Security Engineer
Cyber security analyst job in Irvine, CA
At Balance Staffing, we're obsessed with your success!
The Workstation Security Engineer I is an individual contributor who will participate in and manage all aspects of information and network security, including intrusion detection, incident response, vulnerability assessment, application security, and compliance with the corporate information security policy for all Client Device endpoints. This person Will primarily be responsible for designing, implementing, administrating, operating, and improving security technologies, including but not limited to Client device endpoints, Azure Microsoft Defender, Al Security tools, Network Access Control, End Point Protection, Two Factor Authentication, and their procedures and processes.
ESSENTIAL FUNCTIONS
Workstations Security Engineering -
Design, build, test and deploy new security technologies, which include the development of the operational manual and run books
Provides technical security operations engineering services to support and update existing security systems and works to automate processes related to security implementations, monitoring, and enforcement
Investigates, recommends, evaluates, deploys and integrates operational security tools and techniques to improve our ability to protect corporate assets and infrastructure
Participate in technical risk assessments and security exposure analyses of systems, networks and business applications
Analyzes network security elements and overall network security architectural designs to ensure secure and optimal system and network performance and cost effectiveness
Responsible for conducting vulnerability assessments and penetration testing, analyzing vulnerability data and prioritizing remediation efforts, and developing vulnerability policies and procedures with the collaboration of GRC.
Oversees the installation, configuration, and supportive processes of security technologies
Participate in or lead the Incident Response activities
Interacts With internal and external clients on security operations requirements, identifies security process and develops strategies/solutions to security issues
Keeps fully abreast of trends and changing technologies as they relate to IT and Network
Engineering and Information Security fields
Lead or assist in periodic or ad-hoc security reports that provide relevant situational awareness to our senior stakeholders
Security Operations / Administration -
Monitor and manage our networks and infrastructure environment for attacks, malicious software, and possible intrusions, which includes the follow-up of complete remediation of infected systems
Implement changes to our security technologies/infrastructure in accordance with standard and change control policies/procedures
Evaluate, implement, tune, and operate security solutions such as IPS, Vulnerability scanning tools, encryption capabilities, etc
Monitor and recommend improvements of security technologies and their various reports
Risk Management / Security Audit/Assessment Support / Ad-hoc support -
Support security audit/assessment related activities and compliance reviews
Performs other tasks, duties and projects as assigned
Provide Ad-hoc support as required
REQUIREMENTS
Bachelor's Degree in Computer Science, Information Systems or related field, or equivalent experience
Minimum 3 years of IT relevant experience or equivalent combination of experience plus at least
1 year of experience performing Security Engineering / Planning / Operations
Experience in medium to complex computing environments, with advanced knowledge in security technologies and services
Hands-on experience with at least two or more of the following Enterprise Security Technologies:
Network Intrusion Prevention / Detection
Virtual private Networks; SSL, IPSec and Site-to-Site
Enterprise Class Stateful Inspection Firewalls
Network Access Controls in context to Identity management
Windows server OS & Desktop OS
Network Packet Inspection
Directory Services including LDAP, AD and Secure Authentication Technologies
Experience in implementing Information Security technologies and/or processes required.
Experience in defining Information Security strategies and frameworks
Experience integrating security technologies into corporate operations frameworks.
Ability to communicate effectively with client staff at all levels, from technical to executive
Multi-task oriented in a team environment
Demonstrated ability to pay close attention to detail
Knowledge of Information security risk assessment methodologies and standards
Experience developing technical documentation, including reports, proposals, statements of work, and whitepapers
Ability to work independently, undertaking and completing project tasks on schedule with minimal supervision
Balance Staffing is proud to be an equal-opportunity workplace. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity, Veteran status, or any other characteristic protected by federal or state law.
Cyber Security Analyst
Cyber security analyst job in Costa Mesa, CA
The Orange County Department of Education (OCDE) serves some of Orange County's most vulnerable student populations and provides support and mandated fiscal oversight to 28 school districts serving more than 600 schools and approximately 475,000 students. In addition to providing direct instruction to students through its own alternative and special education programs, OCDE administers an array of programs and services that are critical to the operations of local school districts and community colleges, facilitating professional development, legal guidance, payroll, career and technical education support, high-speed internet access, Local Control and Accountability Plan assistance and approval, resources for families, and student enrichment. OCDE's vision is that "Orange County students will lead the nation in college and career readiness and success." Department staff are working to achieve this goal in collaboration with educators at all levels of student development, from early childhood through higher education, and in partnership with families, businesses and community organizations.
See attachment on original job posting
Education and Experience: Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: • Bachelor's degree or equivalent from an accredited college or university with major course work in information security, or a related field. • One to two years of experience in information security technology, specifically with penetration testing, intrusion detection, incident response, or digital forensics; or an equivalent combination of training and experience.
There are supplemental questions in the application. Please note that the EdJoin system will time-out after a 20-minute period of perceived inactivity. To assist you in the preparation of your application, the supplemental questions are listed here. Your responses should be thoughtful and thorough, and within the limit of 5,000 characters or less. We recommend that you prepare your responses in advance of beginning the application. 1. Explain a cybersecurity framework or methodology you know and how you have applied it in a previous role or project. 2. Describe your approach to investigating and assessing cybersecurity events and incidents. How do you prioritize incidents, and what criteria do you use to determine severity and impact? 3. Why are you passionate about pursuing a career in cybersecurity, and how do you stay current with the latest trends and developments in the field? Notice to Applicants: If you require accommodations in the application process, please inform us.
Education and Experience: Any combination of education and experience that would likely provide the required knowledge and abilities is qualifying. A typical way to obtain the knowledge and abilities would be: • Bachelor's degree or equivalent from an accredited college or university with major course work in information security, or a related field. • One to two years of experience in information security technology, specifically with penetration testing, intrusion detection, incident response, or digital forensics; or an equivalent combination of training and experience.
There are supplemental questions in the application. Please note that the EdJoin system will time-out after a 20-minute period of perceived inactivity. To assist you in the preparation of your application, the supplemental questions are listed here. Your responses should be thoughtful and thorough, and within the limit of 5,000 characters or less. We recommend that you prepare your responses in advance of beginning the application. 1. Explain a cybersecurity framework or methodology you know and how you have applied it in a previous role or project. 2. Describe your approach to investigating and assessing cybersecurity events and incidents. How do you prioritize incidents, and what criteria do you use to determine severity and impact? 3. Why are you passionate about pursuing a career in cybersecurity, and how do you stay current with the latest trends and developments in the field? Notice to Applicants: If you require accommodations in the application process, please inform us.
Comments and Other Information
Resumes will not be accepted in lieu of the completed online application. Before receiving authorization to work in this position, the individual selected will be required to provide a current negative TB authorization, within the last 60 days, and submit fingerprints for the purpose of conducting a confidential background investigation and record check. The tests are arranged and paid for by OCDE. The Immigration Reform and Control Act of 1986 requires employers to verify the employability of all new employees. Before the Department will finalize an offer of employment, the candidate selected will be required to show original documents which establish both the individual's identity and employment authorization. The candidate must also sign a statement under penalty of perjury regarding his/her employability. We reserve the right to reopen, readvertise, or delay filling this position. AA/EOE/ADA
CYBER SECURITY ANALYST I
Cyber security analyst job in Norco, CA
Job Description
Cyber Security Analyst I - Onsite in Norco, CA
The Cyber Security Analyst I is an entry-level position that provides technical and analytical support to protect Navy systems, networks, and data against cyber threats. This role supports the monitoring, detection, and initial response to cybersecurity incidents, while ensuring compliance with Navy and Department of Defense (DoD) security standards. The position involves assisting with system vulnerability assessments, applying Security Technical Implementation Guides (STIGs), supporting Risk Management Framework (RMF) activities, and providing frontline defense against cyber risks. The ideal candidate will be motivated, detail-oriented, and eager to learn within a mission-focused environment.
As with any position, additional expectations exist. Some of these are, but are not limited to, adhering to normal working hours, meeting deadlines, following company policies as outlined by the Employee Handbook, communicating regularly with assigned supervisor(s), and staying focused on the assigned tasks.
