO) to support secure cross-domain solutions, including submission packages and coordination of approvals.
Provide subject matter expertise in support of system security engineering, integration, and testing.
Coordinate with system engineers, developers, and stakeholders to ensure security controls are effectively implemented.
Monitor systems for compliance with DFARS Clause ************ and other DoD IA requirements.
Assist in the preparation and review of technical instructions, engineering plans, and test-related documentation.
Maintain up-to-date knowledge of emerging cybersecurity threats, tools, and regulatory requirements.
Support system Certification and Accreditation (C&A) processes in accordance with NSA and DoD standards.
Required Qualifications:
Education:
Master's degree from an accredited college or university in Computer Science, Information Systems Management, Cybersecurity, or a related field.
Experience:
Minimum of 10 years of Navy or DoD experience in Information Assurance and Cybersecurity.
At least 5 years of recent experience (within the last 5 years) directly supporting Navy cybersecurity programs and RMF processes.
Direct experience with the Navy Cross Domain Solutions Office (NCDSO) within the last five years.
Demonstrated expertise in DoD cybersecurity requirements, including the DoD 8500 Series and NIST SP 800 Series.
Experience with engineering documentation including technical instructions, engineering plans, and systems integration documents.
Strong understanding of military C4I/IT systems, including Navy SATCOM (MILSATCOM and Commercial), Tactical Communications, and GPS systems.
High familiarity with the NSA certification process for secure systems.
Certifications:
Compliant with DFARS Clause ************ for Information Assurance Contractor Training and Certification (e.g., CISSP, CISM, Security+, or equivalent).
Security Clearance:
Must hold an active Top Secret / SCI (TS/SCI) clearance.
Preferred Skills:
Strong leadership and communication skills with the ability to brief senior stakeholders.
Ability to lead complex cybersecurity projects with minimal supervision.
In-depth knowledge of secure system design and implementation in classified environments.
Experience collaborating with cybersecurity authorities across Navy and DoD organizations.
About Data Intelligence, LLC:
Data Intelligence, LLC (DI) is a small business that provides Information Technology System Development (Agile, DevSecOps, Cloud Platform support) Cybersecurity (RMF, Security Engineering, Cross Domain Solutions), Tactical Data Link Standards Development and Testing, and Logistics/Warehousing services to U.S. federal clients both CONUS and OCONUS. DI consistently demonstrates exceptional customer service, maintains an employee-centric culture, and delivers hands-on technical expertise to help our clients achieve their mission.
Since 2005, DI has successfully provided IT Systems Engineering, Software Development, Cybersecurity, and supporting solutions and services to customers that include the Department of Defense, Intelligence, and Federal Civilian clients. Current clients include the US Navy, Air Force, Army, Marine Corps, Coast Guard, National Geospatial-Intelligence Agency, Defense Logistics Agency, and The Department of Homeland Security. DI is headquartered in Marlton, New Jersey, with satellite offices in California, Maryland, Ohio, Pennsylvania, Virginia, and Washington, D.C.
Why you should join us:
Data Intelligence offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Information Security Engineer
Cyber security analyst job in Temecula, CA
It's fun to work in a company where people truly BELIEVE in what they're doing!
We're committed to bringing passion and customer focus to the business.
The Information Security Engineer is responsible for contributing to the corporate Information Security program by assisting in the identification, recommendation and implementation of industry leading application security tools and techniques. The incumbent will also maintain and update application security processes and procedures and train team members on any relevant updates.
This position is remote, but local to the Temecula, CA office.
Essential Functions
Assist with the development, implementation, and administration of information security policies, standards, and procedures, adhering to industry best practices
Assist in integrating regulatory compliance requirements (e.g., PCI, GLBA) into the organizational security roadmap
Assist in ensuring that the corporate IT environment is secure and complies with all external audit requirements and federal standards
Coordinate with IT Operations to ensure endpoints and network devices conform to security standards, and that security devices and controls are working as designed
Assist in the identification, evaluation and implementation of industry leading application security tools and techniques
Plan, coordinate, and implement security measures to regulate access to computer data files and prevent unauthorized modification, destruction, or disclosure of information
Perform risk assessments and execute system tests to ensure proper functioning of data processing activities and security measures
Identify potential security risks, and define and document remediation options or mitigating controls
Perform security incident investigations including: chain of custody, containment measures, root cause analysis, and identification of preventive measures
Define and assist in the management of an Incident Response Team that addresses potential or in-progress security events, establishing and adhering to escalation procedures and response times
Perform information systems evidence gathering, to support e-discovery requests and messaging searches
Perform security reviews on requests for new commercial software or material configuration changes to existing software
Perform periodic internal IT security audit functions on IT operational controls, to include system access controls, firewall rule reviews, etc.