Responsibilities
Monitor Navy networks and systems for suspicious activity, unauthorized access, or security violations
Assist in applying DoD STIGs, security patches, and configuration changes to maintain compliance
Support Risk Management Framework (RMF) documentation, assessments, and reporting requirements
Conduct vulnerability scans, review security logs, and analyze alerts from tools such as ACAS, HBSS, and Splunk
Document incidents and escalate issues to senior cyber analysts or supervisors as required
Assist in preparing security reports and compliance audits
Provide support during cybersecurity exercises, inspections, and readiness reviews
Work with system administrators and engineers to ensure secure configurations across Navy IT systems
Stay current on evolving cyber threats and assist in updating security procedures and best practices
Basic Qualifications
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field
1-2 years of experience in cybersecurity, IT systems, or related technical roles (internships acceptable)
Foundational knowledge of cybersecurity principles, risk management, and network defense
Familiarity with security tools such as ACAS, Splunk, HBSS, or other monitoring platforms
Strong analytical, organizational, and problem-solving skills
Excellent written and verbal communication skills
Must be a U.S. Citizen
Ability to obtain and maintain a DoD security clearance
If applicable: If you are or have been recently employed by the U.S. government, a post-employment ethics letter will be required if employment with VSolvit is offered
Preferred Qualifications
Active DoD Secret Clearance
CompTIA Security+ CE or equivalent baseline DoD 8570 certification
Familiarity with Navy or DoD IT systems, RMF processes, or cybersecurity compliance frameworks (e.g., NIST 800-53, NIST 800-171)
Hands-on experience with vulnerability scanning, incident response, or STIG application
Exposure to cloud security (AWS, Azure, or DoD cloud environments)
Prior experience supporting Navy, DoD, or defense-related cybersecurity operations
Company Summary
Join the VSolvit Team! Founded in 2006, VSolvit (pronounced 'We Solve It') is a technology services provider that specializes in cybersecurity, cloud computing, geographic information systems (GIS), business intelligence (BI) systems, data warehousing, engineering services, and custom database and application development. VSolvit is an award winning WOSB, CA CDB, MBE, WBE, and CMMI Level 3 certified company. We offer a customizable health benefits program that best meets the needs of its employees. Offering may include: medical, dental, and vision insurance, life insurance, long and short-term disability and other insurance products, Health Savings Account, Flexible Spending Account, 401K Retirement Plan options, Tuition Reimbursement, and assorted voluntary benefits. Our goal is to grow together and enjoy the work that we do as a team.
VSolvit LLC is an Equal Opportunity/Affirmative Action employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, national origin, protected veteran status, or disability status.
Cyber security Operations Analyst
Cyber security analyst job in San Diego, CA
Duties and Responsibilities
Maintain and operate cybersecurity technology and and provide expertise in area of focus (e.g. Risk Assessments, Controls Engineering or Incident Response).
Collaborates with the business to understand their needs in order to tailor security offerings unique to their environment.
Uses working knowledge of IT system functionality, architecture and capabilities to effectively diagnose and troubleshoot issues with some assistance.
Conducts competitive analyses on (in-use and alternative) cyber technologies and documents recommendations for our environment.
Provides awareness and guidance within Sempra Infrastructure community on secure business processes, architecture design, and technical controls.
Maintains awareness of evolving cybersecurity threats and best practices for mitigation.
Develops procedures and guidelines for implementing information security systems and practices.
Develops and aggregates metrics to measure, monitor and report on the effectiveness of information security controls and compliance with information security policies.
Performs other duties as assigned (no more than 5% of duties).
Education
Bachelor's degree in Computer Science or other science or technology major or equivalent experience required.
Experience
Minimum of 2-5 years of direct experience within the information security field required.
In-depth experience in at least one cybersecurity discipline required.
Experience with projects of moderately sized security related initiatives to successful completion required.
Demonstrated experience in vendor selection, testing, implementation, and operations of a broad array of security technologies required.
Knowledge, Skills and Abilities
Familiarization with Endpoint protection software such as Trellix and Microsoft Defender.
Familiarization in deploying vulnerability management agents.
Experience deploying logging agents and configurations.
Knowledge of firewalls and security zone.
Experience working in an Operation Technology (OT), ICS / SCADA environment.
Experience with SCADA network protocols.
Experience with OT network monitoring tools (such as but not limited to: Dragos, Cybervision, CyberX).
Ability to take initiative and work independently when needed.
Ability to maintain, upgrade and recommend operational cybersecurity tools.
Ability to work with Cybersecurity OT Engineering to make recommendations for new tools and capabilities.
Ability to work effectively on multiple projects within a team structure and excellent written and oral communication skills.
Licenses and Certifications
Certified Information Systems Security Professional (CISSP) certification, Global Information Security Professional (GISP) certification, Global Information Assurance Certification (GIAC), Certified Information Systems Auditor (CISA), or Certified Internal Auditor (CIA) certificate preferred.
Targeted professional cybersecurity certifications (i.e. forensics and incident response) preferred.
Other Qualifications
Bilingual in English/Spanish preferred.
Cyber Security Analyst (MSSP/SOC)
Cyber security analyst job in San Diego, CA
Hey there, Rockstar! 🚀 We are looking for you!
At Agile IT, we help organizations thrive by making technology simple, secure, and strategic. As a trusted Microsoft partner and CMMC Registered Practitioner Organization (RPO), we specialize in guiding businesses through the complexities of cloud adoption, cybersecurity, and compliance, so they can focus on achieving their mission without being slowed down by IT challenges.
We combine deep technical expertise with a people-first approach to deliver solutions that actually work in the real world. From CMMC compliance and security to cloud migration, collaboration, and ongoing managed services, Agile IT empowers organizations to modernize with confidence and agility.
Why Work at Agile IT?
Impactful Work: Everything you touch helps to keep our nation's secrets secure while also helping our client organizations thrive, making technology a true enabler instead of a roadblock.
Culture of Growth: We're a team of curious learners and problem-solvers, and we invest in developing your expertise through training, certifications, and hands-on experience.
Flexibility & Balance: With a remote-friendly environment and a people-first approach, you get the freedom to do your best work while living your best life.
Collaborative Team: At Agile IT, you're surrounded by passionate professionals who support one another and celebrate success together.
Forward-Thinking Mindset: We stay ahead of industry shifts so our team and our clients are always future-ready.
Joining Agile IT means being part of a company that isn't just adapting to the future of IT-it's shaping it.
Job Description
At Agile IT, supporting CMMC-compliant environments means we don't just fix problems-we prevent them.
As a Security Analyst at Agile IT, you'll play a critical role in safeguarding our clients. You'll monitor and analyze security events, investigate incidents, and collaborate with senior engineers and architects to deliver world-class managed security services. This is an excellent platform to sharpen your analytical and technical skills while protecting clients in today's ever-changing threat landscape. This position is designed to nurture your career growth, providing a pathway into the dynamic and evolving field of cybersecurity operations and defense.
What you do: (major responsibilities)
Monitor and analyze security events across client environments.
Investigate alerts, perform triage, and escalate incidents when needed.
Conduct threat analysis and provide actionable recommendations to reduce risk.
Assist in incident response activities, including root cause analysis and reporting.
Tune and improve detection rules and security use cases to enhance visibility.
Communicate findings clearly to both technical and non-technical stakeholders.
Stay up to date on emerging threats, vulnerabilities, and trends.
Qualifications
What sets you apart: (qualifications-knowledge, skills, and abilities)
2+ years of experience in a SOC/NOC or MSSP in cybersecurity; OR 5+ years of experience in cybersecurity operations role.
Familiarity with SIEM tools (Sentinel, Splunk, QRadar, etc.).
Strong understanding of networking, firewalls, IDS/IPS, and endpoint protection.
Knowledge of security frameworks such as MITRE ATT&CK, NIST, or CIS Controls.
Excellent problem-solving and communication skills.
A collaborative mindset with the ability to work across teams and with customers.
Nice to have skills: (preferred skills or skills that will be expected to learn)
Certifications such as SC-200, Network+, Security+, CySA+, CEH, CISSP, or equivalent.
Experience with Microsoft Security tools (Defender, Sentinel, Purview, Entra).
Exposure to cloud platforms (Microsoft Azure, AWS, Google Cloud).
Familiarity with compliance frameworks (CMMC, NIST 800-171, HIPAA, ISO 27001).
Additional Information
A writing sample will be requested from candidates who are chosen to move forward in the interview process.
THE FINE PRINT:
Compensation and Benefits
*Pay range is $62,400 to $83,200 per year.
Starting pay is generally lower to mid-range; based on experience.
This is a remote, full-time, non-exempt position.
Medical/Dental/Vision/STD/LTD
Remote mental and physical health networks
$200,000 basic life insurance
Voluntary life
401(k) with 3% employer contribution - no vesting period
Combined 18 days PTO increasing with tenure
9 paid holidays
And so much more
*Factors in determining the appropriate compensation for a role include experience, skills, knowledge, abilities, education, licensure and certifications, and other business and organizational needs. The Hiring Pay Scale referenced in the job posting is the budgeted salary or hourly range that Agile IT reasonably expects to pay for this position.
Background checks, pre-employment aptitude, and skills testing are a mandatory part of the recruitment process. All Agile IT employees are provided with laptops and home office equipment. Due to the contractual requirements of our work with government entities, all hires must be US Citizens.
We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. All your information will be kept confidential according to EEO guidelines.
Industrial Security Analyst
Cyber security analyst job in San Diego, CA
RELOCATION ASSISTANCE: No relocation assistance available CLEARANCE TYPE: SecretTRAVEL: Yes, 10% of the TimeDescriptionAt Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work - and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.
Northrop Grumman Mission Systems is seeking an Industrial Security Analyst to develop, and administer security programs and procedures for classified or proprietary materials, documents, and equipment. Studies and implements federal security regulations that apply to company operations. Obtains rulings, interpretations, and acceptable deviations for compliance with regulations from government agencies. Prepares manuals outlining regulations, and establishes procedures for handling, storing, and keeping records, and for granting personnel and visitors access to restricted records and materials. Conducts security education classes and security audits. Investigates security violations and prepares reports specifying preventive action to be taken.
Basic Qualifications:
2+ years of Industrial Security experience or relevant experience with bachelors' Degree; an additional 4 years of applicable work experience may be substituted.
Current Active Secret clearance with ability to meet enhanced security requirements and obtain/maintain SAP eligibility and access.
In-scope investigation (T5, T5R, SSBI, SBPR, PPR) completed within last 6 years or current enrollment in Continuous Evaluation (CE) program.
US Citizenship required.
Excellent oral and written communication skills.
Knowledge of: DODM 5205.07 V1-4 and DISS, JADE, and/or SIMS.
Must be proficient in MS Office suite (Word, SharePoint, PowerPoint, Excel, Outlook, TEAMs).
Preferred Qualifications:
Top Secret clearance.
ICD 705 Tech Spec.
Experience with government networks CV2, CORE, JADE, etc.
Classification review experience.
Experience completing compliance self-inspections and supporting formal customer compliance inspections.
Excellent customer service and communication skills.
Ability to work in a team environment and follow projects through to completion.
Ability to maintain flexibility to deal with changing priorities and deadlines.
Willing to work extended hours, in a fast paced, deadline driven environment, excellent communication skills speaking, writing skills and organized skills enabling effective communications.
Strong working knowledge of basic office automation tool suites such as MS Office (Word, Excel, PowerPoint).
Primary Level Salary Range: $73,900.00 - $110,900.00The above salary range represents a general guideline; however, Northrop Grumman considers a number of factors when determining base salary offers such as the scope and responsibilities of the position and the candidate's experience, education, skills and current market conditions.Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.The application period for the job is estimated to be 20 days from the job posting date. However, this timeline may be shortened or extended depending on business needs and the availability of qualified candidates.Northrop Grumman is an Equal Opportunity Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO and pay transparency statement, please visit *********************************** U.S. Citizenship is required for all positions with a government clearance and certain other restricted positions.
Auto-ApplySenior Cyber Security Operations Analyst
Cyber security analyst job in Irvine, CA
at loan Depot
loan Depot's Security Operations team is at the forefront of cyber defense for the organization. We are seeking a Senior Security Analyst who will act as both a technical authority and front-line commander within our Security Operations Center. This is a strategic, high-impact role for a seasoned professional who can seamlessly integrate with our team on Day One, bringing the composure, knowledge, experience, and precision necessary to contain and eradicate cyber threats from our environment.Reporting directly to the Information Security Operations Manager, this position partners closely with our Level 1 MSSP, internal business units, and external incident response partners to ensure that every incident is managed with accountability, consistency, and efficiency. The ideal candidate is resourceful, quick-thinking, and deeply fluent with the leading security stacks and tools, capable of turning strands of data into decisive action and information. The Sr. Cyber SOC Analyst must be able to come into the Irvine, CA office 2-3 times per week.
Responsibilities:
Lead and execute end-to-end security incident response activities including detection and triage, containment, eradication, and recovery for incidents ranging from simple to complex.
Serve as incident commander for high-severity security events, ensuring clear communication and timely resolution across stakeholders.
Partner with Level 1 MSSP partners to validate escalations, refine detection logic, and ensure consistent handling workflows.
Coordinate with external partners and internal teams to contain and mitigate threats while maintaining operational resilience.
Detection, Analysis, & Threat Hunting
Utilize industry standard and/or custom tools for telemetry to conduct deep-dive investigations and root cause analysis.
Develop and optimize queries, analytic rules, and playbooks to enhance threat detection and automation, pushing incidents towards level 0 where possible.
Conduct proactive threat hunts and adversary emulation exercises to identify emerging tactics, techniques, and procedures (TTPs) before they escalate into incidents.
Leverage MITRE ATT&CK, NIST SP800-61r3, NIST CSF2, and other frameworks to ensure methodical and repeatable investigation practices.
Operational Excellence & Leadership
Document and refine incident response playbooks and runbooks to improve team consistency and speed.
Produce detailed incident reports, post-incident reviews, and executive summaries with actionable insights.
Mentor other analysts and emerging prospects, reinforcing our culture of accountability, consistency, and efficiency.
Participate in weekly high-severity incident case reviews and contribute to the continuous improvement of SOC metrics and performance.
Other duties as assigned.
Requirements:
Bachelor's Degree in a related field preferred, but not required.
Minimum of five (5) + years' experience working in a security operations center or similar environment preferred.
A demonstrated mastery of industry leading tools in SIEM, EDR, and CSPM.
Expertise in querying, hunting, and correlating disparate data points across large telemetry datasets using SQL/KQL/Cypher.
A demonstrated ability to lead complex investigations and coordinate across technical and business stakeholders.
A solid understanding of cybersecurity frameworks such as MITRE ATT&CK, NIST CSF 2, NIST SP800-61r3.
Excellent written and verbal communication skills, with the ability to translate technical findings into business-relevant narratives.
Experience in log aggregation technologies and SIEM tuning processes.
Experience in the Mortgage industry preferred.
CISSP, GIAC Certified Incident Handler, or other related certifications preferred.
Why work for #teamloan Depot:
Competitive compensation based on skillset and relatable experience.
Work with other passionate, purposeful, and customer-centric team members.
Inclusive, diverse, and collaborative culture where people from all backgrounds can thrive.
Extensive internal growth and professional development opportunities including tuition reimbursement.
Comprehensive benefits package including Medical/Dental/Vision.
Wellness program to support both mental and physical health.
Discretionary Time Off (DTO) policy to support work-life balance in addition to Paid Voluntary Time Off.
About loan Depot:
loan Depot (NYSE: LDI) is a digital commerce company committed to serving its customers throughout the home ownership journey. Since its launch in 2010, loan Depot has revolutionized the mortgage industry with a digital-first approach that makes it easier, faster, and less stressful to purchase or refinance a home. Today, loan Depot enables customers to achieve the American dream of homeownership through a broad suite of lending and real estate services that simplify one of life's most complex transactions. With headquarters in Southern California and offices nationwide, loan Depot is committed to serving the communities in which its team lives and works through a variety of local, regional, and national philanthropic efforts. Base pay is one part of our total compensation package and is determined within a range. This provides the opportunity to progress as you grow and develop within a role. The base pay for this roles is between $99,000 and $136,000. Your base pay will depend on multiple individualized factors, including your job-related knowledge/skills, qualifications, experience, and market location. We are an equal opportunity employer and value diversity in our company. We do not discriminate based on race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status.
Auto-ApplyNetwork Security Analyst I
Cyber security analyst job in San Diego, CA
Select Cyber, an Information Security recruitment specialty firm, seeks to fill the following role for our client:
Network Security Analyst I
Be part of a cutting-edge Computer Incident Response Team, (CIRT) for a fortune 500 company. We are looking for individuals that want to learn a new field and grow with the company. Training provided.
The selected candidate will be a part of the Security Operations Center (SOC) and its mission to improve the information security of our customers using a Security Information and Event Management (SIEM) tool to detect and analyze IT security incidents.