Participate in on-call rotation
Perform related duties as requested
Essential Knowledge, Skills, & Abilities
Excellent written and verbal communication skills required
Solid presentation skills
Significant knowledge of security-oriented regulatory requirements and compliance
Excellent familiarity with IT security principles and practices including firewalling, hardening, data loss prevention, threat prevention, and identity management.
Ability to provide technical guidance to less experienced team members
Knowledge of the mortgage industry is helpful, but not required
Commitment and ability to cultivate a diverse and inclusive work environment.
Education
Bachelor's degree in computer science, Engineering, Information Systems Security or a related field is required.
Security class certifications strongly preferred
Azure certifications preferred
CISSP license preferred
Experience
5+ years of related IT experience required
2+ years in an Information Security engineering role
3+ years of experience in a regulated IT environment including some combination of SOX, HIPAA, GLBA, PCI preferred
Compensation and Benefits
Covius offers an extensive benefits package for all employees, including medical, dental, vision and 401(k)!
Compensation: $96,000 to $120,000 annually with a 10% AIP opportunity
Application Guidelines:
For best consideration, please submit your resume and application materials as soon as possible. Review of applications will begin immediately.
Working Conditions
Work is performed in a climate controlled indoor administrative office setting. The noise level in the work environment is usually quiet to moderate, depending upon the office or meeting location.
Physical Demands and Activities
While performing the duties of this job, the employee is frequently required to communicate. The employee frequently is required to remain stationary. The employee is frequently required to move about the office, operate a computer and other office machinery, such as calculator, copy machine, and computer printer; rarely position self to maintain files; rarely moves boxes weighing up to 10 lbs. Close and distance observation required with the ability to observe objects at close range in presence of glare or bright lighting (e.g., computer screen). Must possess the ability to communicate information and ideas so others will understand and have the ability to interact with external and internal stakeholders.
Covius is committed to equal opportunity in all employment practices to all qualified applicants and employees without regard to race, color, religion, gender, gender identity, age, national origin, pregnancy, disability, genetics, marital status, military or veteran status or any other protected category as established by local, state, and federal law. This policy applies to all aspects of the employment relationship including recruitment and hiring, placement, promotion, transfer, compensation, disciplinary action, layoff, leaves of absence, training, and termination. All such employment decisions will be made without unlawful discrimination based on any prohibited basis.
The essential functions, working conditions and physical demands described above are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this position.
Please note that all s are not intended to be all-inclusive. This job description is not designed to cover all activities, duties or responsibilities that are required of the employee for this job. Employees may be required to perform other duties at any time with or without notice to meet the ongoing needs of the organization.
If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us!
Auto-ApplyInformation Security Analyst II
Cyber security analyst job in San Diego, CA
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
PlayStation is looking for an Information Security Analyst to join our team and operate the day-to-day Information Security, Risk and Compliance management processes. This is a mixture of processing requests from the business and driving internal security projects such as security audit and assessment. This role requires a sound understanding of technical and engineering terminology, outstanding ability to articulate risk across any security domains (technical and governance) with the demonstrable ability to work independently and process high volumes of security requests on a weekly basis. This role also provides ample opportunity to work across technical and game-related projects with studio and PlayStation engineering teams and therefore requires risk advisory and influencing experience.
Based in San Diego, the candidate will be the key business relationship partner on behalf of Information Security and work on Information Security processes as well as strategic projects across PlayStation and the Studios group. This role will collaborate closely directly with business, technical and third party collaborators, as well as work multi-functionally with our other Information Security specialist teams across the globe to protect PlayStation's intellectual property, data and infrastructure whilst delivering new and evolving games, services and hardware to the market. This is an opportunity to provide security directly to the global PlayStation business, our PlayStation Network and global Studios and their game development.
What you will be doing:
Serve as a primary partner to PlayStation Studios, supporting security risk management across global game development and studio environments.
Triage and manage technical and strategic security risks across studios, ensuring alignment to security strategy and policy compliance.
Engage directly with technical teams and studio leadership to strengthen risk posture, manage vulnerabilities, and drive mitigation strategies.
Act as a trusted advisor to studio teams, driving a culture of embedding “security by design” principles.
Support the creation of risk insights, reporting, and executive briefings that inform leadership on studio security health and emerging trends.