Responsibilities:
Perform the following functions as individual assignments or as part of a team:
· Monitoring client networks for signs of adversarial activity.
· Respond to alerts from various monitoring systems and platforms providing indicators for enterprise defensive measures.
· Analyze reports to understand threat campaign(s) techniques, lateral movements and extract indicators of compromise (IOCs).
· Triage potentially malicious events to determine severity and criticality of the event.
· Follow procedures to analyze and escalate security incidents which vary from customer to customer.
Experience
· 1+ years technical experience in the Information Technology field.
· Experience with Intrusion Detection & Prevention Systems (IDS/IPS) or Firewalls & Log Analysis a plus.
· Technical degree, Associate or Bachelor's degree from an accredited institution in Computer Science or information technology field preferred.
· CompTIA Network+/Security+ certifications is a plus
Information Systems Security Officer
Cyber security analyst job in Camp Pendleton South, CA
General information Requisition # R64222 Posting Date 11/14/2025 Security Clearance Required TS/SCI Remote Type Onsite Time Type Full time Description & Requirements Shape the future of defense with MANTECH! Join a team dedicated to safeguarding our nation through advanced tech and innovative solutions. Since 1968, we've been a trusted partner to the Department of Defense, delivering cutting-edge projects that make a real impact. Dive into exciting opportunities in Cybersecurity, IT, Data Analytics and more. Propel your career forward and be part of something extraordinary. Your journey starts now-protect and innovate with MANTECH!
MANTECH seeks a motivated, career and customer-oriented Information Systems Security Officer with strengths in Information Systems Security to join our team at Marine Corps Base Camp Pendleton California.
This position will assist Marine Corps Warfighting Laboratory (MCWL) prepare for and maintain the IT infrastructure, IT capabilities and Audio-Visual capabilities to support emerging ICD 705 Sensitive Compartmentalized Information Facilities (SCIFs) and Special Access Control Facilities (SAPFs) through planning, activation and operations.
Responsibilities include but are not limited to:
* Experience in network design, network monitoring, systems development, and knowledge of Information Assurance (IA) policies, directives, and best practices across DoD and Marine Corps.
* Knowledge and experience with organizations within the Marine Corps responsible for facilitating network approvals and connections.
* Work with various Marine Corps, Navy, Joint, and other services to coordinate installs supporting Initial Operating Capability (IOC) and Final Operating Capability (FOC).
* Ability to communicate and provide effective staff coordination across government, Marine Corps, and contractor organizations.
* Support the facility Site Security Manager (SSM)/Special Security Representative (SSR) and Information Systems Security Manager (ISSM) to oversee the secure installations and operations of systems across multiple security domains and in accordance with policies, directives, and best practices.
* Establishes and satisfies complex system-wide information security requirements based upon the analysis of user, policy, regulatory, and resource demands. Supports Marine Corps and other customers at the highest levels in the development and implementation of doctrine and policies.
Minimum Qualifications:
* Bachelor's degree and at least 10 years' experience planning and/or operating IT infrastructure within ICD 705 facilities.
* Experience with network security aspects of installations and operations.
Preferred Qualifications:
* Experience with MS Word, MS Power Point
Clearance Requirements:
* Candidate must have a current/active Top Secret clearance with the ability to obtain and maintain a TS/SCI clearance prior to starting this position.
Physical Requirements:
* Ability to maintain construction security oversight in outdoor environment; walk (with personal protective equipment) to inspect and document delivery of components and assembly/construction of structure.
The projected compensation range for this position is $112,400.00-$186,500.00. There are differentiating factors that can impact a final salary/hourly rate, including, but not limited to, Contract Wage Determination, relevant work experience, skills and competencies that align to the specified role, geographic location (For Remote Opportunities), education and certifications as well as Federal Government Contract Labor categories. In addition, MANTECH invests in its employees beyond just compensation. MANTECH's benefits offerings include, dependent upon position, Health Insurance, Life Insurance, Paid Time Off, Holiday Pay, short-term and long-term Disability, Retirement and Savings, Learning and Development opportunities, wellness programs as well as other optional benefit elections.
MANTECH International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with MANTECH, please email us at ******************* and provide your name and contact information.
Auto-ApplyCyber Security Engineer III
Cyber security analyst job in San Diego, CA
Location: San Diego CARequired Clearance: Secret Certifications: DoD 8570.01-M in accordance with (IAW) DFARS ************ Baseline Certification, minimum IAT Level III Required Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent to above disciplines Required Experience: Ten (10) years of full-time professional experience
Position Description:
PingWind is seeking the right fit to join a team of Cyber professionals as they support critical functions to provide Cyber Security for the Navy's network. You will ensure the highest level of cyber security by implementing STIGS, performing scans using tools such as ACAS, and tracking/patching/mitigating vulnerability findings. You will monitor and act upon situations involving Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS). Key goal is to ensure the warfighter can achieve their mission without the interference of adversaries and opportunistic hackers. Work is performed in support of Naval Surface Warfare Center (NSWC), DAHLGREN DIVISION in Virgina Beach as it conducts Research, Development, Test & Evaluation (RDT&E), analysis, systems engineering, integration, and certification of complex Department of Defense systems.
Primary Responsibilities:
Level III: Ten (10) years of full-time professional experience performing system hardening with demonstrated experience in the following areas:• Interrupting, implementing, tracking and reporting security measures such as STIGs and high impact vulnerability software patching• Monitoring firewalls and overall network for intrusion detection and prevention; acting on security events as they happen and reporting to senior leaders• Involvement in the Navy ATO process to ensure all security risks are removed, mitigated or avoided• Research and tackle security risks as they arise; understand the risk involved, recommend strategies to deal with them, and track/brief risks to leadership, keeping all stakeholders informed until an issue is resolved.
Required Qualifications:
• Secret• DoD 8570.01-M in accordance with (IAW) DFARS ************ Baseline Certification, minimum IAT Level III • Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent to above disciplines• Combined total of ten (10) years of full-time professional experience in the following skillsets/disciplines:• Littoral Combat Ship (LCS) Total Ship Computing Environment (TSCE) experience• Computer security, military system specifications, Security Management policy guidance and directives, DoD and cybersecurity policies;• Risk Management Framework (RMF) and the implementation of Cybersecurity and IA boundary defense techniques and various IA-enabled appliances. Examples of these appliances and applications are Firewalls, IDS, IPS, Switch/Routers, Cross Domain Solutions (CDS), EMASS and Endpoint Security Solution (ESS);• Performing STIG implementation;• Performing vulnerability assessments with the Assured Compliance Assessment Solution tool; and• Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems
Desired Qualifications/Experience:
• DoD 8570.01-M CSSP certification• RMF experience
About PingWind
PingWind is focused on delivering outstanding services to the federal government. We have extensive experience in the fields of cybersecurity, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement. PingWind is a VA CVE certified Service-Disabled Veteran-Owned Small Business (SDVOSB) with offices in Washington DC and Northern Virginia. ****************
Our benefits include:
• Paid Federal Holidays• Robust Health & Dental Insurance Options• 401k with matching• Paid vacation and sick leave• Continuing education assistance• Short Term / Long Term Disability & Life Insurance• Employee Assistance Program through Sun Life Financial EAP Guidance Resources
Veterans are encouraged to apply
PingWind, Inc. does not discriminate in employment opportunities, terms, and conditions of employment, or practices on the basis of race, age, gender, religious or political beliefs, national origin or heritage, disability, sexual orientation, or any characteristic protected by law.
Auto-ApplySenior Security Operations Analyst
Cyber security analyst job in Irvine, CA
As a Senior Security Operations Analyst, you will be a key member of our Security Operations team, responsible for detecting, investigating, and responding to cyber threats across our enterprise. You will help build and mature our SOC (Security Operations Center) capabilities, contribute to threat intelligence and incident response, and play a critical role in securing our e-commerce platforms, customer data, and connected product ecosystem.
This role requires a balance of hands-on technical expertise, analytical thinking, and the ability to communicate risk and remediation clearly to both technical and business stakeholders.
**Key Responsibilities**
Security Monitoring & Detection
· Lead monitoring of security events across SIEM, EDR, cloud, and network security platforms.
· Analyze alerts, correlate data, and distinguish between true positives, false positives, and emerging threats.
· Develop, tune, and improve detection use cases, rules, and automation playbooks.
Incident Response & Forensics
· Serve as a first responder and subject matter expert for security incidents, leading investigations and containment activities.
· Conduct forensic analysis on endpoints, cloud environments, and applications when necessary.
· Collaborate with IT, cloud, and DevOps teams to ensure rapid remediation and recovery.
Threat Intelligence & Hunting
· Perform proactive threat hunting activities to identify hidden risks or advanced persistent threats.
· Leverage external threat intelligence to enrich investigations and improve defensive measures.
· Stay current with evolving attack techniques, malware trends, and vulnerabilities relevant to retail, e-commerce, and IoT/connected devices.
Governance, Risk, and Compliance (Support)
· Support compliance initiatives (PCI-DSS, SOC2, ISO 27001, GDPR, CCPA, NIST etc.) by ensuring security controls are effective.
· Provide input into risk assessments and partner with vulnerability management to prioritize patching.
Collaboration & Continuous Improvement
· Partner with IT, Product, e-commerce, and retail technology teams to secure new business initiatives.
· Mentor junior analysts and contribute to knowledge-sharing across the team.
· Recommend and implement process improvements, automation, and best practices.
**Qualifications**
Required Skills & Experience
· 5+ years in a security operations or incident response role, with experience in enterprise-scale environments.
· Strong knowledge of SIEM, EDR, MDR, firewalls, and cloud-native security tools (AWS/GCP/Azure).
· Hands-on experience with incident handling, digital forensics, and malware analysis.
· Familiarity with MITRE ATT&CK, cyber kill chain, and common threat actor tactics.
· Proficiency in scripting (Python, PowerShell, or similar) to automate investigations or workflows.
· Excellent communication skills, with the ability to explain technical risks to non-technical stakeholders.
Preferred Skills
· Experience in retail, e-commerce, or IoT/connected device security.
· Experience in key principles of incident response & security operations.
· Experience in MDR & SIEM solutions
· retail, e-commerce, or IoT/connected device security.
· Exposure to PCI-DSS or other retail payment security frameworks.
· Knowledge of container security (Kubernetes, Docker) and DevSecOps practices.
· Relevant certifications: GCIA, GCIH, GCFA, CEH, OSCP, or CISSP.
**Pay Range:**
$112,200.00 - $148,500.00
The actual annual salary offered to a candidate will be based on variables including experience, geographic location, education, and skills/achievements, and will be mutually agreed upon at the time of offer.
We offer a highly competitive salary, comprehensive benefits including: medical and dental, vision, disability and life insurance, 401K, PTO, paid holidays, gear discounts and the ability to add value to an exciting mission!
Our Postings are not intended for distribution to or use in any jurisdiction, country or territory where such distribution or use would violate local law or would subject us to any regulations in another jurisdiction, country or territory. We reserve the right to limit our Postings in any jurisdiction, country or territory.
Equal Opportunity Employer Minorities/Females/Protected Veteran/Disabled
**Revelyst is a collective of makers that design and manufacture performance gear and precision technologies. Our category-defining brands leverage meticulous craftsmanship and cross-collaboration to pursue new innovations that redefine what is humanly possible in the outdoors. Portfolio brands include Foresight Sports, Bushnell Golf, Fox, Bell, Giro, CamelBak, Bushnell, Simms Fishing and more.**
Revelyst is an equal opportunity employer. All applicants are considered for employment without regard race, color, religion, sexual orientation, gender identity, national origin, disability, veteran status, and any other characteristics protected by law. The EEO Law poster is available here: ****************************************************************
If you need a reasonable accommodation because of a disability for any part of the employment process, please send an e-mail to ******************** . Please note that this email address is for accommodation purposes only. Revelyst will not respond to inquiries for other purposes.
Cybersecurity Lead/Information Systems Security Officer (ISSO)
Cyber security analyst job in San Diego, CA
Data Intelligence, LLC is seeking a highly experienced Cyber Security Lead / Information Systems Security Officer (ISSO) to support cybersecurity operations and compliance for Navy and Department of Defense (DoD) systems. This role requires deep expertise in Information Assurance (IA), cybersecurity compliance frameworks, and Navy-specific cybersecurity practices. The ideal candidate will have extensive experience working with Navy Cross Domain Solutions (NCDSO) and a strong technical background in military C4I/IT systems.
Key Responsibilities:
Serve as the Cyber Security Lead/ISSO for classified and unclassified Navy/DoD systems.
Lead Risk Management Framework (RMF) efforts in accordance with DoD 8500 Series, NIST SP 800 Series, and other applicable cybersecurity policies and guidelines.
Develop, review, and manage technical documentation including System Security Plans (SSPs), Security Assessment Reports (SARs), and Plan of Action & Milestones (POA&Ms).
Interface with the Navy Cross Domain Solutions Office (NCDSO) to support secure cross-domain solutions, including submission packages and coordination of approvals.
Provide subject matter expertise in support of system security engineering, integration, and testing.
Coordinate with system engineers, developers, and stakeholders to ensure security controls are effectively implemented.
Monitor systems for compliance with DFARS Clause ************ and other DoD IA requirements.
Assist in the preparation and review of technical instructions, engineering plans, and test-related documentation.
Maintain up-to-date knowledge of emerging cybersecurity threats, tools, and regulatory requirements.
Support system Certification and Accreditation (C&A) processes in accordance with NSA and DoD standards.
Required Qualifications:
Education:
Master's degree from an accredited college or university in Computer Science, Information Systems Management, Cybersecurity, or a related field.
Experience:
Minimum of 10 years of Navy or DoD experience in Information Assurance and Cybersecurity.
At least 5 years of recent experience (within the last 5 years) directly supporting Navy cybersecurity programs and RMF processes.
Direct experience with the Navy Cross Domain Solutions Office (NCDSO) within the last five years.
Demonstrated expertise in DoD cybersecurity requirements, including the DoD 8500 Series and NIST SP 800 Series.
Experience with engineering documentation including technical instructions, engineering plans, and systems integration documents.
Strong understanding of military C4I/IT systems, including Navy SATCOM (MILSATCOM and Commercial), Tactical Communications, and GPS systems.
High familiarity with the NSA certification process for secure systems.
Certifications:
Compliant with DFARS Clause ************ for Information Assurance Contractor Training and Certification (e.g., CISSP, CISM, Security+, or equivalent).
Security Clearance:
Must hold an active Top Secret / SCI (TS/SCI) clearance.
Preferred Skills:
Strong leadership and communication skills with the ability to brief senior stakeholders.
Ability to lead complex cybersecurity projects with minimal supervision.
In-depth knowledge of secure system design and implementation in classified environments.
Experience collaborating with cybersecurity authorities across Navy and DoD organizations.
About Data Intelligence, LLC:
Data Intelligence, LLC (DI) is a small business that provides Information Technology System Development (Agile, DevSecOps, Cloud Platform support) Cybersecurity (RMF, Security Engineering, Cross Domain Solutions), Tactical Data Link Standards Development and Testing, and Logistics/Warehousing services to U.S. federal clients both CONUS and OCONUS. DI consistently demonstrates exceptional customer service, maintains an employee-centric culture, and delivers hands-on technical expertise to help our clients achieve their mission.
Since 2005, DI has successfully provided IT Systems Engineering, Software Development, Cybersecurity, and supporting solutions and services to customers that include the Department of Defense, Intelligence, and Federal Civilian clients. Current clients include the US Navy, Air Force, Army, Marine Corps, Coast Guard, National Geospatial-Intelligence Agency, Defense Logistics Agency, and The Department of Homeland Security. DI is headquartered in Marlton, New Jersey, with satellite offices in California, Maryland, Ohio, Pennsylvania, Virginia, and Washington, D.C.
Why you should join us:
Data Intelligence offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities for advancement. Our excellent employee retention record reflects our employee focus. We work with Veteran's organization to proactively hire those who have served our country. We offer medical, dental and vision insurance, 401k, PTO and 11 paid holidays.
Data Intelligence is an Equal Opportunity employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.
Senior Security Engineer
Cyber security analyst job in Irvine, CA
About GoodLeap:GoodLeap is a technology company delivering best-in-class financing and software products for sustainable solutions, from solar panels and batteries to energy-efficient HVAC, heat pumps, roofing, windows, and more. Over 1 million homeowners have benefited from our simple, fast, and frictionless technology that makes the adoption of these products more affordable, accessible, and easier to understand. Thousands of professionals deploying home efficiency and solar solutions rely on GoodLeap's proprietary, AI-powered applications and developer tools to drive more transparent customer communication, deeper business intelligence, and streamlined payment and operations. Our platform has led to more than $30 billion in financing for sustainable solutions since 2018. GoodLeap is also proud to support our award-winning nonprofit, GivePower, which is building and deploying life-saving water and clean electricity systems, changing the lives of more than 1.6 million people across Africa, Asia, and South America.