Maintain broad knowledge of emerging security trends, risks, adn technologies that are applicable to the studio business and Sony at large.
Advance the Information Security program through collaborative and cross-team partnerships.
Required Experience:
3+ years of experience in information security, with demonstrated expertise in risk identification and mitigation.
2+ years conducting risk assessments and providing actionable recommendations to technical and business stakeholders.
2+ years working in vulnerability management, including detection, analysis, reporting, or remediation tracking.
2+ years of hands-on experience managing or evaluating cloud environments, networks, and security infrastructure.
2+ years of experience communicating risk and security insights to leadership and cross-functional partners.
Preferred Experience & Attributes:
Background in the gaming or entertainment industry.
Experience leading projects or programs in a security or risk management capacity.
Technical and Security focused certifications a strong preference
Confident communicator able to translate complex security risk concepts for both technical and non-technical audiences.
Comfortable working in a dynamic, fast-paced environment balancing innovation and security priorities.
Proven success working independently to establish relationships, deliver requirements, and communicate effectively.
#LI-GM1
Please refer to our Candidate Privacy Notice for more information about how we process your personal information, and your data protection rights.
At SIE, we consider several factors when setting each role's base pay range, including the competitive benchmarking data for the market and geographic location.
Please note that the base pay range may vary in line with our hybrid working policy and individual base pay will be determined based on job-related factors which may include knowledge, skills, experience, and location.
In addition, this role is eligible for SIE's top-tier benefits package that includes medical, dental, vision, matching 401(k), paid time off, wellness program and coveted employee discounts for Sony products. This role also may be eligible for a bonus package. Click here to learn more.
The estimated base pay range for this role is listed below.$140,000-$210,000 USD
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
Auto-ApplyIndustrial Security Analyst
Cyber security analyst job in San Diego, CA
RELOCATION ASSISTANCE: No relocation assistance available CLEARANCE TYPE: SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Mission Systems is seeking an Industrial Security Analyst to develop, and administer security programs and procedures for classified or proprietary materials, documents, and equipment. Studies and implements federal security regulations that apply to company operations. Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies. Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials. Conducts security education classes and security audits. Investigates security violations and prepares reports specifying preventive action to be taken.
Basic Qualifications:
2+ years of Industrial Security experience or relevant experience with bachelors' Degree; an additional 4 years of applicable work experience may be substituted.
Current Active Secret clearance with ability to meet enhanced security requirements and obtain/maintain SAP eligibility and access.
In-scope investigation (T5, T5R, SSBI, SBPR, PPR) completed within last 6 years or current enrollment in Continuous Evaluation (CE) program.
US Citizenship required.
Excellent oral and written communication skills.
Knowledge of: DODM 5205.07 V1-4 and DISS, JADE, and/or SIMS.
Must be proficient in MS Office suite (Word, SharePoint, PowerPoint, Excel, Outlook, TEAMs).
Preferred Qualifications:
Top Secret clearance.
ICD 705 Tech Spec.
Experience with government networks CV2, CORE, JADE, etc.
Classification review experience.
Experience completing compliance self-inspections and supporting formal customer compliance inspections.
Excellent customer service and communication skills.
Ability to work in a team environment and follow projects through to completion.
Ability to maintain flexibility to deal with changing priorities and deadlines.
Willing to work extended hours, in a fast paced, deadline driven environment, excellent communication skills speaking, writing skills and organized skills enabling effective communications.
Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint).
Primary Level Salary Range: $73,900.00 - $110,900.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplyOT Cyber security Specialist
Cyber security analyst job in San Diego, CA
Key Responsibilities:
Lead and/or assist technical and analytical Cyber security support activities for Facility Related Control Systems (FRCS), Operational Technology (OT) and Information Technology (IT) to develop, engineer and implement a cyber secure baseline.
Assist the ISSM with initial engineering requirements to determine proper FIPS 199 system categorization and selection of security controls.
Review and determine specific CNSS 1253 security controls applicable to the FRCS/OT/IT. Furthermore, define and determine cyber engineering requirements to meet the assigned CNSS 1253 controls throughout the entire lifecycle.
Provide technical and analytical support while the FRCS/OT/IT system is being built or maintained.
Implement security baseline measures such as STIGs, SRGs, OEM best build practices, etc.
Perform accurate and measurable scanning of the FRCS/OT/IT systems and devices using tools such as ACAS.
Design, develop and maintain required documentation to support the FRCS/OT throughout the lifecycle.