Position Summary The GoodLeap security team is responsible for both business enablement and safeguarding the organization's information assets; it is involved in virtually all aspects of the business, from product safety and resilience, to building security paved roads, customer, partner, and regulatory trust, managing technology governance and compliance, and ensuring the privacy, and safety of GoodLeap's customers, partners, and employees information.
The senior security engineer role provides a unique opportunity to shape the security and resilience of GoodLeap corporate systems, services, and operational processes. In this role, you will work closely with product, engineering, IT, and business teams within GoodLeap, acting as the key individual with both the authority and responsibility to ensure the safety and resilience of enterprise systems, products, and services.
Your oversight will encompass: - Enterprise systems:Identifying potential misuse and abuse cases, proposing solutions to address these scenarios, and identifying product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements. - Build-time controls: Managing applications/products security controls and activities during development. - Runtime controls: Overseeing security measures at runtime, from prevention to detection and response.
Additionally, you will be involved with aspects of internally built products and represent all areas of security, spanning governance, risk, and compliance (GRC) to security monitoring, for a number of departments/teams. You will also have the authority and ability to involve other security team members as needed.
While you will take on multiple responsibilities-from advisor to builder and beyond-your primary focus will be designing and building security patterns and practices for services and processes, and fostering strong relationships with product, business, and engineering. Essential Job Duties & Responsibilities
Lead, participate in, and contribute to partnerships between security, IT, General & Administrative teams, engineering, product, and operations teams to build, orchestrate, and automate security controls and services in GoodLeap enterprise systems, products, services, and operational processes.
Identify potential misuse and abuse cases in enterprise systems, propose solutions to address these scenarios, and identify product features, configuration settings, and/or mitigating or compensating controls to meet resilience requirements.
Support or develop components of the security analytics platform.
Contribute to investigations, threat hunting, and incident response activities in a supporting role.
Collaborate with the monitoring and response team to create playbooks for specific incident response scenarios related to the products and services you oversee. These investigations, incidents, and playbooks may address security, fraud, privacy, resilience, and related concerns.
Support the security operations team with the vulnerability management lifecycle for products and services under your purview.
Ensure technical alignment for the products and services you oversee with team initiatives, including GRC, security operations, and monitoring and response activities.
Required Skills, Knowledge & Abilities
Strong communicator with the ability to lead technical architecture discussions, drive technical decisions, and effectively communicate with non-technical audiences.
Expertise in agile product lifecycles. Ideally, you have experience in a product manager or engineering manager role and understand how SaaS products (B2B, B2B2C, and B2C) are built, including roadmap planning and feature and defect prioritization.
Experience with threat modeling methodologies, with the ability to create efficient and scalable approaches to conducting such assessments.
Familiarity with AWS services, including KMS, SST, Container Registry, ELBs, Lambda, API Gateway, CloudTrail, and IAM (knowledge of GCP and/or Azure is a plus).
Proven ability to establish credibility and build trust with business, engineers, and operational staff; confident yet humble.
Hands-on experience with managing security for core enterprise systems, e.g., ERP, HCM, Salesforce, etc.
Strong understanding of both human and non-human identity management and common enterprise and consumer authentication standards and use cases.
Practical experience with CI/CD pipelines and DevOps tools, including Infrastructure-as-Code (IaC) tools like Terraform, Pulumi, or CDK; GitHub and GitHub Actions; artifact management; and secrets management tools like Doppler and HashiCorp Vault.
Passionate about learning new technologies. While you're not expected to know everything, you should demonstrate a willingness and ability to learn as needed.
Prior experience interfacing and supporting with G&A teams, internal product teams, and other cross-functional areas.
Proficiency in writing automation scripts in multiple languages, with prior experience automating security processes in cloud or SaaS environments.
Experience engaging with vendors in design partnerships.
Experience overseeing vulnerability and threat management at the platform and application levels.
Familiarity with penetration testing and red team exercises, including manual verification, exploitation, and lateral movement.
Ability to balance a high-level view of security strategy with attention to detail, ensuring thorough and effective execution.
Additional Information Regarding Job Duties and s:
Job duties include additional responsibilities as assigned by one's supervisor or other managers related to the position/department. This job description is meant to describe the general nature and level of work being performed; it is not intended to be construed as an exhaustive list of all responsibilities, duties and other skills required for the position. The Company reserves the right at any time with or without notice to alter or change job responsibilities, reassign or transfer job position or assign additional job responsibilities, subject to applicable law. The Company shall provide reasonable accommodations of known disabilities to enable a qualified applicant or employee to apply for employment, perform the essential functions of the job, or enjoy the benefits and privileges of employment as required by the law.
If you are an extraordinary professional who thrives in a collaborative work culture and values a rewarding career, then we want to work with you! Apply today!
We are committed to protecting your privacy. To learn more about how we collect, use, and safeguard your personal information during the application process, please review our Employment Privacy Policy and Recruiting Policy on AI.
Auto-ApplyInformation Security Analyst
Cyber security analyst job in San Diego, CA
Requirements
Bachelor's degree in Cybersecurity, Computer Science, or related field.
3+ years of experience in information assurance or cybersecurity.
DoD 8570 IAT Level II certification (Security+ CE, CySA+, or equivalent).
Familiarity with NIST, DISA STIGs, and DoD RMF compliance.
Must possess an active Secret Clearance - Required
This contractor and subcontractor shall abide by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disability.
Salary Description $88,000-$102,000
Information Security Engineer
Cyber security analyst job in Santa Ana, CA
Orange County's Credit Union is hiring: Information Security Engineer.
Why Orange County's Credit Union? With over 85 years of experience, serving 123,000+ members, and managing $2.5+ billion in assets, we are a premier financial service provider. Our mantra, "Putting People First: Connect, Discover, Deliver & Wow!" is not just a saying-it's a way of life. On our team. You'll work closely with leadership to ensure our projects are aligned with our mission to put people first.
What We Offer:
Comprehensive Benefits: Medical, Dental, and VSP effective day one of employment!
Financial Security: Enjoy peace of mind with life insurance at no cost to you and a robust 401(k) plan where we contribute up to 8%.
Work-Life Balance: Generous days of vacation, seven (7) sick days per year, and paid holidays, you'll have the time to recharge and pursue your passions.
Growth Opportunities: We believe in your professional and personal development, offering educational grants up to $2,000 per year, step progression opportunities, and annual performance merit increases.
Rewarding Work: Annual discretionary bonus and a supportive work environment that celebrates achievements and fosters collaboration.
Make a Difference with Us! If you're looking for a rewarding role where you can contribute to a positive work environment and make a difference in the community, we'd love to hear from you. Apply today and join a team that puts people first, values your expertise, and supports your growth.
OVERVIEW:
The Information Security Engineer will play a critical role in evolving and maturing the organization's information security program to ensure the confidentiality, integrity, and availability of Orange County's Credit Union assets. The program includes: policies, standards, guidelines, and controls to manage and prevent risks to Orange County's Credit Union. Responsible for conducting information security reviews (technology, application and process) and vulnerability / risk assessments, monitoring key / compensating controls and baseline configuration standards, and identifying / remediating control gaps to minimize risks.
ESSENTIAL FUNCTIONS:
Coordinate and perform risk and vulnerability assessments of the Credit Union's systems and processes to ensure appropriate controls are in place and recommend / implement controls to remediate risk findings.
In collaboration with IT Operations / Technology Services / Software Engineering and outside vendors, design and implement security tools, controls and automation frameworks to ensure the integrity, availability and confidentiality of the organization's data, systems and services on premises and in public cloud.
Design, develop and document (1) network security architecture and baseline configuration standards for firewalls, routers, switches, load balancers, and related network appliances; (2) device security architecture and baseline configuration standards for servers, workstations and mobile devices; (3) application and data security architecture and baseline configuration standards for databases and enterprise applications; and (4) cloud platform security architecture and baseline configuration standards for AWS and Microsoft Azure services.
QUALIFICATIONS:
Bachelor's Degree in Computer Science, Information Security, Information Assurance or related technology field.
5+ years of experience in information / cyber security and IT risk management (including hands-on experience in implementing, maintaining, and managing on-prem and cloud-based network / infrastructure / application / data security for the enterprise).