Develop the FRCS/OT/IT self-assessment test plan and assist the ISSM in obtaining approval. Additionally, the ISSE will assist in the self-assessment as required by the ISSM.
Assist the Validator as needed during the validation by providing necessary information, documentation, and onsite support.
Assist the ISSM in mitigating and resolving vulnerabilities after completion of the validation.
Provide life cycle support of the FRCS/OT/IT following approved USMC vulnerability management principles and procedures.
Lead communications with Government stakeholders and provide advisory support.
Basic Qualifications:
Bachelor's degree in Computer Science, Information Assurance, Information Security System Engineering plus a minimum of six (6) years of directly related experience with a minimum of two (2) of these years functioning in an FRCS/OT/IT/RMF role with exposure to diverse IT architectures within the DoD, demonstrating progressive growth of skills.
Certification: CompTIA Sec+
Ability to obtain a Government Common Access Card (CAC)
Proven capability to independently initiate, track and manage tasks, with a high degree of detail, quality, and process orientated completion.
Knowledge of DoDI 8510.01 policy and principles.
Working knowledge of USMC Assessment & Authorization policies, practices, and toolsets.
High level understanding of information security principles and risk assessment techniques associated to FRCS/OT/IT.
Ability to use prior experience and knowledge to address new situations and incorporate new information; especially during interactions with clients.
Willingness and ability to set priorities and deliver under tight deadlines in a heavy workload environment.
Excellent communication skills, both written and verbal to clearly articulate ideas for senior leadership as well as technical staff consumption.
Ability to work in teams, and establish and maintain cross-functional and working relationships.
Proficient with Microsoft Office Suite of tools, including Word, Excel, and PowerPoint.
Preferred Qualifications:
Experience working with DoD programs a significant plus
Experience with USMC systems and RMF process
Experience with industrial control systems
Certification(s): CISSP, CISM, CEH, GICSP
Cloud Security Analyst
Cyber security analyst job in San Diego, CA
Job DescriptionSaronic Technologies is a leader in revolutionizing defense autonomy at sea, dedicated to developing state-of-the-art solutions that enhance maritime operations for the Department of Defense (DoD) through autonomous and intelligent platforms.
Saronic Technologies is seeking a Cloud Security Analyst to join our cybersecurity team and strengthen the security of our AWS GovCloud environments. This role directly supports the Cybersecurity Specialist in maintaining and improving DoD Impact Level 5 (IL5) and IL6 cloud readiness for Saronic systems.
The Cloud Security Analyst will focus on analyzing, monitoring, and hardening AWS configurations, managing access and permissions, and ensuring the protection of Controlled Unclassified Information (CUI) across projects that interact with cloud services.Key Responsibilities:
Cloud Security Oversight
Evaluate and continuously monitor AWS GovCloud environments for compliance with FedRAMP High, DoD IL5/IL6, and CUI handling requirements.
Review and validate IAM roles, permissions, and resource configurations to ensure adherence to least privilege principles.
Assess cloud service configurations (e.g., S3, EC2, RDS, CloudTrail, KMS, Config) and recommend security improvements.
Support implementation of baseline configurations and guardrails aligned with DoD and AWS best practices.
Track, report, and follow up on identified security issues or misconfigurations to closure.
Monitoring and Incident Response Support
Monitor cloud environments using AWS Security Hub, GuardDuty,
CloudTrail, and related tools for anomalies or policy violations.
Assist in vulnerability management efforts, including scanning, prioritization, and remediation verification.
Support cloud-related incident response activities by gathering and analyzing logs, indicators, and events.
Maintain situational awareness of evolving cloud security threats and recommend mitigation strategies.
Governance and Continuous Improvement
Assist in preparing and maintaining security documentation, such as policies, procedures, and compliance evidence.
Support audit preparation and control validation for IL5/IL6 accreditation and RMF-related activities.
Identify opportunities to improve processes and automate compliance or monitoring tasks.
Collaborate on initiatives that strengthen AWS security posture and operational efficiency.
Cross-Team Collaboration
Work closely within the Cybersecurity team to execute security initiatives and ensure unified cloud defense.
Collaborate with internal teams including Security, Software and IT to guide and validate secure implementations.
Provide day-to-day support for AWS-related security issues, IAM management, and secure project deployments.
Communicate findings and recommendations effectively to both technical and non-technical stakeholders.
Required Qualifications
1-2 years of relevant experience in Cybersecurity (internships included).
Bachelor's degree or relevant education in Cybersecurity, Computer Science, or related field. Industry experience may substitute educational requirements.