2+ years of hands-on experience in securing AWS and Microsoft Azure cloud infrastructure / applications / services / solutions.
Relevant security certifications (at least one is required), such as CISSP, SANS GIAC, CompTIA Security+, AWS Certified Security - Specialty, Azure Security Engineer Associate.
The targeted salary range is $100,000.00 to $125,000.00.
Final offer will be determined based on experience, education, training/certifications and specialized skills.
We perform thorough background check and credit check. EOE
Auto-ApplyIT Security Engineer
Cyber security analyst job in Irvine, CA
For More Open Positions Visit us at: ********************************** Our Mission WOONGJIN, Inc. is a rapidly growing team who provides a range of unique, exceptional, and enhanced services to our clients. We have a strong moral code that includes the service of goodness without expectations of reward. We are motivated by the sense of responsibility and servant leadership.
Benefits
Medical Insurance
Vision Insurance
Dental Insurance
401(k)
Paid Sick hours
Job Description
The IT Security Engineer is responsible for supporting the planning, implementation, and management of the organization's IT security infrastructure and policies. This role assists in identifying security risks, responding to incidents, and ensuring compliance with internal standards and external regulations.
Responsibilities
Assist in developing, implementing, and maintaining IT security policies, standards, and procedures
Monitor and analyze security events, logs, and alerts using tools like Splunk of Sentinel to detect and respond to threats
Collaborate with internal IT teams and external vendors to improve overall security posture
Manage user access controls and identity management systems
Monitor and audit for potential security breaches, abnormal behavior, and unauthorized access
Verify that applied security policies are properly configured and effectively enforced
Monitor network, system, and application security to detect and respond to potential threats and vulnerabilities
Participate in incident response processes, including investigation, containment, recovery, and documentation
Assist in audits and ensure compliance with regulatory requirements
Support security awareness training and compliance initiatives for employees and third parties
Maintain up-to-date knowledge of cybersecurity trends, threats, and best practices
Document security configurations, procedures, and technical findings
Conduct vulnerability assessments
Salary:
$80,000 - $95,000 per year (D.O.E)
Qualifications
Skills
3 - 5 years of experience in IT security or related IT roles required
Knowledge of security technologies such as firewalls, IDS/IPS, antivirus, SIEM, and endpoint protection required
Security certifications preferred (e.g., CISSP, CISM, CompTIA Security+, CEH) preferred
Strong problem-solving, analytical, and communication skills required
Education & Experience
Bachelors Degree Required
Computer Science, Information Security, or a related field required
6 - 9 Years of Direct Experience Required
7 - 11 Years of Direct Experience Required
1 - 3 Years of Supervisory Experience Required
3-5 years of experience in IT Security or related IT roles required
Physical Requirements
Ability to sit in front of a desk and/or in front of the computer for long periods
Repetitive use of hand/grasping product, writing, and typing
Lift up to 10lbs
Carry up to 10lbs
Stand/walk
Additional Information
All your information will be kept confidential according to EEO guidelines.
*** NO C2C ***
IT Security Engineer
Cyber security analyst job in Irvine, CA
For More Open Positions Visit us at:
**********************************
Our Mission WOONGJIN, Inc. is a rapidly growing team who provides a range of unique, exceptional, and enhanced services to our clients. We have a strong moral code that includes the service of goodness without expectations of reward. We are motivated by the sense of responsibility and servant leadership.
Benefits
Medical Insurance
Vision Insurance
Dental Insurance
401(k)
Paid Sick hours
Job Description
The IT Security Engineer is responsible for supporting the planning, implementation, and management of the organization's IT security infrastructure and policies. This role assists in identifying security risks, responding to incidents, and ensuring compliance with internal standards and external regulations.
Responsibilities
Assist in developing, implementing, and maintaining IT security policies, standards, and procedures
Monitor and analyze security events, logs, and alerts using tools like Splunk of Sentinel to detect and respond to threats
Collaborate with internal IT teams and external vendors to improve overall security posture
Manage user access controls and identity management systems
Monitor and audit for potential security breaches, abnormal behavior, and unauthorized access
Verify that applied security policies are properly configured and effectively enforced
Monitor network, system, and application security to detect and respond to potential threats and vulnerabilities
Participate in incident response processes, including investigation, containment, recovery, and documentation
Assist in audits and ensure compliance with regulatory requirements
Support security awareness training and compliance initiatives for employees and third parties
Maintain up-to-date knowledge of cybersecurity trends, threats, and best practices
Document security configurations, procedures, and technical findings
Conduct vulnerability assessments
Salary: $80,000 - $95,000 per year (D.O.E)
Qualifications
Skills
3 - 5 years of experience in IT security or related IT roles required
Knowledge of security technologies such as firewalls, IDS/IPS, antivirus, SIEM, and endpoint protection required
Security certifications preferred (e.g., CISSP, CISM, CompTIA Security+, CEH) preferred
Strong problem-solving, analytical, and communication skills required
Education & Experience
Bachelors Degree Required
Computer Science, Information Security, or a related field required
6 - 9 Years of Direct Experience Required
7 - 11 Years of Direct Experience Required
1 - 3 Years of Supervisory Experience Required
3-5 years of experience in IT Security or related IT roles required
Physical Requirements
Ability to sit in front of a desk and/or in front of the computer for long periods
Repetitive use of hand/grasping product, writing, and typing
Lift up to 10lbs
Carry up to 10lbs
Stand/walk
Additional Information
All your information will be kept confidential according to EEO guidelines.
*** NO C2C ***
Information Security Analyst II
Cyber security analyst job in San Diego, CA
Why PlayStation?
PlayStation isn't just the Best Place to Play - it's also the Best Place to Work. Today, we're recognized as a global leader in entertainment producing The PlayStation family of products and services including PlayStation 5, PlayStation 4, PlayStation VR, PlayStation Plus, acclaimed PlayStation software titles from PlayStation Studios, and more.
PlayStation also strives to create an inclusive environment that empowers employees and embraces diversity. We welcome and encourage everyone who has a passion and curiosity for innovation, technology, and play to explore our open positions and join our growing global team.
The PlayStation brand falls under Sony Interactive Entertainment, a wholly-owned subsidiary of Sony Group Corporation.
PlayStation is looking for an Information Security Analyst to join our team and operate the day-to-day Information Security, Risk and Compliance management processes. This is a mixture of processing requests from the business and driving internal security projects such as security audit and assessment. This role requires a sound understanding of technical and engineering terminology, outstanding ability to articulate risk across any security domains (technical and governance) with the demonstrable ability to work independently and process high volumes of security requests on a weekly basis. This role also provides ample opportunity to work across technical and game-related projects with studio and PlayStation engineering teams and therefore requires risk advisory and influencing experience.
Based in San Diego, the candidate will be the key business relationship partner on behalf of Information Security and work on Information Security processes as well as strategic projects across PlayStation and the Studios group. This role will collaborate closely directly with business, technical and third party collaborators, as well as work multi-functionally with our other Information Security specialist teams across the globe to protect PlayStation's intellectual property, data and infrastructure whilst delivering new and evolving games, services and hardware to the market. This is an opportunity to provide security directly to the global PlayStation business, our PlayStation Network and global Studios and their game development.
What you will be doing:
Serve as a primary partner to PlayStation Studios, supporting security risk management across global game development and studio environments.
Triage and manage technical and strategic security risks across studios, ensuring alignment to security strategy and policy compliance.
Engage directly with technical teams and studio leadership to strengthen risk posture, manage vulnerabilities, and drive mitigation strategies.
Act as a trusted advisor to studio teams, driving a culture of embedding “security by design” principles.
Support the creation of risk insights, reporting, and executive briefings that inform leadership on studio security health and emerging trends.
Maintain broad knowledge of emerging security trends, risks, adn technologies that are applicable to the studio business and Sony at large.
Advance the Information Security program through collaborative and cross-team partnerships.
Required Experience:
3+ years of experience in information security, with demonstrated expertise in risk identification and mitigation.
2+ years conducting risk assessments and providing actionable recommendations to technical and business stakeholders.
2+ years working in vulnerability management, including detection, analysis, reporting, or remediation tracking.
2+ years of hands-on experience managing or evaluating cloud environments, networks, and security infrastructure.
2+ years of experience communicating risk and security insights to leadership and cross-functional partners.
Preferred Experience & Attributes:
Background in the gaming or entertainment industry.
Experience leading projects or programs in a security or risk management capacity.
Technical and Security focused certifications a strong preference
Confident communicator able to translate complex security risk concepts for both technical and non-technical audiences.
Comfortable working in a dynamic, fast-paced environment balancing innovation and security priorities.
Proven success working independently to establish relationships, deliver requirements, and communicate effectively.
#LI-GM1
Please refer to our Candidate Privacy Notice for more information about how we process your personal information, and your data protection rights.
At SIE, we consider several factors when setting each role's base pay range, including the competitive benchmarking data for the market and geographic location.
Please note that the base pay range may vary in line with our hybrid working policy and individual base pay will be determined based on job-related factors which may include knowledge, skills, experience, and location.
In addition, this role is eligible for SIE's top-tier benefits package that includes medical, dental, vision, matching 401(k), paid time off, wellness program and coveted employee discounts for Sony products. This role also may be eligible for a bonus package. Click here to learn more.
The estimated base pay range for this role is listed below.$140,000-$210,000 USD
Equal Opportunity Statement:
Sony is an Equal Opportunity Employer. All persons will receive consideration for employment without regard to gender (including gender identity, gender expression and gender reassignment), race (including colour, nationality, ethnic or national origin), religion or belief, marital or civil partnership status, disability, age, sexual orientation, pregnancy, maternity or parental status, trade union membership or membership in any other legally protected category.
We strive to create an inclusive environment, empower employees and embrace diversity. We encourage everyone to respond.
PlayStation is a Fair Chance employer and qualified applicants with arrest and conviction records will be considered for employment.
Auto-ApplyCyber Security Analyst I
Cyber security analyst job in Norco, CA
Cyber Security Analyst I - Onsite in Norco, CA
The Cyber Security Analyst I is an entry-level position that provides technical and analytical support to protect Navy systems, networks, and data against cyber threats. This role supports the monitoring, detection, and initial response to cybersecurity incidents, while ensuring compliance with Navy and Department of Defense (DoD) security standards. The position involves assisting with system vulnerability assessments, applying Security Technical Implementation Guides (STIGs), supporting Risk Management Framework (RMF) activities, and providing frontline defense against cyber risks. The ideal candidate will be motivated, detail-oriented, and eager to learn within a mission-focused environment.
As with any position, additional expectations exist. Some of these are, but are not limited to, adhering to normal working hours, meeting deadlines, following company policies as outlined by the Employee Handbook, communicating regularly with assigned supervisor(s), and staying focused on the assigned tasks.
Responsibilities
Monitor Navy networks and systems for suspicious activity, unauthorized access, or security violations
Assist in applying DoD STIGs, security patches, and configuration changes to maintain compliance
Support Risk Management Framework (RMF) documentation, assessments, and reporting requirements
Conduct vulnerability scans, review security logs, and analyze alerts from tools such as ACAS, HBSS, and Splunk
Document incidents and escalate issues to senior cyber analysts or supervisors as required
Assist in preparing security reports and compliance audits
Provide support during cybersecurity exercises, inspections, and readiness reviews
Work with system administrators and engineers to ensure secure configurations across Navy IT systems
Stay current on evolving cyber threats and assist in updating security procedures and best practices
Basic Qualifications
Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field
1-2 years of experience in cybersecurity, IT systems, or related technical roles (internships acceptable)
Foundational knowledge of cybersecurity principles, risk management, and network defense
Familiarity with security tools such as ACAS, Splunk, HBSS, or other monitoring platforms
Strong analytical, organizational, and problem-solving skills
Excellent written and verbal communication skills
Must be a U.S. Citizen
Ability to obtain and maintain a DoD security clearance
If applicable: If you are or have been recently employed by the U.S. government, a post-employment ethics letter will be required if employment with VSolvit is offered
Preferred Qualifications
Active DoD Secret Clearance
CompTIA Security+ CE or equivalent baseline DoD 8570 certification
Familiarity with Navy or DoD IT systems, RMF processes, or cybersecurity compliance frameworks (e.g., NIST 800-53, NIST 800-171)
Hands-on experience with vulnerability scanning, incident response, or STIG application
Exposure to cloud security (AWS, Azure, or DoD cloud environments)
Prior experience supporting Navy, DoD, or defense-related cybersecurity operations
Company Summary
Join the VSolvit Team! Founded in 2006, VSolvit (pronounced 'We Solve It') is a technology services provider that specializes in cybersecurity, cloud computing, geographic information systems (GIS), business intelligence (BI) systems, data warehousing, engineering services, and custom database and application development. VSolvit is an award winning WOSB, CA CDB, MBE, WBE, and CMMI Level 3 certified company. We offer a customizable health benefits program that best meets the needs of its employees. Offering may include: medical, dental, and vision insurance, life insurance, long and short-term disability and other insurance products, Health Savings Account, Flexible Spending Account, 401K Retirement Plan options, Tuition Reimbursement, and assorted voluntary benefits. Our goal is to grow together and enjoy the work that we do as a team.
VSolvit LLC is an Equal Opportunity/Affirmative Action employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, national origin, protected veteran status, or disability status.
Auto-ApplyInformation Security Analyst I (Temporary)
Cyber security analyst job in San Diego, CA
T3W Business Solutions, Inc. is a Woman-Owned Small Business with Headquarters located in San Diego, CA. It is our mission to help our clients develop strategies to optimize their use of space and resources resulting in maximum benefits; we also deliver quality data and analysis to support our clients' daily facility operations, planning, and compliance programs. We are looking for an Information Security Analyst I (NIWC Pacific) in San Diego, CA.
** This is a temporary position that could last 13 months**
Position Summary
Provide professional information security services assist NIWC Pacific Security Support Services.
Responsibilities
Function as a Key Management Infrastructure (KMI) Operating Account Manager (KOAM) Clerk and to be responsible for maintaining Two-Person Integrity (TPI) requirements as outlined in Navy Regulations
Prepare and maintains accurate records of COMSEC material received, held, transferred, hand receipted, and destroyed IAW Electronic Key Management System (EKMS) 1 (series)
Maintain message files and correspondence originated pertaining to the maintenance and administration of COMSEC accounts
Transfer/receipt of Communications Security (COMSEC) to/from the account to include - wrapping material and inspecting packages for discrepancies/tampering
Conduct destruction, dispose/recycle equipment components and report compliance IAW EKMS 5 series
Assist with Inspection of COMSEC containers/secure rooms IAW Department of the Navy (DoN) and Department of Defense (DoD) security doctrine.
Issue secure voice equipment and install KEYMAT prior to issue and ensure units are re-keyed quarterly
Provide customer support by assisting COMSEC users at the Customer Service counter, answering the phones, and making appointment for customers
Knowledge, Skills, and Abilities
Knowledge of Department of the Navy (DoN) and Department of Defense (DoD) security regulations and policies related to Communications Security (COMSEC) principles, policy and procedures concerning control, accountability and use of cryptographic equipment, software, keying material
Knowledge of Key Management Infrastructure (KMI) Policies and national/user level requirements for traditional COMSEC accounting as well as the operation of electronic key management system (EKMS)/KMI accounts
Knowledge of Secretary of the Navy Instruction (SECNAV) 5510.30 and 5510.36 directives
Knowledge of DoN packing and shipping procedures for classified and controlled cryptographic items
Skills in performing software upgrades using SKL
Skills in performing destruction of COMSEC Material IAW DoN Regulations
Requirements
Minimum active Secret clearance and ability to obtain and maintain a Top Secret (SCI) clearance
0-2 years of relevant experience
A valid driver's license
Ability to lift items up to 40lbs when offloading shipments or moving material
Proficient in Microsoft Office applications, such as Word, Excel, PowerPoint, and Access
Ability to walk moderate distances, stoops, bend, climb, kneel, push, and pull in the performance of semiannual inventories
Infrequent travel may be required
Preferred
Active TS clearance or higher
Prior military experience/background (preferably Navy or Marines)
This contractor and subcontractor shall abide by the requirements of 41 CFR §§ 60-1.4(a), 60-300.5(a) and 60-741.5(a). These regulations prohibit discrimination against qualified individuals based on their status as protected veterans or individuals with disabilities and prohibit discrimination against all individuals based on their race, color, religion, sex, sexual orientation, gender identity or national origin. Moreover, these regulations require that covered prime contractors and subcontractors take affirmative action to employ and advance in employment individuals without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status or disability.
Salary Description $68,400-$71,000