Familiarity with FedRAMP High, DoD IL4+, and CUI data protection frameworks.
Understanding of AWS security resources and security monitoring.
Strong analytical and problem-solving skills for cloud environments.
This role requires the ability to obtain and maintain a security clearance.
Preferred Qualifications:
AWS Certifications: Cloud Practitioner, Security, Solutions Architect, SysOps Administrator and Developer.
Experience working in or securing AWS or AWS GovCloud environments.
SANS GIAC GSEC or similar Cybersecurity certification.
Familiarity with Terraform and reviewing Infrastructure-as-Code (IaC) configurations for security compliance.
Prior IT systems administration or DevOps experience a plus.
Experience in DoD-accredited (IL5/IL6) or FedRAMP High environments.
Knowledge of NIST 800-171, NIST 800-53, and CMMC 2.0 controls.
Knowledge of autonomous, maritime, or defense-related technologies.
Experience supporting security architecture or accreditation efforts for DoD or government cloud systems.
Ability to work cross-functionally and influence secure practices across diverse technical teams.
Physical Demands:
Prolonged periods of sitting and computer work.
Occasional standing and walking within the office.
Manual dexterity to operate computers and office equipment.
Visual acuity to read screens and documents.
Occasional reaching or lifting up to 20 pounds (e.g., equipment or supplies).
Benefits:Medical Insurance: Comprehensive health insurance plans covering a range of services Saronic pays 100% of the premium for employees and 80% for dependents Dental and Vision Insurance: Coverage for routine dental check-ups, orthodontics, and vision care Saronic pays 100% of the premium under the basic plan for employees and 80% for dependents Time Off: Generous PTO and HolidaysParental Leave: Paid maternity and paternity leave to support new parents Competitive Salary: Industry-standard salaries with opportunities for performance-based bonuses Retirement Plan: 401(k) plan Stock Options: Equity options to give employees a stake in the company's success Life and Disability Insurance: Basic life insurance and short- and long-term disability coverage Pet Insurance: Discounted pet insurance options including 24/7 Telehealth helpline Additional Perks: Free lunch benefit and unlimited free drinks and snacks in the office
This role requires access to export-controlled information or items that require “U.S. Person” status. As defined by U.S. law, individuals who are any one of the following are considered to be a “U.S. Person”: (1) U.S. citizens, (2) legal permanent residents (a.k.a. green card holders), and (3) certain protected classes of asylees and refugees, as defined in
8 U.S.C. 1324b(a)(3)
.
Saronic does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.
Security Analyst - CONTRACT
Cyber security analyst job in San Diego, CA
Select Cyber, an Information Security recruitment specialty firm, seeks to fill the following role for our client:
Information Security Analyst
This position serves as the first point of contact with the client for security issues and the individual will administer information security architecture utilizing a thorough understanding of available technology, tools and techniques.
Responsibilities:
Perform the following functions as individual assignments or as part of a team:
Respond to alerts from various monitoring systems and platforms
Triage potentially malicious events to determine severity of the event
Analyze malicious artifacts obtained from network monitoring with a focus on generation of threat intelligence and service improvement
Communicate and collaborate with the analyst team for situational awareness.
Assisting with the selection, installation and adoption of automated tools that enforce or monitor the compliance with information security policies & procedures.
Communicate threat information with clients accurately and professionally through formal and informal interactions
Apply structured analytical methodologies to maximize threat intelligence growth and service efficacy.
Requirements:
Bachelor's degree in related field.
3-7 years of technical experience supporting enterprise-scale Secure Operations Centers.
Experience working with Websense, Tipping Point, Blue Coat, Trend Micro, Symantec, Cisco IOS, IDS/IPS, anti-virus software, Proofpoint, Vmware, and AWS cloud.
Must be familiar with the current regulatory environment such as Sarbanes-Oxley, GLBA, etc.
Advanced knowledge of the TCP/IP protocol suite, security architecture, and remote access security techniques.
Information Security Analyst I (Temporary)
Cyber security analyst job in San Diego, CA
T3W Business Solutions, Inc. is a Woman-Owned Small Business with Headquarters located in San Diego, CA. It is our mission to help our clients develop strategies to optimize their use of space and resources resulting in maximum benefits; we also deliver quality data and analysis to support our clients' daily facility operations, planning, and compliance programs. We are looking for an Information Security Analyst I (NIWC Pacific) in San Diego, CA.
** This is a temporary position that could last 13 months**
Position Summary
Provide professional information security services assist NIWC Pacific Security Support Services.
Responsibilities
Function as a Key Management Infrastructure (KMI) Operating Account Manager (KOAM) Clerk and to be responsible for maintaining Two-Person Integrity (TPI) requirements as outlined in Navy Regulations
Prepare and maintains accurate records of COMSEC material received, held, transferred, hand receipted, and destroyed IAW Electronic Key Management System (EKMS) 1 (series)
Maintain message files and correspondence originated pertaining to the maintenance and administration of COMSEC accounts
Transfer/receipt of Communications Security (COMSEC) to/from the account to include - wrapping material and inspecting packages for discrepancies/tampering
Conduct destruction, dispose/recycle equipment components and report compliance IAW EKMS 5 series
Assist with Inspection of COMSEC containers/secure rooms IAW Department of the Navy (DoN) and Department of Defense (DoD) security doctrine.
Issue secure voice equipment and install KEYMAT prior to issue and ensure units are re-keyed quarterly
Provide customer support by assisting COMSEC users at the Customer Service counter, answering the phones, and making appointment for customers
Knowledge, Skills, and Abilities
Knowledge of Department of the Navy (DoN) and Department of Defense (DoD) security regulations and policies related to Communications Security (COMSEC) principles, policy and procedures concerning control, accountability and use of cryptographic equipment, software, keying material
Knowledge of Key Management Infrastructure (KMI) Policies and national/user level requirements for traditional COMSEC accounting as well as the operation of electronic key management system (EKMS)/KMI accounts
Knowledge of Secretary of the Navy Instruction (SECNAV) 5510.30 and 5510.36 directives
Knowledge of DoN packing and shipping procedures for classified and controlled cryptographic items
Skills in performing software upgrades using SKL
Skills in performing destruction of COMSEC Material IAW DoN Regulations
Requirements
Minimum active Secret clearance and ability to obtain and maintain a Top Secret (SCI) clearance
0-2 years of relevant experience
A valid driver's license
Ability to lift items up to 40lbs when offloading shipments or moving material
Proficient in Microsoft Office applications, such as Word, Excel, PowerPoint, and Access
Ability to walk moderate distances, stoops, bend, climb, kneel, push, and pull in the performance of semiannual inventories
Infrequent travel may be required
Preferred
Active TS clearance or higher
Prior military experience/background (preferably Navy or Marines)
This contractor and subcontractor shall abide by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disability.
Salary Description $68,400-$71,000
Information Systems Security Officer
Cyber security analyst job in Camp Pendleton South, CA
**MANTECH** seeks a motivated, career and customer-oriented **Information Systems Security Officer** with strengths in Information Systems Security to join our team at Marine Corps Base **Camp Pendleton California.** This position will assist Marine Corps Warfighting Laboratory (MCWL) prepare for and maintain the IT infrastructure, IT capabilities and Audio-Visual capabilities to support emerging ICD 705 Sensitive Compartmentalized Information Facilities (SCIFs) and Special Access Control Facilities (SAPFs) through planning, activation and operations.
**Responsibilities include but are not limited to:**
+ Experience in network design, network monitoring, systems development, and knowledge of Information Assurance (IA) policies, directives, and best practices across DoD and Marine Corps.
+ Knowledge and experience with organizations within the Marine Corps responsible for facilitating network approvals and connections.
+ Work with various Marine Corps, Navy, Joint, and other services to coordinate installs supporting Initial Operating Capability (IOC) and Final Operating Capability (FOC).
+ Ability to communicate and provide effective staff coordination across government, Marine Corps, and contractor organizations.
+ Support the facility Site Security Manager (SSM)/Special Security Representative (SSR) and Information Systems Security Manager (ISSM) to oversee the secure installations and operations of systems across multiple security domains and in accordance with policies, directives, and best practices.
+ Establishes and satisfies complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports Marine Corps and other customers at the highest levels in the development and implementation of doctrine and policies.
**Minimum Qualifications:**
+ Bachelor's degree and at least 10 years' experience planning and/or operating IT infrastructure within ICD 705 facilities.
+ Experience with network security aspects of installations and operations.
**Preferred Qualifications:**
+ Experience with MS Word, MS Power Point
**Clearance Requirements** **_:_**
+ Candidate must have a current/active Top Secret clearance with the ability to obtain and maintain a TS/SCI clearance prior to starting this position.
**Physical Requirements:**
+ Ability to maintain construction security oversight in outdoor environment; walk (with personal protective equipment) to inspect and document delivery of components and assembly/construction of structure.
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.